Mod 1 PPT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 100

Introduction To Data Communication And Networking

AGENDA
 Data communication
 Networks
 Network Types
 Network Models
 Protocol Layering
 TCP/IP protocol
 The OSI model
 Physical layer
 Transmission media
 Switching
COMPUTER NETWORKS

MODULE 1
Introduction To Data Communication And Networking
AGENDA
 Data communication
 Networks
 Network Types
 Network Models
 Protocol Layering
 TCP/IP protocol
 The OSI model
 Physical layer
 Transmission media
 Switching
Data Communication

 Data communication is the transfer of data between the source and the receiver via some form via some form of transmission medium such as a
wire cable.
 Source transmits the data and receiver receives it.
Fundamental Characteristics

 The effectiveness of a data communication system depend on four fundamental


characteristics:

 Delivery- sender should send data to proper destination.

 Accuracy-data should be delivered accurately.

 Timelines-data should reach in proper time.

 Jitter- variation in packet delivery delay.


Five Components of Data Communication

1.Message: Information to be communicated. Ex: text, numbers,pictures,audio and video.


2.Sender: It is the device that sends the data message. Ex: computer, telephone handset.
3.Receiver: It is the device that receives the data message. Ex: computer, workstation, telephone.
Handset.
4.Transmission Medium: It is the physical path by which message travels from sender to receiver.
Ex: Twisted wire, coaxial cable, fiber-optics cable and radio waves.
5. Protocol: It is a set of rules and regulations to follow while sending and receiving data.
Data Flow
 The flow of data between two nodes or devices.
 The direction of data flow or Communication can be in three
forms
 Simplex
 Half duplex
 Full duplex
Simplex mode

 One node will transmit and another node will Receive the data.
 Dataflow or Communication is unidirectional.
 Example: keyboard, monitor.
Half duplex

Data flows in both direction but one direction at a time.

Communication in both direction but not simultaneously.


Ex: walkie-talkie – conversation on walkie-talkie.
FULL duplex

 Data flows in both direction simultaneously.

 Two way street, i.e. sending data and receiving data at the
same time.
 Ex: Telephone network.
Data representation
Data can be represented in five formats
 Text-we can send data in text format it is represented in bits format.

It is the combination of 0’s and 1’s.

 Numbers- we can send data in numbers. It is also converted in to bits and transmitted.

 Images- we can send data in image format. Image is nothing but matrix of pixels.

 Audio- Data is in the form of recording or broadcasting of sound and music.

 Video- Data is in the form broadcasting picture or movie. It Is the combination of


both audio and image.
NETWORKS
 Network is a interconnection of set of devices to communicate each other.
 Computer Network is made up of nodes and links.
NODE
It is capable of sending and receiving a data.
EX: COMPUTERS, WORKSTATION, ROUTER, SWITCHES ETC
LINK
 It carries the data or information.
 It is responsible for sending and receiving the data. link
Node Node
 It can be wired or wireless.
 Wired link ex: coaxial cable, Fiber optic cable, USB cable.
 Wireless link ex: infrared, radio, microwave, satellite.
Network criteria
Performance:It measures how well a network can support communication between two nodes in the
Network. It is measured in many ways
 Response time: The total time a node takes to process an inquiry or a request from another
node/ device and respond.
 Throughput: Throughput measures how much data is transferred successfully from the
sender node to the receiver node in a particular time frame.
 Delay: Delay is the measure of time taken to do the delivery.

Reliability:The Reliability of a network is measured by the frequency of failures it is undergoing


and the time it takes to recover from the failures.
Security:It measures how the Network secures the data amid failures and attacks and the policies
and procedures it implements to protect itself from damages and unauthorized access.
Types of connection
Point to point
 Dedicated link between two devices.
 The entire channel capacity is reserved only for two devices in the
connection.
 Use actual length of wire to connect two ends.
 There is a single transmitter and a single receiver.
 Ex: Tv and remote for wireless.
Multipoint connection
 More than two devices share a single link.
 The channel's capacity is shared temporarily among the devices
connected to the link.
 There is a single transmitter and multiple receivers.
 Spatially shared connection- several devices using same link
simultaneously.
 Timeshared connection- each node takes turn while using the link.
TOPOLOGY
Arrangement of nodes in such a way that we can make communication among all
the nodes.

Four types of Topologies


1. Bus topology
2. Ring topology
3. Star topology
4. Mesh topology
Bus Topology
 A bus topology is a multipoint communication.
 One single and long cable is used to connect all the other devices in the
network.
 Nodes are connected to the bus cable by drop lines and taps.
 Dropline is a connection between the device and the main cable.
 A tap is a connector used to connect with main cable and drop lines.
 In bus topology any computer can data to any other computer’s because all
computers are attached to the main cable.
Advantages of bus topology
 It works very efficiently well when there is a small network.
• Very cost-effective as compared to other network topology.
• Easy to expand by joining the two cables together.

Disadvantages of bus topology

• Bus topology is not good for large networks.


• A fault or break in the network breaks entire transmission.
• This network topology is very slow as compared to other topologies.
• No security.
RING TOPOLOGY

• It is like a bus topology in a closed loop.


• All devices are connected point to point in a shape
of ring.
• A signal is passed along the ring from one device
to another device until it reach its destination.
• Sending and receiving data takes place with the
help of token.
• Data flow is unidirectional.
Advantages of Ring Topology

• Due to the presence of token passing the performance of ring topology


becomes better than bus topology under heavy traffic.
 All node have equal access.

Disadvantages of Ring Topology


• No security. due to the Uni-directional Ring, a data packet must have to
pass through all the nodes.
• If any device or node fails in the ring topology the entire network fails.
STAR TOPOLOGY

• A Star topology is a type of network topology in which all the devices or


nodes are physically connected to a central node hub.
• All the data or traffic must pass through the hub or switch.
Advantages of Star Topology
• Easy to design and develop

• Fault identification is easy.


• Centralized management.
• A device failure (computer, cable) doesn't damage the entire network.
Disadvantages of Star Topology
• Increased cost due to hub especially for high-performance models.
• Failure of hub affects the whole network.
• The star network necessitates extensive cabling, which can be
challenging to manage, especially in large or complex layouts.
• Managing and maintaining the central hub requires more resources and
technical expertise than simpler topologies.
MESH TOPOLOGY
• Each node is connected to every other node in the network.
• When you send data from your device, it can take different routes to reach
its destination, depending on distance, traffic congestion, and link quality.
• This type of network is often used in large organizations or companies
because it can handle a large amount of data traffic and can be easily
expanded.
Advantages of Mesh Topology

• Data can be transmitted from different devices simultaneously. It can


withstand high traffic.
• Failure during a single device won’t break the network.

 Fault tolerant and reliable :Even if one connection breaks, the network
keeps sending data through other paths.
 It provides high privacy and security.

Disadvantages of Mesh Topology


• Overall cost of the network is too high compared to other topology.
• Setup and maintenance of this topology is very difficult.
NETWORK TYPES

 Local Area Network (LAN)


• A local area network (LAN) is a computer network that
interconnects computers or devices within a limited
area.
Example: school, lab, office, or home.
• A LAN can be small or large, ranging from a home
network with one user to an enterprise network with
thousands of users and devices in an office or school.
• LANs are capable of transmitting data at very fast rate
with limited distance.
 LAN can be connected in two ways
 Wired LAN: devices connected with cables.
 Ex: Ethernet

 Wireless LAN: devices connected without cable.


 Ex: WI FI
Wide Area Network(WAN)

 A wide area network is a telecommunication


network that extends over a large geographical
area for the primary purpose of networking.
 Telecommunication network -Any
communication at a distance.
 WAN is a interconnection of devices capable
of communication.
 Here two or more LAN’s within a country can
communicate with each other.
SWITCHING
 Switching is a process of transferring data between two devices in computer network
by selecting the best route for data transmission.
 Switching technique is used to connect the systems for making one-to-one
communication.
 A switching consists of interlinked nodes called switches.
 Switches are hardware or software device capable of creating temporary connection
between two devices.
 A Switch forward data from a network to another network when required.
 Switching network are categorized into
1. Circuit switched network
2. Packet switched network
CIRCUIT-SWITCHED NETWORK
 There is a Dedicated communication path is established between two networks.
 It consists of a set of switches connected by physical links.
 A complete end-to-end path must exist before communication can take place.
• Circuit switching in a network operates in a similar way as the telephone works.
• Circuit switching takes at the physical layer.

 Communication via circuit switching has three phase


 Circuit or connection establishment
 Data transfer
 Circuit or connection disconnect
EX: Telephone network connection.
CIRCUIT-SWITCHING PROPERTIES

In Efficiency
 If no data, capacity is wasted
channel capacity is dedicated for the whole duration of a
connection
Delay
 Long initial delay-circuit establishment takes time.
 Low data delay-after circuit establishment, information is
transmitted at a fixed rate.

 Mainly developed for voice services.


PACKET-SWITCHED NETWORK
 In Packet Switched Network a small
units of data called packets are routed
through a network based on the
destination address contained within each
packet.
 Each time one device sends a file to
another, it breaks the file down into
packets so that it can determine the most
efficient route for sending the data across
the network at that time.
 In packet switching no resource
allocation for a packet. Resources are
allocated on demand.
INTERNET

 This is a wide area network.


 Internet is a worldwide system of
interconnected computer networks and electronic
devices that communicate with each other using an
established set of protocols.
 There are so many WAN,LAN across the world are
connected to each other.
 The process of transferring information over the
internet from one device to another relies on packet
switching.
 The Internet is a packet-routing network that uses IP
and TCP protocols for communication.
Accessing the Internet
some common types of Internet service are:
Dial-up: In dial-up connection, computer uses its modem to dial a telephone number given to the
user by an Internet Service Provider.

DSL: DSL service uses a broadband connection, which makes it much faster than dial-up. DSL
connects to the Internet via a phone line but does not require you to have a landline at home.

Cable Networks: Cable service connects to the Internet via cable TV. It uses a broadband
connection and can be faster than both dial-up and DSL service; however, it is only available
where cable TV is available.

Wireless Network:3G and 4G service is most commonly used with mobile phones, and it
connects wirelessly through your ISP's network.
Protocol Layering
 Protocol is a set of rules that both the sender and
receiver needs to follow to make
communication effective.
 Layering- decomposing the problem into
manageable components(layers).
 Simple communication need simple protocol.
 In Complex communication we divide the task
or problem into smaller and form layers to send
those problems.
Scenario1: A single layer protocol
Second Scenario
Principles of Protocol Layering

Frist principle
Both layers need to perform two opposite tasks.
1. First layer is to send and receive mail.
2. Second layer is to encrypt and decrypt.
3. Third layer is to listen or talk.

Logical connection
An imaginary connection established at each layer through which they can
send the object created from that layer.
TCP/IP Protocol suite
 This model defines how data is transmitted
over networks, ensuring reliable
communication between devices.
 The TCP/IP model consists of five layers: the
application layer, transport layer, network
layer, data link layer and physical layer.
 TCP/IP is a hierarchical protocol made up of
interactive modules, and each of them
provides specific functionality..
 It is named from two important protocols in it
 Transmission control protocol(TCP)
 Internet protocol (IP)
Physical layer
 This is the lowest layer of the TCP/IP model architecture.
 It is responsible for carrying individual bits in a frame across the link.

Data Link layer


 It is responsible for moving packets through the link.
 The functions carried out by this layer are encapsulating the IP
datagram into frames transmitted by the network and mapping of IP
addresses into physical addresses.
• It defines how the data should be sent physically through the network.

These two layers are mainly responsible for the transmission of the data
between two devices on the same network.
Network Layer
• An network layer is the third layer of the TCP/IP model.
• Communication at the network layer is host to host communication.
• The main responsibility of the internet layer is to send the packets from
any network, and they arrive at the destination irrespective of the route
they take.

 Following are the protocols used in this layer are:


 IP Protocol
 ARP Protocol
 ICMP Protocol
IP PROTOCOL

 IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP suite.

 Following are the responsibilities of this protocol:

• IP Addressing: This protocol implements logical host addresses known as IP addresses. The
IP addresses are used by the internet and higher layers to identify the device and to provide
internetwork routing.

• Host-to-host communication: It determines the path through which the data is to be


transmitted.

• Data Encapsulation and Formatting: An IP protocol accepts the data from the transport
layer protocol. It encapsulates the data into message known as IP datagram.

• Routing: it is responsible for routing packet from source to its destination, which can be
accomplished by routing the IP datagram through various devices such as routers.
ARP

• ARP stands for Address Resolution Protocol.

• ARP is a network layer protocol which is used to find the physical address from
the IP address.

ICMP

 ICMP stands for internet control message protocol.

 It stands for Internet Control Message Protocol and notification regarding


datagram problems can be sent back to the user using this. Any issue with the
network is immediately notified to the user by ICMP. It can only inform the
user about the errors and cannot rectify the problem
Transport Layer
 It is responsible for giving service to the application layer
 The transport layer is responsible for the reliability, flow control, and correction
of data which is being sent over the network.
 The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.

User Datagram Protocol (UDP)


• It provides connectionless service and end-to-end delivery of transmission.
• It is a simple protocol.
• It is an unreliable protocol as it discovers the errors but not specify the error.
• User Datagram Protocol discovers the error, and ICMP protocol reports the error
to the sender that user datagram has been damaged.
Transmission Control Protocol (TCP)
 It provides a full transport layer services to applications.

 It creates a virtual circuit between the sender and receiver, and it is active for the duration of the transmission.

 TCP is a reliable protocol as it detects the error and retransmits the damaged frames. Therefore, it ensures all the segments must be
received and acknowledged before the transmission is considered to be completed and a virtual circuit is discarded.

 At the sending end, TCP divides the whole message into smaller units known as segment, and each segment contains a sequence
number which is required for reordering the frames to form an original message.

 At the receiving end, TCP collects all the segments and reorders them based on sequence numbers.

 It provides flow control, error control and congestion control.


Application Layer
• An application layer is the topmost layer in the TCP/IP model.

• It is a process to process communication.

• This layer allows the user to interact with the application.

Following are the main protocols used in the application layer:

• HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to
access the data over the world wide web. It transfers the data in the form of
plain text, audio, video.

 SNMP: SNMP stands for Simple Network Management Protocol.it is used by


administrator to manage internet at global and local levels.
• SMTP: SMTP stands for Simple mail transfer protocol. Used in electronic mail
service.

• DNS: DNS stands for Domain Name System. It is used by other protocols to find
the network layer address of a computer.

• TELNET: It is an abbreviation for Terminal Network. Accessing site remotely.

• FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol
used for transmitting the files from one computer to another computer.
Encapsulation
 The process of adding headers and trailers around data
being sent through a network. At source we have only
encapsulation.
 At Application layer: data to be exchanged is called as
message, it doesn’t contain any header and trailer. This
message is passed to transport layer.
 At Transport layer: It takes message as payload, adds header
and other information this results in packet, then passes
packet to network layer.
 At Network layer: It takes packet, adds header and
necessary information this results in datagram, then passes
datagram or packet to datalink layer.
 At Data link layer: Adds its own address to packet, results in
frames and passes it to physical layer for transmission.
Decapsulation and Encapsulation at router
 Decapsulation: the reverse process of encapsulation occurs when data is
received on the destination computer.
 At router we have both encapsulation and decapsulation.
 Data link layer receives set of bits, it decapsulates frame into datagram and
passes to network layer.
 At network layer it only inspects source and destination address and consults its
forwarding table to find next hop.
Decapsulation at destination
 At destination each layer decapsulates the packet received.
 Removes the payload and deliver packet to next higher layer protocol until
message reaches the application layer.
ADDRESSING

TCP/IP includes an Internet


addressing scheme that allows
users and applications to
identify a specific network or
host with which to
communicate.
Multiplexing and demultiplexing

 The TCP/IP protocol suite uses several protocols at


some layer. We have multiplexing at source and
demultiplexing at destination.
 Multiplexing means the protocol at a layer can
encapsulate a packet from several next higher layer
protocols.
 Demultiplexing means the protocol can decapsulate
and send a packet to several next higher layer
protocols.
OSI MODEL
• OSI stands for Open System Interconnection is a reference model that describes how to
facilitate communication between different systems without requiring changes to the
logic of the underlying hardware or software.

• OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.

 OSI consists of seven layers, and each layer performs a particular network function.

• OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
Layers of OSI Model
There are the seven OSI layers. Each layer has different functions. A list of
seven layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

 .
OSI VERSUS TCP/IP
 The biggest difference between the OSI and TCP/IP models is the OSI model has
seven layers instead of five. Although both the TCP/IP and OSI models transport
data, the ways they send it are slightly different.
 The session and presentation layers are separate
in OSI Model, but in TCP/IP model they are not
distinguished.
 TCP/IP model, the transport layer has more than
One protocol, so some functionalities of session
Layer are available in some
transport layer protocol.
 Physical Layer – Introduction
Transmission media are actually located below the physical layer and are directly controlled by the physical layer.
 Guided Media

 Guided media, which are those that provide a conduit from one device to another, include twisted-
pair cable, coaxial cable, and fiber-optic cable.

 A signal traveling along any of these media is directed and contained by the physical limits of the
medium.

 Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals in the
form of electric current. Optical fiber is a cable that accepts and transports signals in the form of light.
 Twisted Pair Cable
 A twisted pair consists of two conductors (normally copper), each with its own
plastic insulation, twisted together.

 One of the wires is used to carry signals to the receiver, and the other is used only as
a ground reference.

 By twisting the pairs, a balance is maintained. For example, suppose in one twist, one
wire is closer to the noise source and the other is farther; in the next twist, the reverse
is true.
 UTP Vs STP
 Categories
 Connectors
 Performance
 Applications
Used to provide voice and data channels
Local-area networks, such as 10Base-T and 100Base-T, also use twisted-pair cables.
 Coaxial Cable
 Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted pair cable,
 coax has a central core conductor of solid or stranded wire (usually copper) enclosed in an insulating
sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a combination of the
two.
The outer metallic wrapping serves both as a shield against noise and as the second conductor, which
completes the circuit. This outer conductor is also enclosed in an insulating sheath, and the whole
cable is protected by a plastic cover
 Coaxial Cable standards
 Coaxial Cable Connectors

Bayonet Neill-Concelman (BNC)


 Performance
 Applications
 Analog telephone networks- carry 10000 voice signals
 Digital telephone-600Mbps
 Cable TV networks
 Ethernet LANs
 Fiber-Optic Cable

 A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.

 Light travels in a straight line as long as it is moving through a single uniform substance.

 If a ray of light traveling through one substance suddenly enters another substance (of a different
density), the ray changes direction.
 If the angle of incidence I (the angle the ray makes with the line perpendicular to the interface
between the two substances) is less than the critical angle, the ray refracts and moves closer to the
surface. If the angle of incidence is equal to the critical angle, the light bends along the interface. If the
angle is greater than the critical angle, the ray reflects (makes a turn) and travels again in the denser
substance.

 A glass or plastic core is surrounded by a cladding of less dense glass or plastic.


 Propagation Modes
 Modes
 Multimode
 In multimode step-index fiber, the density of the core remains constant from the center to the edges. A
beam of light moves through this constant density in a straight line until it reaches the interface of the core
and the cladding.
At the interface, there is an abrupt change due to a lower density; this alters the angle of the beam’s motion.
The term step-index refers to the suddenness of this change, which contributes to the distortion of the signal
as it passes through the fiber.

 multimode graded-index fiber, decreases this distortion of the signal through the cable. The word index
here refers to the index of refraction.
Density is highest at the center of the core and decreases gradually to its lowest at the edge
 Single-Mode

 Single-mode uses step-index fiber and a highly focused source of light that limits beams to a small
range of angles, all close to the horizontal. The single-mode fiber itself is manufactured with a much
smaller diameter than that of multimode fiber, and with substantially lower density (index of
refraction).
 Fiber Sizes
 Cable Composition
 The outer jacket is made of either PVC or Teflon. Inside the jacket are Kevlar strands to strengthen the
cable. Kevlar is a strong material used in the fabrication of bulletproof vests.

 Below the Kevlar is another plastic coating to cushion the fiber.

 The fiber is at the center of the cable, and it consists of cladding and core.
 Connectors
 The subscriber channel (SC) connector is used for cable TV.

 It uses a push/pull locking system.

 The straight-tip (ST) connector is used for connecting cable to networking devices.

 It uses a bayonet locking system and is more reliable than SC.

 MT-RJ is a connector that is the same size as RJ45.


 Performance
 Attenuation is flatter than in the case of twisted-pair cable and coaxial cable.
 Applications
 Backbone networks
 Data rate of 1600Gbps
 Cable TV
 Advantages
Higher Bandwidth
Less signal attenuation
Immunity to electromagnetic interference
Resistance to corrosive materials
Light Weight
Greater Immunity to tapping
 Disadvantages
Installation and Maintenance
Unidirectional light propagation
Cost
PACKET SWITCHING
The packet switching is a switching technique in which the message is divided into
packets, and they are sent individually which allow faster and efficient data transfer.
Two types of packet switched networks:
1.Datagram network
2.Virtual circuit network
Datagram Network:
 It is a packet switching technology in which packet is treated individually
known as a datagram
 Each packet is considered as an independent entity.
 Each packet contains the information about the destination and switch uses
this information to forward the packet to the correct destination.
• The packets are reassembled at the receiving end in correct order.
• In Datagram Packet Switching technique, the path is not fixed.
• Intermediate nodes take the routing decisions to forward the packets.
• Datagram Packet Switching is also known as connectionless switching.
 Problems during data transmission

 Datagrams can arrive out of order with different delays between the packets.

 Packets may also be lost or dropped because of lack of resources.

 In most protocols it is the responsibility of the upper layer protocol to reorder the
datagrams or ask for lost datagrams before passing them on to the application.

 There are no setup or teardown phases.

 How are the packets routed to their destination??


Routing table in a datagram network

 Each packet switch has a routing table which is based on the destination address.
 The routing tables are dynamic and are updated periodically.
 The destination addresses and the corresponding forwarding output ports are
recorded in the tables.
 The destination address in the header of a packet in a datagram network remains the
same during the entire journey of the packet.
 When the switch receives the packet, this destination address is examined, the
routing table is consulted to find the corresponding port through which the packet
should be forwarded.
EFFICIENCY

 Better than circuit switched network


 Resources are allocated only when there are packets to be
transferred.
 If a source sends a packet and there is a delay of few minutes
before another packet can be sent, the resources can be
reallocated during these minutes for other packets from other
sources.
 Switching in the internet is done by using the datagram
approach to packet switching at the network layer.
Delay in datagram network
 There may be greater delay in a datagram network than in a virtual circuit network.
 Although there are no setup and teardown phases, each packet may experience a
wait at a switch before it is forwarded.
 The packet travels through two switches.

 There are three transmission times (3T), three propagation delays (slopes 3of the lines), and two
waiting times (w1 w2).
Virtual circuit switching Network

 A virtual circuit network is a cross between a circuit switched network and


a datagram network.

Characteristics:

 Packets form a single message travel along the same path.


 Three phases to transfer data(setup, data transfer and tear down)
 Resources can be allocated during setup phase.
 Data are packetized and each packet carries an address in the header
 Implemented in data link layer.
Virtual circuit switching Network Addressing
Global addressing
 Source and destination needs unique addresses(used by the
switches only to create a virtual circuit identifier) during the set
up phase.
Local Addressing(VCI- virtual circuit identifier)
 Actually used for data transfer
A small address used by a frame between two
 switches.
Setup request

 The switch, in the setup phase acts as a packet switch, it has a routing table used
to know the output port number
Setup Acknowledgement
 When destination B receives the up frame, and it is ready to receive frames from
A, it assign a VCI. This VCI lets the destination know that the frame comes from
A not other sources.
Data transfer and tear down phase

 After sending all frames, a special frame is send to end the connection.
 Destination B responds with tear down confirmation frame.
Delay in virtual circuit Network

 In datagram network each packet


may experience a wait at a switch
before it is forwarded. In addition
the delay is not uniform for
 The packets of a message in a
virtual circuit network, there is a
one-time delay for setup and a
one-time delay for tear down. If
resource allocated during the
setup phase, there is no Wait time
for individual packets.

You might also like