Connection-oriented service, Computer Networking

The connection-oriented service process for networking is same to the manner in which telephones are used. This is shown as follows:

A caller dials a number of the receiver. The telephone at the receiver end signals the arrival of a connection request. If the called person does not accept; the caller provides up after waiting for a timeout. If the called person does accept, then the connection is created.

In data communication, as binary number identifier is known to each of the two parties to active identification of the connection.

Posted Date: 7/31/2012 7:18:56 AM | Location : United States







Related Discussions:- Connection-oriented service, Assignment Help, Ask Question on Connection-oriented service, Get Answer, Expert's Help, Connection-oriented service Discussions

Write discussion on Connection-oriented service
Your posts are moderated
Related Questions
Q. Explain about Bandwidth – delay product? Bandwidth - delay product - A measure of competence of ARQ system = bandwidth (bits per second) * round-trip delay (in seco

There are two dominant forms of building distributed systems: client-server systems, i.e. systems in which one machine acts as a server and act as clients; and peer-to-peer systems

Error Detection- Check Sum The Checksum generator are subdivides the data unit into equal segments of "n" bits (usually 16) These segments are added utilizing one's c

Medium Earth Orbiting satellite is an orbit which is located just above the few hundred miles to a few thousands above the earth surface. It is of higher advantage than Low orbit s

Router(config-if)# no cdp enable is the  command to disable CDP on an interface

Identify the 3 major functions at layer 3 of the OSI model Ans) Layer three explains the path, forwards the packet and executes software / logical addressing.

In HTML, a tag shows the browser what to do. When you write an HTML page, you enter tags for lot of  reasons -- to change the appearance of text, to show a graphic, or to make a co

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

In FLSM subnet mask of all subnets will b same. But in FLSM it changes.

QUESTION a) Security is a very crucial component in a Distributed System. Describe three properties of a secure channel. b) During packet transmission, messages are subdivid