Networks classification - point to point network , Computer Networking

Networks classification

 

Network  classification  are broadly  based on  these  two basic  approaches transmission  technologies.

Classification based on Transmission Technology

Computer network can be broadly categorized into two types based on transmission technologies.

Point to point Network

In point to point network data of messages from  one host  is transmitted over to other host ( which  are connected ) either director indirect. They  are not  intended to other. In  direct link  hosts  are directly connected via a physical communication medium  during data transfer. In indirect link the data is transferred over intermediate IMPs unit it reaches to destination  host. Here the data  from  incoming  line   arrive at the intermediate IMPs( internet messaging program) which  store it and waits for free l link. If it find free link  the data is sent over it otherwise it sends over next intermediate IMPs. This process is repeated until  the data  is received by the destination host. A communication systems supporting point to point  network  is defined  as point  to point  store  and forward or  packet switch  subnet.

 

Posted Date: 3/2/2013 4:25:24 AM | Location : United States







Related Discussions:- Networks classification - point to point network , Assignment Help, Ask Question on Networks classification - point to point network , Get Answer, Expert's Help, Networks classification - point to point network Discussions

Write discussion on Networks classification - point to point network
Your posts are moderated
Related Questions
Design, develop and build network systems

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection  between them known as a session. Gives for na

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

What is a private IP address? Private IP addresses are allocated for use on intranets. These addresses are used for internal networks and are not routable on external public ne

How does Intranet Work? An Intranet can be defined as a private network which uses Internet tools. The principal tool is the Web browser, but there are other Internet tools su

Q. Flow control in TCP? The amount of data a source is able to send before receiving an ACK from the destination Whether to send 1 byte of data as well as wait for ACK

What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is known as RTT.

Q. Show Coaxial Cable Connectors? - A most common is barrel connector (BNC) - T-connectors are utilized to branch off to secondary cables - Terminators are necessary for

Point out the drawbacks of Token Ring. Few of the drawbacks of Token Ring are: a. Token Ring is very costly. All topology components cost much more than other more popular s