Types of topologies, Computer Networking

Assignment Help:

TWO DIFFERENT KINDS OF TOPOLOGIES:

LOGICAL TOPOLOGY:

 It is described by the specific network technology.

PHYSICL TOPOLOGY:

It relays on the wiring scheme.

NETWORK INTERFACE CARD AND WIRING SCHEMES:

1686_Types OF TOPOLOGIES.png

 

Figure 

To allow modifying the wiring without modifying the interface hardware, NICs support multiple wiring methods. it is given in the figure below.

 


Related Discussions:- Types of topologies

Packet cost - network layer and routing , Packet  Cost Both  distance ...

Packet  Cost Both  distance vector and link  state  routing  are lowest  algorithms. Tow factors  govern  how  cost is applied to packets  in determines  a route. Cost  is a

What is data encapsulation, What is data encapsulation? Data encapsulat...

What is data encapsulation? Data encapsulation is the method of breaking down information into smaller manageable chunks before it is transferred across the network. It is also

Half duplex ethernet operation, Half-Duplex - Capability for data transmis...

Half-Duplex - Capability for data transmission in only single direction at a time among sending station and a receiving station.

Comp architecture, In reg-mem architecture, clock cycle is 10 ns wide. It i...

In reg-mem architecture, clock cycle is 10 ns wide. It is proposed that reg-reg architecture be used instead, that reduces the clock cycle by 2 ns. However, it requires an addition

Explain the rad methodology with a suitable diagram, Question : (a) Exp...

Question : (a) Explain the ‘RAD' methodology with a suitable diagram. (b) One of the activities to be performed during Rapid Application Development is Rapid Business Analys

Dns message - application layer, DNS Message There are  the only  two ...

DNS Message There are  the only  two kinds  of DNS message DNS query and reply messages. Further mote both query  and reply message have  the same  format  as shown in figure.

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Difference among symmetric and asymmetric cryptosystem, what's the differen...

what's the difference among Symmetric and Asymmetric cryptosystem?

Networks - fundamental of network , Normal 0 false false fa...

Normal 0 false false false EN-IN X-NONE X-NONE Networks A networks  consists of two  or m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd