Protocol layering - computer network, Computer Networking

Protocol Layering

To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. Each  protocol  belong to  one  of the layers just as  each  functions  in the metro  train  architecture in figure2.13 belonged to a layer. The services  that a  layer offers to the above  layer is  called  service  model  of a layer.

Protocol  layering has  conceptual and structural advantages. Layering provides a structured way to discuss system components. Modularity makes  it easier to update systems components. The  first  potential drawback of layering is that one layer may  duplicate lower layer functionality. For  example  many protocol stacks provide error  recovery on both  network basis and point to point procedures. A second  potential  drawback  is that functionality at one  layer may  need information  that is present  only in  another layer  this violates the goal of separation of layers.

The protocols of the  various  layers are called  the protocol stack.  The internet  protocol stack  consists  of five  layers the physical  link  network  transport and  application layers  respectively  as figure

  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical


Posted Date: 3/4/2013 1:36:32 AM | Location : United States

Related Discussions:- Protocol layering - computer network, Assignment Help, Ask Question on Protocol layering - computer network, Get Answer, Expert's Help, Protocol layering - computer network Discussions

Write discussion on Protocol layering - computer network
Your posts are moderated
Related Questions

As there will be more devices there will be more traffic of information. We can include capacity to WAN by adding more links and packet switches. Packet switches use not have compu

Explain the Physical layer The Physical layer of the OSI model sets standards for sending and receiving electrical signals among devices. It explains how digital data (bits) ar

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec

Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication among two end users in a network. It is used in developing

Name some common or popular databases Many of the popular databases also provide support of and to the middleware and consequently, the term middleware has become lesser known.

List the steps included in creating the checksum. a. Separate the data into sections b. Add the sections together using 1's complement arithmetic c. Take the complement o

Single-cell wireless LAN All of the wireless end systems are within range of a single control module. Multiple-cell wireless LAN: there are many control modules interlinked by