Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Output Port
The function of the port is take the packets that have been stored in the out put port memory and transmits them over the out going link. The queuing and buffer management functionality required when the switch fabric delivers packets to the output ports at a rate that exceeds the output link rate.
Figure output port processing
Output port queuing is that a packet scheduler at the output port must over packet among those queued for transmission. This selection might be done on a simple basis. Such as first come first served scheduling. Or a more sophisticated scheduling such a weighted fair queuing which shares the outgoing link fairly among the different end to end connections that have packet queued for transmission.
Figure output port queuing
Figure shows the output port queuing. At time a packet has arrived at each of the incoming input ports each destined for the outgoing port. Assuming identical line speeds and a switch operating at three times the line speed, one time unit latter that is in the time needed to receive or send a packet all three original packets have been transferred to the outgoing out and are queued awaiting transmission. In the next time unit one of these three packets will have been transmitted over the outgoing link. By the example two new packet shave arrived at the incoming side of the switch one of these packets is destined for output port.
Control Frame: set_successor Station X wants to leave Successor S Predecessor P X sends set_successor frame to P With S as data field P changes its
Networks Edge and Technologies Network Edge provides information exchange between the access network and the core network. The devices and facilities in the network
Thus now you know how packets travel from one computer to another computer over the Internet. however what's in-between? What in fact makes up the Internet infrastructure or backbo
Memory Pools IOS manages available free memory thorugh memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be al
How is route table populated by RIP protocol?
PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the loca
What is CRC The CRC is computed while transmission and appended to output stream as soon as last bit goes out onto wire. If the CRC were in header, it will be necessary to make
Explain the transport layer in detail Transport Layer: Transport layer ensures and controls the end-to-end integrity of data message propagated via the network amid two devic
Q. Show Ethernet Media standard? - The cables and connector specifications utilized to support Ethernet implementations are derived from the EIA/TIA (Electronic Industries Asso
How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd