1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
10

g What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in

a circuit-switched network?
Computers and Technology
2 answers:
bogdanovich [222]3 years ago
6 0

Answer:

Explanation:

(A) In its simplest term, packet switched network allows packets to be broken into smaller bits and then each bit is made to be sent independently across the network. In this type of network, communications between communicating devices might not necessarily be set up before communication can be initiated.

On the other hand, in a circuit switched network, communications between communicating devices  must be set up before communication can be initiated.  An example of this is the analog telephone network communication where there has to be a connection between the two end telephones before communication can begin.

The following are the advantages of circuit switched network over a packet switched network;

i. Since there is a need to establish connection before communication and once connection is made communication starts, circuit switched experiences lower delay compared to packet switched network.

ii. Also, since there is a need to establish connection before communication, a circuit switched network provides more data transmission reliability than a packet switched network.

iii. Circuit switched networks can be used for real time delivery of data while packet switched networks cannot be used.

(B) TDM (Time Division Multiplexing) and FDM (Frequency Division Multiplexing) are two common methods of combining multiple signals into a single signal - this is called multiplexing. They both act by dividing channels.

TDM splits and assigns time slices to each channel while FDM splits the channel into two or more non-overlapping ranges of frequency.

The following are the advantages of TDM over FDM in a circuit switched network;

(i) TDM provides flexibility than FDM

(ii) TDM provides efficiency by logically assigning time slices to signals according to how much bandwidth they need. This is an advantage that is lacking in FDM.

REY [17]3 years ago
4 0

Answer:

Advantages of a circuit-switched network over a packet-switched network are:

  • In Circuit-switched networks, resources needed to provide communication between the end systems for the duration of the session are usually reserved unlike in packet-switched networks where they are not reserved.
  • Circuit-switched networks have faster communication, so they can be used for Voice/Video calls
  • Circuit-switched networks have less errors in communication
  • Circuit-switched networks are more suitable for real-time services. Packet-switched networks are simpler, more efficient, and less costly to implement. They also offer better sharing of transmission capacity than circuit-switched network

Advantages does TDM have over FDM in a circuit-switched network are;

  • In TDM,  all connections operate at the same frequency , but In FDM,   all connections operate at different frequencies
  • In TDM there is low interference between the signals that are being multiplexed as compared to FDM.
  • In TDM, bandwidth is saved by allocating time slots on demand dynamically
  • TDM systems are more flexible than FDM

You might be interested in
True or False <br><br> Rootkits are only made by black-hat hackers.
andreyandreev [35.5K]

Answer:

True

Explanation:

Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.

Rootkit tools:

1. Keyloggers

2. antivirus disablers

3. password stealers

4. banking credential stealers

5. bots for DDoS attacks

8 0
3 years ago
You used a website to learn about the child-rearing practices in China. Your study is related most to which aspect
ozzi

Answer:

c. culture

Explanation:

I think your study is related to their culture

5 0
3 years ago
Read 2 more answers
When you create a user with the useradd command, what is the immediate state of it?
kipiarov [429]

When a user is created in Linux using the useradd command, the <em>immediate state</em> of the created account is locked.

  • The useradd command can be invoked in other to create a new user account using the following command

sudo useradd fast_user

<em>#fast_user</em><em> </em><em>is</em><em> </em><em>the</em><em> </em><em>name</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>account</em><em> </em><em>created</em><em> </em>

  • At this point, the account has been created but it will be locked until the required login details are set. This can be achieved using the line ;

sudo passwd fast_user

Therefore, an account created using the useradd command is in a locked state.

Learn more :brainly.com/question/12135504?referrer=searchResults

5 0
2 years ago
True or False? Any edition or version of Windows can join a domain.
Veseljchak [2.6K]

Answer: TRUE! 100%

If I was helpful i would to be rated brainliest please thank you!

Explanation:

8 0
2 years ago
In computer science, what are two names that are used to describe data structures organized by association
Bas_tet [7]

Answer:

Answer to the following question are,

  • Association list
  • Tables

Explanation:

Because these are the two associations data structures.

  • Association List: are referred to that data type which contains the pair of the key and item in the Java Programming Language and Python Programming Language, it is called a dictionary data type.
  • Tables or Hash Tables: are referred to that data type which converts the keys into the integer value.
6 0
3 years ago
Other questions:
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • In which area of engineering does material selection play a vital role a design optimization b forensic engineering c mechanical
    6·1 answer
  • A collision between gas atoms and electrons raises the energy levels of oxygen and nitrogen in the _________.
    8·2 answers
  • Why are application programs stored in main memory​
    11·1 answer
  • One of the first signals that an organization is making progress in the development of its IR program, specifically in the devel
    6·1 answer
  • Web analytical packages can obtain the following information when someone visits a website, except Group of answer choices name
    9·1 answer
  • When you purchase donuts, they come in boxes of 12, so 24 donuts take 2 boxes. All donuts need to be in a box, so if you buy 13
    10·1 answer
  • The full meaning of UNIVAC and ENIAC​
    5·2 answers
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
  • When a ____________ file is opened, it appears full-screen, in slideshow mode, rather than in edit mode.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!