Functions Ĭore networks typically provided the following functionality: This makes backbone network essential to providing long-haul wireless solutions to provide internet service, especially to remote areas. Some large enterprises have their own core/backbone network, which are typically connected to the public networks.īackbone networks create links that allow long-distance transmission, usually 10 to 100 miles, and in certain cases - up to 150 miles. Many main service providers would have their own core/backbone networks that are interconnected. In the United States, local exchange core networks were linked by several competing interexchange networks in the rest of the world, the core network has been extended to national boundaries.Ĭore networks usually had a mesh topology that provided any-to-any connections among devices on the network. A core network provided paths for the exchange of information between different sub-networks. Typically the term referred to the high capacity communication facilities that connect primary nodes. One of the main functions was to route telephone calls across the PSTN. The core network was the central part of a telecommunications network that provided various services to customers who were connected by the access network. The theory, design principles, and first instantiation of the backbone network came from the telephone core network when traffic was purely voice. One example of a backbone network is the Internet backbone. Network congestion is often taken into consideration while designing backbones. The pieces of the network connections (for example: Ethernet, wireless) that bring these departments together is often mentioned as network backbone. Ī large corporation that has many locations may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations. Normally, the backbone's capacity is greater than the networks connected to it. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. In: IMC 2007: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, San Diego, CA, USA (2007)Īrlitt, M., Williamson, C.: An analysis of tcp reset behaviour on the internet.A backbone or core network is a part of a computer network which interconnects networks, providing a path for the exchange of information between different LANs or subnetworks. John, W., Tafvelin, S.: Analysis of internet backbone traffic and header anomalies observed. John, W., Tafvelin, S.: (SUNET OC 192 Traces (collection)), Plissonneau, L., Costeux, J.L., Brown, P.: Analysis of peer-to-peer traffic on adsl. In: ICOIN 2008: Proceedings of the 22nd International Conference on Information Networking, Busan, Korea (2008) John, W., Tafvelin, S.: Heuristics to classifiy internet backbone traffic based on connection patterns. Perenyi, M., Trang Dinh, D., Gefferth, A., Molnar, S.: Identification and analysis of peer-to-peer traffic. Mori, T., Uchida, M., Goto, S.: Flow analysis of internet traffic: World wide web versus peer-to-peer. IEEE/ACM Transactions on Networking 12 (2004) Sen, S., Jia, W.: Analyzing peer-to-peer traffic across large networks. National Cable and Telecommunications Association (2003) Gerber, A., Houle, J., Nguyen, H., Roughan, M., Sen, S.: P2p the gorilla in the cable. In: IMC 2004: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy (2004) Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport layer identification of p2p traffic. World Wide Web Conference, New York, USA (2004)Ĭrotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. In: WWW 2004: Proceedings of the 13th Int. Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications.
0 Comments
Leave a Reply. |