What are the important topologies for networks, Computer Networking

Assignment Help:

What are the important topologies for networks?

BUS topology: In this every computer is directly linked to primary network cable in a single line.

Advantages: Inexpensive, simple to install, simple to understand, simple to extend.

STAR topology: In this all computers are linked using a central hub.

Advantages: Can be inexpensive, simple to install and reconfigure and easy to trouble shoot physical problems.

RING topology: In this all computers are linked in loop. Advantages: All computers have equal access to network media, installation can be easy, and signal does not degrade as much as in other topologies because each computer regenerates it.

 


Related Discussions:- What are the important topologies for networks

Sorting using interconnection networks, The combinational circuits use the ...

The combinational circuits use the comparators for comparing the storing and number them on the basis of minimum and maximum functions. Likewise, in the interconnection networks th

Why mac address called physical address, MAC address called Physical addres...

MAC address called Physical address Because it's not changeable

Source port number - transport layer, Source Port Number This fields o...

Source Port Number This fields occupies  the first 16 bytes of the UDP header. This  fields typically hold the UDP port number  of the application sending  this datagram. The

Create and simulate a network - netml system, Create and simulate a network...

Create and simulate a network similar to the one shown here, using the NetML system. The network is a little more complex, as depicted at the right. There is an extra node

Explain in detail about wireless network, Explain in detail about wireless ...

Explain in detail about wireless network Think about unseen terminal problem. Imagine a wireless network consist of five stations, A through E, such that each one them is in r

A Comparative Study between MPLS VPN and the Public Internet, A Comparative...

A Comparative Study between MPLS VPN and the Public Internet which has intro. operation of tecnology, analysis, discussion, recommendation, conclusion.

Explain categorization according to pipeline configuration, Categorization ...

Categorization according to pipeline configuration According to the configuration of a pipeline, the below categories are recognized under this classification: Unifunct

What is kerberos in networking, What is Kerberos in Networking? It is a...

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover

Error detection-- crc, Error Detection-- CRC Powerful error detecti...

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

Describe some common threats to the hardware, Describe some common threats ...

Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd