Switching via memory - network layer and routing , Computer Networking

Switching  via memory

Traditional  computers with switching  between  input and output  being  doen under  direct  control  of the CPU input and output  ports  functioned as traditional I/O devices in a traditional  operating systems. Aninput port with an arriving  packet first signalled the routing  processor. The packet  was then copied  from the  input   port into processor  memory. The routing  processor  then extract the destination address from the heard looked  up the appropriate output port in  the forwarding table and the packet to the output  buffers. Note  that if memory  bandwidth  is B packets per second  can be written into  or read from memory them the overall forwarding throughput ( the  total  rate at which  packets are transferred   from input  ports to output  ports ) must be  less than B/2.

Posted Date: 3/16/2013 5:41:46 AM | Location : United States







Related Discussions:- Switching via memory - network layer and routing , Assignment Help, Ask Question on Switching via memory - network layer and routing , Get Answer, Expert's Help, Switching via memory - network layer and routing Discussions

Write discussion on Switching via memory - network layer and routing
Your posts are moderated
Related Questions
What is the benefit of using classless addressing over classfull addressing scheme?

What is Round Trip Time? The duration of time it takes to send a message from one end of a network to the other and back, is known as RTT.

Q. Show the CRC-Performance ? CRC-Performance CRC is able to detect all burst errors that affect an odd number of bits CRC is able to detect all burst errors of


What is the Network Time Protocol? A protocol that makes sures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is c

What is the suggestion of increasing and decreasing subnet Bits?

FDDI -(Fiber Distributed Data Interface) FDDI Basics: FDDI (Fiber Distributed Data Interface) came about because system managers became concerned with network reliability i


Write discussion on Associative mapping - computer architecture.

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which