Packet switching - fundamentals of networks, Computer Networking

Assignment Help:

Packet Switching

In the  packet  switching network  type on specific  path is  used for  data  transfer. Instead the data is chopped up into  small  pieces called packed and sent over the network. We  can route combine or fragment the packets as required to get them to their eventual  destination. One  the  receiving end the process is reversed the data is read from the  packets and reassembled to form the original data. A packet switched network is more  analogous to the postal system that if is to the  telephone system through the comparison is not perfect. An  example is  shown  in figure                               

In a packet  switched network no circuit  is set up prior to sending  data  between  devices. Blocks of data even from  same file or communication may  take  any  number  of paths  as they journey  from one device to another.

 

 

655_packet swtiching.jpg

 

figure Packet switching


Related Discussions:- Packet switching - fundamentals of networks

Subtract two from number of hosts, Why do we require to subtract two from n...

Why do we require to subtract two from number of hosts?

Data transfer - tcp connection management , Data Transfer After  conne...

Data Transfer After  connection  is established  bidirectional  data transfer  can take  place. The client  and  server  can both  send data  and acknowledgments. Figure  show

Command to disable cdp on an interface, Recognize the command to disable CD...

Recognize the command to disable CDP on an interface Ans) Router(config-if)# no cdp enable

Switching creates variable latency through the switch, DEFINITION: Latency ...

DEFINITION: Latency = Delay. Because a store and forward switch reads the entire frame before forwarding, a larger frame takes longer than a shorter frame.

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Define the difference among trusted and untrusted networks, Can you define ...

Can you define the difference among trusted and untrusted networks?

Client server architecture - application layer, Client  Server Architectur...

Client  Server Architecture There is an  always  on host  called  server  which  provides  service requests to many other hosts  called  clients. In other words  client progra

What is the importance of encryption on a network, What is the importance o...

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o

Assignment, Name the three ways or wireless data to be propagated.

Name the three ways or wireless data to be propagated.

Command structure in distributed enrollment protocol , Command Structure: ...

Command Structure: Commands are all-upper-case strings, either 4 or 6 characters in length. Table 1 shows the commands, and (for method commands) the parameters, return values, ex

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd