Primary function - computer network, Computer Networking

Assignment Help:

Primary Function

Core network typically providing  the followings functionality

1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The  next  level in the hierarchy under  the core  nodes  is the  distribution  networks  and then the edge networks. Customers  premise Equipment ( CPE) do not  normally connect  to the core networks  of a large  service  provide.

2. Authentication: The  function  to decide whether the user requesting a service from the telecom network is authorized to do so within this network or not.

3. Call Control Switching: Call control  functionality decides the future  course  of call based on the call signaling processing. for e,  g  switching  functionality may decide  based on  the called number  that the  call be routed  towards a subscriber within  this operator  networks.

4.Charging: This functionality  handles the  collation and  processing  of charging  data generated  by various  networks  nodes. Two common types  of charging  mechanisms found  in present day networks are prepaid charging and post-paid charging.

5.Service Invocation: Core  network  perform  the task of service  invocation for its  subscribers. Service invocation  may happen  based on  some explicit action(for e, g, call transfer) by  user or implicitly ( call waiting). Its important  to note  however that  service execution may  or may not be a core network functionality  as third party  networks / nodes  may take  part in  actual service execution.

6.  Nateways: Gateways shall be present  in the core network to access other networks gateway  functionality  is dependent  on the type of  network it interfaces with.

Physically  one or more  of these  logical  functionalities may  simultaneously exist in a given  core network node.

 

 


Related Discussions:- Primary function - computer network

What is the frame, What is the Frame A presentation format, which en...

What is the Frame A presentation format, which enables Web page designers and users to mark a part of the screen for links to other pages. Frames usually appear on the left

What is a binary semaphore, What is a binary semaphore? What is its u...

What is a binary semaphore? What is its use? A binary semaphore is takes only 0 and 1 as values. They are used to execute mutual exclusion and synchronize concurrent p

Discuss the architecture and applications of e-mail, Question 1 Discuss th...

Question 1 Discuss the following Switching Mechanisms- Circuit switching Message switching Packet switching   Question 2 Discuss the following IEEE standard

Program for two library methods with thread , #include void subdomain(...

#include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456; } void sub(float x[ 10000], int npoints) {

Overview of the various network topologies, QUESTION Write a report to ...

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

What is the administrative distance for igrp, IGRP is a distance vector rou...

IGRP is a distance vector routing protocol designed by Cisco. The maximum hop count is 255, and it uses a combination of variables to verify a composite metric. IGRP has an adminis

Show the parity check - performance, Q. Show the Parity Check - Performance...

Q. Show the Parity Check - Performance? Parity Check - Performance Is able to detect all single-bit errors Can as well detect burst errors if the total number of

Banking industry, Will like to know what is the standard industrial practic...

Will like to know what is the standard industrial practice for a bank network design? Preferably with complete paper on the network design covering security, domain segregation, vi

What is the beaconing, An FDDI frame or Token Ring frames those points to s...

An FDDI frame or Token Ring frames those points to serious problem with the ring, like a broken cable. The beacon frame carries the address of the station thought to be down.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd