Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Packet Switching
In the packet switching network type on specific path is used for data transfer. Instead the data is chopped up into small pieces called packed and sent over the network. We can route combine or fragment the packets as required to get them to their eventual destination. One the receiving end the process is reversed the data is read from the packets and reassembled to form the original data. A packet switched network is more analogous to the postal system that if is to the telephone system through the comparison is not perfect. An example is shown in figure
In a packet switched network no circuit is set up prior to sending data between devices. Blocks of data even from same file or communication may take any number of paths as they journey from one device to another.
figure Packet switching
How does IGRP measure metric
What is point to point link? It refers to a direct connection among two computers on a network. A point to point connection does not require any other network devices other tha
what's the difference among Symmetric and Asymmetric cryptosystem?
What must be true for two Routers running IGRP to communicate their routes? Ans) Similar autonomous system number
VLAN ( Virtual Local Area Network) is a concept of creating distinct broadcast domains. It is a network which aims at partitioning the physical network. VLAN comprises all the attr
Can you describe the concept of TTL?
If a data packet switch has a queue of data packets waiting when a new packet reach. The new packet will be located on the whole queue and will have to wait while the switch forwar
10BASE-T: This is another standard of wiring function. It is usually known 10Base-T, TP Ethernet or Twisted Pair. It removes AUI cable with twisted pair cable and thick coax
Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut
Can you define Ping and Tracert?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd