Tcp/Ip Architecture and Application To Enterprise: School: Lecturer
Tcp/Ip Architecture and Application To Enterprise: School: Lecturer
Tcp/Ip Architecture and Application To Enterprise: School: Lecturer
APPLICATION TO ENTERPRISE
Another reliability issue is finding a working path through a network. Often there are multiple paths
between a source and destination, and in a large network, there may be some links or routers that are
broken.
Remedy
Error detection mechanism
Error correction mechanism
Both of these mechanisms work by adding redundant information. They are used at low layers, to
protect packets sent over individual links, and high layers, to check that the right contents were
received.
2. The evolution of the network.
Over time, networks grow larger and new designs emerge that need to be
connected to the existing network.
Remedy
Network design should be scalable
3. Resource allocation
Networks provide a service to hosts from their underlying resources, such as the
capacity of transmission lines.
To do this well, they need mechanisms that divide their resources so that one host
does not interfere with another too much.
An allocation problem that occurs at every level is how to keep a fast sender from
swamping a slow receiver with data.
Most networks must provide service to applications that want this real-time
delivery at the same time that they provide service to applications that want high
throughput.
Remedy
Flow control mechanism
Congestion control mechanism
Quality of service provision
4. Network Security
Threats includes: eavesdropping, hijacking, denial of service,
information theft, etc…
Remedy
Confidentiality
Authentication
Integrity
CONNECTION-ORIENTED VERSUS CONNECTIONLESS SERVICE
Layers can offer two different types of service to the layers above them:
connection-oriented and connectionless.
Connection-oriented
Connection-oriented service is modeled after the telephone system. To talk to
someone, you pick up the phone, dial the number, talk, and then hang up.
The essential aspect of a connection is that it acts like a tube: the sender pushes
objects (bits) in at one end, and the receiver takes them out at the other end.
In most cases the order is preserved so that the bits arrive in the order they were
sent.
In some cases when a connection is established, the sender, receiver, and subnet
conduct a negotiation about the parameters to be used, such as maximum
message size, quality of service required, and other issues.
Connectionless Service
Connectionless service is modeled after the postal system.
Each message (letter) carries the full destination address, and each one is
routed through the intermediate nodes inside the system independent of all the
subsequent messages.
When the intermediate nodes receive a message in full before sending it on to
the next node, this is called store-and-forward switching.
The alternative, in which the onward transmission of a message at a node starts
before it is completely received by the node, is called cut-through switching.
Continuation……
Each kind of service can further be characterized by its reliability. Some
services are reliable in the sense that they never lose data.
Usually, a reliable service is implemented by having the receiver acknowledge
the receipt of each message so the sender is sure that it arrived.
A typical situation in which a reliable connection-oriented service is appropriate
is file transfer.
Reliable connection-oriented service has two minor variations: message
sequences and byte streams.
In the message sequence, the message boundaries are preserved. For
example, When two 1024-byte messages are sent, they arrive as two distinct
1024-byte messages, never as one 2048-byte message.
In the latter, the connection is simply a stream of bytes, with no message
boundaries. When 2048 bytes arrive at the receiver, there is no way to tell if
they were sent as one 2048-byte message, two 1024-byte messages, or 2048 1-
byte messages.
SERVICE PRIMITIVES
A service is formally specified by a set of primitives (operations) available to
user processes to access the service.
These primitives tell the service to perform some action or report on an action
taken by a peer entity.
The set of primitives available depends on the nature of the service being
provided.
3. The function of each layer should be chosen with an eye toward defining internationally
standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown together
in the same layer out of necessity and small enough that the architecture does not become
unwieldy.
OSI MODEL LAYERING
OSI MODEL AND FUNCTION
TCP/IP MODEL
TCP/IP PROTOCOLS
Remedy
Flow control mechanism
Congestion control mechanism
Quality of service provision
Remedy
Flow control mechanism
Congestion control mechanism
Quality of service provision
Remedy
Flow control mechanism
Congestion control mechanism
Quality of service provision
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: