Networks edge and technologies - computer networks , Computer Networking

Assignment Help:

Networks Edge  and Technologies

Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network edges are switches routers routing  switches. IAD and a variety of MAN/ WAN devices  which  are often  called   edge devices.

Network edges provide entry points into carrier service provider core backbone  networks. On an enterprise  network, network edge may connect ANs ( Ethernet or liken  Ring ) to an ATM backbone.

939_Networks Edge  and Technologies.jpg

figre Network Edge Information exchange  between  the access netowrk and the core netowrk

Network  edge  devices may translate  between one type  of network  protocol and another  if different  technologies in the access and the  core networks are used. For  example if  the  core network uses ATM switches  send data in calls  and use connection  oriented  virtual circuits while in the access network  edge  are responsible  for handling  this conversion. There is an  ingress (input) and egress(output)  edge devised for all  connections. The edge  device  aggregates ingress traffic for high speed transmission in the core  backbone  network  and then distribute egress traffic to end user through access devices.

Due  to the  variety and  complexity  at customer  access  technologies  and multiple choices  of a core  network.  A switch  at the network edge for a WAN may be a multiservice unit,  meaning  that it  supports a wide variety of communication technologies including  voice and IP over  dial  up connections. ISDN frame relay and TAM.

A core  network  ( or network core ) is  the  central  part of a telecom network that  provides various services  to customers who  are connected by  the access  network.

 

 

 


Related Discussions:- Networks edge and technologies - computer networks

What is medium access control of ethernet, What is Medium Access Control of...

What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the

Metrics are used by routing protocols, What metrics are used by routing pro...

What metrics are used by routing protocols to verify the best path?

Name the steps included in creating the checksum, List the steps included i...

List the steps included in creating the checksum. a. Separate the data into sections b. Add the sections together using 1's complement arithmetic c. Take the complement o

Which layer defines bit synchronization, Physical layers defines with synch...

Physical layers defines with synchronizing the 1s and 0s on the wire.

Describe some common threats to the hardware, Describe some common threats ...

Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan

Discuss on basic services in gsm, Question 1 Explain the process of Compon...

Question 1 Explain the process of Components Identification and call establishment Question 2 Discuss on Basic services in GSM Question 3 Explain the Protocols Use

Determine about the tcp/ip and osi model, Determine about the TCP/IP and OS...

Determine about the TCP/IP and OSI model Both models are based on the layered protocols. Both comprise network, transport and application layer. In both the models, transport s

Computer networks - fundamentals of networks , Computer Networks A com...

Computer Networks A computer  networks  can be defined as set of computer that  interact  among  the individual  computers sharing  resources or information. Reference models

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd