Networks edge and technologies - computer networks , Computer Networking

Assignment Help:

Networks Edge  and Technologies

Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network edges are switches routers routing  switches. IAD and a variety of MAN/ WAN devices  which  are often  called   edge devices.

Network edges provide entry points into carrier service provider core backbone  networks. On an enterprise  network, network edge may connect ANs ( Ethernet or liken  Ring ) to an ATM backbone.

939_Networks Edge  and Technologies.jpg

figre Network Edge Information exchange  between  the access netowrk and the core netowrk

Network  edge  devices may translate  between one type  of network  protocol and another  if different  technologies in the access and the  core networks are used. For  example if  the  core network uses ATM switches  send data in calls  and use connection  oriented  virtual circuits while in the access network  edge  are responsible  for handling  this conversion. There is an  ingress (input) and egress(output)  edge devised for all  connections. The edge  device  aggregates ingress traffic for high speed transmission in the core  backbone  network  and then distribute egress traffic to end user through access devices.

Due  to the  variety and  complexity  at customer  access  technologies  and multiple choices  of a core  network.  A switch  at the network edge for a WAN may be a multiservice unit,  meaning  that it  supports a wide variety of communication technologies including  voice and IP over  dial  up connections. ISDN frame relay and TAM.

A core  network  ( or network core ) is  the  central  part of a telecom network that  provides various services  to customers who  are connected by  the access  network.

 

 

 


Related Discussions:- Networks edge and technologies - computer networks

Analyze snort or pcap data from a public wifi hotspot, The project idea is ...

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r

What is boundary level masking, Q. What is Boundary Level Masking? ...

Q. What is Boundary Level Masking? If mask numbers are either 255 or 0: Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet ma

What is the main purpose of ospf, What is the main purpose of OSPF? OSP...

What is the main purpose of OSPF? OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to verify the best possible path for data exchang

Firewalls - point to point, Firewalls After several  security  related ...

Firewalls After several  security  related internet  newsgroups  started overflowing  with posts it becomes  clear something  hand to done to help  secure  networks. The first

Connect a router and computer with a console cable- ccna, Connect a Router ...

Connect a Router and Computer with a Console Cable Step 1 : Set up a basic physical connection. Connect the console (rollover) cable to the console port on the router. Link

State about the future of the intranet, Future of the intranet At ...

Future of the intranet At present, the world of information technology is guided bythe C 3 paradigm that stands for Command, Control and Communication, which is normally

Program, i need the job to be done within 3days

i need the job to be done within 3days

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd