BDC6eChapter5 - Chapter 5: TCP/IP and OSI Business Data...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 5: TCP/IP and OSI Business Data Communications, 6e
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is a Protocol? Allows entities (i.e. application programs) from different systems to communicate Shared conventions for communicating information are called protocols Defines a set of rules that govern the exchange of data Includes syntax, semantics, and timing
Background image of page 2
Why Use Protocol Architecture? Data communications requires complex procedures Sender identifies data path/receiver Systems negotiate preparedness Applications negotiate preparedness Translation of file formats For all tasks to occur, high level of cooperation is required
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Modular Approach Breaks complex tasks into subtasks Each module handles specific subset of tasks Communication occurs between different modules on the same system between similar modules on different systems
Background image of page 4
Advantages of Modularity Easier application development Network can change without all programs being modified
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Three-Layer Model Distributed data communications involves three primary components: Networks Computers Applications Three corresponding layers Network access layer Transport layer Application layer
Background image of page 6
Network Access Layer Concerned with exchange of data between computer and network Includes addressing, routing, prioritizing, etc Different networks require different software at this layer Example: X.25 standard for network access procedures on packet-switching networks
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Transport Layer Concerned with reliable transfer of information between applications Independent of the nature of the application Includes aspects like flow control and error checking
Background image of page 8
Application Layer Logic needed to support various applications Each type of application (file transfer, remote access) requires different software on this layer
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Addressing Each computer on a network requires a unique address on that network Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/06/2011 for the course EST 321 taught by Professor Matt during the Fall '11 term at SUNY Stony Brook.

Page1 / 49

BDC6eChapter5 - Chapter 5: TCP/IP and OSI Business Data...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online