Packet switching, Basic Computer Science

Packet Switching:

This is one of recent techniques of switching. Packet switching was originally developed for use by ARPA network by the Defence Department of US. According to this method, each message is broken into packets of approsimately 1000 bits each. Each packet carries information about its origin and destination Packets are stored and forwarded by means of computers in a steady stream, but not in any order. Specially designed computers sort out the packets at each node in the transmission network and retransmit them along the best path to their destination, where they are put in the right sequence for decoding. Because of the standard size of packets, transmission is highly efficient and less prone to error. As a result, economies are effected which benefit the end user. -Packet switching is the technology used in value-added networks like Tymnet and Telenet, which provide libraries with connections to many database search services. 

The advantages of packet switching include transmission economies because of shared utilization, high quality, error reduced service, and the facilities for speed changing and procedures conversion thus allowing communication between different types of terminals and the interconnection of networks.  

Posted Date: 10/25/2012 12:51:21 AM | Location : United States







Related Discussions:- Packet switching, Assignment Help, Ask Question on Packet switching, Get Answer, Expert's Help, Packet switching Discussions

Write discussion on Packet switching
Your posts are moderated
Related Questions
function of arithmetic logic unit

Twisted pair cables comes in two appearance : Unshielded twisted pair cable : UTP : UTP cables is the most common types of telecommunication medium used today. Its frequency range

grades computation

Need of artificial intelligence: Artificial Intelligence may be seen as just the latest tool in the philosopher's toolbox for answering these all questions about the behavior o

identify application software from the list? ms excel linux internet explorer adobe photshop sound card driver window disk manger adobe dream weaver windows file explorer

Access time: Access time: This is the time required to locate and retrieve stored data from the storage unit in response to a program instruction. That is the time interval be

In many respect threads operate in the similar way as that of processes. A number of the similarity and differences are: Similarities • Similar to processes threads share CPU and o

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

QUESTION (i) Define each of the following terms: a) Book trade catalogue b) Stocktaking c) Ephemera d) Contracting out e) Special library (ii) Discuss the adv

Python Strings: Strings in Python are recognized as an adjacent set of characters in among quotation marks. Python permits for either pairs of single or double quotes. Subsets of s