Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Router Components

As noted in the  previous  a router consists of a of input  interfaces at which  packets arrive and a set  of output interfaces from  which  packets depart. The  input and output interfaces are interconnected  by a high  sped fabric that allows packets to be transferred from  inputs  to outputs. The main  parameter that characterizes the fabric is the speed  up. The speedup is defined as the  ration between  the maximum transfer rate across the fabric from an  input  to an output interface and the capacity of an input link.

The set of operation performed by routers on a data packet as the packet travels from  source to destination. The  main functions performed by routers on the data path are routing lookup buffer management and  packet scheduling routing lookup identifies the output interface where to forward each incoming  packet based on the  destination address in the packet heard. Buffer  management and scheduling are concerned with managing  router  resources in case of congestion. In particular when the  buffer overflow or when it exceeds some predefined threshold the router  has to  decide what packet to drop. Similarly when there is more than one packet in the buffer the  router has to decide what packet to transmit next. Usually today routers implement a simple drop tail  buffer management scheme that is  when the buffer overflow the  packet at the tail of the queue is dropped  packets are scheduled on a first in first out  basis.

As  a packet  traverse a router the packet  can be stored at input  at output  or at both  the input  and  output  interfaces. Based  on where a router can stores  packets routers are classified as input queuing output queuing or input output queuing.

A high level  view of  a generic router  architecture is shown  in figure four  components  of a router can be identified.

Input port  performs  the physical  layer functions  of terminating and incoming physical  link to  a router. It also performs the data link layer function  that middle boxes in the input and out port needed to inter operate with the data link layer functions  at the remote side of the incoming links. It also performs a lookup  and forwarding function  so that a packet  forwarded into the  switching  fabric of the router  emerge at the appropriate output  port. Control  packets  are forwarded  from an input  port to the routing  processor.

Output port stores the  packets  that have  been forwarded  to it through the switching  fabric  and then  transmits the packets on the outgoing link. The output port thus  performs  the reverse data link and physical  layer functionality of the output  port. When a link  is bidirectional an to the link  will typically by paired  with the  input  port  for that  same link  card.

Routing  process executes the routing protocols  maintains the routing  information and forwarding  tables and performs  networks  management  function within  the router.

Switching fabric  connects the  router  input  ports to tits output  ports. This switching  fabric  is completely contained within  the router  a network  inside a network  router.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9529273

Have any Question?


Related Questions in Computer Network & Security

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Since quotas do not raise revenues but have the same trade

Since quotas do not raise revenues but have the same trade effects as do tariffs, why not just have tariffs? Why would the government impose quotas when tariffs not only would reduce imports but also bring in new revenue ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Compare the importance of three categories described in the

Compare the importance of three categories described in the article: 1. window of exposure, 2. full public disclosure, 3. reasonable disclosure for three types of software applications: 4. military, 5. medical, 6. educat ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As