Switching via an interconnection network, Computer Networking

Assignment Help:

Switching  via an interconnection network

The switching  techniques  overcome the bandwidth  limitation of a single  shared bus. This technique use a more sophisticated interconnection network such as  those  that have  been  used in the past  to inter connect  processor in a  multiprocessor computer architecture.

A crossbar switch  is an interconnection network consisting of  2 N buses that connect N input ports  to N output  ports as shown  in figure. A packet  arriving at an input  port travels  along the horizontal bus  attached to the input port until it intersects  with the  vertical bus leading to the desired output  port. If the vertical bus leading to the  bus output  port is free the packet is transferred to the output port. If the  vertical bus is being  is used  to transfer a packet  from  another  port to this same  output  port. The arriving  packet is blocked and  must be  queued  at the input port.


Related Discussions:- Switching via an interconnection network

What do you mean by osi, What do you mean by OSI? The Open System Inter...

What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

What is meant by asymmetrical protocols, What is meant by Asymmetrical prot...

What is meant by Asymmetrical protocols? There is a many-to-one relationship among clients and server. Clients always initiate the dialog by requesting a service. Servers are p

Domain names and address resolution, However what if you don't know about t...

However what if you don't know about the IP address of the computer you wished to connect to? What if you have to access a web server referred to as www.abc.com? How does your web

Explain hyper cube interconnection networks, Hyper Cube: A Hypercube inter...

Hyper Cube: A Hypercube interconnection network is an expansion of cube network. For n=3, Hypercube interconnection network may be described recursively in this manner:  For n

What are some drawbacks of implementing a ring topology, What are some draw...

What are some drawbacks of implementing a ring topology? In case one workstation on the network varies a malfunction, it can bring down the whole network. Another drawback is t

Line layer - sonet sdh , Line Layer The line layer provides the synchr...

Line Layer The line layer provides the synchronization multiplexer, multiplexing and automatic  protection switching for the layer . primary  concerned with the  reliable trans

Give the description of security tools, Give the Description of security to...

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

Set up to use pvm run and complie, PVM uses two environment variables when ...

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the loca

Well known internet applications that uses tcp connection, a)  Which of the...

a)  Which of the well-known Internet applications uses a separate TCP connection for control?   b)  The separate control connection as in (a) above is an example of control (sig

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd