Switching
Switching
o When a user accesses the internet or another computer network outside their immediate
location, messages are sent through the network of transmission media. This technique of
transferring the information from one computer network to another network is known
as switching.
o Switching in a computer network is achieved by using switches. A switch is a small hardware
device which is used to join multiple computers together with one local area network (LAN).
o Network switches operate at layer 2 (Data link layer) in the OSI model.
o Switching is transparent to the user and does not require any configuration in the home
network.
o Switches are used to forward the packets based on MAC addresses.
o A Switch is used to transfer the data only to the device that has been addressed. It verifies the
destination address to route the packet appropriately.
o It is operated in full duplex mode.
o Packet collision is minimum as it directly communicates between source and destination.
o It does not broadcast the message as it works with limited bandwidth.
o Bandwidth: It is defined as the maximum transfer rate of a cable. It is a very critical and
expensive resource. Therefore, switching techniques are used for the effective utilization of the
bandwidth of a network.
o Collision: Collision is the effect that occurs when more than one device transmits the message
over the same physical media, and they collide with each other. To overcome this problem,
switching technology is implemented so that packets do not collide with each other.
Advantages of Switching:
Disadvantages of Switching:
o A Switch is more expensive than network bridges.
o A Switch cannot determine the network connectivity issues easily.
o Proper designing and configuration of the switch are required to handle multicast packets.
o The layer 2 switches are used for transmitting the data on the data link layer, and it also
performs error checking on transmitted and received frames.
o The layer 2 switches forward the packets with the help of MAC address.
o Different modes are used for forwarding the packets known as Switching modes.
o In switching mode, Different parts of a frame are recognized. The frame consists of several
parts such as preamble, destination MAC address, source MAC address, user's data, FCS.
o Store-and-forward
o Cut-through
o Fragment-free
o Store-and-forward is a technique in which the intermediate nodes store the received frame and
then check for errors before forwarding the packets to the next node.
o The layer 2 switch waits until the entire frame has received. On receiving the entire frame,
switch store the frame into the switch buffer memory. This process is known as storing the
frame.
o When the frame is stored, then the frame is checked for the errors. If any error found, the
message is discarded otherwise the message is forwarded to the next node. This process is
known as forwarding the frame.
o CRC (Cyclic Redundancy Check) technique is implemented that uses a number of bits to check
for the errors on the received frame.
o The store-and-forward technique ensures a high level of security as the destination network
will not be affected by the corrupted frames.
o Store-and-forward switches are highly reliable as it does not forward the collided frames.
o Cut-through switching is a technique in which the switch forwards the packets after the
destination address has been identified without waiting for the entire frame to be received.
o Once the frame is received, it checks the first six bytes of the frame following the preamble, the
switch checks the destination in the switching table to determine the outgoing interface port,
and forwards the frame to the destination.
o It has low latency rate as the switch does not wait for the entire frame to be received before
sending the packets to the destination.
o It has no error checking technique. Therefore, the errors can be sent with or without errors to
the receiver.
o A Cut-through switching technique has low wait time as it forwards the packets as soon as it
identifies the destination MAC address.
o In this technique, collision is not detected, if frames have collided will also be forwarded.
Switching technique is used to connect the systems for making one-to-one communication.
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated path between sender
and receiver.
o In the Circuit Switching Technique, once the connection is established then the dedicated path
will remain to exist until the connection is terminated.
o Circuit switching in a network operates in a similar way as the telephone works.
o A complete end-to-end path must exist before the communication takes place.
o In case of circuit switching technique, when any user wants to send the data, voice, video, a
request signal is sent to the receiver then the receiver sends back the acknowledgment to
ensure the availability of the dedicated path. After receiving the acknowledgment, dedicated
path transfers the data.
o Circuit switching is used in public telephone network. It is used for voice transmission.
o Fixed data can be transferred at a time in circuit switching technology.
o Circuit establishment
o Data transfer
o Circuit Disconnect
Circuit Switching can use either of the two technologies:
o Space Division Switching is a circuit switching technology in which a single transmission path is
accomplished in a switch by using a physically separate set of crosspoints.
o Space Division Switching can be achieved by using crossbar switch. A crossbar switch is a
metallic crosspoint or semiconductor gate that can be enabled or disabled by a control unit.
o The Crossbar switch is made by using the semiconductor. For example, Xilinx crossbar switch
using FPGAs.
o Space Division Switching has high speed, high capacity, and nonblocking switches.
o Crossbar Switch
o Multistage Switch
Crossbar Switch
The Crossbar switch is a switch that has n input lines and n output lines. The crossbar switch has
n2 intersection points known as crosspoints.
The number of crosspoints increases as the number of stations is increased. Therefore, it becomes
very expensive for a large switch. The solution to this is to use a multistage switch.
Multistage Switch
o Multistage Switch is made by splitting the crossbar switch into the smaller units and then
interconnecting them.
o It reduces the number of crosspoints.
o If one path fails, then there will be an availability of another path.
o Once the dedicated path is established, the only delay occurs in the speed of data
transmission.
o It takes a long time to establish a connection approx 10 seconds during which no data can be
transmitted.
o It is more expensive than other switching techniques as a dedicated path is required for each
connection.
o It is inefficient to use because once the path is established and no data is transferred, then the
capacity of the path is wasted.
o In this case, the connection is dedicated therefore no other data can be transferred even if the
channel is free.
Message Switching
o Message Switching is a switching technique in which a message is transferred as a complete
unit and routed through intermediate nodes at which it is stored and forwarded.
o In Message Switching technique, there is no establishment of a dedicated path between the
sender and receiver.
o The destination address is appended to the message. Message Switching provides a dynamic
routing as the message is routed through the intermediate nodes based on the information
available in the message.
o Message switches are programmed in such a way so that they can provide the most efficient
routes.
o Each and every node stores the entire message and then forwards it to the next node. This type
of network is known as store and forward network.
o Message switching treats each message as an independent entity.
Advantages Of Message Switching
o Data channels are shared among the communicating devices that improve the efficiency of
using available bandwidth.
o Traffic congestion can be reduced because the message is temporarily stored in the nodes.
o Message priority can be used to manage the network.
o The size of the message which is sent over the network can be varied. Therefore, it supports
the data of unlimited size.
o The message switches must be equipped with sufficient storage to enable them to store the
messages until the message is forwarded.
o The Long delay can occur due to the storing and forwarding facility provided by the message
switching technique.
Packet Switching
o The packet switching is a switching technique in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address, destination
address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend the message.
o If the correct order of the packets is reached, then the acknowledgment message will be sent.
Approaches Of Packet Switching:
There are two approaches to Packet Switching:
o In the above diagram, A and B are the sender and receiver respectively. 1 and 2 are the nodes.
o Call request and call accept packets are used to establish a connection between the sender and
receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the receiver that the message
has been received.
o If the user wants to terminate the connection, a clear signal is sent for the termination.
Advantages Of Packet Switching:
o Packet Switching technique cannot be implemented in those applications that require low
delay and high-quality services.
o The protocols used in a packet switching technique are very complex and requires high
implementation cost.
o If the network is overloaded or corrupted, then it requires retransmission of lost packets. It
cannot also lead to the loss of critical information if errors are nor recovered.