Process switching and fast switching, Computer Networking

Process Switching

It applies the brute force method to switch packets wih consumption of large amount of CPU time

List of items are needed when switching packets

Routing tables-    DRAM

Routing algorithm -  Flash memory

Packets-  SDRAM

 I/O memory    - Memory pools - DRAM, Kernal participation

Fast Switching

Same components which are needed for process switching.

Here Cache concept has involved for storing packets header in hash table structure. It increases the performance of switching fastly. Main purpose SDRAM is performs the switching packets quickly with efficiently.

In Cisco IOS Release 10.2, overcome the hash table structure by implement the was another data structure called a 2-way radix tree (a form of a binary tree).

Posted Date: 3/5/2013 7:13:17 AM | Location : United States







Related Discussions:- Process switching and fast switching, Assignment Help, Ask Question on Process switching and fast switching, Get Answer, Expert's Help, Process switching and fast switching Discussions

Write discussion on Process switching and fast switching
Your posts are moderated
Related Questions
The major features of TCP are following: Reliability : TCP ensures that any data sent by a sender arrives at the destination as it was sent. There cannot be any data loss or mo

Post Office  Protocols Version In computing  the post office protocol  version 3 (POP3) is an  application layer internet standard  protocols  used by  local e mail  clients


State the Disadvantages of adaptive routing process  (1) The routing decision is more difficult; thus, the processing burden on network nodes enhances. (2) In most cases, ad

One of the design requirements is to isolate other network traffic and broadcast from finance department to improve security. In order for this to possible we will implement VLAN o

Normal 0 false false false EN-IN X-NONE X-NONE Networks A networks  consists of two  or m

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

simple introduction,defination and with example & digram

Describe the concept of successor and feasible successor?

can i get a sample networking project for 20 computer with all network components?