Star topology, Computer Network Security

Assignment Help:

STAR TOPOLOGY

In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.

2452_Star topology.png

 

Figure: An idealized star network

It is very important to show that these networks are not physically like stars but they are seems like stars. It defines that their shape does not seems like a star but their connections are just same as a star. The above figure is idealized. Here is given a star network in practice in the diagram below:

 

1758_Star topology practice.png


Related Discussions:- Star topology

What do you meant by network address translation, Problem: (a) What do ...

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Estimate the average throughput, Question (a) Estimate the average thr...

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Evaluate the sample correlation between y and z, Question: (a) Data on ...

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Ring topology, RING TOPOLOGY In this topology of network the devices a...

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Explain briefly the role of the physical layer, a) Calculate the CRC for th...

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

Attacks on wireless network, Q. Attacks on wireless network WSN are vul...

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Biology, Ask question #Minimum 100 words are there non parasitic v...

Ask question #Minimum 100 words are there non parasitic viruses

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Virtual terminal protocol vtp, Write down the short notes on VTR.  Communic...

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd