Routers - network layer and routing , Computer Networking

Routers

The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which  means that the network  layer  must transport  traffic  between  devices  that aren't  locally attached. Routers are specified at the  network  layer  and provide  the routing  service switch  an internetwork.

It happens like  this first when a packet is  received  on a  router  interface the destination  IP  address  is checked. If  the packet is not destined for that particular router. It will look  up the  destination network  address  in the  routing table. Once the router chosen  an exit  interface the packet will be sent to that interface to be framed and sent  out on  the local  network. If the router  cannot  find an entry  for the  packets  destination  network  in the  routing  table  the  packets  destination network  in the  routing  table  the router  drops  the packets.

 

Posted Date: 3/16/2013 2:40:16 AM | Location : United States







Related Discussions:- Routers - network layer and routing , Assignment Help, Ask Question on Routers - network layer and routing , Get Answer, Expert's Help, Routers - network layer and routing Discussions

Write discussion on Routers - network layer and routing
Your posts are moderated
Related Questions
Mail Access Protocols The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves messa

Explain clustering support Clustering support refers to the ability of a network operating system to link multiple servers in a fault-tolerant group. The main purpose of this i

Cube: It's a 3 dimensional interconnection network.  In Cube PE s   are organised in a cube structure.  Figure 11: Cube interconnection network

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Write discussion on Associative mapping - computer architecture

How does the cut-through switching technique work? Ans) Cut-Through switching copies only the destination address which is the first 6 bytes after the =frame preamble into its b

Explain Peer-to-Peer Networking Model. A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no

1 Suppose you are the new regulator in charge who has authority over Internet services (although in reality such a position may not exist depending on your country). You aim to enh

What is Ping? Ping is a utility program that permits you to check connectivity among network devices on the network. You can ping a device by using its IP address or device nam

Floating Point Representation in Memory 1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this rep