Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the important topologies for networks?

Answer Posted / pawan yadav

a way designed of networking called topology.
different types of topology like as:-
1 star topology
2.bustopology
3.ring topology
4.hybrid topology.(in this topology used star& bus topology)
5.mesh topology.
mosty used star topology in lan networking.

Is This Answer Correct ?    11 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.

1842


Define Satellite Networks

1177


How the code in popup card number(SIM recharge card number) will be unique?How they designed?What is the formula?Please answer me?

2237


Enumerate the main responsibilities of data link layer ?

2005


On a nexus, is the metric-type keyword not available in the "default-information originate" command?

1122


Explain network topologies ?

1191


A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20 db.Calculate the maximum achievable data rate ?

2901


what is piggy backing?

1237


not able to connect to SBI Visa payment server...Getting message like "Server not found"...."proxy protected by firewall"....how to resolve this issue?

4223


Which layer is used to route packets

1824


Differentiate between IEEE 802.3, IEEE 802.4 and IEEE 802.5 standards.

4944


Which layer is used to run services like FTP, Telnet etc.

1953


How do cryptography-based keys ensure the validity of data transferred across the network?

6669


When is a translating bridge used ?

1692


Explain leaky bucket algorithm and compare it with token bucket algorithm.

2623