Home Common Problem What architecture does a computer network system use?

What architecture does a computer network system use?

Aug 01, 2020 am 10:54 AM

The architecture adopted by the computer network system is: OSI's seven-layer protocol architecture, TCP/IP's four-layer protocol and five-layer protocol architecture; which is the hierarchical division of network protocols and the structure of each layer of protocols. Sets, protocols in the same layer are determined according to the functions to be achieved by the layer.

What architecture does a computer network system use?

The architecture adopted by the computer network system is:

There are three architectures

1. OSI's seven-layer protocol architecture

OSI is a standard formulated by the International Organization for Standardization. It has a clear concept and complete theory, but is complicated and impractical.

OSI architecture

7 Application layer

6 Presentation layer

5 Session layer

4 Transport layer

3 Network layer

2 Data link layer

1 Physical layer

2, TCP/IP four-layer protocol

TCP/IP architecture has been widely used.

TCP/IP architecture

4 Application layer (various application layer protocols such as FTP, DNS, etc.)

3 Transport layer (TCP or UDP)

2 Internet layer (also known as network interconnection layer)

1 Data link layer (also known as network interface layer)

3. It has five layers The architecture of the protocol

The architecture when learning network principles, combining the advantages of OSI and TCP/IP.

5 Application layer

4 Transport layer

3 Network layer

2 Data link layer

1 Physical layer

(5) Application layer

The application layer directly provides services for the user's application process.

Application layer protocols: FTP, DNS, HTTP and other protocols.

(4) Transport layer

The transport layer is responsible for providing services for communication between processes in two hosts.

Protocol used by the transport layer:

1>Transmission Control Protocol TCP

Connection-oriented, the data transmission unit is a message segment, providing reliable delivery.

2>User Datagram Protocol UDP

Connectionless, the data transmission unit is datagram, and reliable delivery is not guaranteed.                 

(3) Network layer (using IP protocol)

The network layer is responsible for providing communication services for different hosts on the packet-switched network.

Tasks of the network layer:

When sending data, the network layer encapsulates the message segments or user datagrams generated by the transport layer into packets (also known as IP datagrams) for transmission. Another task of the network layer is to select appropriate routes so that the packets passed by the transport layer of the source host can find the destination host through the routers in the network.

(2) Data link layer

When transmitting data between two adjacent nodes (host and router or between two routers), the data link layer combines the network layer The submitted IP datagram is assembled into a frame, and the data in the frame is transmitted on the link between two adjacent nodes.

(1)Physical layer

The physical layer is used to transmit bit streams.

Transmission uses some physical media: twisted pair, optical fiber, etc.

Benefits of layering

(1). Each layer is independent. A certain layer does not need to know how its next layer is implemented, it only needs to call the interface between layers. (2), good flexibility. Changing any one of these layers will not affect the other layers as long as the interface remains the same.

(3), easy to implement and maintain.

(4), can promote standardization work. The function of each layer is precisely explained.

What is a computer network architecture?

The computer network architecture is a hierarchical division of network protocols and a collection of protocols at each layer. The protocols in the same layer are based on the requirements of that layer. Determine the functions implemented. The protocol functions between each peer layer are completed by the corresponding underlying services.

The reason why the computer network architecture appears

The computer network is a very complex system. In order to design complex computer networks, people adopt a layered approach to convert large and complex problems into several small local problems.

The above is the detailed content of What architecture does a computer network system use?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

deepseek web version official entrance deepseek web version official entrance Mar 12, 2025 pm 01:42 PM

The domestic AI dark horse DeepSeek has risen strongly, shocking the global AI industry! This Chinese artificial intelligence company, which has only been established for a year and a half, has won wide praise from global users for its free and open source mockups, DeepSeek-V3 and DeepSeek-R1. DeepSeek-R1 is now fully launched, with performance comparable to the official version of OpenAIo1! You can experience its powerful functions on the web page, APP and API interface. Download method: Supports iOS and Android systems, users can download it through the app store; the web version has also been officially opened! DeepSeek web version official entrance: ht

In-depth search deepseek official website entrance In-depth search deepseek official website entrance Mar 12, 2025 pm 01:33 PM

At the beginning of 2025, domestic AI "deepseek" made a stunning debut! This free and open source AI model has a performance comparable to the official version of OpenAI's o1, and has been fully launched on the web side, APP and API, supporting multi-terminal use of iOS, Android and web versions. In-depth search of deepseek official website and usage guide: official website address: https://www.deepseek.com/Using steps for web version: Click the link above to enter deepseek official website. Click the "Start Conversation" button on the homepage. For the first use, you need to log in with your mobile phone verification code. After logging in, you can enter the dialogue interface. deepseek is powerful, can write code, read file, and create code

How to solve the problem of busy servers for deepseek How to solve the problem of busy servers for deepseek Mar 12, 2025 pm 01:39 PM

DeepSeek: How to deal with the popular AI that is congested with servers? As a hot AI in 2025, DeepSeek is free and open source and has a performance comparable to the official version of OpenAIo1, which shows its popularity. However, high concurrency also brings the problem of server busyness. This article will analyze the reasons and provide coping strategies. DeepSeek web version entrance: https://www.deepseek.com/DeepSeek server busy reason: High concurrent access: DeepSeek's free and powerful features attract a large number of users to use at the same time, resulting in excessive server load. Cyber ​​Attack: It is reported that DeepSeek has an impact on the US financial industry.