Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Internet Articles
Page 57 of 88
What is virtual circuit packet switching?
Packet Switched service transfers the data from source to destination. Data is transferred on a type of network in which small units of data called packets are transferred. Each packet contains a destination address within it, where it has to be received.This type of communication between receiver & sender is connectionless. The internet is also a connectionless network. Most of the traffic over the internet uses packet switched service.Voice call over the internet is a type of packet switching, where each end of the conversation is divided into small packets & is reassembled later into a complete message. Packets are ...
Read MoreWhat is the concept of datagram packet switching?
In a packet switching network, the data or information is transmitted between the sender and receiver in the form of packets. It does not require a dedicated physical path to transmit the fixed-size packet across the sun-network.If the size of information is large, then it is subdivided into multiple packets. On the destination side these multiple packets are assembled together into the original message, one type of packet-switched network is the datagram packet switched network.Types of Packet Switching NetworkThe packet switching network is of two types −Datagram packet switchingVirtual circuit packet switchingThe packet switching network is diagrammatically represented as follows ...
Read MoreImplementation of connection-oriented services
We need a virtual-circuit subnet for connection-oriented service. Virtual circuits were designed to avoid having to choose a new route for every packet sent.Instead, a route from the source machine to the destination machine is chosen as part of the connection setup and stored in tables inside the routers, when a connection is established. That route is utilised for all traffic flowing over the connection, and exactly the same manner even telephone works.The virtual circuit is also terminated, when the connection is released. In connection-oriented service, every packet will have an identifier which tells to which virtual circuit it belongs ...
Read MoreWhat is Implementation of connection less services?
When connectionless service is offered, packets are frequently called Datagrams (just like telegrams) because individual packets are injected to the subnet and are routed individually.No advance setup is required. Subnets are called Datagram subnets. When Connection oriented service is provided, then before any packet is sent a path from source router to destination router is established. This connection is called Virtual Circuit and the subnet is called Virtual Circuit subnet.The implementation of connectionless service is diagrammatically represented as follows −Datagram NetworkLet us discuss how datagram network works in stepwise manner −Step 1 − Suppose there is a process P1 on ...
Read MoreDifferentiate between infrastructure mode and the ad hoc mode of IEEE 802.11
802.11 architecture uses two types of modes, which are as follows −Infrastructure ModeThe most popular mode used to connect clients like laptops and smartphones to another network such as company intranet or internet.This mode is shown below −In infrastructure mode every client is associated with an Access point which is in turn connected to another network. The client sends and receives its packet via Access Point.Ad-Hoc ModeCollections of computers are associated so that they can directly send frames to each other. There is no Access Point in Ad hoc, because Internet access is the killer application for wireless. Ad hoc ...
Read MoreWhat is the performance of ethernet and token ring under light traffic load?
Ethernet is a way of connecting computers together in LAN, it is the most widely used method of linking computers together in LANs. The basic idea of its design is that multiple computers have access to it and can send data at any time.Token Ring is also a computer networking technology which is used to build local area networks where all stations are connected in a ring topology and pass one or more tokens for channel acquisition.EthernetThe performance of Ethernet under light traffic load is explained below in stepwise manner −Step 1 − Ethernet is a computer networking technology which ...
Read MoreWhat is Ethernet evolution in computer networks?
Ethernet was developed at Xerox PARC between 1973 and 1974. Engineer Bob Metcalfe invented it for interconnecting advanced computer workstations, making it possible to send data to one another and to high-speed laser printers.It was originally intended to create a network in a small area known as a Local Area Network (LAN).In 1983 the first iteration of Ethernet 10Base 5, was released.In 1985 thin coaxial cable was approved and the group made changes to the specification in 1987, 1990 and 1993.In 1995 so called Fast Ethernet introduced it contains speed and duplex mode (both side transmitting at same time)In 1998 ...
Read MoreWhat is binary countdown protocol in computer networks?
The collision free protocols are of three type and they are as follows −Bit map protocolToken passingBinary countdownNow let see about binary countdown protocol −Binary CountdownThe binary countdown is explained below in stepwise manner −Step 1 − A problem with the bit map protocol and token passing is that overhead is 1 bit per station, so bitmap and token passing will not suit the networks with thousands of stations.Step 2 − A station wants to use the channel. It has to broadcast its address as a binary bit string starting with a high order bit.Step 3 − All addresses are ...
Read MoreWhat is slotted ALOHA in computer networks?
Aloha is a packet switching system. The time interval required to transmit one packet is called a slot. Aloha is a random access technique.There are two ALOHA protocols as follows −Pure ALOHASlotted ALOHANow let us see what Slotted ALOHA is −Slotted ALOHAThe slotted ALOHA is explained below in stepwise manner −Step 1 − Slotted ALOHA was introduced to improve the efficiency of pure ALOHA, because in pure ALOHA there is a high chance of collision.Step 2 − In this protocol, the time of the shared channel is divided into discrete intervals called as slots.Step 3 − The stations can send ...
Read MoreWhat are different types of multiple access protocols?
Multiple access protocols are generally used to coordinate access to link, here nodes can regulate their transmission onto the shared broadcast channels by using multiple access protocol, It is used on both wired and wireless LAN and satellite network.Multiple nodes can transmit frames at the same time, if so the transmitted frame collides at the entire receiver. When there is a collision, there is no acknowledgement to the receiver that the frame is transmitted or not.Thus, all frames involved in the collision are lost, and the broadcast channel is wasted during the collision interval. To rectify this problem Multiple Access ...
Read More