Networks classification - point to point network , Computer Networking

Networks classification

 

Network  classification  are broadly  based on  these  two basic  approaches transmission  technologies.

Classification based on Transmission Technology

Computer network can be broadly categorized into two types based on transmission technologies.

Point to point Network

In point to point network data of messages from  one host  is transmitted over to other host ( which  are connected ) either director indirect. They  are not  intended to other. In  direct link  hosts  are directly connected via a physical communication medium  during data transfer. In indirect link the data is transferred over intermediate IMPs unit it reaches to destination  host. Here the data  from  incoming  line   arrive at the intermediate IMPs( internet messaging program) which  store it and waits for free l link. If it find free link  the data is sent over it otherwise it sends over next intermediate IMPs. This process is repeated until  the data  is received by the destination host. A communication systems supporting point to point  network  is defined  as point  to point  store  and forward or  packet switch  subnet.

 

Posted Date: 3/2/2013 4:25:24 AM | Location : United States







Related Discussions:- Networks classification - point to point network , Assignment Help, Ask Question on Networks classification - point to point network , Get Answer, Expert's Help, Networks classification - point to point network Discussions

Write discussion on Networks classification - point to point network
Your posts are moderated
Related Questions
The School of Computing is planning to deploy a new network structure to accommodate the following scenario. Please make suggestions on how this LAN can be designed based on the fl

In a network that contains two servers and twenty workstations, where is the best place to install an Anti-virus program? An anti-virus program must be installed on all servers

I Have an exam Questions and i would like it to be answered. Thanks

Transmission robustness and security Unless properly designed, a wireless LAN might be interference prone and simply eavesdropped. The design of a wireless LAN must allow relia

Computer Networks 1. Differentiate WAN and LAN. 2. Describe the TCP/IP Reference Model with diagram. 3. Explain Circuit switching and message switching. 4. List the fu

Explain Peer-to-Peer Networking Model. A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no

Connection Establishment TCP transmits  data in full duplex mode. When two TCP is two machines are  connected they are able  to send segments to each other simultaneously. This

What is MAC address in Networking? The address for a device as it is recognized at the Media Access Control (MAC) layer in the network architecture. MAC address is usually kept

Explain the terms - LAN extension and Ad hoc network LAN extension: a wireless LAN integrated with a wired LAN to extend the coverage area of the LAN complex; Cross-building

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.