Primary function - computer network, Computer Networking

Assignment Help:

Primary Function

Core network typically providing  the followings functionality

1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The  next  level in the hierarchy under  the core  nodes  is the  distribution  networks  and then the edge networks. Customers  premise Equipment ( CPE) do not  normally connect  to the core networks  of a large  service  provide.

2. Authentication: The  function  to decide whether the user requesting a service from the telecom network is authorized to do so within this network or not.

3. Call Control Switching: Call control  functionality decides the future  course  of call based on the call signaling processing. for e,  g  switching  functionality may decide  based on  the called number  that the  call be routed  towards a subscriber within  this operator  networks.

4.Charging: This functionality  handles the  collation and  processing  of charging  data generated  by various  networks  nodes. Two common types  of charging  mechanisms found  in present day networks are prepaid charging and post-paid charging.

5.Service Invocation: Core  network  perform  the task of service  invocation for its  subscribers. Service invocation  may happen  based on  some explicit action(for e, g, call transfer) by  user or implicitly ( call waiting). Its important  to note  however that  service execution may  or may not be a core network functionality  as third party  networks / nodes  may take  part in  actual service execution.

6.  Nateways: Gateways shall be present  in the core network to access other networks gateway  functionality  is dependent  on the type of  network it interfaces with.

Physically  one or more  of these  logical  functionalities may  simultaneously exist in a given  core network node.

 

 


Related Discussions:- Primary function - computer network

Define some solutions of security, What is Security solutions Though t...

What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

What are triggers and rules, Triggers are special user defined actions usua...

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

How to configure vtp pruning on the switches-ccna, Configure VTP Pruning on...

Configure VTP Pruning on the Switches VTP pruning permits a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN

What is network architecture, What is Network Architecture? When two o...

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

Post office protocols version - application layer, Post Office  Protocols ...

Post Office  Protocols Version In computing  the post office protocol  version 3 (POP3) is an  application layer internet standard  protocols  used by  local e mail  clients

Encrypt and decrypt message cryptography, Submission instructions: Answer ...

Submission instructions: Answer the following questions using a text processing software and submit your answers via connex. Possible file formats for your submission file(s) are .

Satellite radio channels - computer network, Satellite Radio Channels ...

Satellite Radio Channels A communication  satellite links two or more  earth  microwave transmitter receiver, know  as ground  stations. The satellite receives transmission on

Input port - network layer and routing , Input Port The input  ports ...

Input Port The input  ports line  termination functions  and data link processing implement  the physical  and data  link layer  associated with an individual input  link to

network consultant, Network Consultant, My name is Jason Long. I am th...

Network Consultant, My name is Jason Long. I am the CEO of IL Corporation. IL is an investment firm that performs financial services to many organizations. We currently have a

Database servers connected as a cluster to the main server, Database server...

Database servers connected as a cluster to the main server There could be three database servers connected as a cluster to the main server to provide better connectivity and se

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd