Packet switching and virtual circuit packet switching, Computer Networking

Describe Circuit switching, Packet switching and Virtual Circuit Packet switching. Explain their suitability for different applications such as telephone and internet.

Packet Switching

Packet switching differs from the circuit switching as the methodology is used in digital transmission but not as analog transmission as done in circuit switching. In this case, the data is transmitted in the form of packets without considering the type, content or the structure of the data. The delay in the bit rate here is variable and is a function of the load/ traffic on the network. The packet transmission is suitable in use of internet where the packets are subjected to buffering and queuing. The fee in this case is charged as the information unit being transferred.  The packet switching is applied as connection oriented packet switching and virtual circuit packet switching.

Virtual circuit packet switching

In the virtual circuit packet switching, before taking on the communication a path is established between the source and final channels on which the packets will be routed. The path which is established is known as the virtual circuit as the user can view this circuit as a dedicated physical circuit. The virtual packet switching ensures that all the packets are delivered in the same order.  There is almost no/ negligible overheads in transmission. It is more reliable form of communication. 

 

Posted Date: 7/10/2012 8:47:40 AM | Location : United States







Related Discussions:- Packet switching and virtual circuit packet switching, Assignment Help, Ask Question on Packet switching and virtual circuit packet switching, Get Answer, Expert's Help, Packet switching and virtual circuit packet switching Discussions

Write discussion on Packet switching and virtual circuit packet switching
Your posts are moderated
Related Questions
Define in details about computer networks ? Discuss a variety of types of networks topologies in computer network. Also discuss a variety of costs and disadvantage of all topology

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Mail Access Protocols The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves messa

Problem 1: (a) Briefly explain each of the following wireless standards: (i) WiFi (ii) WiMAX (iii) 3G. Problem 2: (b) Bluetooth is an industrial specific

What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.

Q. What is Data Representation? Information Today arrives in different forms such as numbers, text, images, audio and video. Text: Represented like a bit pattern a sequence

What is a Java package and how is it used? A Java package is a naming context for classes and interfaces. A package is used to make a separate name space for groups of classes

What is the implication of increasing and decreasing subnet Bits?

How an Ethernet Worked? The operation of Ethernet can be explained in simple terms as follows: Each computer on the Ethernet Network, also called as a node, operates indepen

What is a binary semaphore? What is its use? A binary semaphore is takes only 0 and 1 as values. They are used to execute mutual exclusion and synchronize concurrent p