Performance metrics of networks, Computer Networking

Assignment Help:

The performance of interconnection networks is measured on the below parameters. 

1) Bandwidth: It determines maximum transfer rate between any two nodes.  It is measured in MB per second or GB per second.

2) Functionality: It refers how interconnections network maintains synchronization, interrupt handling, request/message combines, coherence and data routing.

3) Latency: In interconnection networks different nodes can be at different distances depending on the topology. The network latency indicates to the worst-case time delay for unit message when transferred via the network between farthest nodes. 

4) Scalability: It indicates to ability of interconnection-networks for modular expansion with a scalable performance with rising machine resources.

5) Hardware Complexity: It denotes to the cost of hardware logic such as switches, wires, connectors, arbiter which are needed for implementation of interconnection network.


Related Discussions:- Performance metrics of networks

Networking, Discuss the interdependence of networking hardware and software...

Discuss the interdependence of networking hardware and software. Is it possible to have one without the other?

What is cross over cable, Q. What is Cross over cable? - Cross the crit...

Q. What is Cross over cable? - Cross the critical pair to properly transmit, align and receive signals on devices with like connections. - Pin 1 connected to pin 3 as well a

What are the advantages of star topology, What are the advantages of Star T...

What are the advantages of Star Topology? The advantages of star topology are: a. Relatively easy to configure. b. Simple to troubleshoot c. Media faults are automatic

Enumerate the various internetworking facility, Enumerate the various inter...

Enumerate the various internetworking facility 1.) Give a link among networks. At minimum, a physical and link control connection is required.   (2) Provide for the routing

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Subletting, Ask Design private subnetworks (using Class A range for CIDR) f...

Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table. Hints: Consider how many network bits are required to a

Importance of implementing a fault tolerance system, What is the importance...

What is the importance of implementing a Fault Tolerance System? Are there limitations? A fault tolerance system makes sure continuous data availability. This is done by elimin

Define in details about computer networks, Define in details about compute...

Define in details about computer networks ? Discuss a variety of types of networks topologies in computer network. Also discuss a variety of costs and disadvantage of all topology

Briefly describe how the file system is organized in unix, Question: a)...

Question: a) Briefly describe how the file system is organized in Unix. b) What is the importance of the "touch" command. Give one of its disadvantage. c) Name three d

Vector-distance algorithm, Vector-Distance algorithm illustrated in more d...

Vector-Distance algorithm illustrated in more detail below: Packet switches wait for next update message and they goes by entries in packet. If entry has least path to destinat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd