Process switching and fast switching, Computer Networking

Assignment Help:

Process Switching

It applies the brute force method to switch packets wih consumption of large amount of CPU time

List of items are needed when switching packets

Routing tables-    DRAM

Routing algorithm -  Flash memory

Packets-  SDRAM

 I/O memory    - Memory pools - DRAM, Kernal participation

Fast Switching

Same components which are needed for process switching.

Here Cache concept has involved for storing packets header in hash table structure. It increases the performance of switching fastly. Main purpose SDRAM is performs the switching packets quickly with efficiently.

In Cisco IOS Release 10.2, overcome the hash table structure by implement the was another data structure called a 2-way radix tree (a form of a binary tree).


Related Discussions:- Process switching and fast switching

Show the communication between switches in VLAN, Q. Show the Communication ...

Q. Show the Communication between Switches? Communication between Switches - Must know which station belongs to which VLAN as well as membership of stations connected to

What is fiber distributed data interface, FDDI -(Fiber Distributed Data Int...

FDDI -(Fiber Distributed Data Interface) FDDI Basics: FDDI (Fiber Distributed Data Interface) came about because system managers became concerned with network reliability i

Connection establishment - tcp connection management, Connection Establishm...

Connection Establishment TCP transmits  data in full duplex mode. When two TCP is two machines are  connected they are able  to send segments to each other simultaneously. This

Program, i need the job to be done within 3days

i need the job to be done within 3days

Debug ip igrp transaction, To monitor IP igrp traffic, we can use "debug IP...

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Source port number - transport layer, Source Port Number This fields o...

Source Port Number This fields occupies  the first 16 bytes of the UDP header. This  fields typically hold the UDP port number  of the application sending  this datagram. The

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd