Implementing parallel data paths between input and output ports is to move the buffers to the crossbar crosspoints, this switch architecture is usually referred as ____________
Implementing parallel data paths between input and output ports is to move the buffers to the crossbar crosspoints, this switch architecture is usually referred as ____________
If the receiving overhead is greater than the sending overhead and the receiver cannot process incoming packets fast enough, then it is called a ____________
If the receiving overhead is greater than the sending overhead and the receiver cannot process incoming packets fast enough, then it is called a ____________
Packets belonging to the same message can be distinguished from others by including a _______________
Packets belonging to the same message can be distinguished from others by including a _______________
Any network topology that provides this bisection bandwidth is said to have _____________
Any network topology that provides this bisection bandwidth is said to have _____________
The routing algorithm can allow packets to use resources in increasing partial order, first traversing up the tree until they reach some_____________
The routing algorithm can allow packets to use resources in increasing partial order, first traversing up the tree until they reach some_____________
The address and data information is typically referred to as the ____________
The address and data information is typically referred to as the ____________
The end node is busy for the entire time, hence the use of the term ______________
The end node is busy for the entire time, hence the use of the term ______________
The black box network can be viewed as a simple ____________
The black box network can be viewed as a simple ____________
Interconnection networks are also called ________________
Interconnection networks are also called ________________
In the network, when ports remain free at the other side of the network but can be used for later expansion of the network to larger sizes. These kind of networks are referred to as ____________
In the network, when ports remain free at the other side of the network but can be used for later expansion of the network to larger sizes. These kind of networks are referred to as ____________
When the routing algorithm restricts the paths allowed by packets to only those that keep the global network state deadlock-free, it is known as ____________
When the routing algorithm restricts the paths allowed by packets to only those that keep the global network state deadlock-free, it is known as ____________
Listening before transmission to avoid collisions is called ___________
Listening before transmission to avoid collisions is called ___________
Techniques commonly used to implement flow control beyond simple ______________
Techniques commonly used to implement flow control beyond simple ______________
Algorithm that defines which network path, or paths, are allowed for each packet, is known as ______________
Algorithm that defines which network path, or paths, are allowed for each packet, is known as ______________
New topologies that could reduce the number of switches through which packets must traverse, referred to as the ______________
New topologies that could reduce the number of switches through which packets must traverse, referred to as the ______________