Circuit switching and , Basic Computer Science

Circuit Switching:

Many switching techniques are in use. One of them is line or circuit switching in which a communications path is actually established before the message is accepted for transmission. For voice communication circuit switching is the norm where by a path through connected circuits is established. While this method is suited to telephone traffic, it is not so, economical or efficient for data which is transmitted at different bit rates and in varying amounts. 

Message Switching:

This is a different technique associated with switching. According to this method, the system accepts all messages, stores them in a computer, and transmits them as and when channels become available,  

Posted Date: 10/25/2012 12:50:28 AM | Location : United States







Related Discussions:- Circuit switching and , Assignment Help, Ask Question on Circuit switching and , Get Answer, Expert's Help, Circuit switching and Discussions

Write discussion on Circuit switching and
Your posts are moderated
Related Questions
Question 1 Explain the importance of graphics in multimedia. What are few of the tips to keep in mind while using graphics for the web? Question 2 Write a long note on co

Question 1 What are the various steps involved in pre-production design? Question 2 What are the different kinds of perspectives used in a layout? Question 3 Descr

Ask questioMost part of power consumption in data centers comes from computation processing, disk storage, network and cooling systems. Nowadays, there are new technologies and met

TELECOMMUNICATIONS STANDARDS: They are defined internationally by the CCITT (Consultative Committee for International Telegraphy and Telephones), but to deal with the rapidly

In-door Patient Department Ideally all features of OPD.  Both OPD and IPD modules should be inter-linked.  In addition all details pertaining to the patient's medica

Circuit Switching: Many switching techniques are in use. One of them is line or circuit switching in which a communications path is actually established before the message is

#whatis cai?and its pit fallsquestion..

The difference between kernel mode and user mode gives a rudimentary form of security in the following manner. Convinced instructions could be executed only when the CPU is in kern

Computerised Systems : You would have realized by now that computing systems are most useful for manipulating information. Any organisation and management of information basically

QUESTION (a) Distinguish between S-HTTP and SSL (b) What are the three basic security provided by SSL? (c) Discuss the limitations of SSL (d) State the port number us