What are some drawbacks of implementing a ring topology, Computer Networking

What are some drawbacks of implementing a ring topology?

In case one workstation on the network varies a malfunction, it can bring down the whole network. Another drawback is that when there are adjustments and reconfigurations required to be performed on a particular part of the network, the whole network has to be temporarily brought down as well.

 

Posted Date: 8/5/2013 2:26:12 AM | Location : United States







Related Discussions:- What are some drawbacks of implementing a ring topology, Assignment Help, Ask Question on What are some drawbacks of implementing a ring topology, Get Answer, Expert's Help, What are some drawbacks of implementing a ring topology Discussions

Write discussion on What are some drawbacks of implementing a ring topology
Your posts are moderated
Related Questions
Question: a) Briefly describe how the file system is organized in Unix. b) What is the importance of the "touch" command. Give one of its disadvantage. c) Name three d

Name the Twisted pairs cables Twisted pairs cables (Shielded and Unshielded), Coaxial cable and Fiber optic cable. ?Testing of the points ?Testing of the entire network t

Q. Show the Class D and Class E Addresses? Class D and Class E Addresses Class D - reserved for multicast addresses Multicasting - transmission method which allo

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

Can you describe the concept of IP multicasting or multicast IP address?

details of delta routing??

Q. Straight through Lan Cable ? Straight through Cable - Maintain the pin connection each the way through the cable. - The wire connected to pin 1 is the similar on bo

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

Q. Illustrate the Model for Network Security? - A message is transferred from one party (Principal) to another. - A logical information channel is founded between the t

The client side building block moves towards the client side of the application. The server side building block moves towards the server side of the application.