• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Networks Architectures & Protocols

Extracts from this document...

Introduction

Computer Networks Architectures & Protocols

Part One (Computer Networks Layering Models)

i.

The communication between the nodes in a data network must be correctly defined to ensure correct interpretation of the packets by the receiving intermediate and the end systems. The packets exchanged between the nodes are defined by a protocol or a communications language. There are many functions which may be needed to be performed by a protocol. These range from the specification of connectors, addresses of the communications nodes, identification of interfaces, options, flow control, reliability, error reporting, synchronization, etc. In practice there are so many different functions, that a set (also known as suite or stack) of protocols are usually defined. Each protocol in the suite handles one specific aspect of the communication

Advantages of layered protocol

The advantages of layered protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication systems. Also the layered protocol diminishes the complexity of networking by separating it into many functions or layers and the introduction of new features in the layer can be accomplished without changes in the other layers.
The layered protocol provides a standard to follow which means allowing inter-operability between the software and hardware vendors this is a immense advantage for the protocol.

The layered approach has proven time and time again to be the most economical way of developing and implementing any systems be they small, simple, large or complex makes no difference. This ease of development and implementation translates to greater efficiency and effectiveness which in turn translates into greater economic rationalization and cheaper products while not compromising quality.

...read more.

Middle

OSI Model

Data Unit

Layer

Function



Data

7. Application

Network processes to application

6. Presentation

Data representation and encryption

5. Session

Interhost communication


Segment


4. Transport

End to end communications and reliability

Packet

3. Network

Path determination and logical addressing

Frame

2. Data Link

Physical addressing (MAC)

Bit

1. Physical

Media, signal and binary transmission

iii. Use a diagram to show how a message is passed (physically and logically), using the OSI model between two Application-layer peers that are separated by a single router.        

The main ideas about formal correspondence between TCP-IP layers and OSI layers can be easily deducted from the following diagram: image01.png

Part Two (Network Application Architectures)

There are three predominant network application architectures used in modern network applications: the client-server architecture, the Peer to Peer (P2P) architecture and a hybrid of the client-server and P2P architectures.

  • Briefly compare and contrast client server and P2P architectures providing one advantage of each.        

i.

Client Server

Client server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client server model are very common.

For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you.

The client server model has become one of the central ideas of network computing. Most business applications being written today use the client server model. So does the Internet's main program, TCP/IP.

Relative to the Internet, your Web browser is a client program that requests services which are the sending of Web pages or files from a Web server which technically is called a Hypertext Transport Protocol or HTTP server in another computer somewhere on the Internet. Another program relationship models is peer-to-peer, with either of two programs able to initiate a transaction.

Advantages of client server are:-

  • Access, resources and data security are controlled throught the server
  • Any element can be upgraded when needed
  • New technology can be easily intergrated into the system
  • All componenets (clients, networkm servers) work together
...read more.

Conclusion

image04.png

image00.png

User Datagram Protocol (UDP) is another commonly used protocol on the internet. However, UDP is never used to send important data such as web pages and database information. UDP is commonly used for streaming audio and video devices. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others use UDP because it offers speed. The reason UDP is faster than TCP is because there is no from of flow control or error correction. The data sent over the internet is affected by collisions, and errors will be prevented. UDP is only concerned with speed; this is the main reason why streaming media is not high quality.



image04.png

iii

Describe briefly how TCP uses the window-size to provide both flow control and congestion control

TCP uses the window-size to provide both flow control and congestion control. TCP transmits data up to the window size before waiting for the packets; the full bandwidth of the network may not always get used. The limitation caused by window size can be calculated.
At any given time, the window advertised by the receive side of TCP corresponds to the amount of free receive memory it has allocated for this connection. Otherwise it would take the risk to have to drop received packets by lack of space.
Unrelated to the TCP receive window, the sending side should
also allocate the same amount of memory as the receive side for good performance. That is because, even after data has been sent on the network, the sending side must hold it in memory until its has been acknowledged as successfully received, just in case it would have to be retransmitted. If the receiver is far away, acknowledgments will take a long time to arrive. If the send memory is small, it can saturate and block emission. A simple computation gives the same optimal send memory size as for the receive memory size given above.

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Project proposal "Designing a simple Integrated Network for a Secondary School"

    select any printer within the school to output your documents regardless of your location within the premises. > You can retrieve data from any database, example, from finance office to confirm if a student hasn't got any outstanding fees to pay.

  2. This research is about Management of network operating system at Natural Forest Resources management ...

    was established on 1st April 2004. The centre evolved as result of spurring achievements and experience of both HASHI and HASHI/ICRAF project in involving local communities in the management of natural forest resources and Agroforestry practices. It is under the Forestry and Beekeeping Division in the Ministry of Natural Resources and Tourism (MNRT)

  1. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    hardware/software platforms and the network environment to be used should be detailed. (http://www.comp.dit.ie/dgordon/Lectures/SSADM/Stages/Stage6/stage6.htm Accessed 10 January 2009) 2.5 Tools and Techniques 2.5.1 Data Flow Diagrams (DFD) A Data Flow Diagram (DFD) is a graphical representation illustrating how data moves through a function and how input is transformed into output.1 SSDAM

  2. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    to Cisco and if they pass the specified requirements they must then compete in a pool with other suppliers. The Bargaining Power of Buyers Buyers as a whole do not have much bargaining power against the Cisco giant. Examined individually, it can be said that large corporations retain limited bargaining power.

  1. Research into standards and standardisation in modern communication networks and their implications and applications

    to make sure the standards are still in sync with the market requirements. This step would remedy any problems, which may arise.2 1.2 Formulating and maintaining standards Standards are developed and managed by different organisations at various levels within the economy.

  2. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants ...

    With the increased network capacity, the company will be able to handlehigh bandwidth demand multimedia streams for meetings, or even training purposes. This upgrade will also help increase the product reputation ofAndrosia Superior Fabrics,resulting in higher recognition and consequently higher profits.

  1. Facebook and its Multimedia elements

    There are also some components that is hard to be count accurately but the main site codebase is largest among the all of it by far so this is atleast a reasonable order-of-magnitude estimated. FACEBOOK APPLICATIONS Facebook is contained with many application which is a perfect combination of few multimedia elements such as text, images, animations, video, graphic, and audio.

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    (email), record deals, task reminders etc, this is usually used in B2C e-business model (business to consumer)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work