Connection-oriented service, Computer Networking

Assignment Help:

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when transmission is done.

CONTINUOUS AND BURST TRAFFIC:

Networks handling video or voice are engineered to access and deliver continuous data at limited rate. Others are prepared to handle burst traffic typical of computer networks. Connection does not disconnected when no data is transmit.

SIMPLEX & FULL DUPLEX CONNECTION:

Some connection-oriented methods give full duplex while other allow on simplex connection. To interact using a simplex design a pair of devices must create two connections one from device A to device B and another from device B to A.

CONNECTION DURATION AND PERSISTANCE:

Connection can be created on demand set up permanently. There are two kinds:

  • Switched Virtual Circuit or Switched Connection.
  • Permanent Virtual Circuit or Permanent Connection.

Permanent connections are naturally hardwired and now managed at system unit time. In switched connections, device maintains permanent connection to network and networks create connections on demand.

Internal elements are switched networks is a switched data network.

SERVICE GUARANTEES:

Some connection-oriented networks give guarantees about the application that computer will receive. They may guarantee a throughput rate larger packet loss rate. For example, ATM gives statistical guarantee about performance.


Related Discussions:- Connection-oriented service

What is extranet and intranet, Extranet and Intranet An Extranet is a t...

Extranet and Intranet An Extranet is a type of Intranet (Internal TCP/IP Network) that has been selectively opened to a firm's suppliers, customers. Intranet An intrane

What are the data units at dissimilar layers of the tcp / ip, What are the ...

What are the data units at dissimilar layers of the TCP / IP protocol suite? The data unit formed at the application layer is called a message, at the transport layer the data

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

High availability - application layer, High Availability Oracle web  c...

High Availability Oracle web  cache supports  content  aware  load  balancing  and fail  over  detection. The  features ensure that cache messes are directed to the most  avai

Data types in distributed enrollment protocol, Data Types Each data typ...

Data Types Each data type of Table 1 must be sent according to the specifications below. [INT] Each value of this type is sent as the string representation of the corre

Determine about the proxy servers, Determine about the proxy servers T...

Determine about the proxy servers There are proxy servers that act as good firewall protection for the entire Intranet system. In some cases, firewall comes as a separate serv

Frequency division multiplexing, Frequency Division Multiplexing Frequ...

Frequency Division Multiplexing Frequency  division  multiplexing (FDM) is an analogy technique that can be applied when the bandwidth of a link is greater than the combined b

LTE, What is LTE ?

What is LTE ?

Mechanical characteristics of RS232 interface, Q. Mechanical Characteristic...

Q. Mechanical Characteristics of RS232 interface? - 9-pin connector - 9-pin connector is more usually found in IBM-PC but it covers signals for asynchronous serial com

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd