Layered architecture - computer network, Computer Networking

Assignment Help:

Layered Architecture

The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical approach for this is to  divide the overall  set of unction  into modular  components each of which is responsible for a particular  function. At the same time we also need to define  interfaces between  these  components  which  describe how  they fit together.

To understand  internet  architecture we will  take  an example  from our  daily  life. Every  day we  have  to deal  with complex systems. If  someone  want  to describe the metro railway  systems he she will  describe this complex  systems that has tokens baggage  checkers tracing machines  security personnel  pilots metro  train  metro  train control and a system  for routing  metro trains. In  other way this  system might be described as  the series of actions when  one travel from a metro trains. He she has to purchase a token get his  baggage cheeked goes for the train and eventually get loaded on to the  train. The  train then moves and is routed to its destination. After reaching to the destination at the baggage's collecting counter one claims for baggage. If  the trip was good  or bad  he she  gives  suggestions  to the  suggestions  sections  at the  station. In this systems  one moves to destination from  source.

In internet a  packet  is shipped from  source  host to destination host. According to the  figure 2.12, there  is a token  function  baggage  check  function  for the  passengers having  token  gate  function  for already  checked  passengers with  tokens and the  process continues.

Horizontal layering of metro railway  functionality  2.13 show the horizontal  manner each layer is combined with the  layer below. All this  process moves  step by  without  token  baggage check cannot be done  and without  token  gates  cannot  be loaded. Each layer provides  its service  by performing  certain  actions  within  that layer and by  using  the services  of the  layer  directly  below it.

A layered architecture allows  to discuss a well defined specific part of a large and complex system. This simplification  itself makes  its much easier to change the  implementation  of the  service provided by the layer.

The  ability  to change the implementation of service without  affecting other  components of the  systems  is another  important  advantage  of layering.

 


Related Discussions:- Layered architecture - computer network

Butterfly permutation, Butterfly permutation This permutation is gettin...

Butterfly permutation This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

Internet architecture, Company seldom uses a single router to connect its e...

Company seldom uses a single router to connect its entire network for two purpose. Because the router must transmit every packet, the processor in a provided router is insuff

Types of ends in wan, There are two types of ends in WAN (1)DTE (DATA TE...

There are two types of ends in WAN (1)DTE (DATA TERMINAL EQUIPMENT) (2)DCE(DATA COMMUNICATION EQUIPMENT)

Clock-driven scheme , Assume that the clock-driven scheme for generating st...

Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16).  The clock t

Define tp monitor, There is no commonly accepted meaning for a TP monitor. ...

There is no commonly accepted meaning for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

What are the advantages of bus topology, What are the advantages of bus top...

What are the advantages of bus topology? The benefit of physical bus topology is: a. It uses established standards and it is relatively simple to install. b. It needs les

Explain fdm and tdm with example, Question 1 Explain FDM and TDM with exam...

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Building distributed systems, Unfortunately, building real-life distributed...

Unfortunately, building real-life distributed systems is not easy. It is hard, for instance, to implement instructions such as "send this data structure to be processed on that com

Describe about cryptography, Q. Describe about Cryptography? - Some med...

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

Configure vtp on the switches - ccna, Configure VTP on the Switches VTP...

Configure VTP on the Switches VTP permits the network administrator to control the instances of VLANs on the network by creating VTP domains. Within each VTP domain, one or mor

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd