Process switching and fast switching, Computer Networking

Assignment Help:

Process Switching

It applies the brute force method to switch packets wih consumption of large amount of CPU time

List of items are needed when switching packets

Routing tables-    DRAM

Routing algorithm -  Flash memory

Packets-  SDRAM

 I/O memory    - Memory pools - DRAM, Kernal participation

Fast Switching

Same components which are needed for process switching.

Here Cache concept has involved for storing packets header in hash table structure. It increases the performance of switching fastly. Main purpose SDRAM is performs the switching packets quickly with efficiently.

In Cisco IOS Release 10.2, overcome the hash table structure by implement the was another data structure called a 2-way radix tree (a form of a binary tree).


Related Discussions:- Process switching and fast switching

Write the definition of SAN, Write the definition of SAN A SAN is a sep...

Write the definition of SAN A SAN is a separate network to handle storage requirements. The SAN detaches storage tasks from specific servers and makes a shared storage facility

Torus, Torus The mesh network with enclose around connections is called...

Torus The mesh network with enclose around connections is called Tours Network.

Usages, what are usages of gogle and internet

what are usages of gogle and internet

What are the features of star and ring topology, What are the features of s...

What are the features of star and ring topology The three networks have following features: star: best case is = 2, average case is = 2, worst case is = 2 ring: best case

Types of topologies, TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOL...

TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY:  It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE

Network interface hardware, NETWORK INTERFACE HARDWARE:  CPU can't ope...

NETWORK INTERFACE HARDWARE:  CPU can't operate data at network speeds. So in order to connect to the network device systems use special purpose hardware for network connection

What are the tools sued for cryptography and web security, Q. What are the ...

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec

Building a defense in networking, Q. Building a Defense in networking? ...

Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

Unused reserved - trannsport layer, Unused Reserved This  is a 6 bi...

Unused Reserved This  is a 6 bite field  reserved for future use.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd