Layered architecture - computer network, Computer Networking

Layered Architecture

The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical approach for this is to  divide the overall  set of unction  into modular  components each of which is responsible for a particular  function. At the same time we also need to define  interfaces between  these  components  which  describe how  they fit together.

To understand  internet  architecture we will  take  an example  from our  daily  life. Every  day we  have  to deal  with complex systems. If  someone  want  to describe the metro railway  systems he she will  describe this complex  systems that has tokens baggage  checkers tracing machines  security personnel  pilots metro  train  metro  train control and a system  for routing  metro trains. In  other way this  system might be described as  the series of actions when  one travel from a metro trains. He she has to purchase a token get his  baggage cheeked goes for the train and eventually get loaded on to the  train. The  train then moves and is routed to its destination. After reaching to the destination at the baggage's collecting counter one claims for baggage. If  the trip was good  or bad  he she  gives  suggestions  to the  suggestions  sections  at the  station. In this systems  one moves to destination from  source.

In internet a  packet  is shipped from  source  host to destination host. According to the  figure 2.12, there  is a token  function  baggage  check  function  for the  passengers having  token  gate  function  for already  checked  passengers with  tokens and the  process continues.

Horizontal layering of metro railway  functionality  2.13 show the horizontal  manner each layer is combined with the  layer below. All this  process moves  step by  without  token  baggage check cannot be done  and without  token  gates  cannot  be loaded. Each layer provides  its service  by performing  certain  actions  within  that layer and by  using  the services  of the  layer  directly  below it.

A layered architecture allows  to discuss a well defined specific part of a large and complex system. This simplification  itself makes  its much easier to change the  implementation  of the  service provided by the layer.

The  ability  to change the implementation of service without  affecting other  components of the  systems  is another  important  advantage  of layering.

 

Posted Date: 3/4/2013 1:31:58 AM | Location : United States







Related Discussions:- Layered architecture - computer network, Assignment Help, Ask Question on Layered architecture - computer network, Get Answer, Expert's Help, Layered architecture - computer network Discussions

Write discussion on Layered architecture - computer network
Your posts are moderated
Related Questions
Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

Normal 0 false false false EN-IN X-NONE X-NONE

Question 1 Discuss the following                     Evolution of Data Communication                     Elements of Data Communication System Question 2 Explain the following

Commands SMTP uses commands  and response  to transfer  message between a client  and a  server.  Each  commands  or reply  is terminated by a two character ( carriage re


10BASE-T:  This is another standard of wiring function. It is usually known 10Base-T, TP Ethernet or Twisted Pair. It removes AUI cable with twisted pair cable and thick coax

How does Intranet Work? An Intranet can be defined as a private network which uses Internet tools. The principal tool is the Web browser, but there are other Internet tools su

the equation x3-6x+9x-5=0

Prepare the Network  Step 1: Disable all ports by using the shutdown command. Ensure that the initial switch port states are inactive with the shutdown command. Use the inter

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.