Difference between the communication and transmission, Computer Networking

Assignment Help:

Communication is the process of sending and receiving data by means of a data cable that is associated externally.

Transmission means the transmitting of data from the source to the destination.

 


Related Discussions:- Difference between the communication and transmission

What are the key elements of protocols, What are the key elements of protoc...

What are the key elements of protocols? The key elements of protocols are a. Syntax   It refers to the structure or format of the data that is the order in which they a

Virtual private network vpns, Virtual Private Network  ( VPNs) When we ...

Virtual Private Network  ( VPNs) When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for

What are the access methods used in lan, What are the Access methods used i...

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

Introduction-pram algorithms, One of the most popular models for designing ...

One of the most popular models for designing parallel algorithms is PRAM (Parallel Random Access Machine). A PRAM consists of unbounded number of processors interrelating with each

Overview of the transport layer protocols, Overview of the Transport  Laye...

Overview of the Transport  Layer Protocols Transport layer  can be  available  more than  protocols  to the  network  applications. For  example the network  applications. For

What are the main differences between ripv1 and ripv2, 1.  What does RIP st...

1.  What does RIP stand for? 2.  What metric does RIP use for Path Selection? 3.  If the metric used by RIP exceeds this value for a route it is considered unreachable, effec

What are the station types of bss, Station Types No-transition mobility...

Station Types No-transition mobility moreover stationary or moving only inside a BSS BSS-transition mobility is able to move from one BSS to another, but confined inside one

What is cam, CAM- Content Address Memory.  Its another name of MAC address ...

CAM- Content Address Memory.  Its another name of MAC address table.

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Thrift Towne, what role would you assign for Pentium iii, 500 MHz processor...

what role would you assign for Pentium iii, 500 MHz processor, 256 MB memory, 1o GB hard drive

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd