Documente Academic
Documente Profesional
Documente Cultură
Network Architecture
Outline the products and services
necessary
for
the
individual
components
within
a
data
communications network to operate
together.
Functional Responsibilities
Electrical specification
Hardware arrangement
Software procedures
Current
It include the most modern and
sophisticated networks and protocols
available
Legacy
If a network or protocol becomes
legacy, no one really wants to use it,
but for some reason it just will no go
away.
Legendary
When an antiquated network or
protocol finally disappears.
Broadcast Network
All stations and devices on the network share a
single communications channel. Data are propagated
through the network in relatively short message
sometimes called frames, blocks, network.
Broadcasting
When messages are intended for all subscribers on
the network.
Multicasting
When messages are intended for a specific group of
subscribers.
Point-to-point network
It only has two stations. Therefore, no addresses
are needed. All transmission from one station are
intended for and received by the other station.
Connection-oriented and
Connectionless Protocols
Connection-oriented protocol
A logical connection is established between the
endpoints prior to the transmission of data.
It is designed o provide a high degree of reliability
for data moving through the network.
Connectionless protocol
Are protocols where data are exchanged in an
unplanned fashion without prior coordination
between endpoints.
Characteristics of Connection-oriented
protocols
1. A connection process called Handshake occurs between
two stations before any data are actually transmitted.
2. Most connection-oriented protocols require some means
of acknowledging the data as they are being
transmitted.
3. Connection-oriented protocols
means of error control .
often
provide
some
Characteristics of Connectionless
protocols
1. Connectionless protocols send data with a source and
destination address without a handshake to ensure
that the destination is ready to receive the data.
2. Connectionless protocols usually do not support error
control or acknowledgement procedures, making them
a relatively unreliable method of data transmission.
3. Connectionless protocols are used because hey are
often more efficient, as the data being transmitted
usually do not justify the extra overhead required by
connection-oriented protocols.