Switching via an interconnection network, Computer Networking

Assignment Help:

Switching  via an interconnection network

The switching  techniques  overcome the bandwidth  limitation of a single  shared bus. This technique use a more sophisticated interconnection network such as  those  that have  been  used in the past  to inter connect  processor in a  multiprocessor computer architecture.

A crossbar switch  is an interconnection network consisting of  2 N buses that connect N input ports  to N output  ports as shown  in figure. A packet  arriving at an input  port travels  along the horizontal bus  attached to the input port until it intersects  with the  vertical bus leading to the desired output  port. If the vertical bus leading to the  bus output  port is free the packet is transferred to the output port. If the  vertical bus is being  is used  to transfer a packet  from  another  port to this same  output  port. The arriving  packet is blocked and  must be  queued  at the input port.


Related Discussions:- Switching via an interconnection network

Command to show the hardware platform information, Recognize the command to...

Recognize the command to show the hardware platform information Ans) Show version is the command to show the hardware platform information

Debug ip igrp transaction, To monitor IP igrp traffic, we can use "debug IP...

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

Compare Intranet with Internet and LAN, Intranet vs Internet vs LAN It...

Intranet vs Internet vs LAN It is certainly possible that both Intranets and the Internet can coexist. As spelt theoretically, the entire Intranet could be located at a remote

Describe asynchronous vs. synchronous transmission, Serialized data is not ...

Serialized data is not generally sent at a uniform rate by a channel. Instead, there is usually a burst of regularly spaced binary data bits followed by a pause, after which the da

Show the character-level encryption, Q. Show the Character-level Encryption...

Q. Show the Character-level Encryption? - Substitutional - Monoalphabetic - simplest form; also called Caesar cipher - Every character is replaced with another character

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

How does a switch use store and forward, The LAN switch copies the whole fr...

The LAN switch copies the whole frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and verifies the outgoing interface

Show the communication between switches in VLAN, Q. Show the Communication ...

Q. Show the Communication between Switches? Communication between Switches - Must know which station belongs to which VLAN as well as membership of stations connected to

What is egp, What is EGP (Exterior Gateway Protocol)? It is the protoco...

What is EGP (Exterior Gateway Protocol)? It is the protocol the routers in neighboring autonomous systems use to recognize the set of networks that can be reached within or by

What is an ethernet, What is an Ethernet? The Ethernet topology was dev...

What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd