Protocol layering - computer network, Computer Networking

Protocol Layering

To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. Each  protocol  belong to  one  of the layers just as  each  functions  in the metro  train  architecture in figure2.13 belonged to a layer. The services  that a  layer offers to the above  layer is  called  service  model  of a layer.

Protocol  layering has  conceptual and structural advantages. Layering provides a structured way to discuss system components. Modularity makes  it easier to update systems components. The  first  potential drawback of layering is that one layer may  duplicate lower layer functionality. For  example  many protocol stacks provide error  recovery on both  network basis and point to point procedures. A second  potential  drawback  is that functionality at one  layer may  need information  that is present  only in  another layer  this violates the goal of separation of layers.

The protocols of the  various  layers are called  the protocol stack.  The internet  protocol stack  consists  of five  layers the physical  link  network  transport and  application layers  respectively  as figure

  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical

 

Posted Date: 3/4/2013 1:36:32 AM | Location : United States







Related Discussions:- Protocol layering - computer network, Assignment Help, Ask Question on Protocol layering - computer network, Get Answer, Expert's Help, Protocol layering - computer network Discussions

Write discussion on Protocol layering - computer network
Your posts are moderated
Related Questions
Source Port Number This fields occupies  the first 16 bytes of the UDP header. This  fields typically hold the UDP port number  of the application sending  this datagram. The

Q. Error Detection-General? Sender transmits every data unit twice Receiver performs bit-by-bit comparison between those two versions of data. Any mismatch would

What is ICMP? ICMP is Internet Control Message Protocol. It gives messaging and communication for protocols within the TCP/IP stacks. This is also the protocol that manages err

Algorithm:  Odd-Even Transposition //Input: N numbers that are in the unsorted form //Assume that element bi is assigned to pi for I=1 to N { If (I%2 != 0) //i.e Odd

Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to

What is the default CDP broadcast update rate for Cisco routers? Ans) Cisco Discovery Protocol is a proprietary protocol to permit you to access configuration information on oth

Question The operational amplifier in the peak detector circuit shown in the figure below is powered from plus and minus 15 V. If Vout is at 1V and Vin is at 0.5V, at approxima

3.  Explain how you would pipeline the four following pairs of statements.  (4×5 points) a)  add $t0, $s0, $s1 beq $s1,$s2, 300 b)  add $t2, $t0, $t1 sw $t3, 36($t2) c)

If the host has the subnet ID why do we require a subnet mask?

MPI_Wtime ( ) returns elapsed wall-clock time in seconds as some arbitrary point in past. Elapsed time for program segment is specified by the difference between MPI_Wtime values a