Approaches use in constructing application entities, Computer Networking

Assignment Help:

The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model.

114_Approaches use in constructing application entities.png

ISO Approach

- Occasionally called Horizontal Approach

- OSI asserts that distributed applications function over a strict hierarchy of layers and are constructed from a common tool kit of standardized application service elements.

- In OSI each distributed application service selects functions from a large common -toolbox? of application service element (ASEs) and complements these with application service elements that perform functions specific to given end-user service.

TCP/IP Approach

- Occasionally called Vertical Approach

- In TCP/IP every application entity is composed of whatever set of function it needs beyond end to end transport to support a distributed communications service.

- Most of these application processes builds on what it requirements and assumes only that an underlying transport mechanism (datagram or connection) will be provided.


Related Discussions:- Approaches use in constructing application entities

Define directed path, QUESTION (a) Define what you understand by the fo...

QUESTION (a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of th

Explain about the digital traffic channels, Explain about the Digital traff...

Explain about the Digital traffic channels The most notable difference among the two generations is that first generation systems are almost purely analog, while second generat

Give the examples of the session layer, Session layer examples  are Netbios...

Session layer examples  are Netbios Names, SQL, NFS, X Windows, and RPC.

Shared variable programme structures, Shared variable programme structures ...

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Horizontal scaling and vertical scaling, What is meant by horizontal scalin...

What is meant by horizontal scaling and vertical scaling? Ans) Horizontal scaling means adding or removing client workstations with only a small performance impact. Vertical

Types of redundancy checks, Types of Redundancy Checks Parity Check ...

Types of Redundancy Checks Parity Check Simple Parity Check Two Dimensional Parity Check / Longitudinal Redundancy Check (LRC) CRC (Cyclic Redundancy Check)

What are routers, What are routers? Routers work to connect two or more...

What are routers? Routers work to connect two or more network segments. These are the most intelligent network devices that store information in its routing table like paths, h

Packet switching, Suppose there are exactly five packet switches (Figure 4)...

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

Define IEEE 802.4-token bus, IEEE 802.4-Token bus Physical line or tree...

IEEE 802.4-Token bus Physical line or tree however logical ring. Stations know "left" as well as "right" stations. One token "passed" from station to station. Only station with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd