1. The document discusses different types of switched networks including circuit-switched, datagram, and virtual circuit networks. It describes the key characteristics of each type.
2. Circuit switching uses dedicated paths between nodes and has three phases: setup, data transfer, and teardown. Datagram networks treat each packet independently and route using destination addresses in packet headers. Virtual circuit networks combine aspects of circuit and datagram switching.
3. The structures of switches used in different networks are examined, including crossbar switches for circuit switching and various designs for packet switches like Banyan networks.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
switching techniques in data communication and networkingHarshita Yadav
it is a detailed presentation on switching techniques. it includes the three types of switching technique. it is described in such manner that you can learn switching without any difficulties.
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
switching techniques in data communication and networkingHarshita Yadav
it is a detailed presentation on switching techniques. it includes the three types of switching technique. it is described in such manner that you can learn switching without any difficulties.
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
popularly known as Akbar the Great,[15] and also as Akbar I (Persian pronunciation: [akbar]),[16] was the third Mughal emperor, who reigned from 1556 to 1605. Akbar succeeded his father, Humayun, under a regent, Bairam Khan, who helped the young emperor expand and consolidate Mughal domains in the Indian subcontinent.
Akbar gradually enlarged the Mughal Empire to include much of the Indian subcontinent through Mughal military, political, cultural, and economic dominance. To unify the vast Mughal state, Akbar established a centralised system of administration and adopted a policy of conciliating conquered rulers through marriage and diplomacy. To preserve peace and order in a religiously and culturally diverse empire, he adopted policies that won him the support of his non-Muslim subjects, including abolishing the sectarian tax and appointing them to high civil and military posts.
Under Akbar, Mughal India developed a strong and stable economy, which tripled in size and wealth, leading to commercial expansion and greater patronage of an Indo-Persian culture. Akbar's courts at Delhi, Agra, and Fatehpur Sikri attracted holy men of many faiths, poets, architects, and artisans, and become known as centres of the arts, letters, and learning. Timurid and Perso-Islamic culture began to merge and blend with indigenous Indian elements into a distinct style of Mughal arts, including painting and architecture. Disillusioned with orthodox Islam and perhaps hoping to bring about religious unity within his empire, Akbar promulgated Din-i Ilahi, a syncretic creed derived mainly from Islam and Hinduism as well as elements of Zoroastrianism and Christianity.popularly known as Akbar the Great,[15] and also as Akbar I (Persian pronunciation: [akbar]),[16] was the third Mughal emperor, who reigned from 1556 to 1605. Akbar succeeded his father, Humayun, under a regent, Bairam Khan, who helped the young emperor expand and consolidate Mughal domains in the Indian subcontinent.
Akbar gradually enlarged the Mughal Empire to include much of the Indian subcontinent through Mughal military, political, cultural, and economic dominance. To unify the vast Mughal state, Akbar established a centralised system of administration and adopted a policy of conciliating conquered rulers through marriage and diplomacy. To preserve peace and order in a religiously and culturally diverse empire, he adopted policies that won him the support of his non-Muslim subjects, including abolishing the sectarian tax and appointing them to high civil and military posts.
Under Akbar, Mughal India developed a strong and stable economy, which tripled in size and wealth, leading to commercial expansion and greater patronage of an Indo-Persian culture. Akbar's courts at Delhi, Agra, and Fatehpur Sikri attracted holy men of many faiths, poets, architects, and artisans, and become known as centres of the arts, letters, and learning. Timurid and Perso-Islamic culture began to merge and blend with indigeno
A network switch (sometimes known as a switching hub) is a computer networking device that is used to connect devices together on a computer network by performing a form of packet switching. A switch is considered more advanced than a hub because a switch will only send a message to the device that needs or requests it, rather than broadcasting the same message out of each of its ports
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2. 8.2
Introduction
Whenever we have multiple devices, we have the
problem of how to connect them to make one-to-one
communication possible.
Mesh network (point-point) and Star network (to
central device) connection. But these impractical in large
networks.
A better solution is switching. A switched network
consists of a series of interlinked nodes, called switches.
Switches are devices capable of creating temporary
connections between two or more devices linked to the
switch.
5. 8.5
8-1 CIRCUIT-SWITCHED NETWORKS
A circuit-switched network consists of a set of
switches connected by physical links. A connection
between two stations is a dedicated path made of one
or more links. However, each connection uses only
one dedicated channel on each link. Each link is
normally divided into n channels by using FDM or
TDM.
Three Phases
Efficiency
Delay
Circuit-Switched Technology in Telephone Networks
Topics discussed in this section:
6. 8.6
A circuit-switched network is made of a
set of switches connected by physical
links, in which each link is
divided into n channels.
Note
7. 8.7
Figure 8.3 A trivial circuit-switched network
circuit-switched network with four switches
and four links. Each link is divided into n=3.
8. 8.8
Figure 8.3 A trivial circuit-switched network
When end system A needs to communicate with end
system M:
1. the setup phase: system A needs to request a
connection to M that must be accepted by all switches
as well as by M itself.
2. A dedicated path: a circuit (channel) is reserved on
each link, and the combination of circuits or channels.
3. Data transfer can take place. After all data have been
transferred.
9. 8.9
Figure 8.3 A trivial circuit-switched network
1. Circuit switching takes place at the physical layer.
2. The stations must make a reservation for the resources
to be used during the communication.
3. Data transferred between the two stations are not
packetized.
4. There is no addressing involved during data transfer.
The switches route the data based on their occupied
band (FDM) or time slot (TDM).
10. 8.10
In circuit switching, the resources need
to be reserved during the setup phase;
the resources remain dedicated for the
entire duration of data transfer until the
teardown phase.
Note
11. 8.11
As a trivial example, let us use a circuit-switched
network to connect eight telephones in a small area.
Communication is through 4-kHz voice channels. We
assume that each link uses FDM to connect a maximum
of two voice channels. The bandwidth of each link is
then 8 kHz. Figure 8.4 shows the situation.
Telephone 1 is connected to telephone 7; 2 to 5; 3 to 8;
and 4 to 6. Of course the situation may change when
new connections are made. The switch controls the
connections.
Example 8.1
13. 8.13
As another example, consider a circuit-switched
network that connects computers in two remote offices
of a private company. The offices are connected using a
T-1 line leased from a communication service provider.
There are two 4 × 8 (4 inputs and 8 outputs) switches in
this network. For each switch, four output ports are
folded into the input ports to allow communication
between computers in the same office. Four other
output ports allow communication between the two
offices. Figure 8.5 shows the situation.
Example 8.2
16. 8.16
Efficiency
It can be argued that circuit-switched
networks are not as efficient as the other
two types of networks because resources
are allocated during the entire duration of
the connection.
17. 8.17
Delay
Figure 8.6 Delay in a circuit-switched network
the delay in this type of network is minimal. The total delay is due to the
time needed to create the connection, transfer data, and disconnect the
circuit
18. 8.18
Switching at the physical layer in the
traditional telephone network uses
the circuit-switching approach.
Note
19. 8.19
8-2 DATAGRAM NETWORKS
1. In data communications, we need to send messages from one
end system to another. If the message is going to pass
through a packet-switched network, it needs to be divided
into packets of fixed or variable size. The size of the packet is
determined by the network and the governing protocol.
2. In a datagram network, each packet is treated independently
of all others.
3. Datagram switching is normally done at the network layer.
Routing Table
Efficiency
Delay
Datagram Networks in the Internet
Topics discussed in this section:
20. 8.20
In a packet-switched network, there
is no resource reservation;
resources are allocated on demand.
Note
21. 8.21
Figure 8.7 A datagram network with four switches (routers)
Figure 8.7 shows how the datagram approach is used to deliver four
packets from station A to station X.
The datagram networks are sometimes referred to as connectionless
networks. The term connectionless here means that the switch (packet
switch) does not keep information about the connection state.
22. 8.22
Figure 8.8 Routing table in a datagram network
If there are no setup or teardown phases,
how are the packets routed to their
destinations in a datagram network?
each switch (or packet switch) has a
routing table which is based on the
destination address.
The routing tables are dynamic and
are updated periodically.
23. 8.23
A switch in a datagram network uses a
routing table that is based on the
destination address.
Note
24. 8.24
The destination address in the header of
a packet in a datagram network remains
the same during the entire journey of the
packet.
Note
25. 8.25
Figure 8.9 Delay in a datagram network
There may be greater delay in a datagram network than in a virtual-
circuit network and delay is not uniform
26. 8.26
Switching in the Internet is done by
using the datagram approach to packet
switching at the network layer.
Note
Datagram Networks in the Internet
27. 8.27
8-3 VIRTUAL-CIRCUIT NETWORKS
A virtual-circuit network is a cross between a circuit-
switched network and a datagram network. It has
some characteristics of both.
1. As in a circuit-switched network, there are setup and teardown
phases in addition to the data transfer phase.
2. Resources can be allocated during the setup phase, as in a
circuit-switched network, or on demand, as in a datagram
network.
3. As in a datagram network, data are packetized and each packet
carries an address in the header.
4. As in a circuit-switched network, all packets follow the same
path established during the connection.
5. virtual-circuit network is normally implemented in the data link
layer,
30. 8.30
Figure 8.11 Virtual-circuit identifier
Addressing
two types of addressing:
1. Global Address
2. Local (Virtual-circuit identifier): The identifier
that is actually used for data transfer (switch scope)
When a frame arrives at a switch, it has VCI; when it leaves, it has a
different VCl.
31. 8.31
3 phases
setup, data transfer, and teardown.
1. Setup: the source and destination use their global addresses
to help switches make table entries for the connection.
2. the source and destination inform the switches to delete the
corresponding entry.
3. occurs between these two phases.
32. 8.32
Figure 8.12 Switch and tables in a virtual-circuit network
To transfer a frame from a source to its
destination, all switches need to have a
table entry for this virtual circuit. The
table, in its simplest form, has four
columns.
34. 8.34
Figure 8.14 Setup request in a virtual-circuit network
In the setup phase, a switch creates an
entry for a virtual circuit. For example,
suppose source A needs to create a
virtual circuit to B. Two steps are
required:
1. the setup request
2. the acknowledgment.
36. 8.36
Teardowil Phase: In this phase, source A, after
sending all frames to B, sends a special frame
called a teardown request.
Teardown Phase
37. 8.37
In virtual-circuit switching, all packets
belonging to the same source and
destination travel the same path;
but the packets may arrive at the
destination with different delays
if resource allocation is on demand.
Note
Efficiency
39. 8.39
Switching at the data link layer in a
switched WAN is normally implemented
by using virtual-circuit techniques.
Note
40. 8.40
8-4 STRUCTURE OF A SWITCH
We use switches in circuit-switched and packet-
switched networks. In this section, we discuss the
structures of the switches used in each type of
network.
Structure of Circuit Switches
Structure of Packet Switches
Topics discussed in this section:
41. 8.41 Figure 8.17 Crossbar switch with three inputs and four outputs
Structure of Circuit Switches
Circuit switching today can use either of two technologies: the
space-division switch or the time-division switch.
In space-division switching, the paths in the circuit are separated
from one another spatially.
1-crossbar switch
43. 8.43
In a three-stage switch, the total
number of crosspoints is
2kN + k(N/n)2
which is much smaller than the number of
crosspoints in a single-stage switch (N2).
Note
44. 8.44
Design a three-stage, 200 × 200 switch (N = 200) with
k = 4 and n = 20.
Solution
In the first stage we have N/n or 10 crossbars,
each of size 20 × 4. In the second stage, we have
4 crossbars, each of size 10 × 10. In the third
stage, we have 10 crossbars, each of size 4 × 20.
The total number of crosspoints is 2kN + k(N/n)2,
or 2000 crosspoints. This is 5 percent of the
number of crosspoints in a single-stage switch
(200 × 200 = 40,000).
Example 8.3
45. 8.45
According to the Clos criterion:
n = (N/2)1/2
k > 2n – 1
Crosspoints ≥ 4N [(2N)1/2 – 1]
Note
46. 8.46
Redesign the previous three-stage, 200 × 200 switch,
using the Clos criteria with a minimum number of
crosspoints.
Solution
We let n = (200/2)1/2, or n = 10. We calculate k = 2n
− 1 = 19. In the first stage, we have 200/10, or 20,
crossbars, each with 10 × 19 crosspoints. In the
second stage, we have 19 crossbars, each with 10
× 10 crosspoints. In the third stage, we have 20
crossbars each with 19 × 10 crosspoints. The
total number of crosspoints is 20(10 × 19) + 19(10
× 10) + 20(19 ×10) = 9500.
Example 8.4
47. 8.47 Figure 8.19 Time-slot interchange
Time-Division Switch
Time-division switching uses time-division multiplexing
(TDM) inside a switch. The most popular technology is
called the time-slot interchange (TSI).
48. 8.48
Time-space-time switch
space-division
adv. The advantage of space-division switching is that it
is instantaneous
Dis. the number of cross-points required
Time –division
Adv. No need of cross-points.
Dis. is that processing each connection creates delays.
Each time slot must be stored by the RAM, then
retrieved and passed on.
50. 8.50
Figure 8.21 Packet switch components
a packet switch has four components:
input ports, output ports, the routing processor, and
the switching fabric
51. 8.51
Figure 8.22 Input port
An input port performs the physical and data link functions of
the packet switch. The bits are constructed from the received
signal. The packet is de-capsulated from the frame. Errors are
detected and corrected. The packet is now ready to be routed by
the network
52. 8.52
ROllting Processor
The routing processor performs the functions of the network layer.
The destination address is used to find the address of the next hop
and, at the same time, the output port number from which the
packet is sent out.
Switching "Fabrics
The most difficult task in a packet switch is to move the packet
from the input queue to the output queue. The speed with which
this is done affects the size of the input/output queue and the
overall delay in packet delivery. As crossbar switch and banyan
switch
53. 8.53
Figure 8.23 Output port
The output port performs the same functions
as the input port, but in the reverse order.
First the outgoing packets are queued, then
the packet is encapsulated in a frame, and
finally the physical layer functions are
applied
54. 8.54 Figure 8.24 A banyan switch
banyan switch
A banyan switch is a multistage switch with micro-switches at
each stage that route the packets based on the output port
represented as a binary string. For n inputs and n outputs, we
have log2 n stages with nl2 micro-switches at each stage.
#of stages = Iog2(8) = 3.
56. 8.56
Figure 8.26 Batcher-banyan switch
The problem with the banyan switch is the possibility of internal
collision even when two packets are not heading for the same
output port.