You are on page 1of 3
savant ‘Switching Techniques | KVSeContets in bg sah reset teacher Wome Syiabus Evalite Yoursaf Think Crticlly Question Bank eBook Project Reports Referencss Contactos Home » Swtcheg Tecingues ‘Computer Fundamerta Softee Concepts emery Concept Number System peraing System (pen Source Concept Intamalseorage encoding of Choractes. acount Programing ethodsiay Problem Sobing athodoay Trieductont Or stuctue of C+ Program Vertes and Expressions XICSUNITIV- C44 bw Cont Saements toons In tne following figure a connection in a four-node out tons fxeuit awitehing network is shown. set etn Functions ——— aitoat siches —— One Denar eo Ss “Two Denaro i Fa Fa Fa a Us Deed Daa Tyms Ed E Es ‘Switching Techniques ——Sss~—~C~*~“—~*~*~*~*~*~S~S~S i Switching Techniques - Source (en.wikipedia.org) Apart from determining valid paths between sources and destinations within an interconnection network, a switching technique is needed that specifies "how messages are to be fragmented before passing then to the network and how the resources along the path are to be allocated. Furthermore, 2 switching technique gives preconditions to be fulfilled before a fragment can be moved on to the next network component. Following are the different switching techniques: Circuit Switching In circuit switching when a connection is established, the crigin-node identifies the first intermediate node (node A) in the path to the end-node and sends it a communication request signal. After che fires, intermediate node receives this signal the process is repeated as many times as needed to reach the end-node. Afterwards, the end-node sends a communication acknowledge signal to the origin node through all the intermediate nodes that ave been used in the communication request. Then, a full duplex transmission line, that it is going to be kept for the whole communication, is set-up between the origin-node and the end-nede, To release the communication the origin- node sends a communication end signal to the end-node. Message Switching When a connection is established, the origin-node identifies the first intermediate node in the path to the end-node and sends it the whole message. After receiving and storing this message, the first intermediate node (node A) identifies the second one (node 8) and, when the transmission line is not busy, the former sends the whole message (store-and-forward philosophy). This process is repeated up to the end- node. ‘ObjctOrertas Progranmng ‘Gass a Object access Specter ‘contractor and Desructor hertance Data Fe Haning Pontes rey stack ueve xucs-varm Database Concent Rebtonal Abeba SQ ‘SQL Functions Book Metra Logeal Greats ‘epkaton of Bookan Lge ‘commoneaton Tecmebois ‘Switching Techniques “Trenamason Hed Network Dovees Network Topologies Networks Network Protocole Network Secu Vieb Serves | ‘open Source Concent Packet Switching based Packet routing through WAN Internet Ihip Rasecontentsivindexphnswitching-techniques 1B savant ‘Switching Techniques | KVSeContets in Packet Switching based on Virtual Circuit connection is estab!ished, When a Virtual Ciel. pete men Ty ae hats The origin-node identifies the first intermediate node (node A) in the path to the end-node and sends it a communication request packet. This process is repeated as many times as needed to reach, Then, the end-nade sends a communication acknowledge packet ‘to the origin- nede through the intermediate nodes (A, B, ¢ and D) that have been traversed in the communication zequest. he virtual cizcuit established on this way will be kept for the whole communication. once a virtual circuit has been estabiished, the origin node begins to send packets (each of them has a virtual circuit identifier) to the first intermediate node. Then, the st intermediate node (node A) begins to send packets to the following node in the virtual circuit without waiting to store all message packets received from the origin-node. This process is repeated until all message packets arrive to the end-node. In the communication release, when the origin node sends to the end-node a communication end packet, the latter anawere with an acknowledge packet. ‘There are two possibilities to release a connection: + No trace of the virtual circuit information is left, go every communication 48 get up ag if it were che first one. + The virtual circuit information is kept for future connections. Packet Switching based on Datagram: Packet Switching rena = =) I. ‘he origin-node identifies the first intermediate node in the path and heging to send packets. Each packet carries an origin-nede and end-node identifier. The first intermediate node (node A) begins send packets, without storing the whole message, to the following intermediate node. This process is repeated up to the end-nede. As there are neither connection establishment nor connection zelease, the path followed by each pactet from the origin~node to the end-node can be different and therefore, as = consequence of, Afferent propagation delays, they can arrive ordered. Comparison of Switching Techniques If a connection (path) between the origin and the end node is established at the beginning of a session we are talking about circuit or packet (virtual circuit) switching. In case it does not, we refer to message and packet (datagram) switching. On the other hand, when considering how a message is transmitted, if the whole message is divided into pieces we have packet switching (based either on virtual circuit or datagram) but if it does not, we have circuit and message switching. Ihipmasecontentsinvindexphnswitching-techniques savant ‘Switching Techniques | KVSeContets in 2017 KVSeContentsin. ‘Webste designed and maintained by SANJEEV SHARMA PGT (Computer Science) Kendriya Vidyalaya Pabimpur Fhipitasecontensinindexphnswitshing-tecriques, 38

You might also like