Answer should be original and similarity (plagiarism) not more than 10% this is very important point. Answer should be at least 750 words. Answer should be references on Harvard style (Not use Wikipedia), the references should be Academic Articles or books or Trusted website. When use citation from any reference please keep it between "citation" (Author,Year). As reference you can use the following book: Jim Kurose & Keith Ross (2010), COMPUTER NETWORKING: A Top-Down Approach. 5th ed. Boston: Addison Wesley. Assignment is: Conduct research to find three companies selling high-speed router products. Compare the most powerful routers sold and elaborate on how you define “most powerful.”
Document Preview:
Week 4: Network Layer There are many things to learn during this week. This seminar is rich with graph manipulations. Techniques used to computerize graph analysis are taken as is without proof (which is good). Although you have to read a lot this week, you will find this part to be easy to follow and interesting. The Network Layer takes care of delivering packets between end systems. Unlike the Transport layer, the network layer exists in all routers and bridges; all network layers on the route from source to destination are involved in delivering packets. Routers contain fewer layers than any end workstation. Naturally, routers are not used to run applications, nor do they have application or transport layers [why?]. We must keep in mind, however, that end workstations can be utilized to do routing jobs. Network layers have three main functions: a) path determination, b) switching, and c) call setup. A large part of this seminar will deal with path determination, where a network strives to balance the load among all links. Switching is also a main function in routers; we will look at the internal structure of routers and see how switching is performed. There is not much to say about call setup because it is similar to TCP connection setup, which we have discussed in the last seminar. There are two forms of services provided by the network layer: virtual circuits and datagrams. Real-time applications, such as phone calls, require a guaranteed bit rate. To achieve this goal, resources should be allocated from source to destination. These resources are reserved for the duration of communication. During the communication session, the whole path from source to destination is called the Virtual Circuit (VC). Other applications, such as web browsing, do not put this restriction. Thus the network is flexible in implementing a simpler and less expensive form of communication. Hence, packets are sent along paths that vary with the variation of the load on links. Therefore,...