Protocol layering - computer network, Computer Networking

Protocol Layering

To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. Each  protocol  belong to  one  of the layers just as  each  functions  in the metro  train  architecture in figure2.13 belonged to a layer. The services  that a  layer offers to the above  layer is  called  service  model  of a layer.

Protocol  layering has  conceptual and structural advantages. Layering provides a structured way to discuss system components. Modularity makes  it easier to update systems components. The  first  potential drawback of layering is that one layer may  duplicate lower layer functionality. For  example  many protocol stacks provide error  recovery on both  network basis and point to point procedures. A second  potential  drawback  is that functionality at one  layer may  need information  that is present  only in  another layer  this violates the goal of separation of layers.

The protocols of the  various  layers are called  the protocol stack.  The internet  protocol stack  consists  of five  layers the physical  link  network  transport and  application layers  respectively  as figure

  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical


Posted Date: 3/4/2013 1:36:32 AM | Location : United States

Related Discussions:- Protocol layering - computer network, Assignment Help, Ask Question on Protocol layering - computer network, Get Answer, Expert's Help, Protocol layering - computer network Discussions

Write discussion on Protocol layering - computer network
Your posts are moderated
Related Questions
Single Program Multiple Date A common style of writing data parallel programs for MIMD computers is SPMD (single program, multiple data): all the processors implement the same

Name the two commands that save the running-config to a TFTP server Ans)  Two commands are:- a) copy running tftp  b) write network

What is ARCNet? The  Attached  Resource Computer Network (ARCNet) standard was formed in 1977 at the Data Point Corporation by a scientist  -  John Murphy. ARCNet uses the toke

Consider a subnet with subnet prefix 101.101.101/24  a)  If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.

Explain the working of Transceivers Transceivers are used to connect nodes to the several Ethernet media. Most computers and network interface cards having a built-in 10BaseT o

1.  Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each in

Q. Explain about Congestion control? Congestion control Open-loop congestion control - prevent congestion before it happens retransmission policy - Ret

The transport Layer Communication  between  computers is handled by the transport layer which  is comprised of transmission control  protocol (TCP) and the users  datagram pro

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra

1. A systematic study of failures will help in identifying areas that may cause :   i.  Loss of adjacent parts/ equipment/ whole equipment. ii.  Loss of production and rev