Packet switching, Basic Computer Science

Assignment Help:

Packet Switching:

This is one of recent techniques of switching. Packet switching was originally developed for use by ARPA network by the Defence Department of US. According to this method, each message is broken into packets of approsimately 1000 bits each. Each packet carries information about its origin and destination Packets are stored and forwarded by means of computers in a steady stream, but not in any order. Specially designed computers sort out the packets at each node in the transmission network and retransmit them along the best path to their destination, where they are put in the right sequence for decoding. Because of the standard size of packets, transmission is highly efficient and less prone to error. As a result, economies are effected which benefit the end user. -Packet switching is the technology used in value-added networks like Tymnet and Telenet, which provide libraries with connections to many database search services. 

The advantages of packet switching include transmission economies because of shared utilization, high quality, error reduced service, and the facilities for speed changing and procedures conversion thus allowing communication between different types of terminals and the interconnection of networks.  


Related Discussions:- Packet switching

Briefly explain main parts of the camera, Question 1 Briefly explain main ...

Question 1 Briefly explain main parts of the Camera Question 2 Write a note on: Ripple Edit Tool, Rate Stretch Tool & Track Selection Tool Question 3 What is Pixel

Write a brief note on firewalls, Question 1 Explain the TCP/IP protocol la...

Question 1 Explain the TCP/IP protocol layers Question 2 Write a note Fiber Distributed Data Interface (FDDI) Question 3 Discuss on File Transfer Protocol (FTP)

Data communication & net centric computing, Suppose there are exactly five ...

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

File organization, File Organization There are three types of fi...

File Organization There are three types of file organization used in practice. Let us consider the example of a dictionary. The dictionary contains listing of English wo

Assignment 4: Cloud Computing to the Rescue, The cost of building and maint...

The cost of building and maintaining an organizational computing ecosystem has become a bigger part of most organizations’ budgets. Organizations have been looking for ways to redu

Distinguish between s-http and ssl, QUESTION (a) Distinguish between S...

QUESTION (a) Distinguish between S-HTTP and SSL (b) What are the three basic security provided by SSL? (c) Discuss the limitations of SSL (d) State the port number us

Concept of operating system, Concept of operating system: An operating...

Concept of operating system: An operating system is an essential software component of a computer system. The basic  objectives of an operating system are to make the computer

Input devices, Input Devices: i)  Keyboard is the most common form of ...

Input Devices: i)  Keyboard is the most common form of input devices. It was originally designed in the last century. Since then, only minor improvements have taken place in k

C in, which one of the following is a valid identifier

which one of the following is a valid identifier

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd