Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe Circuit switching, Packet switching and Virtual Circuit Packet switching. Explain their suitability for different applications such as telephone and internet.
Packet Switching
Packet switching differs from the circuit switching as the methodology is used in digital transmission but not as analog transmission as done in circuit switching. In this case, the data is transmitted in the form of packets without considering the type, content or the structure of the data. The delay in the bit rate here is variable and is a function of the load/ traffic on the network. The packet transmission is suitable in use of internet where the packets are subjected to buffering and queuing. The fee in this case is charged as the information unit being transferred. The packet switching is applied as connection oriented packet switching and virtual circuit packet switching.
Virtual circuit packet switching
In the virtual circuit packet switching, before taking on the communication a path is established between the source and final channels on which the packets will be routed. The path which is established is known as the virtual circuit as the user can view this circuit as a dedicated physical circuit. The virtual packet switching ensures that all the packets are delivered in the same order. There is almost no/ negligible overheads in transmission. It is more reliable form of communication.
Q. Show the Flow characteristics? Flow characteristics Reliability - if lacking means that packets or ACKs are lost - more important with FTP, SMTP than with audio
Process to send data is called as encapsulation and process to receive data is called De-encapsulation.
Controlling and monitoring access to the Intranet Digital certificates provide excellent means of controlling and monitoring access to the Intranets. The certificate itself act
What is one basic requirement for establishing VLANs? A VLAN needs dedicated equipment on each end of the connection that permits messages entering the Internet to be encrypted
What are the two broad class classifications under which Networks can be divided? All computer networks fit in one of the two dimensions namely: a) Transmission Technol
Network Service Model The network service model defines the characteristics of end to end transport of data between one edge of the network to the other that is betwe
Multiplexing Multiplexing is the set of techniques that allows simultaneous transmission of multiple signals across a single data like. It is methods for efficient utiliza
What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating
Q Illustrate Unipolar line coding? - Simplest method is inexpensive - Utilizes only one voltage level - Polarity is habitually assigned to binary 1 a 0 is represented by
Some of the ?elds of IP and ICMP datagrams will be ?xed, some will be settable by the application, and others will computed according to the situation. You must set all ?elds of th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd