Protocol layering - computer network, Computer Networking

Protocol Layering

To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. Each  protocol  belong to  one  of the layers just as  each  functions  in the metro  train  architecture in figure2.13 belonged to a layer. The services  that a  layer offers to the above  layer is  called  service  model  of a layer.

Protocol  layering has  conceptual and structural advantages. Layering provides a structured way to discuss system components. Modularity makes  it easier to update systems components. The  first  potential drawback of layering is that one layer may  duplicate lower layer functionality. For  example  many protocol stacks provide error  recovery on both  network basis and point to point procedures. A second  potential  drawback  is that functionality at one  layer may  need information  that is present  only in  another layer  this violates the goal of separation of layers.

The protocols of the  various  layers are called  the protocol stack.  The internet  protocol stack  consists  of five  layers the physical  link  network  transport and  application layers  respectively  as figure

  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical

 

Posted Date: 3/4/2013 1:36:32 AM | Location : United States







Related Discussions:- Protocol layering - computer network, Assignment Help, Ask Question on Protocol layering - computer network, Get Answer, Expert's Help, Protocol layering - computer network Discussions

Write discussion on Protocol layering - computer network
Your posts are moderated
Related Questions
Question 1 Write about                       Circuit Switched Networks                       Packet Switched Networks Question 2 Write about                       Protocol Indep

Bridges The bridge function is to attach separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only essential

Data Parallel Programming In the data parallel programming model, main focus is on performing simultaneous operations on a data set. The data set is typically prepared into a c

UDP sends packets 'blind' down the network, and relies on upper-layer protocols to form connections and identify errors. TCP is a connection-oriented protocol that can give reliabl

Prepare the Network  Step 1: Disable all ports by using the shutdown command. Ensure that the initial switch port states are inactive with the shutdown command. Use the inter

i have an assigment due and want some one to do my assognment

Introduction of DNS While discussing about the Internet, one things comes automatically in the n=mind and hence it is directly or indirectly depended on DNS. The DNS which sta

Functions and features of the IPMonitor program are as follows:   a)  This program should be able to list out detail information of IP traffic which includes source IP address an

Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p