Switching via an interconnection network, Computer Networking

Assignment Help:

Switching  via an interconnection network

The switching  techniques  overcome the bandwidth  limitation of a single  shared bus. This technique use a more sophisticated interconnection network such as  those  that have  been  used in the past  to inter connect  processor in a  multiprocessor computer architecture.

A crossbar switch  is an interconnection network consisting of  2 N buses that connect N input ports  to N output  ports as shown  in figure. A packet  arriving at an input  port travels  along the horizontal bus  attached to the input port until it intersects  with the  vertical bus leading to the desired output  port. If the vertical bus leading to the  bus output  port is free the packet is transferred to the output port. If the  vertical bus is being  is used  to transfer a packet  from  another  port to this same  output  port. The arriving  packet is blocked and  must be  queued  at the input port.


Related Discussions:- Switching via an interconnection network

Repeater - network layer and routing, Repeater Repeater is  also named...

Repeater Repeater is  also named as active hub operates at physical  layer of OSI model. Repeater is an  electronic  device that simply regenerates the signal. Signals travell

What is boundary level masking, Q. What is Boundary Level Masking? ...

Q. What is Boundary Level Masking? If mask numbers are either 255 or 0: Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet ma

Line layer - sonet sdh , Line Layer The line layer provides the synchr...

Line Layer The line layer provides the synchronization multiplexer, multiplexing and automatic  protection switching for the layer . primary  concerned with the  reliable trans

Analyze snort or pcap data from a public wifi hotspot, The project idea is ...

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r

Describe any good security technology, Describe any good security technolog...

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

Exam, i have an exam i need it to be solved

i have an exam i need it to be solved

Diffuse reflection in the basic illumination model, Question: (a) By ma...

Question: (a) By making use of an example, explain the Cohen-Sutherland line clipping algorithm. (b) Compare and contrast between the CMY and RGB colour models. (c) Expla

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd