Packet switching and virtual circuit packet switching, Computer Networking

Assignment Help:

Describe Circuit switching, Packet switching and Virtual Circuit Packet switching. Explain their suitability for different applications such as telephone and internet.

Packet Switching

Packet switching differs from the circuit switching as the methodology is used in digital transmission but not as analog transmission as done in circuit switching. In this case, the data is transmitted in the form of packets without considering the type, content or the structure of the data. The delay in the bit rate here is variable and is a function of the load/ traffic on the network. The packet transmission is suitable in use of internet where the packets are subjected to buffering and queuing. The fee in this case is charged as the information unit being transferred.  The packet switching is applied as connection oriented packet switching and virtual circuit packet switching.

Virtual circuit packet switching

In the virtual circuit packet switching, before taking on the communication a path is established between the source and final channels on which the packets will be routed. The path which is established is known as the virtual circuit as the user can view this circuit as a dedicated physical circuit. The virtual packet switching ensures that all the packets are delivered in the same order.  There is almost no/ negligible overheads in transmission. It is more reliable form of communication. 

 


Related Discussions:- Packet switching and virtual circuit packet switching

Byte number - transport layer, Byte Number TCP number all data  bytes ...

Byte Number TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stor

Describe the method of one way redistribution and mutual, Define  the conce...

Define  the concept of one way redistribution and mutual

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

Transport layer protocols , TCP (Transmission Control Protocol) and UDP are...

TCP (Transmission Control Protocol) and UDP are used by TCP/IP. SPX (Sequenced Packet Exchange) is used with IPX. NBP (Name Binding Protocol) is used with Appletalk.

traffic flow mapping , Develop traffic flow mapping and performance requir...

Develop traffic flow mapping and performance requirements for flows. A) Traffic Flow Mapping B) Performance Requirements

Security impact of not having a public key infrastructure, (a) You are pro...

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

Medium earth orbiting satellite, Medium Earth Orbiting satellite is an orbi...

Medium Earth Orbiting satellite is an orbit which is located just above the few hundred miles to a few thousands above the earth surface. It is of higher advantage than Low orbit s

Dns - protocol attacks, DNS - Protocol Attacks Generally, in the DNS p...

DNS - Protocol Attacks Generally, in the DNS protocol, flaws are based on the implementation issues. The three common issues are generally, associated which can be of one of t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd