Primary function - computer network, Computer Networking

Assignment Help:

Primary Function

Core network typically providing  the followings functionality

1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The  next  level in the hierarchy under  the core  nodes  is the  distribution  networks  and then the edge networks. Customers  premise Equipment ( CPE) do not  normally connect  to the core networks  of a large  service  provide.

2. Authentication: The  function  to decide whether the user requesting a service from the telecom network is authorized to do so within this network or not.

3. Call Control Switching: Call control  functionality decides the future  course  of call based on the call signaling processing. for e,  g  switching  functionality may decide  based on  the called number  that the  call be routed  towards a subscriber within  this operator  networks.

4.Charging: This functionality  handles the  collation and  processing  of charging  data generated  by various  networks  nodes. Two common types  of charging  mechanisms found  in present day networks are prepaid charging and post-paid charging.

5.Service Invocation: Core  network  perform  the task of service  invocation for its  subscribers. Service invocation  may happen  based on  some explicit action(for e, g, call transfer) by  user or implicitly ( call waiting). Its important  to note  however that  service execution may  or may not be a core network functionality  as third party  networks / nodes  may take  part in  actual service execution.

6.  Nateways: Gateways shall be present  in the core network to access other networks gateway  functionality  is dependent  on the type of  network it interfaces with.

Physically  one or more  of these  logical  functionalities may  simultaneously exist in a given  core network node.

 

 


Related Discussions:- Primary function - computer network

Describe techniques used in location based services, Question: a) Comp...

Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Data structures for parallel algorithms, To execute any algorithm, selectio...

To execute any algorithm, selection of a proper data structure is very crucial. A particular operation may be executed with a data structure in a smaller time but it may have a ver

Off the shelf company, Draw a work breakdown structure (WBS) diagram for th...

Draw a work breakdown structure (WBS) diagram for the project, to show all the planned tasks. This WBS should contain at least two levels. b) Explain the main differences between

Collective message passing, In collective message passing, all the processe...

In collective message passing, all the processes of a set participate in communication. MPI gives a number of functions to execute the collective message passing. Some of them are

State the characteristics of thinnet, Thinnet Characteristics Short...

Thinnet Characteristics Shorter range (185 meters) as well as smaller capacity Bus topology LAN Connectors and cables include: thin coaxial cable, NICs and BNC-T

Tcp-ip and osi differences, Q. TCP-IP and OSI Differences - TCP/IP com...

Q. TCP-IP and OSI Differences - TCP/IP combines the Presentation and Application Layers - TCP/IP combines the OSI Data Link and Physical Layers into 1 Layer - TCP/IP app

Osi reference model, - The model was developed by the ISO (International Or...

- The model was developed by the ISO (International Organisation for Standardisation) in 1984. It is currently considered the primary Architectural model for inter-computer communi

What is the mac address, The address for a device as it is recognized at th...

The address for a device as it is recognized at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd