Networks classification - point to point network , Computer Networking

Networks classification


Network  classification  are broadly  based on  these  two basic  approaches transmission  technologies.

Classification based on Transmission Technology

Computer network can be broadly categorized into two types based on transmission technologies.

Point to point Network

In point to point network data of messages from  one host  is transmitted over to other host ( which  are connected ) either director indirect. They  are not  intended to other. In  direct link  hosts  are directly connected via a physical communication medium  during data transfer. In indirect link the data is transferred over intermediate IMPs unit it reaches to destination  host. Here the data  from  incoming  line   arrive at the intermediate IMPs( internet messaging program) which  store it and waits for free l link. If it find free link  the data is sent over it otherwise it sends over next intermediate IMPs. This process is repeated until  the data  is received by the destination host. A communication systems supporting point to point  network  is defined  as point  to point  store  and forward or  packet switch  subnet.


Posted Date: 3/2/2013 4:25:24 AM | Location : United States

Related Discussions:- Networks classification - point to point network , Assignment Help, Ask Question on Networks classification - point to point network , Get Answer, Expert's Help, Networks classification - point to point network Discussions

Write discussion on Networks classification - point to point network
Your posts are moderated
Related Questions
Shared Programming Using Library Routines The most well-liked of them is the use of combo function called fork() and join(). Fork() function is used to make a new child proces

Hyper  Text Transfer Protocols ( HTTP) The Hyper text  protocols ( HTTP) is at  the heart  of the  web. If a browser  developer follows  the rules  of the HTTP, the  browser w

Q. Show the Masking process? Masking Take out the address of the physical network from an IP address Used by routers inside the organization

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

Latency : In interconnection networks a variety of nodes may be at dissimilar distances depending upon the topology. The network latency differs to the worst-case time wait for a u

WAN interface card(WIC) slots Two fixed WIC slots are present in  2600 series router except 2691. It has contained 3 WIC slots. Network Module Expansion Slot( NM) slot

What is Connection-oriented communication Connection-oriented communication can be in three phases. In establishment phase a request is made to set up the connection. Only afte

Fixed version of rdt 2.0 rdt 2.1 The  rdt 2.1 sender and receiver  FSM each now  have  twice  as many  states  as before. This is because  the protocols  state must  now refle