Network service model - network layer and routing, Computer Networking

Assignment Help:

Network Service Model

The network  service  model  defines  the characteristics of end to end  transport of data between  one edge of the  network  to the  other  that is between  sending  and receiving end  systems.

Lets now  consider  some  possible  services  that the  network  layer  can provide. In the sending  host when  the transport  layer passes a packet to the network  layer  specific services that  could be provided by  network  layer  include:

a.This  service  guarantees that the  packet will eventually arrive at tits destination.

b.Offers uniform  services  various types  of sub network . the sub network  may be defined as a set  of one  or more  intermediate nodes  which  are used  for establishing network  connection between  end systems and provide  routing  and  relaying of frames thought  it.

c.Offers  uniform  addressing and services to LAN and WAN the  network  layer defines  network  addresses which  are being  used by transport enmities to access network services. Each transport entity is a unique network connection end point  identifier  defined by the  network  layer  which  may be independent of addressing required by underlying layer. The  network entities define network  connection and  may also include intermediate nodes which  usually  provide  relaying. The network  connection   over intermediate subnets is known  as a subnet connection and is usually  handled by  underlying protocols.

d.Establishes  control and maintains  a logical  connection between  the transport  layer  entities for exchanging the data  across the network. The network  connection offers  point to point  connection and more than one  network connection may  be defined between  the same  pair of network  addresses. The network  service data units  are transferred transparently between transport  entities over the network connection  and generally do not have  upper  limit  on their  size.

e.The transport  layer can adapt to different types  of sub network  ( it is  independent  of the characteristics of sub network e, g routing  strategies considered topologies and type of the sub network).

f.Offers an acceptable quality of services during  the network  connection  which  in turn  is based on parameters such as residual error rate service availability  throughput reliability etc. It also reports any undetectable error  to the transport layer.

g.Provides sequencing for NDSU over the  network  connection when  requested by transport  entities.

h.Provides both  connection oriented  and connectionless services to the  users.

In connection oriented services a logical connection is set  up between  two transport entities including agreement for the  type of service desired parameters cost priorities transfer of  data in both direction with  appropriate flow control  and finally the termination of the  connection.

On the other  hand  in connectionless service network  layer primitives SEND  and RECEIVE are being  used to  send and receive the packet across the networks. The  users  are responsible for flow  control  and error  control  on their  hosts.


Related Discussions:- Network service model - network layer and routing

Show example on hedge fund, Q. Show example on Hedge Fund? Hedge Fund ...

Q. Show example on Hedge Fund? Hedge Fund have been playing a no-lose game In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the

Determine about unique least-cost path, Determine about unique least-cost p...

Determine about unique least-cost path If there is a unique least-cost path, the two algorithms will yield the similar result because they are both guaranteed to search the lea

Describe about the server and browser software, Describe about the Server a...

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

What is the client side of applications, What is the client side of applica...

What is the client side of applications To build the client side of applications, developers use various tools. Some of the popular software development environments include Vi

What is oltp, In the transaction server, the client component usually consi...

In the transaction server, the client component usually consists of GUI and the server components usually having of SQL transactions against a database. These applications are know

Transmission robustness and security, Transmission robustness and security ...

Transmission robustness and security Unless properly designed, a wireless LAN might be interference prone and simply eavesdropped. The design of a wireless LAN must allow relia

Explain multipoint connection, Explain multipoint connection. A multipo...

Explain multipoint connection. A multipoint connection is a link among three or more devices. Historically, multipoint connections were used to attach central CPs to distribute

Explain token bus sublayer protocol, Token Bus Sublayer Protocol Se...

Token Bus Sublayer Protocol Send for some time then pass token If no data after that pass token right away Traffic classes 0, 2, 4 and 6 (highest) Internal s

Explain the diffrent types of security attacks, Q. Explain the diffrent typ...

Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active

Define pptp (point-to-point tunneling protocol), Can you define PPTP (Point...

Can you define PPTP (Point-to-Point Tunneling Protocol)?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd