Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe Circuit switching, Packet switching and Virtual Circuit Packet switching. Explain their suitability for different applications such as telephone and internet.
Packet Switching
Packet switching differs from the circuit switching as the methodology is used in digital transmission but not as analog transmission as done in circuit switching. In this case, the data is transmitted in the form of packets without considering the type, content or the structure of the data. The delay in the bit rate here is variable and is a function of the load/ traffic on the network. The packet transmission is suitable in use of internet where the packets are subjected to buffering and queuing. The fee in this case is charged as the information unit being transferred. The packet switching is applied as connection oriented packet switching and virtual circuit packet switching.
Virtual circuit packet switching
In the virtual circuit packet switching, before taking on the communication a path is established between the source and final channels on which the packets will be routed. The path which is established is known as the virtual circuit as the user can view this circuit as a dedicated physical circuit. The virtual packet switching ensures that all the packets are delivered in the same order. There is almost no/ negligible overheads in transmission. It is more reliable form of communication.
State about transcontinental ?ber A transcontinental ?ber link may have many gigabits/sec of the bandwidth, but latency will also be high due to speed of light propagation abov
State the specification of high-end server A mid-range or high-end server with the following specifications would be sufficient for a medium to large organisation: A Pentiu
LRC - Performance Detects every burst errors up to length n (number of columns) If two bits in one data unit are damaged as well as two bits in exactly same positions
Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16). The clock t
distortion
Question Approximately what is the low frequency cut-off of the band-pass filter shown in the figure?
Identify the purpose of the TCP three step handshakes Ans) The three step handshake establishes the parameters needed for a TCP connection. During the handshake process series n
What is redirector? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer.
The following information was obtained from a host: IP address...............205.133.127.8/24 Default Gateway...... 205.133.127.1 DNS Server.............139.100.110.10
Can you describe L2TP?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd