Packet switching - fundamentals of networks, Computer Networking

Assignment Help:

Packet Switching

In the  packet  switching network  type on specific  path is  used for  data  transfer. Instead the data is chopped up into  small  pieces called packed and sent over the network. We  can route combine or fragment the packets as required to get them to their eventual  destination. One  the  receiving end the process is reversed the data is read from the  packets and reassembled to form the original data. A packet switched network is more  analogous to the postal system that if is to the  telephone system through the comparison is not perfect. An  example is  shown  in figure                               

In a packet  switched network no circuit  is set up prior to sending  data  between  devices. Blocks of data even from  same file or communication may  take  any  number  of paths  as they journey  from one device to another.

 

 

655_packet swtiching.jpg

 

figure Packet switching


Related Discussions:- Packet switching - fundamentals of networks

Process management in pvm, Process Management int pvm_mytid( void ...

Process Management int pvm_mytid( void ) Returns the tid of the calling process.  tid values less than zero indicate an fault. int pvm_exit( void ) T

State the software requirement for an intranet, State the Software requir...

State the Software requirement for an intranet To develop an Intranet the first we should design a Client /Server model for our network. As you know clients are the computers

What is meant by transparency, Transparency really means adumbrating the ne...

Transparency really means adumbrating the network and its servers from the users and even the application programmers.

Cidr presentation, Inside a device, every address mask is stored as a 32-bi...

Inside a device, every address mask is stored as a 32-bit number. When we submit a prefix and an address mask they use a changed form of dotted decimal addressing known CIDR addres

Shared memory programming, We know that all processors share a common memor...

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implemen

Aaa, explain layered protocol architecture

explain layered protocol architecture

Difference between trigger and rule, What is the difference between trigger...

What is the difference between trigger and rule? Ans) The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by cli

What is piggy backing, What is Piggy Backing? A process called piggybac...

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

Dns cache poisoning, DNS cache poisoning The DNA cache poisoning gener...

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd