Star topology, Computer Network Security

 

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a star network consists of one main hub, switch or computer, which performs as a conduit to transmit packets. This consists of a central node, to which all other packets are connected; this main node gives a common connection point for all devices through a hub. In Star topology each node is transferred to central device known switch or hub. The switch is the server and the peripherals are the users.

 

2100_Star Topology.png

Posted Date: 8/20/2012 3:11:52 AM | Location : United States







Related Discussions:- Star topology, Assignment Help, Ask Question on Star topology, Get Answer, Expert's Help, Star topology Discussions

Write discussion on Star topology
Your posts are moderated
Related Questions
People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

on LAN,where are IP datagrams transported?

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a