Star topology, Computer Network Security

 

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a star network consists of one main hub, switch or computer, which performs as a conduit to transmit packets. This consists of a central node, to which all other packets are connected; this main node gives a common connection point for all devices through a hub. In Star topology each node is transferred to central device known switch or hub. The switch is the server and the peripherals are the users.

 

2100_Star Topology.png

Posted Date: 8/20/2012 3:11:52 AM | Location : United States







Related Discussions:- Star topology, Assignment Help, Ask Question on Star topology, Get Answer, Expert's Help, Star topology Discussions

Write discussion on Star topology
Your posts are moderated
Related Questions
how can i start thesis? Please mention so of examples?

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio


STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Network diagram for a mediacal care

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID