Atm cells, Computer Networking

To accept its goals, ATM uses fixed, small sized packets known cells. Every cell has 53 octets. VPI/VCI fields shows the cells destination.

PRIO say if cell can be discarded CRC examine the header bits only. ATM header is approximate the 10% of the cell. Ethernet may have overhead of only 1%. Engineers sometimes call the ATM load the cell tax. An ATM is given below.

2284_atm cells.png

Posted Date: 7/31/2012 7:17:49 AM | Location : United States







Related Discussions:- Atm cells, Assignment Help, Ask Question on Atm cells, Get Answer, Expert's Help, Atm cells Discussions

Write discussion on Atm cells
Your posts are moderated
Related Questions
Address is a full unique identifier. Connectionless delivery needs address on every packet. Connection-oriented delivery may use a short hand that shows the connection rather th

Q. Show the Character-level Encryption? - Substitutional - Monoalphabetic - simplest form; also called Caesar cipher - Every character is replaced with another character

Question 1: The following is a dump of a TCP header in hexadecimal format: 00CD0018 00000EF1 00000D5D 502200D1 01BF0010 Please answer the following two parts of questions

how to remove runtime error..

Q. Flow control in TCP? The amount of data a source is able to send before receiving an ACK from the destination Whether to send 1 byte of data as well as wait for ACK

Q. Describe Mail Access Protocols? Mail Access Protocols - Used by receiver to retrieve mail when desired - Post Office Protocol, version 3 (POP3) is a simple limited

Recognize the command to view the configuration-register value Ans) show version is the command to view the configuration-register value

Recognize the command that will show the RIP routes entering and leaving the router? Ans) Route# debug ip rip

You need to enable both arpa and snap encapsulation on single router interface. How do you do this? Ans)Assign two network numbers, one for every encapsulation type.

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain