Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

The communication and processing functions of a computer network are done via several cooperating computing processes. The architectural model that defines the classes of functions or protocols involv

The communication and processing functions of a computer network are done via several cooperating computing processes. The architectural model that defines the classes of functions or protocols involved in this cooperation is based on the concept of layering. So, the whole system is viewed as a hierarchy of functional layers. Every layer adds to the system a series of functions based on the services supplied by the below subordinate level. The functions are accomplished by the action of some entities or modules that belong to different nodes of the network. The entities on the same level coordinate their actions by transmitting a control information according to a certain protocol. Such a network with a perfect layering of its functions may be a reference model for open systems interconnection.

When a resource is shared among multiple independent stations or users, the need exists for a mechanism to control access to the resource, or in the absence of such a mechanism there must exist a course of action to be taken when two or more users attempt to acquire the resource at the same time. One solution would be to allow stations to transmit whenever they have data to send. A node transmits at random (i.e. there is no priory coordination among nodes) at the full rate of the channel. If two or more nodes collide, they retransmit at random times. Contention among users (or collisions of transmissions) limits network throughput and increase time delay. Thus, some protocols must be employed to exercise control over the access method of users. Random Access Protocols address this situation. The random access MAC protocol specifies how to detect collisions and how to recover from them (for instance, via delayed retransmissions). There are a number of MAC protocols which have been developed for various communications networks. Depending upon the type and limitations of the network, each protocol has its advantages and disadvantages as well as unique performance limitations.

Some protocols have became "de facto" standards due to their widespread by a large product selling. Thus, two of the early ARPA's protocols have proliferated due to their inclusion in the UNIX Berkeley operating system. These are the network protocol IP (Internetwork Protocol) and the transport protocol TCP (Transmission Control Protocol). However, these protocols that are the foundation of the TCP/IP architecture are not unanimously accepted by the networks manufacturers. In order to exist a unitary way of conceiving the functions performed at every level, the International Organization for Standardization (ISO) has designed a reference model of protocol levels with 7 layers, called Open System Interconnection (OSI). This model serves as a basis for the design and standardization of ISO's own protocols.

An alternative to circuit-switching, where the communication lines are dedicated to passing messages from the source to the destination is packet-switching. Packet switching originates in message switching, where each message can travel from the source to destination independently. In order to know how to arrive at destination, the message must contain the destination address and also the source address for message identification. The message is transmitted in its entirety from one node to another. When messages are broken into smaller units called packets, the message switching becomes packet switching. The idea is to ensure that the packets size are more convenient for the network transmission. At the destination the packets are reassembled into the original message.

Read through the related OERs. The purpose of this section is to discuss the networking fundamentals starting from the above mentioned architectures.Due May 31th3 pagesOERs:

  • CISCO. (n.d.).ICND1 100-101. Functions of Networking. Retrieved from: http://www.learncisco.net/courses/icnd-1/building-a-network/the-functions-of-networking.html.
  • CISCO. (n.d.). ICND1 100-101. Securing Network. Retrieved from: http://www.learncisco.net/courses/icnd-1/building-a-network/network-security.html.
  • CISCO. (n.d.). ICND1 100-101. Layering in Host-to-Host Communications. Retrieved from:http://www.learncisco.net/courses/icnd-1/building-a-network/host-to-host-communications.html.
  • CISCO. (n.d.). ICND1 100-101.Understanding the IP Layer & Internal IP Addressing. Retrieved from:http://www.learncisco.net/courses/icnd-1/building-a-network/tcpip-internet-layer.html.
  • CISCO. (n.d.). ICND1 100-101.Understanding The TCP (Transport) Layer. Retrieved from:http://www.learncisco.net/courses/icnd-1/building-a-network/tcpip-transport-layer.html.

(Feel free to read subsequent chapters in this CISCO resource; but reading them is not required.)

  • OmniSecu.com. (n.d.). TCP/IP Encapsulation and Decapsulation. Retrieved from: http://www.omnisecu.com/tcpip/tcpip-encapsulation-decapsulation.php.
  • IETF. (1981). INTERNET PROTOCOL. DARPA INTERNET PROGRAM. PROTOCOL SPECIFICATION.RFC 791. Retrieved from: https://tools.ietf.org/html/rfc791
  • IETF (1981). TRANSMISSION CONTROLPROTOCOL. DARPA INTERNET PROGRAM. PROTOCOL SPECIFICATION. RFC 793. Retrieved from: https://www.ietf.org/rfc/rfc793.txt.
  • Arora H. The Geek Stuff. (2013). Hubs vs Switches vs Routers – Networking Device Fundamentals. Retrieved from: http://www.thegeekstuff.com/2013/09/hubs-switches-routers.
  • Mitchell B. (2020). Introduction to LANs, WANs, and Other Kinds of Area Networks. Retrieved from: https://www.lifewire.com/lans-wans-and-other-area-networks-817376
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question