Computer Network Topology
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2010, Vol 2, Issue 11
Abstract
In recent day’s demands of high productivity, security of computer systems and computer networks is very important and popular issue. Communication network in a distributed computing environment, which is arranged in a geometrical shape, called network topology. There are different types of the topologies like bus, ring, star, tree, mesh, hybrid etc. However, we will consider five basic network structures- topology. In the present paper a detailed study and analysis on network topologies is presented. Definitions of physical and logical topology are also provided.
Authors and Affiliations
Vikram Singh, Jaspal Ramola
Comparative Demographic Distribution of Upper and Lower Assam
India is a country with rich tapestry of cultures, ethnic mixes, languages and traditions which coexist in harmony and peace. Assam, a state in the northeast part of India sets a fine example which contributes to the pr...
Formability Analysis in Incremental Sheet Forming Of Aluminium Alloy
Non-corrosiveness and lightweight are the characteristics of aluminium due to which it is finding wider application in industries. However, forming aluminium sheet is difficult as compared to steel. Thus, emerging metho...
An Ensemble Model for Teaching Assistant Evaluation using Classification Technique
Teaching Assistant Evaluation is very important for every education sector for academic improvement. To improve the performance of teaching skill, criteria is increasing day by day. Due large number of data and criteria...
Wireless Human Detection Robot
The advent of new high-speed technology and the growing computer capacity provided realistic opportunity for new robot controls and realization of new methods of control theory. This technical improvement together with...
Authenticating Machines by Using Human Biometric
The main aim of this paper is to design and implement authenticating machines by using human biometric which can be organized in bank, secured offices and homes. In this system only authorized person can be used bank lo...