Primary function - computer network, Computer Networking

Assignment Help:

Primary Function

Core network typically providing  the followings functionality

1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The  next  level in the hierarchy under  the core  nodes  is the  distribution  networks  and then the edge networks. Customers  premise Equipment ( CPE) do not  normally connect  to the core networks  of a large  service  provide.

2. Authentication: The  function  to decide whether the user requesting a service from the telecom network is authorized to do so within this network or not.

3. Call Control Switching: Call control  functionality decides the future  course  of call based on the call signaling processing. for e,  g  switching  functionality may decide  based on  the called number  that the  call be routed  towards a subscriber within  this operator  networks.

4.Charging: This functionality  handles the  collation and  processing  of charging  data generated  by various  networks  nodes. Two common types  of charging  mechanisms found  in present day networks are prepaid charging and post-paid charging.

5.Service Invocation: Core  network  perform  the task of service  invocation for its  subscribers. Service invocation  may happen  based on  some explicit action(for e, g, call transfer) by  user or implicitly ( call waiting). Its important  to note  however that  service execution may  or may not be a core network functionality  as third party  networks / nodes  may take  part in  actual service execution.

6.  Nateways: Gateways shall be present  in the core network to access other networks gateway  functionality  is dependent  on the type of  network it interfaces with.

Physically  one or more  of these  logical  functionalities may  simultaneously exist in a given  core network node.

 

 


Related Discussions:- Primary function - computer network

Higher bandwidth - computer network, Higher bandwidth Fibre  optic  ...

Higher bandwidth Fibre  optic  cable an  support  dramatically higher bandwidths than  either   twisted pair or  coaxial  cable currently data rates  and bandwidth utilizatio

Briefly describe three security requirements of an agent, QUESTION (a) ...

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Determine the method to protect the web servers, Determine the method to pr...

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

Implement a transport layer protocol to transmit data, In this project, you...

In this project, you will implement a Transport Layer protocol to transmit data with Reliable Data Transfer from a client to a server in the presence of channel errors and loss. Th

What is the function of the osi session layer, What is the function of the ...

What is the function of the OSI Session Layer? This layer gives the protocols and means for two devices on the network to communicate with each other by holding a session.  Thi

What is network layer of osi model, Q. What is network layer of osi model? ...

Q. What is network layer of osi model? - Describe end-to-end delivery of packets. - Defines logical addressing thus that any endpoint can be identified. - Defines how ro

Differentiate between fast fading and slow fading, Differentiate between Fa...

Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

Hybrid of client server and p2p architecture, Hybrid  of Client Server and...

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd