Switching via memory - network layer and routing , Computer Networking

Switching  via memory

Traditional  computers with switching  between  input and output  being  doen under  direct  control  of the CPU input and output  ports  functioned as traditional I/O devices in a traditional  operating systems. Aninput port with an arriving  packet first signalled the routing  processor. The packet  was then copied  from the  input   port into processor  memory. The routing  processor  then extract the destination address from the heard looked  up the appropriate output port in  the forwarding table and the packet to the output  buffers. Note  that if memory  bandwidth  is B packets per second  can be written into  or read from memory them the overall forwarding throughput ( the  total  rate at which  packets are transferred   from input  ports to output  ports ) must be  less than B/2.

Posted Date: 3/16/2013 5:41:46 AM | Location : United States







Related Discussions:- Switching via memory - network layer and routing , Assignment Help, Ask Question on Switching via memory - network layer and routing , Get Answer, Expert's Help, Switching via memory - network layer and routing Discussions

Write discussion on Switching via memory - network layer and routing
Your posts are moderated
Related Questions
INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

Most protocol suites have dissimilar OSI layer protocols within them. At layer 3, IP is for TCP/IP. TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4. DDP is for Appletal

In link-state routing network topology is filled from route calculation. Switches send link-state information about local joins. Every switch creates own routing tables. It needs

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit

Now, let us suppose a famous sequence called as bitonic sequence and sort out the elements using a combinational circuit consisting of a set of comparators. The property of bitonic

Skype is a web-based service which offers cheap and free phone calls. Explain step by step (in terms of networking technology) what really happens from the point when you initiate

#include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456; } void sub(float x[ 10000], int npoints) {

Q. What are the Routing Techniques? Routing Routing Techniques Static versus Dynamic Routing Routing Table for classful Addressing Routing Table for Cl

Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active