Protocol layering - computer network, Computer Networking

Assignment Help:

Protocol Layering

To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. Each  protocol  belong to  one  of the layers just as  each  functions  in the metro  train  architecture in figure2.13 belonged to a layer. The services  that a  layer offers to the above  layer is  called  service  model  of a layer.

Protocol  layering has  conceptual and structural advantages. Layering provides a structured way to discuss system components. Modularity makes  it easier to update systems components. The  first  potential drawback of layering is that one layer may  duplicate lower layer functionality. For  example  many protocol stacks provide error  recovery on both  network basis and point to point procedures. A second  potential  drawback  is that functionality at one  layer may  need information  that is present  only in  another layer  this violates the goal of separation of layers.

The protocols of the  various  layers are called  the protocol stack.  The internet  protocol stack  consists  of five  layers the physical  link  network  transport and  application layers  respectively  as figure

  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical

 


Related Discussions:- Protocol layering - computer network

How is a logical network diagram, Question: a) In relation to network ...

Question: a) In relation to network design, give two reasons why the building-block approach is favoured to the traditional approach. b) Explain the following steps in rela

What is redundancy, What is Redundancy? The method of including extra i...

What is Redundancy? The method of including extra information in the transmission solely for the purpose of comparison. This technique is known as redundancy.

What are the drawbacks of wireless devices, What are the drawbacks of wirel...

What are the drawbacks of wireless devices One drawback is security. Every random delivery man who happens to be in building can listen on network. Another weakness is reliabil

Explain the types of security service, Q. Explain the Types of Security Ser...

Q. Explain the Types of Security Service? Security Services fall into one of the subsequent categories - Confidentiality: Confirms that the info in a system and transm

Packet loss and retransmission in tcp, Packet loss and retransmission in TC...

Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no

Explain the following: cdma and fdma, Question 1 Explain GSM digital cellu...

Question 1 Explain GSM digital cellular System model Question 2 Explain cellular Digital Packet Data(CDPD) system with the help of CDPD network reference model Question 3

Ajax, Ajax is a relatively new set of techniques that, in a sense, implemen...

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with

Computer nework critira, what is compurter network and types, topology, com...

what is compurter network and types, topology, communication media

What are the key design issues of a computer network, What are the key desi...

What are the key design issues of a computer Network? a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd