savant
‘Switching Techniques | KVSeContets in
bg sah reset
teacher
Wome Syiabus Evalite Yoursaf Think Crticlly Question Bank eBook Project Reports Referencss
Contactos
Home » Swtcheg Tecingues
‘Computer Fundamerta
Softee Concepts
emery Concept
Number System
peraing System
(pen Source Concept
Intamalseorage encoding
of Choractes.
acount
Programing
ethodsiay
Problem Sobing
athodoay
Trieductont Or
stuctue of C+
Program
Vertes and Expressions
XICSUNITIV- C44
bw Cont Saements
toons In tne following figure a connection in a four-node
out tons fxeuit awitehing network is shown.
set etn Functions ——— aitoat siches ——
One Denar eo Ss
“Two Denaro i Fa Fa Fa a
Us Deed Daa Tyms Ed E Es
‘Switching Techniques ——Sss~—~C~*~“—~*~*~*~*~*~S~S~S i
Switching Techniques - Source (en.wikipedia.org)
Apart from determining valid paths between sources and
destinations within an interconnection network, a
switching technique is needed that specifies "how
messages are to be fragmented before passing then to
the network and how the resources along the path are to
be allocated. Furthermore, 2 switching technique gives
preconditions to be fulfilled before a fragment can be
moved on to the next network component. Following are
the different switching techniques:
Circuit Switching
In circuit switching when a connection is established,
the crigin-node identifies the first intermediate node
(node A) in the path to the end-node and sends it a
communication request signal. After che fires,
intermediate node receives this signal the process is
repeated as many times as needed to reach the end-node.
Afterwards, the end-node sends a communication
acknowledge signal to the origin node through all the
intermediate nodes that ave been used in the
communication request. Then, a full duplex transmission
line, that it is going to be kept for the whole
communication, is set-up between the origin-node and
the end-nede, To release the communication the origin-
node sends a communication end signal to the end-node.
Message Switching
When a connection is established, the origin-node
identifies the first intermediate node in the path to
the end-node and sends it the whole message. After
receiving and storing this message, the first
intermediate node (node A) identifies the second one
(node 8) and, when the transmission line is not busy,
the former sends the whole message (store-and-forward
philosophy). This process is repeated up to the end-
node.
‘ObjctOrertas
Progranmng
‘Gass a Object
access Specter
‘contractor and
Desructor
hertance
Data Fe Haning
Pontes
rey
stack
ueve
xucs-varm
Database Concent
Rebtonal Abeba
SQ
‘SQL Functions
Book Metra
Logeal Greats
‘epkaton of Bookan
Lge
‘commoneaton
Tecmebois
‘Switching Techniques
“Trenamason Hed
Network Dovees
Network Topologies
Networks
Network Protocole
Network Secu
Vieb Serves |
‘open Source Concent
Packet Switching based
Packet routing through WAN Internet
Ihip Rasecontentsivindexphnswitching-techniques
1Bsavant
‘Switching Techniques | KVSeContets in
Packet Switching based on Virtual Circuit
connection is estab!ished,
When a
Virtual Ciel. pete men Ty ae hats
The origin-node identifies the first intermediate node
(node A) in the path to the end-node and sends it a
communication request packet. This process is repeated
as many times as needed to reach, Then, the end-nade
sends a communication acknowledge packet ‘to the origin-
nede through the intermediate nodes (A, B, ¢ and D)
that have been traversed in the communication zequest.
he virtual cizcuit established on this way will be
kept for the whole communication. once a virtual
circuit has been estabiished, the origin node begins to
send packets (each of them has a virtual circuit
identifier) to the first intermediate node. Then, the
st intermediate node (node A) begins to send packets
to the following node in the virtual circuit without
waiting to store all message packets received from the
origin-node. This process is repeated until all message
packets arrive to the end-node. In the communication
release, when the origin node sends to the end-node a
communication end packet, the latter
anawere with an acknowledge packet. ‘There are two
possibilities to release a connection:
+ No trace of the virtual circuit information is left,
go every communication 48 get up ag if it were che
first one.
+ The virtual circuit information is kept for future
connections.
Packet Switching based on Datagram:
Packet Switching
rena
=
=) I.
‘he origin-node identifies the first intermediate node
in the path and heging to send packets. Each packet
carries an origin-nede and end-node identifier. The
first intermediate node (node A) begins send
packets, without storing the whole message, to the
following intermediate node. This process is repeated
up to the end-nede. As there are neither connection
establishment nor connection zelease, the path followed
by each pactet from the origin~node to the end-node can
be different and therefore, as = consequence of,
Afferent propagation delays, they can arrive
ordered.
Comparison of Switching Techniques
If a connection (path) between the origin and the end
node is established at the beginning of a session we
are talking about circuit or packet (virtual circuit)
switching. In case it does not, we refer to message and
packet (datagram) switching. On the other hand, when
considering how a message is transmitted, if the whole
message is divided into pieces we have packet switching
(based either on virtual circuit or datagram) but if it
does not, we have circuit and message switching.
Ihipmasecontentsinvindexphnswitching-techniquessavant ‘Switching Techniques | KVSeContets in
2017 KVSeContentsin.
‘Webste designed and maintained by SANJEEV SHARMA PGT (Computer Science) Kendriya Vidyalaya Pabimpur
Fhipitasecontensinindexphnswitshing-tecriques, 38