Close Menu
    Facebook X (Twitter) Instagram
    Dutta TechDutta Tech
    • Home
    • Courses
      • Computer Network
        • Basic Introduction on Computer System
        • Basic Introduction on Computer Network
        • Features Of Computer network
        • Computer Network Architecture
        • Computer Network Components
        • Computer Network Types
        • Internetwork
        • Topology
        • Computer Network Models
        • TCP/IP model
        • OSI Model
        • Digital Transmission
        • Digital-to-Digital Conversion
        • Analog to Digital Conversion
        • Digital-to-Analog Conversion
        • Analog-to-Analog Conversion
        • UnGuided Transmission
        • Guided Media
        • Multiplexing
        • Switching
        • Switching Modes
    • School
      • Class-9
        • Syllabus-Computer Science-Class-9
      • Class-10
        • Syllabus-Computer Science-Class-10
      • Class-11
        • Syllabus-Computer Science-Class-11
      • Class-12
        • Syllabus-Computer Science-Class-12
    Facebook X (Twitter) Instagram
    Dutta TechDutta Tech
    Computer Network

    Computer Network Models

    PrabhakerBy PrabhakerNovember 22, 2021Updated:December 14, 2022No Comments3 Mins Read

    In the past couple of decades implementing the software for subsystems was based on a single, complex, unstructured program with many interacting components. Therefore software was very difficult to test and modify. To overcome such problems, the International Organization of Standardization(ISO) has started various network schemes in other words Computer Network Models. In layered principles, the networking concept is divided into several layers, and each layer is given a particular task.

    Table of Contents

    • Layered Architecture
    • Why do we require Layered architecture?
      • The most important reference Computer Network Models are:
        • OSI reference model.
        • TCP/IP reference model.

    Layered Architecture

    • The main aim of layered architecture is to divide the model into small parts.
    • Every lower layer adds its services to the higher layer to provide a full set of services.
    • It provides modularity and clarity between interfaces, i.e., provides interaction between each subsystem.
    • It ensures independence with each layer by providing services from lower to higher layers. Therefore, any modification in a layer will not affect the other corresponding layers.
    • The number of layers, functions, contents of each layer will vary from network to network. Each layer is to provide the service from lower to a higher layer.
    • Hide the details from the layers, the services are implemented.
    • The basic elements of layered architecture are services, protocols, and interfaces.
      • Service: It allocates actions that a layer provides to the higher layer.
      • Protocol: It defines a set of rules that a layer uses to exchange information to another layer.
      • Interface: It is a medium through which the message is transferred from one layer to another layer.
    • In the case of layered architecture, no data is transferred from the layer of one machine to the layer of another machine. Instead, each layer passes the data to the layer immediately just below it, until the lowest layer is reached.
    • In a layered architecture, tasks are divided into several small and manageable tasks.
    • The data is passed from the upper layer to the lower layer through an interface.
    • A set of layers and protocols is known as network architecture.

    Why do we require Layered architecture?

    • It makes a design process in such a way that the unmanageable tasks are divided into small and manageable tasks. In another word, we can say that this approach reduces the complexity of the design.
    • Layered architecture is more modular. Modularity provides independence of each layer, which is easier to understand and implement.
    • It ensures the independence of layers so that implementation in one layer can be changed without affecting other layers.
    • Each layer of the layered architecture can be analyzed and tested individually.

    The most important reference Computer Network Models are:

    1. OSI reference model.

    2. TCP/IP reference model.

    Computer Network Models
    Prabhaker
    • Website
    • X (Twitter)

    Related Posts

    Transmission modes

    March 31, 2022
    Read More

    Transport Layer

    March 30, 2022
    Read More

    Network Layer Protocols

    February 3, 2022
    Read More

    Comments are closed.

    Recent Posts
    • Transmission modes
    • Transport Layer
    • Network Layer Protocols
    • Routing
    • Types of Routing
    • Network Layer Addressing
    • Data Link Control
    • Network Layer
    • Error Detection and Correction
    • Data Link Layer
    • Switching Techniques
    • Switching Modes
    • Switching
    • Multiplexing
    • UnGuided Transmission
    • Home
    • School
    • Courses
      • Computer Network
    • Contact Us
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Terms and Conditions
    • Privacy Policy
    • Disclaimer
    • Contact Us
    • Terms & conditions
    © 2025 DuttaTech.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    Preferences
    {title} {title} {title}