The architecture adopted by the computer network system is: OSI's seven-layer protocol architecture, TCP/IP's four-layer protocol and five-layer protocol architecture; which is the hierarchical division of network protocols and the structure of each layer of protocols. Sets, protocols in the same layer are determined according to the functions to be achieved by the layer.
The architecture adopted by the computer network system is:
There are three architectures
1. OSI's seven-layer protocol architecture
OSI is a standard formulated by the International Organization for Standardization. It has a clear concept and complete theory, but is complicated and impractical.
OSI architecture
7 Application layer
6 Presentation layer
5 Session layer
4 Transport layer
3 Network layer
2 Data link layer
1 Physical layer
2, TCP/IP four-layer protocol
TCP/IP architecture has been widely used.
TCP/IP architecture
4 Application layer (various application layer protocols such as FTP, DNS, etc.)
3 Transport layer (TCP or UDP)
2 Internet layer (also known as network interconnection layer)
1 Data link layer (also known as network interface layer)
3. It has five layers The architecture of the protocol
The architecture when learning network principles, combining the advantages of OSI and TCP/IP.
5 Application layer
4 Transport layer
3 Network layer
2 Data link layer
1 Physical layer
(5) Application layer
The application layer directly provides services for the user's application process.
Application layer protocols: FTP, DNS, HTTP and other protocols.
(4) Transport layer
The transport layer is responsible for providing services for communication between processes in two hosts.
Protocol used by the transport layer:
1>Transmission Control Protocol TCP
Connection-oriented, the data transmission unit is a message segment, providing reliable delivery.
2>User Datagram Protocol UDP
Connectionless, the data transmission unit is datagram, and reliable delivery is not guaranteed.
(3) Network layer (using IP protocol)
The network layer is responsible for providing communication services for different hosts on the packet-switched network.
Tasks of the network layer:
When sending data, the network layer encapsulates the message segments or user datagrams generated by the transport layer into packets (also known as IP datagrams) for transmission. Another task of the network layer is to select appropriate routes so that the packets passed by the transport layer of the source host can find the destination host through the routers in the network.
(2) Data link layer
When transmitting data between two adjacent nodes (host and router or between two routers), the data link layer combines the network layer The submitted IP datagram is assembled into a frame, and the data in the frame is transmitted on the link between two adjacent nodes.
(1)Physical layer
The physical layer is used to transmit bit streams.
Transmission uses some physical media: twisted pair, optical fiber, etc.
Benefits of layering(1). Each layer is independent. A certain layer does not need to know how its next layer is implemented, it only needs to call the interface between layers. (2), good flexibility. Changing any one of these layers will not affect the other layers as long as the interface remains the same.
(3), easy to implement and maintain.
(4), can promote standardization work. The function of each layer is precisely explained.
What is a computer network architecture?The computer network architecture is a hierarchical division of network protocols and a collection of protocols at each layer. The protocols in the same layer are based on the requirements of that layer. Determine the functions implemented. The protocol functions between each peer layer are completed by the corresponding underlying services.
The reason why the computer network architecture appearsThe computer network is a very complex system. In order to design complex computer networks, people adopt a layered approach to convert large and complex problems into several small local problems.
The above is the detailed content of What architecture does a computer network system use?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

WebStorm Mac version
Useful JavaScript development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Atom editor mac version download
The most popular open source editor
