Network laye - fundamentals of networks , Computer Networking

Network Laye

The network  layer provides  communication  between the multiple networks. Whereas the  data link  layer provides the  communication between  two systems on the same  network of two systems are connected to the same link  there is usually more need for a network layer. However if the systems are attached to the different networks ( links) with connecting devices there is often  a need for the network layer to accomplish sources to destination delivery. It defines addressing and routing ( logical link) between sources and  destination. This  layer also makes sure  that data packets are transmitted across the  networks correctly.Other  responsibilities of the network  layer include the followings.

  • Logical addressing. The physical addressing implemented by the data link layer handles the addressing problems locally. If a packet passes the network boundary we need another addressing systems to help distinguish the source and destination systems. A header to the packet coming from the upper layer the among other things includes the logical addresses of the sender and receiver.
  • Routing. When independent networks or links are connected to create internet works of a large network the connecting devices ( called routers or switches) route or switch the packets to their final destination. One of the functions of the networks layer is to provide this mechanism.

 

 

Posted Date: 3/2/2013 6:36:11 AM | Location : United States







Related Discussions:- Network laye - fundamentals of networks , Assignment Help, Ask Question on Network laye - fundamentals of networks , Get Answer, Expert's Help, Network laye - fundamentals of networks Discussions

Write discussion on Network laye - fundamentals of networks
Your posts are moderated
Related Questions
What are the Communication tools ? Voice mail ? Email ? Fax ? Video conferencing applications

What are the disadvantages of bus topology? The disadvantages of bus topology are: a. The bus networks are dissimilar to reconfigure, especially when the acceptable number o

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

What is anonymous FTP and why would you use it Anonymous FTP enables users to join to a host without using a valid login and password. Generally, anonymous FTP uses a login kno

Connection Oriented Multiplexing And De multiplexing TCP socket  identified by 4 tuple: a.Source IP address b.Source port number c.Destination IP address d.Destina

Parallel Balance Point In order to implement a parallel algorithm on a parallel computer, K number of processors is needed. It may be noted that the given input is assigned to

Q. Show the TCP connections? Connection establishment Three-way handshake Why is two-way handshake not enough? Connection termination Four steps

Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no

As there will be more devices there will be more traffic of information. We can include capacity to WAN by adding more links and packet switches. Packet switches use not have compu

Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret