Switching via an interconnection network, Computer Networking

Switching  via an interconnection network

The switching  techniques  overcome the bandwidth  limitation of a single  shared bus. This technique use a more sophisticated interconnection network such as  those  that have  been  used in the past  to inter connect  processor in a  multiprocessor computer architecture.

A crossbar switch  is an interconnection network consisting of  2 N buses that connect N input ports  to N output  ports as shown  in figure. A packet  arriving at an input  port travels  along the horizontal bus  attached to the input port until it intersects  with the  vertical bus leading to the desired output  port. If the vertical bus leading to the  bus output  port is free the packet is transferred to the output port. If the  vertical bus is being  is used  to transfer a packet  from  another  port to this same  output  port. The arriving  packet is blocked and  must be  queued  at the input port.

Posted Date: 3/16/2013 5:45:21 AM | Location : United States







Related Discussions:- Switching via an interconnection network, Assignment Help, Ask Question on Switching via an interconnection network, Get Answer, Expert's Help, Switching via an interconnection network Discussions

Write discussion on Switching via an interconnection network
Your posts are moderated
Related Questions
Router(config-if)# no cdp enable is the  command to disable CDP on an interface

Q. Illustrate the Drawbacks of stop and wait? Drawbacks of stop and wait - Only one frame is able to be in transit at a time - After every frame sent the host must wai

Explain the working of ISDN Stands for Integrated Services Digital Network. It is a way to move more data over existing regular phone lines. ISDN is rapidly becoming availab

Q. Show the Routing Table? Routing Table Every router remains a routing table that has one entry for every destination network of which the router is aware Proces

M E T HOD OF CALCULATION It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain t

Let's imagine that we have 2 TCP clients. A simple one (modTCPClient.c) like the one you wrote in the first part of project 2 and another one (modTCPClient1.c) that after it connec

Mail Access Protocols The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves messa

Q. Illustrate Nonboundary-Level Masking with example? Nonboundary-Level Masking Example IP address 45 123 21 8 Mask 255 192 0 0 Subnet 45 64 0 0 123 0

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop

The transport Layer Communication  between  computers is handled by the transport layer which  is comprised of transmission control  protocol (TCP) and the users  datagram pro