Why it is essential to have layering in a network, Computer Networking

Assignment Help:

Q. Why it is essential to have layering in a network?

Ans: A computer network is a very complicated system. It becomes very hard to implement as a single entity. The layered approach divides a very complex task into small pieces each of which is independent of others and it allow a structured approach in implementing a network. The basic idea of a layered architecture is to split the design into small pieces. Each layer adds to the services provided by the lower layers in such a manner that the highest layer is given a full set of services to manage communications and execute the applications.


Related Discussions:- Why it is essential to have layering in a network

How is final different from finally and finalize, How is final different fr...

How is final different from finally and finalize ()? Final is a modifier which can be applied to a class or a method or a variable. final class can't be inherited, final method

Firewall rules based on a fictitious organisation, Question 1 requires you ...

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t

Two routers running igrp to communicate their routes, What must be true for...

What must be true for two Routers running IGRP to communicate their routes? Ans) Similar autonomous system number

Synchronous tdm and statistical tdm, Difference between synchronous tdm and...

Difference between synchronous tdm and statistical tdm

Path overhead - sonet sdh , Path  Overhead It is part  of SPE  and con...

Path  Overhead It is part  of SPE  and contain followings  information: Performance monitor of synchronous transport , signal , path , track ,parity ,checks,  and path  status.

Define choke packet and implicit congestion signalling, Define Choke packet...

Define Choke packet and Implicit congestion signalling Choke packet: A choke packet is a control packet produced at a congested node and transmitted back to a source node to co

Describe the importance of backups, Question: (a) Describe the importa...

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

Find the main problems with access points in a wireless lan, Question: ...

Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi

Command Necessary to enter the extended ping command , Determine the comman...

Determine the command mode necessary to enter the extended ping command Ans) Router#

What are called transactions, The grouped SQL statements are known as Trans...

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd