Layered architecture - computer network, Computer Networking

Assignment Help:

Layered Architecture

The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical approach for this is to  divide the overall  set of unction  into modular  components each of which is responsible for a particular  function. At the same time we also need to define  interfaces between  these  components  which  describe how  they fit together.

To understand  internet  architecture we will  take  an example  from our  daily  life. Every  day we  have  to deal  with complex systems. If  someone  want  to describe the metro railway  systems he she will  describe this complex  systems that has tokens baggage  checkers tracing machines  security personnel  pilots metro  train  metro  train control and a system  for routing  metro trains. In  other way this  system might be described as  the series of actions when  one travel from a metro trains. He she has to purchase a token get his  baggage cheeked goes for the train and eventually get loaded on to the  train. The  train then moves and is routed to its destination. After reaching to the destination at the baggage's collecting counter one claims for baggage. If  the trip was good  or bad  he she  gives  suggestions  to the  suggestions  sections  at the  station. In this systems  one moves to destination from  source.

In internet a  packet  is shipped from  source  host to destination host. According to the  figure 2.12, there  is a token  function  baggage  check  function  for the  passengers having  token  gate  function  for already  checked  passengers with  tokens and the  process continues.

Horizontal layering of metro railway  functionality  2.13 show the horizontal  manner each layer is combined with the  layer below. All this  process moves  step by  without  token  baggage check cannot be done  and without  token  gates  cannot  be loaded. Each layer provides  its service  by performing  certain  actions  within  that layer and by  using  the services  of the  layer  directly  below it.

A layered architecture allows  to discuss a well defined specific part of a large and complex system. This simplification  itself makes  its much easier to change the  implementation  of the  service provided by the layer.

The  ability  to change the implementation of service without  affecting other  components of the  systems  is another  important  advantage  of layering.

 


Related Discussions:- Layered architecture - computer network

For making assignment, can you make the assignment plagiarism free and when...

can you make the assignment plagiarism free and when you give me back the assignment. Thanks

Fat tree, Fat tree It is a modified version of the tree network. In thi...

Fat tree It is a modified version of the tree network. In this group the bandwidth of edge (or the connecting wire among nodes) increases towards the root. It is a more practic

How l2f establishes the tunnel, Can you describe the broader steps of how L...

Can you describe the broader steps of how L2F establishes the tunnel?

Explain the three principles of data communication system, Question 1 Vide...

Question 1 Videoconferencing is used to conduct meetings with the people who are located in far distance. Videoconferencing is an example of which type of computer networks? Expla

Dns spoofing - domain name server, DNS spoofing This process is genera...

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

Which layer are called upper layer, Three layers are called upper layers ...

Three layers are called upper layers a) Application Layer - 7 b) Presentation Layer - 6 c) Session Layer - 5

Write the statement which is true regarding full duplex, Allows for transmi...

Allows for transmission and receiving of data concurrently

What are the control frames for lost tokens, Control Frames for Lost Tokens...

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

Dynamic configuration and signaling, Dynamic Configuration int pvm...

Dynamic Configuration int pvm_addhosts( char **hosts, int nhost, int *infos ) Add hosts to the virtual machine. hosts is an array of strings naming the hosts to be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd