How physical addressing is performed in wan, Computer Engineering

Assignment Help:

How physical addressing is performed in WAN? 

WAN networks operate as similar to a LAN. All WAN technology describes the specific frame format a computer uses while sending and receiving data. All computer linked to a WAN is allocated a physical address. While sending a frame to other computer, the sender should supply the destination's address. 

Several WANs use a hierarchical addressing scheme which makes forwarding more capable. Hierarchical addressing scheme divides an address in many parts. The simplest scheme divides address in two divisions; the first part recognizes packet switch and second recognizes computer attached to such packet switch.

651_physical addressing is performed in WAN.png

Illustration of Hierarchical addresses in WAN

The above given figure demonstrates each address like a pair of decimal integers. A computer linked to port 6 on packet switch 2 is assigned address i.e. [2,6].


Related Discussions:- How physical addressing is performed in wan

Types where relationship exists in electronic market place, What are the ty...

What are the types where relationship exists in Electronic Market Place? In this two forms of relationships can exist, they are: a. Customer/seller linkage is recognized at

Nmknl''knl, Ask question bhjjnjnnjnjm#Minimum 100 words accepted#

Ask question bhjjnjnnjnjm#Minimum 100 words accepted#

Explain the term step-wise refinement, Explain the term step-wise refinemen...

Explain the term step-wise refinement. Ans:  Step Wise Refinement  Refinement is a method of elaboration. Here one starts with a statement of function that is described a

Find out the access time of ROM using bipolar transistors, The access time ...

The access time of ROM using bipolar transistors is about ? Ans. About 1 µ sec is the access time of ROM using bipolar transistors.

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Explain about the functionality of olap, Hyper cube or multidimensional cub...

Hyper cube or multidimensional cube forms the core of OLAP system. This having of measures which are arranged according to dimensions. Hyper cube Meta data is formed by star or sno

Why is the wait-for-memory-function-completed, Why is the Wait-For-Memory-F...

Why is the Wait-For-Memory-Function-Completed step required when reading from or writing to the main memory? WMFC step is needed for the write control signal / read control si

Process of interaction design, This unit starts by discussing the importanc...

This unit starts by discussing the importance of involving users in the interaction design process, explaining the reasons why user involvement can be useful, the different degrees

Describe the vertical frequency or cycle, Q. Describe the Vertical Frequenc...

Q. Describe the Vertical Frequency or cycle? Like a Fluorescent lamp, the screen has to repeat same image many times per second to display an image to user. The frequency of th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd