Switching via memory - network layer and routing , Computer Networking

Assignment Help:

Switching  via memory

Traditional  computers with switching  between  input and output  being  doen under  direct  control  of the CPU input and output  ports  functioned as traditional I/O devices in a traditional  operating systems. Aninput port with an arriving  packet first signalled the routing  processor. The packet  was then copied  from the  input   port into processor  memory. The routing  processor  then extract the destination address from the heard looked  up the appropriate output port in  the forwarding table and the packet to the output  buffers. Note  that if memory  bandwidth  is B packets per second  can be written into  or read from memory them the overall forwarding throughput ( the  total  rate at which  packets are transferred   from input  ports to output  ports ) must be  less than B/2.


Related Discussions:- Switching via memory - network layer and routing

Layered concept of computer networks, Q1.  What  advantages  do  you  see  ...

Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the proces

Connection-oriented protocol, TCP is connection-oriented. Connection-orient...

TCP is connection-oriented. Connection-oriented is a kind of connection established between the source & destination machines before any data is sent that means a connection is est

IP address, what is variable ip address

what is variable ip address

Advantages of ls over dv algorithm, Advantages of LS over DV algorithm ...

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

Challenge handshake authentication protocols (chap), Challenge Handshake Au...

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Describe in detail with example how data fragmentation works, Describe in d...

Describe in detail with example how data fragmentation works?

Determine about the security systems, Determine about the Security Systems ...

Determine about the Security Systems If the company intends to connect to the Internet, then it should pay great attention to the configuration of firewalls. Just as no one wo

State the reason for intranet system breaks down, State the reason for Intr...

State the reason for Intranet system breaks down Care must be taken to ensure that proper spare parts are available even after about five years of commissioning. In addition t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd