Define the term network throughput, Computer Networking

Network throughput

It is a symptomatic measure of the message carrying capability of a network. It is termed as the total number of messages network can send in per unit time. To approximate the throughput, the capability of network and the messages number of really carried by the network are computed. Actually the throughput is just a part of its capacity. In 'interconnection network' traffic flow between nodes can be non uniform and it can be probable that a definite pair of nodes manages a disproportionately huge amount of traffic. These are known as 'hot spot'. The hot spot can act like a bottleneck and may reduce the performance of the entire network.

 

 

Posted Date: 7/12/2013 3:16:43 AM | Location : United States







Related Discussions:- Define the term network throughput, Assignment Help, Ask Question on Define the term network throughput, Get Answer, Expert's Help, Define the term network throughput Discussions

Write discussion on Define the term network throughput
Your posts are moderated
Related Questions
#clasification of inductor

In this question, you will compare delays in packet switching (i.e. in IP networks), in circuit switching (i.e. in PSTN telephony) and in virtual circuit packet switching (i.e. in

FDDI Media Access Control Unlike CSMA/CD networks such like Ethernet token-passing networks are deterministic--you are able to calculate the maximum time that will pass before

Initialization  Imagine that  all routers in our  sample internetwork  comes up  at the  same time. Each router sends a greeting packet to its  neighbours to find  out the  sta

Large data packets result in fewer load because a smaller part of the packet is used for header information. Optimum networks use 4kB data packets or larger. Large data packets


Transition Phases A PPP connection goes through phases  which can be  shown in a transition phase . Dead: In  the dead phase  the link is not  being used. There is  no ac

implementing cnet sliding window protocol with 6 nodes

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Increasingly it is the quality of the interface of mobile phones that are giving competitors the edge.  Users not only make selections based on cost but also functionality and cert