Switching Techniques
Switching Techniques
❑ Routing decisions must be made when the circuit is first established, but there
are no decisions made after that time.
❑ A complete end-to-end path must exist before communication can take place.
❑ The computer initiating the data transfer must ask for a connection to the
destination.
❑ Once the connection has been initiated and completed to the destination device,
the destination device must acknowledge that it is ready and willing to carry on a
transfer.
❑ Disadvantages:
➢ More expensive than any other switching techniques, because a dedicated path
is required for each connection.
➢ Inefficient use of the communication channel, because the channel is not used
when the connected systems are not using it.
❑ Since packets have a strictly defined maximum length, they can be stored in
main memory instead of disk, therefore access delay and cost are minimized.
❑ With current technology, packets are generally accepted onto the network on a
first-come, first-served basis. If the network becomes overloaded, packets are
delayed or discarded.
❑ This fact allows packets to take a variety of possible paths through the network.
❑ So the packets, each with the same destination address, do not follow the same route,
and they may arrive out of sequence at the exit point node (or the destination).
❑ It is possible for a packet to be destroyed if one of the nodes on its way is crashed
momentarily. Thus all its queued packets may be lost.
Prof. Sudip Misra, IIT Kharagpur 14
Packet Switching : Datagram
Delay caused by the setup is the sum of four parts: the propagation time of the source computer
request, the request signal transfer time, the propagation time of the acknowledgment from the
destination computer, and the signal transfer time of the acknowledgment.
The delay due to data transfer is the sum of two parts: the propagation time and data transfer
time, which can be very long.
Global Address
Global address in virtual-circuit networks is used only to create a virtual-circuit
identifier.
Virtual-Circuit Identifier
The identifier that is actually used for data transfer is called the virtual-circuit
identifier (Vel)
Fig.: Vel
Source: B. A. Forouzan, “ Data Communications and Networking ,” McGraw-
Prof. Sudip Misra, IIT Kharagpur Hill Forouzan Networking Series,5E. 19
Three Phases
▪ Source and destination need to go through three phases in a virtual-circuit
network: setup, data transfer, and teardown.
▪ In the setup phase, the source and destination use their global addresses to
help switches make table entries for the connection.
▪ In the teardown phase, the source and destination inform the switches to
delete the corresponding entry.
https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbW
FpbnxlZWJhaHJpYTV8Z3g6MjE2MzY2MjcxMGU3MmQ4Nw
Prof. Sudip Misra, IIT Kharagpur 24
Data Teardown Phase
▪ In this phase, source A, after sending all frames to B, sends a special frame
called a teardown request.
❑Packet can be rerouted if there is any problem, such as, busy or disabled
links.
❑The advantage of packet switching is that many network users can share the
same channel at the same time. Packet switching can maximize link efficiency
by making optimal use of link bandwidth.
29