Connection-oriented service, Computer Networking

Assignment Help:

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when transmission is done.

CONTINUOUS AND BURST TRAFFIC:

Networks handling video or voice are engineered to access and deliver continuous data at limited rate. Others are prepared to handle burst traffic typical of computer networks. Connection does not disconnected when no data is transmit.

SIMPLEX & FULL DUPLEX CONNECTION:

Some connection-oriented methods give full duplex while other allow on simplex connection. To interact using a simplex design a pair of devices must create two connections one from device A to device B and another from device B to A.

CONNECTION DURATION AND PERSISTANCE:

Connection can be created on demand set up permanently. There are two kinds:

  • Switched Virtual Circuit or Switched Connection.
  • Permanent Virtual Circuit or Permanent Connection.

Permanent connections are naturally hardwired and now managed at system unit time. In switched connections, device maintains permanent connection to network and networks create connections on demand.

Internal elements are switched networks is a switched data network.

SERVICE GUARANTEES:

Some connection-oriented networks give guarantees about the application that computer will receive. They may guarantee a throughput rate larger packet loss rate. For example, ATM gives statistical guarantee about performance.


Related Discussions:- Connection-oriented service

Recognize the definition of demarcation, Demarcation is the point in which ...

Demarcation is the point in which responsibility changes hands.

Explain dynamic domain name system, Q. Explain Dynamic Domain Name System? ...

Q. Explain Dynamic Domain Name System? DDNS - Dynamic Domain Name System automatically updates the DNS master file - Sent by DHCP to a primary DNS server; secondary se

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

Digital encoding, A modified NRZ code known as enhanced-NRZ (E-NRZ) operate...

A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the

Command to configure a explanation on an interface, Recognize the command t...

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

Simplicity - transport layer, Simplicity The advantage of this approa...

Simplicity The advantage of this approach is the simplicity  of receiver buffering. The  receiver need not  buffer out of  order packets the sender must maintain the upper an

Define the types of computer network, Define the Types of Computer Network ...

Define the Types of Computer Network Computer networks fall into three classes regarding the size, distance and the structure namely: LAN (Local Area Network), MAN (Metropolita

What is piggy backing, What is Piggy Backing? A process called piggybac...

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

Explain the concept of router-root path, Explain the concept of router-root...

Explain the concept of router-root path The mean router-router path is double the mean router-root path. Number levels of tree with root as 1 and the deepest level as n. The pa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd