Unit-1 NetWSoft, Design Issue, Connection
Unit-1 NetWSoft, Design Issue, Connection
Scalability
Networks are continuously evolving. The sizes are
continually increasing leading to congestion. Also, when
new technologies are applied to the added components, it
may lead to incompatibility issues. Hence, the design
should be done so that the networks are scalable and can
accommodate such additions and alterations.
Addressing
At a particular time, infinite messages are being
transferred between large numbers of computers. So, a
naming or addressing system should exist so that each
layer can identify the sender and receivers of each
message.
Error Control
Unreliable channels introduce a number of errors in the
data streams that are communicated. So, the layers need
to agree upon common error detection and error
correction methods so as to protect data packets while
they are transferred.
Flow Control
If the rate at which data is produced by the sender is
higher than the rate at which data is received by the
receiver, there are chances of overflowing the receiver.
So, a proper flow control mechanism needs to be
implemented.
Resource Allocation
Computer networks provide services in the form of
network resources to the end users. The main design
issue is to allocate and deallocate resources to
processes. The allocation/deallocation should occur so
that minimal interference among the hosts occurs and
there is optimal usage of the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each
message while it is being transferred from the source to
the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the
bandwidth or time to each host.
Routing
There may be multiple paths from the source to the
destination. Routing involves choosing an optimal path
among all possible paths, in terms of cost and time.
There are several routing algorithms that are used in
network systems.
Security
A major factor of data communication is to defend it
against threats alteration of messages. So, there
should be mechanisms to prevent unauthorized access
to data through authentication and cryptography.
Connection Oriented and Connectionless
Services
Connection Oriented Services
There is a sequence of operation to be followed by the users of
connection oriented service. These are:
1. Connection is established.
2. Information is sent.
3. Connection is released.
In connection oriented service we have to establish a connection
before starting the communication. When connection is
established, we send the message or the information and then we
release the connection.
Connection oriented service is more reliable than connectionless
service. We can resend the message in connection oriented service
if there is an error at the receivers end. Example of connection
oriented is TCP (Transmission Control Protocol) protocol.
Connection Less Services
• For example,
Ethernet provide physical architecture
IP provide service of addressing and routing
TCP, UDP provide service of connection
SMTP, FTP, HTTP provide service of sharing