Layering and tcp/ip protocols, Computer Networking

TCP/IP protocols are managed into five basic layers. Although some layers of the TCP/IP reference model related to layers of the ISO reference model, the ISO layers procedure does not have a layer that corresponds to TCP/IP Internet Layer.

TCP/IP reference model is given in the figure below.

256_Layering.png

LAYER 1:

Corresponds to physical network hardware layer in OSI.

LAYER 2:

Specifies how to manage data in frames.

LAYER 3:

Specifies the format of data packets transmit across an Internet and forwards data packets.

LAYER 4:

Specifies how to ensure reliable communication.

LAYER 5:

Like 6 and 7 in OSI architecture, it specifies how one application needs an Internet.

HOST COMPUTERS, ROUTERS AND PROTOCOL LAYERS:

TCP/IP describe the term host computer to refer to any computer machine that connects to an Internet and executes applications. A TCP/IP protocol makes it worth full for any pair of hosts to interact despite hardware differences.

Both routers and host require TCP/IP protocol software but routers do not require layer 5 protocols for applications, as they do not execute applications.

Posted Date: 7/31/2012 8:30:18 AM | Location : United States







Related Discussions:- Layering and tcp/ip protocols, Assignment Help, Ask Question on Layering and tcp/ip protocols, Get Answer, Expert's Help, Layering and tcp/ip protocols Discussions

Write discussion on Layering and tcp/ip protocols
Your posts are moderated
Related Questions

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

state the advantages of the ICT

Single Program Multiple Date A common style of writing data parallel programs for MIMD computers is SPMD (single program, multiple data): all the processors implement the same

Define the Class B Addresses? First two octets are the network number as well as the last two octets are the host number 16382 probable blocks for assignment to organi

Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is

The FORALL Statement The FORALL statement allows for more common assignments to sections of an array. A FORALL statement has the general form.               FORALL ( triplet

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

System Deadlock A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation. The fol