Layered Architecture in Computer Networks
Last Updated :
08 Aug, 2024
Layered architecture in computer networks refers to dividingĀ a network’s functioning into different layers, each responsible for a certain communication component. The major goal of this layered architecture is to separate the complex network communication process into manageable, smaller activities that can be better developed. In this article, we will discuss Layered Architecture in Computer Networks.
Introduction to Layered Architecture
Every network consists of a specific number of functions, layers, and tasks to perform. Layered Architecture in a computer network is defined as a model where a whole network process is divided into various smaller sub-tasks. These divided sub-tasks are then assigned to a specific layer to perform only the dedicated tasks. A single layer performs only a specific type of task. To run the application and provide all types of services to clients a lower layer adds its services to the higher layer present above it. Therefore layered architecture provides interactions between the sub-systems. If any type of modification is done in one layer it does not affect the next layer.

Layered Architecture
As shown in the above diagram, there are five different layers. Therefore, it is a five-layered architecture. Each layer performs a dedicated task. The lower-level data for example from layer 1 data is transferred to layer 2. Below all the layers Physical Medium is present. The physical medium is responsible for the actual communication to take place. For the transfer of data and communication layered architecture provides simple interface.
Features of Layered Architecture
- Use of Layered architecture in computer network provides with the feature of modularity and distinct interfaces.
- Layered architecture ensures independence between layers, by offering services to higher layers from the lower layers and without specifying how these services are implemented.
- Layered architecture segments as larger and unmanageable design into small sub tasks.
- In layer architecture every network has different number of functions, layers and content.
- In layered architecture, the physical route provides with communication which is available under the layer 1.
- In layered architecture, the implementation done by one layer can be modified by another layer.
Elements of Layered Architecture
There are three different types of elements of a layered architecture. They are described below:
- Service: Service is defined as a set of functions and tasks being provided by a lower layer to a higher layer. Each layer performs a different type of task. Therefore, actions provided by each layer are different.
- Protocol: Protocol is defined as a set rule used by the layer for exchanging and transmission of data with its peer entities. These rules can consists details regarding a type of content and their order passed from one layer to another.
- Interface: Interface is defined as a channel that allows to transmit the messages from one layer to the another.
Significance of Layered Architecture
- Divide and Conquer Approach: Layered architecture supports divide and conquer approach. The unmanageable and complex task is further divided into smaller sub tasks. Each sub task is then carried out by the different layer. Therefore, using this approach reduces the complexity of the problem or design process.
- Easy to Modify: The layers are independent of each other in layered architecture. If any sudden change occurs in the implementation of one layer, it can be changed. This change does not affect the working of other layers involved in the task. Therefore, layered architectures are required to perform any sudden update or change.
- Modularity: Layered architecture is more modular as compared to other architecture models in computer network. Modularity provides with more independence between the layers and are easier to understand.
- Easy to Test: Each layer in layered architecture performs a different and dedicated task. Therefore, each layer can be analyzed and tested individually. It helps to analyze the problem and solve them more efficiently as compared to solving all the problems at a time.
- Scalability: As networks grow in size and complexity, additional layers or protocols may be added to meet new requirements while maintaining existing functionality.
- Security: The layered technique enables security measures to be implemented to varying degrees, protecting the community from a variety of threats.
- Efficiency: Each layer focuses on a certain aspect of verbal exchange, optimizing aid allocation and performance.
Evolution of Layered Architecture
In computer networks, layered architecture is majorly used for communication. The two network models that makes use of layered architecture are:
1. OSI Model
OSI stands for Open Systems Interconnection. OSI is a seven layered architecture. All these seven layers work collaboratively to transmit data from one layer to another. Below are the layers of OSI Model.
- Physical Layer: Physical layer is the lowest layer of OSI model and is responsible for the physical connection between all the required devices. The information present in physical layer is in the form of bits. Physical layer performs various functions such as bit rate control, bit synchronization, transmission mode etc.
- Data Link Layer: Data Link layer provides with successful delivery of message from one node to the another. It checks whether this delivery of message is error free. Other functions performed by data link layer are error control, framing, flow control etc.
- Network Layer: Network Layer is responsible for the transmission of data from one host to another host that is connected in different network. It performs other tasks such routing and logical addressing.
- Transport Layer: Transport Layer is defined as a layer that takes services from network layer and provides services to application layer. Other tasks performed by transport layer are service point addressing, segmentation and reassembling.
- Session Layer: Session layer is defined as a layer that is responsible for establishing a connection, maintenance of session and to provide with security. Other functions of session Layer are to establish session, termination and synchronization.
- Presentation Layer: The data from application layer is extracted at the presentation layer. This layer is also known as translation layer. The functions of presentation layer are encryption, decryption, compression and translation.
- Application Layer: Application layer is the topmost layer of OSI Model. Application layer is also known as desktop layer. It provides with other functions such as directory services, mail services, network virtual terminal etc.

OSI and TCP/IP
2. TCP/IP Model
1. Network Access Layer
It is a group of applications requiring network communications. This layer is responsible for generating the data and requesting connections. It acts on behalf of the sender and the Network Access layer on the behalf of the receiver. During this article, we will be talking on the behalf of the receiver.
The packetās network protocol type, in this case, TCP/IP, is identified by network access layer. Error prevention and āframingā are also provided by this layer.Ā Point-to-Point Protocol (PPP)Ā framing and Ethernet IEEE 802.2 framing are two examples of data-link layer protocols.
2. Internet Layer
This layer parallels the functions of OSIās Network layer. It defines the protocols which are responsible for the logical transmission of data over the entire network. The main protocols residing at this layer are as follows:
- IP:Ā IPĀ stands for Internet Protocol and it is responsible for delivering packets from the source host to the destination host by looking at the IP addresses in the packet headers. IP has 2 versions: IPv4 and IPv6. IPv4 is the one that most websites are using currently. But IPv6 is growing as the number of IPv4 addresses is limited in number when compared to the number of users.
- ICMP:Ā ICMPĀ stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible for providing hosts with information about network problems.
- ARP:Ā ARPĀ stands for Address Resolution Protocol. Its job is to find the hardware address of a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP, and Inverse ARP.
3. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments and retransmit missing packets to ensure that packets arrive in order and without error. End-to-end communication is referred to as such. Transmission Control Protocol (TCP) and User Datagram Protocol are transport layer protocols at this level (UDP).
- TCP:Ā Applications can interact with one another usingĀ TCPĀ as though they were physically connected by a circuit. TCP transmits data in a way that resembles character-by-character transmission rather than separate packets. A starting point that establishes the connection, the whole transmission in byte order, and an ending point that closes the connection make up this transmission.
- UDP:Ā The datagram delivery service is provided byĀ UDP, the other transport layer protocol. Connections between receiving and sending hosts are not verified by UDP. Applications that transport little amounts of data use UDP rather than TCP because it eliminates the processes of establishing and validating connections.
4. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end communication and error-free delivery of data. It shields the upper-layer applications from the complexities of data. The three main protocols present in this layer are:
- HTTP and HTTPS:Ā HTTPĀ stands for Hypertext transfer protocol. It is used by the World Wide Web to manage communications between web browsers and servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in cases where the browser needs to fill out forms, sign in, authenticate, and carry out bank transactions.
- SSH:Ā SSHĀ stands for Secure Shell. It is a terminal emulations software similar to Telnet. The reason SSH is preferred is because of its ability to maintain the encrypted connection. It sets up a secure session over a TCP/IP connection.
- NTP:Ā NTPĀ stands for Network Time Protocol. It is used to synchronize the clocks on our computer to one standard time source. It is very useful in situations like bank transactions. Assume the following situation without the presence of NTP. Suppose you carry out a transaction, where your computer reads the time at 2:30 PM while the server records it at 2:28 PM. The server can crash very badly if itās out of sync.
Benefits of Layered Architecture
- Modularity
- Interoperability
- Flexibility
- Reusability
- Scalability
- Security
Challenges in Layered Architecture
- Performance Overhead
- Complexity in Implementation
- Resource Utilization
- Debugging and Troubleshooting
- Protocol Overhead
Real-World Applications and Examples
Conclusion
Layered architecture in computer networks significantly simplifies the complex process involved in network communication by dividing them into smaller process, each with its own function and responsibility. This method improves modularity, interoperability, flexibility, and security, making network systems easier to design, manage, and expand. Despite problems like as performance overhead and implementation complexity, the layered model’s benefits may be seen in real-world applications such as internet browsing, email communication, video streaming, and more, emphasising its importance in modern networking.
Similar Reads
Basic Network Attacks in Computer Network
Many people rely on the Internet for many of their professional, social and personal activities. But there are also people who attempt to damage our Internet-connected computers, violate our privacy and render inoperable the Internet services. Given the frequency and variety of existing attacks as w
7 min read
Multiple Access Protocols in Computer Network
Multiple Access Protocols are methods used in computer networks to control how data is transmitted when multiple devices are trying to communicate over the same network. These protocols ensure that data packets are sent and received efficiently, without collisions or interference. They help manage t
9 min read
End Devices in Network Layer
The network layer is the third layer of the OSI model. Handles transport layer service requests and forwards service requests to the data link layer. The network layer translates logical addresses into physical addresses. It defines routes from sources to destinations, manages traffic issues such as
4 min read
Computer Network - Cheat Sheet
A computer network is an interconnected computing device that can exchange data and share resources. These connected devices use a set of rules called communication protocols to transfer information over physical or wireless technology. Modern networks offer more than just connectivity. Enterprises
15+ min read
5 Layer Architecture of Internet of Things
Internet of Things (IoT)Â is the networking of physical objects that contain electronics embedded within their architecture to communicate and sense interactions amongst each other or to the external environment. Internet of Things (IoT) technology has a wide range of applications and the use of the
4 min read
Peer-to-Peer (P2P) Architecture
Peer-to-peer (P2P) architecture is a decentralized computing model where network participants share resources directly with each other without the need for a centralized server. In a P2P network, each node acts as both a client and a server, enabling distributed sharing of files, data, and computing
9 min read
Sensor Network Architecture
Sensor Network Architecture is used in Wireless Sensor Network (WSN). It can be used in various places like schools, hospitals, buildings, roads, etc for various applications like disaster management, security management, crisis management, etc. There are 2 types of architecture used in WSN: Layered
2 min read
Computer Networks (CN) for GATE CSE Exam
Here's the complete tutorial on Computer Networks for GATE CSE Exam. This tutorial will break down the syllabus topics into easy-to-understand sections. If you have less time to study topic wise in details, you may refer Computer Networks previous year questions topic wise. 1. Introduction to Networ
4 min read
Multitiered Architectures in Distributed System
Multitiered Architectures in Distributed Systems explains how complex computer systems are organized into different layers or tiers to improve performance and manageability. Each tier has a specific role, such as handling user interactions, processing data, or storing information. By dividing tasks
11 min read
Challenges of Computer Network
In the age of Internet where everyone loves to work with their computers and smart phones it is impossible to think any work without networking. With advancement of technology use of computer networking is increasing rapidly. In general if we will see, we can feel also how important networking is th
4 min read