Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Output Port
The function of the port is take the packets that have been stored in the out put port memory and transmits them over the out going link. The queuing and buffer management functionality required when the switch fabric delivers packets to the output ports at a rate that exceeds the output link rate.
Figure output port processing
Output port queuing is that a packet scheduler at the output port must over packet among those queued for transmission. This selection might be done on a simple basis. Such as first come first served scheduling. Or a more sophisticated scheduling such a weighted fair queuing which shares the outgoing link fairly among the different end to end connections that have packet queued for transmission.
Figure output port queuing
Figure shows the output port queuing. At time a packet has arrived at each of the incoming input ports each destined for the outgoing port. Assuming identical line speeds and a switch operating at three times the line speed, one time unit latter that is in the time needed to receive or send a packet all three original packets have been transferred to the outgoing out and are queued awaiting transmission. In the next time unit one of these three packets will have been transmitted over the outgoing link. By the example two new packet shave arrived at the incoming side of the switch one of these packets is destined for output port.
Virtual Private Network (VPN) adds the features of both public and private networks. It is fixed to single organization and needs public network for connectivity. These connect
Question: (a) Distinguish between Flow Control and Congestion Control. (b) Explain clearly how a URL is resolved by a computer. (c) List one application that uses TCP
What is Telnet It is a protocol or set of rules that uses to connect one computer to another computer in network. It is also called as a remote login. The telnet operates on cl
ACME Corp is located in Toledo, Ohio. They would like to create a network and divide it into 3 subnets, each subnet has 150 computers. The IT plan calls for connecting the LAN to t
You have been tasked with the job of designing the new network layout for R2I's new location. R2I has a fractional T1 line that enters the premises at Site B. You can use: 1
As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans) the authentication method
Question 1: (a) In networking, there are different possible topologies. Explain the Linear bus, Ring and Star topology along with their advantages and disadvantages. (b) W
compare routing algorithms with non adaptive algorithms
With an object server, the Client/Server application is written as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). T
How many dissimilar types of subnet classful networks are present?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd