Connection-oriented service, Computer Networking

The connection-oriented service process for networking is same to the manner in which telephones are used. This is shown as follows:

A caller dials a number of the receiver. The telephone at the receiver end signals the arrival of a connection request. If the called person does not accept; the caller provides up after waiting for a timeout. If the called person does accept, then the connection is created.

In data communication, as binary number identifier is known to each of the two parties to active identification of the connection.

Posted Date: 7/31/2012 7:18:56 AM | Location : United States







Related Discussions:- Connection-oriented service, Assignment Help, Ask Question on Connection-oriented service, Get Answer, Expert's Help, Connection-oriented service Discussions

Write discussion on Connection-oriented service
Your posts are moderated
Related Questions
Difference between synchronous tdm and statistical tdm

Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

Explain about the Browser A program that allows the user to access and read information on the World Wide Web. Netscape® Navigator and Microsoft Explorer® are the best known


Latest Internet and Intranet technologies Even though the security capabilities of the latest Internet and Intranet technologies have enabled the companies to control the avail

Question 1 Using a flowchart and appropriate annotations, describe the execution path of an Agent in JADE 2 Write down code snippets for the following in JADE a Agent A n

Persistent and No persistent Connections HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections. Persistent Connections

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Reliability is the probability of success ; where success is defined as compliance to specified requirements. A system or an item is considered reliable if it performs satisfactori

Question: (a) Explain and illustrate different architectures for IEEE802.11 (WiFi). (b) The MAC management of IEEE802.11 handles transmitter activity for power management.