Connection-oriented service, Computer Networking

Assignment Help:

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when transmission is done.

CONTINUOUS AND BURST TRAFFIC:

Networks handling video or voice are engineered to access and deliver continuous data at limited rate. Others are prepared to handle burst traffic typical of computer networks. Connection does not disconnected when no data is transmit.

SIMPLEX & FULL DUPLEX CONNECTION:

Some connection-oriented methods give full duplex while other allow on simplex connection. To interact using a simplex design a pair of devices must create two connections one from device A to device B and another from device B to A.

CONNECTION DURATION AND PERSISTANCE:

Connection can be created on demand set up permanently. There are two kinds:

  • Switched Virtual Circuit or Switched Connection.
  • Permanent Virtual Circuit or Permanent Connection.

Permanent connections are naturally hardwired and now managed at system unit time. In switched connections, device maintains permanent connection to network and networks create connections on demand.

Internal elements are switched networks is a switched data network.

SERVICE GUARANTEES:

Some connection-oriented networks give guarantees about the application that computer will receive. They may guarantee a throughput rate larger packet loss rate. For example, ATM gives statistical guarantee about performance.


Related Discussions:- Connection-oriented service

What is load balancing, If the number of incoming clients invokes exceeds t...

If the number of incoming clients invokes exceeds the number of processes in a server class, the TP Monitor might be dynamically start new ones and this is known as Load balancing.

What is protocol data unit, What is Protocol Data Unit? The data unit i...

What is Protocol Data Unit? The data unit in the LLC level is known as the protocol data unit (PDU). The PDU having of four fields a destination service access point (DSAP), a

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Assignment, i want to make the assignment from you

i want to make the assignment from you

What is difference between arp and rarp, What is difference between ARP and...

What is difference between ARP and RARP? The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a

What are the two types of transmission technologies, What are the two types...

What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc

Concurrently read exclusively write (crew), This  is one of the models base...

This  is one of the models based on PRAM. In this, the processors access the memory location parallel for reading while exclusively for writing operations. In the algorithm which u

Multicast routing protocols, Multicast Routing Protocols Multicast gr...

Multicast Routing Protocols Multicast group addresses are assigned by IANA [Internet Assigned Numbers Authority for well known services and protocols. Information is exchang

What is manchester, Q. What is Manchester? - Utilizes an inversion at t...

Q. What is Manchester? - Utilizes an inversion at the middle of each bit interval for both synchronization and bit representation - Negative-to-positive represents binary 1

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd