Approaches use in constructing application entities, Computer Networking

Assignment Help:

The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model.

114_Approaches use in constructing application entities.png

ISO Approach

- Occasionally called Horizontal Approach

- OSI asserts that distributed applications function over a strict hierarchy of layers and are constructed from a common tool kit of standardized application service elements.

- In OSI each distributed application service selects functions from a large common -toolbox? of application service element (ASEs) and complements these with application service elements that perform functions specific to given end-user service.

TCP/IP Approach

- Occasionally called Vertical Approach

- In TCP/IP every application entity is composed of whatever set of function it needs beyond end to end transport to support a distributed communications service.

- Most of these application processes builds on what it requirements and assumes only that an underlying transport mechanism (datagram or connection) will be provided.


Related Discussions:- Approaches use in constructing application entities

Determine about the internet, Determine about the Internet The I...

Determine about the Internet The Internet as a source of information and reference material, browsing the World Wide Web (WWW) and Newsgroups for the latest gossip or sh

Describe at one disadvantage of a peer to peer network, Describe at one dis...

Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes

Define the term network throughput, Network throughput It is a symptoma...

Network throughput It is a symptomatic measure of the message carrying capability of a network. It is termed as the total number of messages network can send in per unit time.

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

What are the compression protocols for ppp, The compression protocols for P...

The compression protocols for PPP are:- A. Stac   B. Predictor

use dijkstras shortest-path algorithm compute short path, Consider the fol...

Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to a

Internet client control task, Internet Client Control Task A distribut...

Internet Client Control Task A distributed system is to be implemented using networked PCs. The role of the system in this task is to implement an environmental control sys

Show the network layer in an internetwork, Q. Show the Network layer in an ...

Q. Show the Network layer in an internetwork? - Receives data from Transport layer - Responsible for creating Packet - Each packet contains - Universal Address of Sour

Whcih is the routing metric used by rip, Routing Information Protocol (RIP)...

Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops are considered unreachable. RIP upd

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd