Broadcast and multicast , Computer Networking

Broadcast and Multicast :

Broadcast and Multicast :In the broadcast interconnection network, at one time one node transfer the data and all other nodes get that data.  Broadcast is one to all mapping.  It is the execution achieved by SIMD computer systems.  Message passing multi-computers also has broadcast networks.  In multicast network many nodes are concurrently allowed to transfer  the data and multiple nodes get the data. 

Posted Date: 3/2/2013 4:54:47 AM | Location : United States







Related Discussions:- Broadcast and multicast , Assignment Help, Ask Question on Broadcast and multicast , Get Answer, Expert's Help, Broadcast and multicast Discussions

Write discussion on Broadcast and multicast
Your posts are moderated
Related Questions

Tools for Digital Sound Sound is the oscillation of pressure that propagates in the form of a wave. Sound waves are transmitted through some medium (solid, liquid, or gas); th

In link-state routing network topology is filled from route calculation. Switches send link-state information about local joins. Every switch creates own routing tables. It needs

Which layers are user support layers? Three layers are come under user support layer:- a. Session Layer b. Presentation Layer and c. Application Layer

Determine the task which should intranet require Intranet to work smoothly, the following tasks should be properly synchronised: All computers connected together in a n

IGP= Interior gateway routing protocol and EIGRP= Enhanced Interior Gateway routing protocol IGP = use in one Autonomous and EIGRP = use with many autonomous

Hi Sir. I am Deep. I am studying masters of networking. I have an assignment which is due on Monday 28 August. Is this possible to make it within 5 days? And also tell me that how

Sharing  information  To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each c

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Q. Describe Mail Access Protocols? Mail Access Protocols - Used by receiver to retrieve mail when desired - Post Office Protocol, version 3 (POP3) is a simple limited