Networks edge and technologies - computer networks , Computer Networking

Assignment Help:

Networks Edge  and Technologies

Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network edges are switches routers routing  switches. IAD and a variety of MAN/ WAN devices  which  are often  called   edge devices.

Network edges provide entry points into carrier service provider core backbone  networks. On an enterprise  network, network edge may connect ANs ( Ethernet or liken  Ring ) to an ATM backbone.

939_Networks Edge  and Technologies.jpg

figre Network Edge Information exchange  between  the access netowrk and the core netowrk

Network  edge  devices may translate  between one type  of network  protocol and another  if different  technologies in the access and the  core networks are used. For  example if  the  core network uses ATM switches  send data in calls  and use connection  oriented  virtual circuits while in the access network  edge  are responsible  for handling  this conversion. There is an  ingress (input) and egress(output)  edge devised for all  connections. The edge  device  aggregates ingress traffic for high speed transmission in the core  backbone  network  and then distribute egress traffic to end user through access devices.

Due  to the  variety and  complexity  at customer  access  technologies  and multiple choices  of a core  network.  A switch  at the network edge for a WAN may be a multiservice unit,  meaning  that it  supports a wide variety of communication technologies including  voice and IP over  dial  up connections. ISDN frame relay and TAM.

A core  network  ( or network core ) is  the  central  part of a telecom network that  provides various services  to customers who  are connected by  the access  network.

 

 

 


Related Discussions:- Networks edge and technologies - computer networks

Tqm in design manufacturing, Quality assurance through statistical methods...

Quality assurance through statistical methods is a key component in a manufacturing organization where TQM generally starts by sampling a random selection selection of th

Approaches use in constructing application entities, The diagram below offe...

The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model. ISO Approach - Occasionally called Horizontal Approach - OSI asse

Command that forces the router to load into ROM, Determine the command that...

Determine the command that forces the router to load into ROM mode upon a reload?  Ans) boot system rom ia the command that forces the router to load into ROM mode upon a reload

Network design, Get the network design for a company

Get the network design for a company

Explain fiber-optics cable, Explain Fiber-Optics cable. A cable with ce...

Explain Fiber-Optics cable. A cable with central glass tube covered with protective shield which transmit data using photons is fiber optics cable. These cables transmit data t

State the methods to keep the attackers at bay, State the methods to keep t...

State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design

Wait protocol in parallel programming , Wait protocol The wait protoco...

Wait protocol The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait prot

WOrkstation, Interdepences of workstation hardware and software

Interdepences of workstation hardware and software

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd