Connection-oriented service, Computer Networking

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when transmission is done.

CONTINUOUS AND BURST TRAFFIC:

Networks handling video or voice are engineered to access and deliver continuous data at limited rate. Others are prepared to handle burst traffic typical of computer networks. Connection does not disconnected when no data is transmit.

SIMPLEX & FULL DUPLEX CONNECTION:

Some connection-oriented methods give full duplex while other allow on simplex connection. To interact using a simplex design a pair of devices must create two connections one from device A to device B and another from device B to A.

CONNECTION DURATION AND PERSISTANCE:

Connection can be created on demand set up permanently. There are two kinds:

  • Switched Virtual Circuit or Switched Connection.
  • Permanent Virtual Circuit or Permanent Connection.

Permanent connections are naturally hardwired and now managed at system unit time. In switched connections, device maintains permanent connection to network and networks create connections on demand.

Internal elements are switched networks is a switched data network.

SERVICE GUARANTEES:

Some connection-oriented networks give guarantees about the application that computer will receive. They may guarantee a throughput rate larger packet loss rate. For example, ATM gives statistical guarantee about performance.

Posted Date: 7/31/2012 8:02:17 AM | Location : United States







Related Discussions:- Connection-oriented service, Assignment Help, Ask Question on Connection-oriented service, Get Answer, Expert's Help, Connection-oriented service Discussions

Write discussion on Connection-oriented service
Your posts are moderated
Related Questions
Q. Illustrate about Sliding Window Protocols? - Sliding window - Keeps the unacknowledged outstanding frames in sender - Keeps the expected frames in receiver - Sequen

What is Frequency borrowing In the simplest case, frequencies are taken from adjacent cells by congested cells. The frequencies can also be assigned to cells dynamically.

explain Learning Bridges in deatil.

using binary adition, what is the result of 1010 + 10? Using binary addition, how would you repeatedly increment a number by 2?


Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is

Name some common or popular databases Many of the popular databases also provide support of and to the middleware and consequently, the term middleware has become lesser known.

What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.

NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network. The NIC gives a physical connection among the networking medium and the comput

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can