Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the advantages and disadvantages of packet switching over circuit switching?
The comparison of packet switching and circuit switching demonstrating advantages and disadvantages of packet switching over circuit switching is specified below:
Circuit Switching
Packet Switching
Dedicated transmission path.
No dedicated transmission path
Transmission of data.
Transmission of packets.
Operate in real time.
Near real time.
Message not stored.
Message held for short time
Path established for complete message.
Route established for each packet
Call setup delay.
Packet transmission delay.
Busy signal if called party busy.
No busy signal.
Blocking may arise.
Blocking cannot arise
User responsible for message-loss protection.
Network may be responsible for each packet but not for entire message.
Code conversion or no speed.
Code and speed conversion.
Fixed bandwidth transmission.
Dynamic utilization of bandwidth.
No overload bits after initial setup delay.
Overload bits in each packet.
What is delegation? Delegation gives a proper mechanism to achieve the desired code reuse. The method is caught in the desired class and forwarded to another class for actual i
127.0.0.1 is a? 127.0.0.1 it is a loop-back address.
Q. Steps uesd in quine mckluskey method? Step I: Build a table in that every term of expression is represented in row (Expression must be in SOP form). Terms can be expres
The result of adding hexadecimal number A6 to 3A is ? Ans. The result will be E0.
Explain LRU Page replacement algorithm. LRU policy: It expands to least recently use. This policy proposes that we remove a page that last usage is farthest from present time
State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,
https://dl.dropbox.com/u/41918180/Images/Pro%202/2.png https://dl.dropbox.com/u/41918180/Images/Pro%202/3.png https://dl.dropbox.com/u/41918180/Images/Pro%202/4.png">https://dl.d
Write notes on Frame Filtering Techniques. Frame filtering: The most valuable function performed through bridges is frame filtering. A bridge doesn't forward a frame unles
Target abort -computer architecture: Usually, a target holds DEVSEL# asserted through the final data phase. However, if a target desserts DEVSEL# before disconnecting without
Vector-Memory Instructions When vector operations with memory M are carried out then these are vector-memory instructions. These instructions are referred with the subsequent f
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd