• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Networks Architectures & Protocols

Extracts from this document...

Introduction

Computer Networks Architectures & Protocols

Part One (Computer Networks Layering Models)

i.

The communication between the nodes in a data network must be correctly defined to ensure correct interpretation of the packets by the receiving intermediate and the end systems. The packets exchanged between the nodes are defined by a protocol or a communications language. There are many functions which may be needed to be performed by a protocol. These range from the specification of connectors, addresses of the communications nodes, identification of interfaces, options, flow control, reliability, error reporting, synchronization, etc. In practice there are so many different functions, that a set (also known as suite or stack) of protocols are usually defined. Each protocol in the suite handles one specific aspect of the communication

Advantages of layered protocol

The advantages of layered protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication systems. Also the layered protocol diminishes the complexity of networking by separating it into many functions or layers and the introduction of new features in the layer can be accomplished without changes in the other layers.
The layered protocol provides a standard to follow which means allowing inter-operability between the software and hardware vendors this is a immense advantage for the protocol.

The layered approach has proven time and time again to be the most economical way of developing and implementing any systems be they small, simple, large or complex makes no difference. This ease of development and implementation translates to greater efficiency and effectiveness which in turn translates into greater economic rationalization and cheaper products while not compromising quality.

...read more.

Middle

OSI Model

Data Unit

Layer

Function



Data

7. Application

Network processes to application

6. Presentation

Data representation and encryption

5. Session

Interhost communication


Segment


4. Transport

End to end communications and reliability

Packet

3. Network

Path determination and logical addressing

Frame

2. Data Link

Physical addressing (MAC)

Bit

1. Physical

Media, signal and binary transmission

iii. Use a diagram to show how a message is passed (physically and logically), using the OSI model between two Application-layer peers that are separated by a single router.        

The main ideas about formal correspondence between TCP-IP layers and OSI layers can be easily deducted from the following diagram: image01.png

Part Two (Network Application Architectures)

There are three predominant network application architectures used in modern network applications: the client-server architecture, the Peer to Peer (P2P) architecture and a hybrid of the client-server and P2P architectures.

  • Briefly compare and contrast client server and P2P architectures providing one advantage of each.        

i.

Client Server

Client server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client server model are very common.

For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you.

The client server model has become one of the central ideas of network computing. Most business applications being written today use the client server model. So does the Internet's main program, TCP/IP.

Relative to the Internet, your Web browser is a client program that requests services which are the sending of Web pages or files from a Web server which technically is called a Hypertext Transport Protocol or HTTP server in another computer somewhere on the Internet. Another program relationship models is peer-to-peer, with either of two programs able to initiate a transaction.

Advantages of client server are:-

  • Access, resources and data security are controlled throught the server
  • Any element can be upgraded when needed
  • New technology can be easily intergrated into the system
  • All componenets (clients, networkm servers) work together
...read more.

Conclusion

image04.png

image00.png

User Datagram Protocol (UDP) is another commonly used protocol on the internet. However, UDP is never used to send important data such as web pages and database information. UDP is commonly used for streaming audio and video devices. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others use UDP because it offers speed. The reason UDP is faster than TCP is because there is no from of flow control or error correction. The data sent over the internet is affected by collisions, and errors will be prevented. UDP is only concerned with speed; this is the main reason why streaming media is not high quality.



image04.png

iii

Describe briefly how TCP uses the window-size to provide both flow control and congestion control

TCP uses the window-size to provide both flow control and congestion control. TCP transmits data up to the window size before waiting for the packets; the full bandwidth of the network may not always get used. The limitation caused by window size can be calculated.
At any given time, the window advertised by the receive side of TCP corresponds to the amount of free receive memory it has allocated for this connection. Otherwise it would take the risk to have to drop received packets by lack of space.
Unrelated to the TCP receive window, the sending side should
also allocate the same amount of memory as the receive side for good performance. That is because, even after data has been sent on the network, the sending side must hold it in memory until its has been acknowledged as successfully received, just in case it would have to be retransmitted. If the receiver is far away, acknowledgments will take a long time to arrive. If the send memory is small, it can saturate and block emission. A simple computation gives the same optimal send memory size as for the receive memory size given above.

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Project proposal "Designing a simple Integrated Network for a Secondary School"

    select any printer within the school to output your documents regardless of your location within the premises. > You can retrieve data from any database, example, from finance office to confirm if a student hasn't got any outstanding fees to pay.

  2. The intention of this study is to analyze and explore the emerging field of ...

    cannot be afforded that large amounts of data traveling on the links be dropped or lost on the way. 1.4.2 COMPUTATIONAL NODES ON THE GRID Grid applications are more inclined towards using resources for computational needs. Thus nodes, which are themselves high performance parallel machines or clusters, are of great interest to the grid researchers.

  1. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    Data Flow Diagrams feature in this stage. The first being a context diagram, which is a simple representation of the entire system under investigation. This is followed by a level 1 diagram; which provides an overview of the major functional areas of the business.

  2. Use the Internet to find ways that some companies currently destroy their data before ...

    Look for a provider that complies with standards set by both NIST and the National Industrial Security Program (NISP) as well as any federal legislation that applies to your company, such as the Sarbanes-Oxley Act or the Health Insurance Portability and Accountability Act (HIPAA)

  1. Website Design. This is a Texans Credit Union online website. It has recently ...

    Upon form submission send this request to a human bank teller to process the request. a4. If the destination is invalid then reject request. 4. a. Perform the same exceptional flow as step 3 a1-a4 for the credit to bank.

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    Soft systems are usually used in small organisations and in departments such as HR. A hard system is appropriate/practical for the department I have chosen, because accounts consists of large amounts of numerical data, and is very data intensive, as all its information is based upon the collection and processing of figures.

  1. Internet Privacy and Security

    The computer user can easily set their preference to ask before accepting any cookie requests or block the entirely. There are several ways to increase control by computer users to protect their personal information. The "Anonymizer" (www.anonymizer.com) allows users to browse the web and to surf privately.

  2. Facebook and its Multimedia elements

    There are also some components that is hard to be count accurately but the main site codebase is largest among the all of it by far so this is atleast a reasonable order-of-magnitude estimated. FACEBOOK APPLICATIONS Facebook is contained with many application which is a perfect combination of few multimedia elements such as text, images, animations, video, graphic, and audio.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work