Protocol layering - computer network, Computer Networking

Protocol Layering

To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. Each  protocol  belong to  one  of the layers just as  each  functions  in the metro  train  architecture in figure2.13 belonged to a layer. The services  that a  layer offers to the above  layer is  called  service  model  of a layer.

Protocol  layering has  conceptual and structural advantages. Layering provides a structured way to discuss system components. Modularity makes  it easier to update systems components. The  first  potential drawback of layering is that one layer may  duplicate lower layer functionality. For  example  many protocol stacks provide error  recovery on both  network basis and point to point procedures. A second  potential  drawback  is that functionality at one  layer may  need information  that is present  only in  another layer  this violates the goal of separation of layers.

The protocols of the  various  layers are called  the protocol stack.  The internet  protocol stack  consists  of five  layers the physical  link  network  transport and  application layers  respectively  as figure

  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical

 

Posted Date: 3/4/2013 1:36:32 AM | Location : United States







Related Discussions:- Protocol layering - computer network, Assignment Help, Ask Question on Protocol layering - computer network, Get Answer, Expert's Help, Protocol layering - computer network Discussions

Write discussion on Protocol layering - computer network
Your posts are moderated
Related Questions
Most protocol suites have dissimilar OSI layer protocols within them. At layer 3, IP is for TCP/IP. TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4. DDP is for Appletal

Routing Table Each  router now  uses the  shortest path tree to construct its routing table . each  router  uses the same algorithm and the same link state  database its own sh

- EIA/ TIA specifies and RJ-45 connector for unshielded twisted-pair (UTP) cable. The letter RJ stand for registered jack and the number 45 refers to a specific wiring sequence.

The auxiliary port is used to link a modem to for dial backups.

#clasification of inductor

Give me a wide idea about simple pendulum and its types with equation and tables as usual assignment?

MPMM is a Project Management Methodology which gives a complete "framework" for managing projects. This framework gives you with a step-by-step walkthrough of the phases, activitie

To accept its goals, ATM uses fixed, small sized packets known cells. Every cell has 53 octets. VPI/VCI fields shows the cells destination. PRIO say if cell can be discarded CRC

Question 1 Write a long note on computers in television development Question 2 Write a long note on the ‘Steadicam' Question 3 Write a long note on Internet and pr