Switching-
A network is a set of connected devices. Whenever we have multiple
devices, we have the problem of how to connect them to make one-to-one
communication possible. One solution is to make a point-to-point connection
between each pair of devices (a mesh topology) or between a central device
and every other device (a star topology). These methods, however, are
impractical and wasteful when applied to very large networks.
A better solution is switching. A switched network consists of a series of interlinked
nodes, called switches. Switches are devices capable of creating temporary connections
between two or more devices linked to the switch. In a switched network, some of these
nodes are connected to the end systems (computers or telephones, for example). Others
are used only for routing.
The end systems (communicating devices) are labeled A, B, C, D, and so on, and the
switches are labeled I, II, III, IV, and V. Each switch is connected to multiple links.
Traditionally, three methods of switching have been important: circuit switching,
packet switching, and message switching. The first two are commonly used today. The
third has been phased out in general communications but still has networking applications.
We can then divide today's networks into three broad categories: circuit-switched networks,
packet-switched networks, and message-switched. Packet-switched networks can further
be divided into two subcategories-virtual-circuit networks and datagram networks.
CIRCUIT-SWITCHED NETWORKS-
A circuit-switched network consists of a set of switches connected by physical links.
A connection between two stations is a dedicated path made of one or more links. How
ever, each connection uses only one dedicated channel on each link. Each link is normally divided into n channels by using FDM or TDM. In circuit switching, the resources need to be reserved during the setup
phase;
the resources remain dedicated for the entire duration of data transfer until the
teardown phase
The actual communication in a circuit-switched network requires three phases:
connection setup, data transfer, and connection teardown.
Setup Phase
Before the two parties (or multiple parties in a conference call) can
communicate, a dedicated circuit (combination of channels in links) needs to be
established. Connection setup means creating dedicated channels between the
switches. For example, in Figure, when system A needs to connect to system M,
it sends a setup request that includes the address of system M, to switch I.
Switch I finds a channel between itself and switch IV that can be dedicated for
this purpose. Switch I then send the request to switch IV, which finds a dedicated channel between itself and switch III. Switch III informs system M of
system A's intention at this time.
In the next step to making a connection, an acknowledgment from system
M needs to be sent in the opposite direction to system A. Only after system A
receives this acknowledgment is the connection established.
Data Transfer Phase
After the establishment of the dedicated circuit (channels), the two parties can
transfer data
Teardown Phase
When one of the parties needs to disconnect, a signal is sent to each switch to
release the resources.
Efficiency
It can be argued that circuit-switched networks are not as efficient as the other
two types of networks because resources are allocated during the entire
duration of the connection. These resources are unavailable to other
connections. Delay
Although a circuit-switched network normally has low efficiency, the delay in
this type of network is minimal. During data transfer the data are not delayed
at each switch; the resources are allocated for the duration of the connection.
The total delay is due to the time needed to create the connection, transfer
data, and disconnect the circuit.
DATAGRAM NETWORKS
In a packet-switched network, there is no resource reservation; resources
are allocated on demand. The allocation is done on a first come, first-served
basis. When a switch receives a packet, no matter what the source or destination is, the packet must wait if there are other packets being processed.
This lack of reservation may create delay. For example, if we do not have a
reservation at a restaurant, we might have to wait.
In a datagram network, each packet is treated independently of all others.
Packets in this approach are referred to as datagrams. Datagram switching is
normally done at the network layer.
Figure shows how the datagram approach is used to deliver four packets
from station A to station X. The switches in a datagram network are traditionally
referred to as routers.
The datagram networks are sometimes referred to as connectionless
networks. The term connectionless here means that the switch (packet
switch) does not keep information about the connection state. There are no
setup or teardown phases. Each packet is treated the same by a switch
regardless of its source or destination.
A switch in a datagram network uses a routing table that is based on the
destination address. The destination address in the header of a packet in a
datagram network remains the same during the entire journey of the packet.
Efficiency
The efficiency of a datagram network is better than that of a circuit-switched
network; resources are allocated only when there are packets to be transferred.
Delay
There may be greater delay in a datagram network than in a virtual-circuit
network. Although there are no setup and teardown phases, each packet may
experience a wait at a switch before it is forwarded. In addition, since not all
packets in a message necessarily travel through the same switches, the delay is
not uniform for the packets of a message.
VIRTUAL-CIRCUIT NETWORKS
A virtual-circuit network is a cross between a circuit-switched
network and a datagram network. It has some characteristics of both.
1. As in a circuit-switched network, there are setup and teardown phases in addition to the data transfer phase.
2. Resources can be allocated during the setup phase, as in a circuit-switched network, or on demand, as in a datagram network.
3. As in a datagram network, data are packetized and each packet carries an address in the header. However, the address in the header has local jurisdiction (it defines what should be the next switch and the channel on which the packet is being carried), not end-to-end jurisdiction.
4. As in a circuit-switched network, all packets follow the same path established during the connection.
5. A virtual-circuit network is normally implemented in the data link layer, while a circuit-switched network is implemented in the physical layer and a datagram network in the network layer.
Addressing
In a virtual-circuit network, two types of addressing are involved: global and local (virtual-circuit identifier).
Global Addressing
A source or a destination needs to have a global address-an address that can be unique in the scope of the network.
Virtual-Circuit Identifier
The identifier that is actually used for data transfer is called the virtual-circuit identifier (VCI). A VCI, unlike a global address, is a small number that has only switch scope; it is used by a frame between two switches. When a frame arrives at a switch, it has a VCI; when it leaves, it has a different VCl.
Figure shows how the VCI in a data frame changes from one switch to another. Note that a VCI does not need to be a large number since each switch can use its own unique set of VCls.
Three Phases-
As in a circuit-switched network, a source and destination need to go through three
phases in a virtual-circuit network: setup, data transfer, and teardown. In the setup
phase, the source and destination use their global addresses to help switches make table
entries for the connection. In the teardown phase, the source and destination inform the
switches to delete the corresponding entry. Data transfer occurs between these two
phases. We first discuss the data transfer phase, which is more straightforward; we then
talk about the setup and teardown phases.
Data Transfer Phase-
To transfer a frame from a source to its destination, all switches need to have a table
entry for this virtual circuit. The table, in its simplest form, has four columns. This
means that the switch holds four pieces of information for each virtual circuit that is
already set up. We show later how the switches make their table entries, but for the
moment we assume that each switch has a table with entries for all active virtual circuits. Figure 8.12 shows such a switch and its corresponding table.
Figure 8.12 shows a frame arriving at port 1 with a VCI of 14. When the frame
arrives, the switch looks in its table to find port 1 and a VCI of 14. When it is found, the
switch knows to change the VCI to 22 and send out the frame from port 3.
Figure 8.13 shows how a frame from source A reaches destination B and how its
VCI changes during the trip. Each switch changes the VCI and routes the frame.
The data transfer phase is active until the source sends all its frames to the destination. The procedure at the switch is the same for each frame of a message. The process
creates a virtual circuit, not a real circuit, between the source and destination.
Setup Phase -
In the setup phase, a switch creates an entry for a virtual circuit. For example, suppose
source A needs to create a virtual circuit to B. Two steps are required: the setup request
and the acknowledgment.
Setup Request -
A setup request frame is sent from the source to the destination.
Figure 8.14 shows the process.
a. Source A sends a setup frame to switch 1.
b. Switch 1receives the setup request frame. It knows that a frame going from A to B
goes out through port 3. How the switch has obtained this information is a point
covered in future chapters. The switch, in the setup phase, acts as a packet switch;
it has a routing table which is different from the switching table. For the moment,
assume that it knows the output port. The switch creates an entry in its table for this virtual circuit, but it is only able to fill three of the four columns. The switch
assigns the incoming port (1) and chooses an available incoming VCI (14) and the
outgoing port (3). It does not yet know the outgoing VCI, which will be found during the acknowledgment step. The switch then forwards the frame through port 3
to switch 2.
c. Switch 2 receives the setup request frame. The same events happen here as at
switch 1; three columns of the table are completed: in this case, incoming port (l),
incoming VCI (66), and outgoing port (2).
d. Switch 3 receives the setup request frame. Again, three columns are completed:
incoming port (2), incoming VCI (22), and outgoing port (3).
e. Destination B receives the setup frame, and if it is ready to receive frames from A,
it assigns a VCI to the incoming frames that come from A, in this case 77. This
VCI lets the destination know that the frames come from A, and not other sources.
Acknowledgment -
A special frame, called the acknowledgment frame, completes
the entries in the switching tables. Figure 8.15 shows the process.
a. The destination sends an acknowledgment to switch 3. The acknowledgment carries
the global source and destination addresses so the switch knows which entry in the
table is to be completed. The frame also carries VCI 77, chosen by the destination as
the incoming VCI for frames from A. Switch 3 uses this VCI to complete the outgoing
VCI column for this entry. Note that 77 is the incoming VCI for destination B, but
the outgoing VCI for switch 3.
b. Switch 3 sends an acknowledgment to switch 2 that contains its incoming VCI in the
table, chosen in the previous step. Switch 2 uses this as the outgoing VCI in the table.
c. Switch 2 sends an acknowledgment to switch 1thatcontains its incoming VCI in the
table, chosen in the previous step. Switch 1uses this as the outgoing VCI in the table.
d. Finally switch 1 sends an acknowledgment to source A that contains its incoming
VCI in the table, chosen in the previous step.
e. The source uses this as the outgoing VCI for the data frames to be sent to destination B.
Teardowil Phase -
In this phase, source A, after sending all frames to B, sends a special frame called a
teardown request. Destination B responds with a teardown confirmation frame. All
switches delete the corresponding entry from their tables
Message switching techniques-
Message Switching is a switching technique where the entire message is sent as a single unit from one node to another without a dedicated path between the sender and receiver. Each intermediate node stores the message temporarily and then forwards it to the next node until it reaches its destination. Communication occurs hop by hop, with messages being the smallest unit of transfer. This method allows data to be transmitted even when direct connections are not available, making it a flexible network approach.
Key Features of Message Switching
1. Store-and-Forward
- Each intermediate node must store the entire message before forwarding it.
- Transmission occurs only if the next link and node are available; otherwise, the message waits in storage until resources are free.
2. Message Delivery
- Messages are transmitted as complete units, with a header containing routing information (source and destination addresses).
- Communication is hop by hop until the message reaches its destination.
3. Network Components
A message-switching network consists of:
- Transmission links (channels)
- Store-and-forward switching nodes
- End stations (source and destination devices)

Advantages of Message Switching
- As message switching is able to store the message for which communication channel is not available, it helps in reducing the traffic congestion in the network.
- In message switching, the data channels are shared by the network devices.
- It makes traffic management efficient by assigning priorities to the messages.
- It allows for infinite message lengths.
Disadvantages of Message Switching
- Not suitable for real-time applications: Storing messages at intermediate nodes causes delays.
- High storage requirement: Every intermediate node needs large storage capacity.
- Delivery uncertainty: Complex system can make it unclear if messages are correctly delivered.
- No dedicated path: Communication is less reliable because sender and receiver are not directly connected.
Applications of Message Switching
- Email systems: Messages are sent and stored at intermediate nodes until delivered.
- Fax transmission: Data is stored and forwarded through multiple nodes.
- Telex networks: Text messages are transmitted hop by hop.
- Store-and-forward messaging in networks: Used in systems where direct connections are not always available.
Comments
Post a Comment