LCP sets up the PPP connection and its parameters. NCP handles higher layer protocol configurations.
1. Protocol layering is a common technique to simplify networking designs by dividing them into functional layers, and assigning protocols to perform each layer's task. For example, it is common to separate the functions of data delivery and connection management into separate layers, and therefore separate protocols. Thus, one protocol is designed to perform data delivery, and another protocol, layered above the first, performs connection management. The data delivery protocol is fairly simple and knows nothing of connection management. The connection management protocol is also fairly simple, since it doesn't need to concern itself with data delivery. 2. Protocol layering produces simple protocols, each with a few well defined tasks. These protocols can then be assembled into a useful whole. Individual protocols can also be removed or replaced as needed for particular applications. The most important layered protocol designs are the Internets original DoD model, and the OSI Seven Layer Model. The modern Internet represents a fusion of both models. 1. Protocol layering is a common technique to simplify networking designs by dividing them into functional layers, and assigning protocols to perform each layer's task. For example, it is common to separate the functions of data delivery and connection management into separate layers, and therefore separate protocols. Thus, one protocol is designed to perform data delivery, and another protocol, layered above the first, performs connection management. The data delivery protocol is fairly simple and knows nothing of connection management. The connection management protocol is also fairly simple, since it doesn't need to concern itself with data delivery. 2. Protocol layering produces simple protocols, each with a few well defined tasks. These protocols can then be assembled into a useful whole. Individual protocols can also be removed or replaced as needed for particular applications. The most important layered protocol designs are the Internets original DoD model, and the OSI Seven Layer Model. The modern Internet represents a fusion of both models.
The following are the disadvantages of a layered architecture:There might be a negative impact on the performance as we have the extra overhead of passing through layers instead of calling a component directly.Development of user-intensive applications can sometime take longer if the layering prevents the use of user interface components that directly interact with the database.The use of layers helps to control and encapsulate the complexity of large applications, but adds complexity to simple applications.Changes to lower level interfaces tend to percolate to higher levels, especially if the relaxed layered approach is used.
WAP is designed in a layered fashion so that it can be extensible,flexible, and scalable. As a result, the WAP protocol stack is divided into five layers:Application LayerWireless Application Environment (WAE). This layer is of most interest to content developers because it contains, among other things, device specifications and the content development programming languages, WML and WMLScript.Session LayerWireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the WAP Forum to provide fast connection suspension and reconnection.Transaction LayerWireless Transaction Protocol (WTP). The WTP runs on top of a datagram service such as User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to provide a simplified protocol suitable for low bandwidth wireless stations.Security LayerWireless Transport Layer Security (WTLS). WTLS incorporates security features that are based upon the established Transport Layer Security (TLS) protocol standard. It includes data integrity checks, privacy, service denial, and authentication services.Transport LayerWireless Datagram Protocol (WDP). The WDP allows WAP to be bearer-independent by adapting the transport layer of the underlying bearer. The WDP presents a consistent data format to the higher layers of the WAP protocol stack, thereby offering the advantage of bearer independence to application developers.Each of these layers provides a well-defined interface to the layer above it. This means that the internal workings of any layer are transparent or invisible to the layers above it. The layered architecture allows other applications and services to utilise the features provided by the WAP-stack as well. This makes it possible to use the WAP-stack for services and applications that currently are not specified by WAP.
Protocol is the special set of rules that end points in a telecommunication connection use when they communicate. In other words Protocol is an agreed-upon format for transmitting data between two devices. The protocol determines the following: * the type of error checking to be used * data compression method, if any * how the sending device will indicate that it has finished sending a message * how the receiving device will indicate that it has received a message Service is a program, routine, or process that performs a specific system function to support other programs, particularly at a low (close to the hardware) level
layered model architecture is tcp/ip model .you can reference this model as layered model architecture protocol.
Not always, but the more complex the protocol the more likely a layered architecture will simplify design and implementation.
LCP sets up the PPP connection and its parameters. NCP handles higher layer protocol configurations.
Micro kernel's have more fun. Where layered models tend to have drinking problems
k
as we know the protocol is collection of rules and regulation.while every communication takes place there is a protocol.protocol states whwt is format of data ,how much time to given.
internet
David B. Hanna has written: 'The layered city' -- subject(s): Architecture, Domestic, Domestic Architecture
A protocol is a set of rules that are standard for a telecommunications network. These rules will outline procedures and controls that are in place for the network.
Ethernet
Protocol architecture or TCP/IP protocol architecture also referred to as the TCP/IP protocol suite is a simple fundamental underlying design which obeys a set of rules and conventions in which communication tasks are to be performed. The communication tasks of the protocol architecture are organized into five relatively independent layers: * Physical * Network Access Layer * Internet layer * Host-to-host, or transport layer * Application Layer In my research to this question it was interested to find out that there were some who consider the protocol architecture to be comprised of only four relative independent layers which are: * Network Access Layer * Internet layer * Host-to-host, or transport layer * Application Layer More information for each layer can be found at: http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/cnet/cnbb_tcp_kscb.mspx?mfr=true http://www.unix.org.ua/orelly/networking/tcpip/ch01_03.htm
Allows for redundant links by eliminating loops.