How a physical addressing is performed in wan, Computer Engineering

Assignment Help:

How physical addressing is performed in WAN?

WAN networks operate as similar to a LAN. All WAN technology classifies the exact frame format a computer uses while sending and receiving data. All computer connected to a WAN is allocated a physical address. While sending a frame to other computer, the sender should supply the destination's address.

Several WANs use a hierarchical addressing scheme which makes forwarding more efficient. Hierarchical addressing scheme divides an address in multiple parts. The simplest scheme divides address into two parts; the first part recognizes packet switch as well as second part identifies computer attached to that packet switch.

1171_Example of Hierarchical addresses in WAN.png

Example of Hierarchical addresses in WAN

The figure demonstrates each address as a pair of decimal integers. To port 6 on packet switch 2 a computer connected, which is assigned address [2,6].


Related Discussions:- How a physical addressing is performed in wan

Differentiate among validation and exception testing, Differentiate between...

Differentiate between validation and exception testing. - Validation testing is done to test software in conformance to requirements specified. It aims to demonstrate that soft

what is lrd_stmt?, The lrd_stmt function associates a character string (ge...

The lrd_stmt function associates a character string (generally a SQL statement) with a cursor. This function sets a SQL statement to be processed.

Illustrate about fourth generation computers, Q. Illustrate about fourth ge...

Q. Illustrate about fourth generation computers? One of the main milestones in IC technology is Very large scale integration (VLSI) where thousands of transistors can be integr

Rpn procedure, Apply this algorithm to your MASM program 1) Declare the ...

Apply this algorithm to your MASM program 1) Declare the following variables in your data segment: .data ; ; These are the values of the variables ; Variables

Error detection mechanism must be in-built, Error detection mechanism may i...

Error detection mechanism may include checking mechanical and data communication errors. These errors must be reported to processor. The illustrations of kind of mechanical errors

Temporary location, Compare zero-, one, two-, and three- address machines b...

Compare zero-, one, two-, and three- address machines by writing programs to compute                         X = (A + B x C)/(D - E x F) for every of the four machines.  Do n

Embedded system design using c, W To date we have discussed elementary high...

W To date we have discussed elementary high level language programming and low level assembler programming, one of the benefits of C is the integration of both , this requires a re

Ready to help students, What is the process to register as expert in comput...

What is the process to register as expert in computer science

Online teaching jobs, Dear, I''m an engineering post graduate in computer s...

Dear, I''m an engineering post graduate in computer science. I would like to work as online tutor. please suggest ideas. Thank You.

What are the two ways in which the system using cache, What are the two way...

What are the two ways in which the system using cache can proceed for a write operation? Write by protocol technique Write-back or Copy-back protocol method

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd