Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Packet Switching
In the packet switching network type on specific path is used for data transfer. Instead the data is chopped up into small pieces called packed and sent over the network. We can route combine or fragment the packets as required to get them to their eventual destination. One the receiving end the process is reversed the data is read from the packets and reassembled to form the original data. A packet switched network is more analogous to the postal system that if is to the telephone system through the comparison is not perfect. An example is shown in figure
In a packet switched network no circuit is set up prior to sending data between devices. Blocks of data even from same file or communication may take any number of paths as they journey from one device to another.
figure Packet switching
Why do we require to subtract two from number of hosts?
Data Transfer After connection is established bidirectional data transfer can take place. The client and server can both send data and acknowledgments. Figure show
Recognize the command to disable CDP on an interface Ans) Router(config-if)# no cdp enable
DEFINITION: Latency = Delay. Because a store and forward switch reads the entire frame before forwarding, a larger frame takes longer than a shorter frame.
Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated
Can you define the difference among trusted and untrusted networks?
Client Server Architecture There is an always on host called server which provides service requests to many other hosts called clients. In other words client progra
What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o
Name the three ways or wireless data to be propagated.
Command Structure: Commands are all-upper-case strings, either 4 or 6 characters in length. Table 1 shows the commands, and (for method commands) the parameters, return values, ex
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd