Network Topologies (Bus Network: (All nodes are attached to the backbone.,…
All nodes are attached to the backbone.
The terminators prevent signal reflection.
Prone to collisions
If there is a backbone problem then the whole network goes down.
A waveband is divided into channels to allow multiple data streams on one carrier.
Channels have to be fairly widely separated to avoid interference.
There are security issues that need to be addressed.
It is easy to eavesdrop on a wireless signal.
Encryption is crucial.
All nodes are involved in the transmission of a message.
There is no single point of failure.
Nodes can talk to each other.
Multiple pathways are possible.
Protocols are standards or rules that govern communication between devices.
They involve software or hardware.
They are used for addressing.
The IP address is part of the TCP/IP protocol.
An IP address is a series of binary numbers normally displayed in decimal or hexadecimal.
Each node has an independent connection to a central switch or server.
Encryption is used to make passages intelligible to unauthorised people.
Asymmetric key Encryption:
In Asymmetric key encryption:
A public key is used to encrypt a message.
A secret private key is linked to this and is required to decrypt the message.
Only the holder of the paired private key can decrypt the message.