Packet switching, Basic Computer Science

Assignment Help:

Packet Switching:

This is one of recent techniques of switching. Packet switching was originally developed for use by ARPA network by the Defence Department of US. According to this method, each message is broken into packets of approsimately 1000 bits each. Each packet carries information about its origin and destination Packets are stored and forwarded by means of computers in a steady stream, but not in any order. Specially designed computers sort out the packets at each node in the transmission network and retransmit them along the best path to their destination, where they are put in the right sequence for decoding. Because of the standard size of packets, transmission is highly efficient and less prone to error. As a result, economies are effected which benefit the end user. -Packet switching is the technology used in value-added networks like Tymnet and Telenet, which provide libraries with connections to many database search services. 

The advantages of packet switching include transmission economies because of shared utilization, high quality, error reduced service, and the facilities for speed changing and procedures conversion thus allowing communication between different types of terminals and the interconnection of networks.  


Related Discussions:- Packet switching

Frequency and bandwidth, Frequency and Bandwidth: Let us try to unders...

Frequency and Bandwidth: Let us try to understand a little about how information is transmitted. The information may be in the form of sound (human voice, music) or it may be

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Basic computer structure, Basic computer structure: A computer is an el...

Basic computer structure: A computer is an electronic device, which can accept and process data by carrying out a set of stored instructions in sequence. This sequence of math

Operation research, origin,nature and impact of operation research

origin,nature and impact of operation research

Define CISC and RISC ?, Two competing architectures were developed for impr...

Two competing architectures were developed for improving the architecture of the central processing unit, and different processors are conventional to each one. Both had their powe

Rooted tree, Ask qu The figure below shows a rooted tree, 756_Find the hei...

Ask qu The figure below shows a rooted tree, 756_Find the height.png 1.1. Find the height/level of the tree as shown above?estion #Minimum 100 words accepted#

Hacking, how can i hack a server

how can i hack a server

Provide a goms description of the procedure, Question : (a) You want to...

Question : (a) You want to perform the task of sending an e-mail message to three of your friends. You can assume that the email addresses, of the people you want to send the e

Discuss the attributes of speech codec, Question 1 What is mobile telephon...

Question 1 What is mobile telephone initialization? Explain the three main goals of this procedure Define GSM system operations Introduction to mobile telephone initializ

Explain the characteristics of vector processing, Question 1 Draw the bloc...

Question 1 Draw the block diagram of von Neumann Architecture and explain about its parts in brief Question 2 Draw the block diagram of Intel 8085 CPU organization and explai

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd