Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Switching via an interconnection network
The switching techniques overcome the bandwidth limitation of a single shared bus. This technique use a more sophisticated interconnection network such as those that have been used in the past to inter connect processor in a multiprocessor computer architecture.
A crossbar switch is an interconnection network consisting of 2 N buses that connect N input ports to N output ports as shown in figure. A packet arriving at an input port travels along the horizontal bus attached to the input port until it intersects with the vertical bus leading to the desired output port. If the vertical bus leading to the bus output port is free the packet is transferred to the output port. If the vertical bus is being is used to transfer a packet from another port to this same output port. The arriving packet is blocked and must be queued at the input port.
ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.
To split data in pieces is known as segmentation and divide segmentation in pieces called Fragmentation. #question..
How can you manage a network using a router? Routers have built in console that lets you configure dissimilar settings, like security and data logging. You can allocate restric
Question: (a) Do you agree with the following statements (specify your reasons to support your answer for each):- i) Policies are the foundation for the development of sta
Q. Define Name Space in domain name system? - All names assigned to machines on an internet - Must be unique; either flat or hierarchical - Flat name space - name is assi
Describe the concept of broad cast and multi-cast?
what are queues?
How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.
Simple Mail Transfer Protocol ( SMTP) SMTP is the principal application layer protocol for internet electronic mail. It uses the reliable data transfer service of TCP to
Configure VTP on the Switches VTP permits the network administrator to control the instances of VLANs on the network by creating VTP domains. Within each VTP domain, one or mor
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd