Virtual channel (or circuits), Computer Networking

Connections in ATM are known virtual circuits or virtual channels These are known virtual, since connections are created in ATM by starting values in memory locations (tables) in ATM switches as opposed to creating actual electrical connections. The VC is shown by a 24-bit value created from the VPI or Virtual Path Indicator, which denotes a particular way through the network and the Virtual Channel Indicator or VCI (16-bits), which shows the channel in the virtual path being needed by the connection.

Most usually, the 24-bit pair is acted as just a single connection identifier by device.

Posted Date: 7/31/2012 7:19:38 AM | Location : United States







Related Discussions:- Virtual channel (or circuits), Assignment Help, Ask Question on Virtual channel (or circuits), Get Answer, Expert's Help, Virtual channel (or circuits) Discussions

Write discussion on Virtual channel (or circuits)
Your posts are moderated
Related Questions
Explain the building blocks of Client/Server? The client side building block runs the client side of the application. The server side building block runs the server side of

Q. Show the Drawbacks of Go-back-N? Drawbacks of Go-back- N - Inefficient - Every out of order received packets are discarded (receiver side is simplified) - This

Q. What do you mean by Substitutional Ciphers? Substitutional Ciphers Monoalphabetic Substitution Polyalphabetic Substitution - Transpositional - character

How many ways are there to execute VPN architecture?

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

1.  What does RIP stand for? 2.  What metric does RIP use for Path Selection? 3.  If the metric used by RIP exceeds this value for a route it is considered unreachable, effec

As a system administrator, you require to set up single Ethernet interface on the Cisco router to permit for both sap and Novell-ether encapsulations. Which set of commands will ac

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

For VOIP, first you need to consider the codec to use. Although there are many voice codecs, MyCo wants the safest bet and suggests that you design with the most known and oldest c

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o