Primary function - computer network, Computer Networking

Assignment Help:

Primary Function

Core network typically providing  the followings functionality

1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The  next  level in the hierarchy under  the core  nodes  is the  distribution  networks  and then the edge networks. Customers  premise Equipment ( CPE) do not  normally connect  to the core networks  of a large  service  provide.

2. Authentication: The  function  to decide whether the user requesting a service from the telecom network is authorized to do so within this network or not.

3. Call Control Switching: Call control  functionality decides the future  course  of call based on the call signaling processing. for e,  g  switching  functionality may decide  based on  the called number  that the  call be routed  towards a subscriber within  this operator  networks.

4.Charging: This functionality  handles the  collation and  processing  of charging  data generated  by various  networks  nodes. Two common types  of charging  mechanisms found  in present day networks are prepaid charging and post-paid charging.

5.Service Invocation: Core  network  perform  the task of service  invocation for its  subscribers. Service invocation  may happen  based on  some explicit action(for e, g, call transfer) by  user or implicitly ( call waiting). Its important  to note  however that  service execution may  or may not be a core network functionality  as third party  networks / nodes  may take  part in  actual service execution.

6.  Nateways: Gateways shall be present  in the core network to access other networks gateway  functionality  is dependent  on the type of  network it interfaces with.

Physically  one or more  of these  logical  functionalities may  simultaneously exist in a given  core network node.

 

 


Related Discussions:- Primary function - computer network

Clos network, Clos network This network was organized by Clos (1953).  ...

Clos network This network was organized by Clos (1953).  It is a non-blocking network and gives full connectivity like crossbar network but it also requires significantly minim

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Network layer in osi model, The Network layer is used to route physical dat...

The Network layer is used to route physical data to the destination point, it decides the actual path from where data travels to destination point. The network layer supports both

Explain the term ftp- file transfer protocol, Explain the term FTP: File T...

Explain the term FTP: File Transfer Protocol A very common method of moving files between two Internet sites. FTP is a special way to log in to another Internet site for pur

Explain about horn antenna, Q. Explain about Horn Antenna? - Outgoing t...

Q. Explain about Horn Antenna? - Outgoing transmissions broadcast by a stem and deflected outward - Received transmissions collect by a scooped part of the horn and deflecte

Virtual local area network, VLAN ( Virtual Local Area Network) is a concept...

VLAN ( Virtual Local Area Network) is a concept of creating distinct broadcast domains. It is a network which aims at partitioning the physical network. VLAN comprises all the attr

What is star topology, What is Star topology Each station is directly c...

What is Star topology Each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for tran

What is the difference between trigger and rule, What is the difference bet...

What is the difference between trigger and rule? The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by client

What are the call routers, What are the Call routers Call routers A, B,...

What are the Call routers Call routers A, B, C, D, and E. There are ten potential lines: AB, AC, AD, AE, BC, BD, BE, CD, CE, and DE. Each of these lines has four possibilities

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd