Packet switching - fundamentals of networks, Computer Networking

Assignment Help:

Packet Switching

In the  packet  switching network  type on specific  path is  used for  data  transfer. Instead the data is chopped up into  small  pieces called packed and sent over the network. We  can route combine or fragment the packets as required to get them to their eventual  destination. One  the  receiving end the process is reversed the data is read from the  packets and reassembled to form the original data. A packet switched network is more  analogous to the postal system that if is to the  telephone system through the comparison is not perfect. An  example is  shown  in figure                               

In a packet  switched network no circuit  is set up prior to sending  data  between  devices. Blocks of data even from  same file or communication may  take  any  number  of paths  as they journey  from one device to another.

 

 

655_packet swtiching.jpg

 

figure Packet switching


Related Discussions:- Packet switching - fundamentals of networks

What is stateful multi-layer inspection, What is Stateful Multi-Layer Inspe...

What is Stateful Multi-Layer Inspection (SMLI) They are considered as the third generation of firewall technology and usually combine the facilities of the above two. They are

SAN, Case study on SAN Providers and Products available in the market.

Case study on SAN Providers and Products available in the market.

Explain ibms sna architecture, Explain IBM's SNA Architecture SNA is a ...

Explain IBM's SNA Architecture SNA is a computer networking architecture that was formed by IBM to give a network structure for IBM mainframe, midrange, and personal computer s

State the term - lot of care required while programming, State the term - L...

State the term - Lot of care required while programming It is a common and well-known saying that many developers of "secure systems" leave a "back door" way for themselves so

Introduction-pram algorithms, One of the most popular models for designing ...

One of the most popular models for designing parallel algorithms is PRAM (Parallel Random Access Machine). A PRAM consists of unbounded number of processors interrelating with each

Illustrate 802.11b HR DSSS, 802.11b HR DSSS a) High-rate DSSS using a ...

802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to

Database management, University of Wolverhampton School of Technology 6CI00...

University of Wolverhampton School of Technology 6CI007 Database Server Management Resit Assessment Hand in December 14th 2012 In this assignment you will build a small database t

Compute the hash - part of the packet, In this question, we study Nested ES...

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd