Virtual channel (or circuits), Computer Networking

Connections in ATM are known virtual circuits or virtual channels These are known virtual, since connections are created in ATM by starting values in memory locations (tables) in ATM switches as opposed to creating actual electrical connections. The VC is shown by a 24-bit value created from the VPI or Virtual Path Indicator, which denotes a particular way through the network and the Virtual Channel Indicator or VCI (16-bits), which shows the channel in the virtual path being needed by the connection.

Most usually, the 24-bit pair is acted as just a single connection identifier by device.

Posted Date: 7/31/2012 7:19:38 AM | Location : United States







Related Discussions:- Virtual channel (or circuits), Assignment Help, Ask Question on Virtual channel (or circuits), Get Answer, Expert's Help, Virtual channel (or circuits) Discussions

Write discussion on Virtual channel (or circuits)
Your posts are moderated
Related Questions
Pipelined Processor A pipeline processor can be described as a processor which comprises of a series of processing circuits known as segments and a stream of operands (data) is

show ipx servers is the command that shows the SAP table

How Does Network Topology Affect The Cost And Network Performance, Computer Science.

the equation x3-6x+9x-5=0

Q. What is Manchester? - Utilizes an inversion at the middle of each bit interval for both synchronization and bit representation - Negative-to-positive represents binary 1

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

- Lost as well as delayed ACKs - Bidirectional transmission both side needs both sending and receiving windows Note: In selective repeat ARQ the size of the sender and rece

INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

Lat take the CONNECT (client side), LISTEN, and ACCEPT (server side) socket primitives a) Why are these three needed for a TCP connection? b) Why are none of them needed for a U