Explain the basic of network properties, Computer Networking

Assignment Help:

Explain the basic of Network Properties

 The subsequent properties are related with interconnection networks.

1)  Topology: It refers how the nodes a network are systematized.

2)  Network Diameter:  It is minimum distance between farthest nodes in a network.  The distance is calculated in provisions of number of different hops between whichever two nodes.

3)  Node degree:  Number of edges associated with a node is known as node degree.  If the edge carries data from node, it is termed as out degree and if this carries data in the node it is termed as in degree.

4)  Bisection Bandwidth: Number of edges needed to be cut to split a network in two halves is known as bisection bandwidth.

5)  Latency: It is the delay in exchanging the message between two nodes.

 

 


Related Discussions:- Explain the basic of network properties

Computing shortest path in a graph, While calculating shortest path, first ...

While calculating shortest path, first we assume graph presentation of network at every node then we use Djikstra's algorithm to calculate shortest path from every node to other on

Error correction, discuss the concept of redundancy in error detection and ...

discuss the concept of redundancy in error detection and correction

What is shielded twisted pair, Q. What is Shielded Twisted Pair? - A me...

Q. What is Shielded Twisted Pair? - A metal foil or braided-mesh covering encases every pair of insulated conductors to prevent electromagnetic noise called crosstalk - Cros

Intradomain and interdomain routing protocols?, Describe the concept of int...

Describe the concept of intradomain and interdomain routing protocols?

Matlab chi square functioning, Create a custom chi-square function in matla...

Create a custom chi-square function in matlab, MATLAB in Statistics

What are firewalls, What are firewalls? Firewalls serve to protect an i...

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

Debug ip igrp transaction, To monitor IP igrp traffic, we can use "debug IP...

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

Explain the meaning and use of the z-index property in dhtml, QUESTION ...

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t

Wait protocol in parallel programming , Wait protocol The wait protoco...

Wait protocol The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait prot

Security mechanism, How can the use of NAT and PAT, be considered a securit...

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd