Switching via memory - network layer and routing , Computer Networking

Assignment Help:

Switching  via memory

Traditional  computers with switching  between  input and output  being  doen under  direct  control  of the CPU input and output  ports  functioned as traditional I/O devices in a traditional  operating systems. Aninput port with an arriving  packet first signalled the routing  processor. The packet  was then copied  from the  input   port into processor  memory. The routing  processor  then extract the destination address from the heard looked  up the appropriate output port in  the forwarding table and the packet to the output  buffers. Note  that if memory  bandwidth  is B packets per second  can be written into  or read from memory them the overall forwarding throughput ( the  total  rate at which  packets are transferred   from input  ports to output  ports ) must be  less than B/2.


Related Discussions:- Switching via memory - network layer and routing

Media, explain history of internet?

explain history of internet?

Undesirable sharing - fundamentals of networks, Undesirable Sharing ...

Undesirable Sharing With  the good  comes  the bad  while  networking  allow  the easy  sharing  of useful  information it also  the sharing  of undesirable  data. One sign

What is the standard isdn term for a native isdn modem, TA is the standard...

TA is the standard ISDN term for a native ISDN modem

What is one basic requirement for establishing vlan, What is one basic requ...

What is one basic requirement for establishing VLANs? A VLAN needs dedicated equipment on each end of the connection that permits messages entering the Internet to be encrypted

What are the concerns of the physical layer, What are the concerns of the P...

What are the concerns of the Physical Layer? Physical layer coordinates the functions needed to transmit a bit stream over a physical medium. a. Physical characteristics of in

Explain in detail about wireless network, Explain in detail about wireless ...

Explain in detail about wireless network Think about unseen terminal problem. Imagine a wireless network consist of five stations, A through E, such that each one them is in r

Cost involved in inter-processor communication, Cost Involved in Inter-Proc...

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

Half duplex ethernet operation, Half-Duplex - Capability for data transmis...

Half-Duplex - Capability for data transmission in only single direction at a time among sending station and a receiving station.

Categories to access the intranet, Categories to access the Intranet P...

Categories to access the Intranet Persons who can find access to the Intranet can be put into three categories. 1.  Those who can enter the site 2.  Those who can access

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd