Layered architecture - computer network, Computer Networking

Assignment Help:

Layered Architecture

The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical approach for this is to  divide the overall  set of unction  into modular  components each of which is responsible for a particular  function. At the same time we also need to define  interfaces between  these  components  which  describe how  they fit together.

To understand  internet  architecture we will  take  an example  from our  daily  life. Every  day we  have  to deal  with complex systems. If  someone  want  to describe the metro railway  systems he she will  describe this complex  systems that has tokens baggage  checkers tracing machines  security personnel  pilots metro  train  metro  train control and a system  for routing  metro trains. In  other way this  system might be described as  the series of actions when  one travel from a metro trains. He she has to purchase a token get his  baggage cheeked goes for the train and eventually get loaded on to the  train. The  train then moves and is routed to its destination. After reaching to the destination at the baggage's collecting counter one claims for baggage. If  the trip was good  or bad  he she  gives  suggestions  to the  suggestions  sections  at the  station. In this systems  one moves to destination from  source.

In internet a  packet  is shipped from  source  host to destination host. According to the  figure 2.12, there  is a token  function  baggage  check  function  for the  passengers having  token  gate  function  for already  checked  passengers with  tokens and the  process continues.

Horizontal layering of metro railway  functionality  2.13 show the horizontal  manner each layer is combined with the  layer below. All this  process moves  step by  without  token  baggage check cannot be done  and without  token  gates  cannot  be loaded. Each layer provides  its service  by performing  certain  actions  within  that layer and by  using  the services  of the  layer  directly  below it.

A layered architecture allows  to discuss a well defined specific part of a large and complex system. This simplification  itself makes  its much easier to change the  implementation  of the  service provided by the layer.

The  ability  to change the implementation of service without  affecting other  components of the  systems  is another  important  advantage  of layering.

 


Related Discussions:- Layered architecture - computer network

Wideband digital cross connects, Wideband Digital Cross Connects A SONE...

Wideband Digital Cross Connects A SONET  cross  connect  accepts  various  optical  carries  rates accesses the  STS signals  and switches at this level . it  is idally used at

Error detection and correction, Error detection and correction The digi...

Error detection and correction The digital traffic stream of second generation systems also lends itself to the use of error detection and correction methods. The result can be

Explain ibms sna architecture, Explain IBM's SNA Architecture SNA is a ...

Explain IBM's SNA Architecture SNA is a computer networking architecture that was formed by IBM to give a network structure for IBM mainframe, midrange, and personal computer s

use dijkstras shortest-path algorithm compute short path, Consider the fol...

Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to a

Openmp in shared memory programming, OpenMP is a compiler directive based s...

OpenMP is a compiler directive based standard developed in the late 1990s jointly by a group of main computer hardware and software vendors. It is portable across a lot of popular

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Explain FDDI media access control, FDDI Media Access Control Unlike CSM...

FDDI Media Access Control Unlike CSMA/CD networks such like Ethernet token-passing networks are deterministic--you are able to calculate the maximum time that will pass before

Communication protocol - internet protocol, The Internet protocol mentions ...

The Internet protocol mentions the rules that describe the details of how computers communicate. It exactly mentions how a packet should be formed & how a router should forward eac

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd