Packet switching, Basic Computer Science

Assignment Help:

Packet Switching:

This is one of recent techniques of switching. Packet switching was originally developed for use by ARPA network by the Defence Department of US. According to this method, each message is broken into packets of approsimately 1000 bits each. Each packet carries information about its origin and destination Packets are stored and forwarded by means of computers in a steady stream, but not in any order. Specially designed computers sort out the packets at each node in the transmission network and retransmit them along the best path to their destination, where they are put in the right sequence for decoding. Because of the standard size of packets, transmission is highly efficient and less prone to error. As a result, economies are effected which benefit the end user. -Packet switching is the technology used in value-added networks like Tymnet and Telenet, which provide libraries with connections to many database search services. 

The advantages of packet switching include transmission economies because of shared utilization, high quality, error reduced service, and the facilities for speed changing and procedures conversion thus allowing communication between different types of terminals and the interconnection of networks.  


Related Discussions:- Packet switching

Democracy and ICT, Ask questio Discuss the idea of democracy and its overl...

Ask questio Discuss the idea of democracy and its overlapping meanings for IS design. How would you democratically design IS? How does participation help the practice of democrac

Introduction to computer, Computer: People call a lot of things, compu...

Computer: People call a lot of things, computers. Some of them are cheap, but can only process numerical information. Such devices would better be described as 'calculators' r

Write a program to swap two names between two variables, QUESTION (a) W...

QUESTION (a) Write a program to swap two names between two variables for examples: N1 = "Mary Anne" N2 = "Queen Mary". The program should make use of an appropriate Fu

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

Briefly explain art driven character design, Question 1 What is role playi...

Question 1 What is role playing game? Explain the special design issues for sports games Question 2 What do you mean by collusion? Explain its types Question 3 Wri

Printers, Printers: Printers: Printers exist in a variety of forms:  ...

Printers: Printers: Printers exist in a variety of forms:  Line Printers: These have been widely used for many years in large computer installations. They are design

What is the intent of the singleton pattern, QUESTION Consider a Univer...

QUESTION Consider a University system which has several sub systems: Student Registration Module Registration Time Tabling Library System Human Resource Manag

Database design, Build a database application for a sports league. Assume y...

Build a database application for a sports league. Assume your application is to keep track of teams and equipment that is checked out to teams. Explain the steps that is needed and

Copmurer, Classify computer systems according to capacity. How they are dif...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd