What is network layer of osi model, Computer Networking

Q. What is network layer of osi model?

- Describe end-to-end delivery of packets.

- Defines logical addressing thus that any endpoint can be identified.

- Defines how routing works as well as how routes are learned thus that the packets can be delivered.

- The network layer as well defines how to fragment a packet into smaller packets to accommodate different media.

- Routers work at Layer 3.

- Instances - IPX, IP and AppleTalk.

Posted Date: 7/20/2013 3:49:35 AM | Location : United States







Related Discussions:- What is network layer of osi model, Assignment Help, Ask Question on What is network layer of osi model, Get Answer, Expert's Help, What is network layer of osi model Discussions

Write discussion on What is network layer of osi model
Your posts are moderated
Related Questions
- The project should include a web server, and an example webpage - Webserver should continue to accept multiple requests from client browser - Webserver should print out logs: how

DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response

State the latest technology in the line of Intranet The latest technology in the line of Intranet tools has been the Web-based Distributed Authoring and Versioning (WebDAV), w

Define the Types of Computer Network Computer networks fall into three classes regarding the size, distance and the structure namely: LAN (Local Area Network), MAN (Metropolita

What is the purpose of cables being shielded and having twisted pairs? The main purpose of this is to stop crosstalk. Crosstalks are electromagnetic interferences or noise that

Explain how the lan model be developed The LAN model can be developed incrementally. If LAN is just a long cable. it cannot be brought down by single failure (if servers are re

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Question 1 Write a note on a) Internet layer b) strict source routing Question 2 Explain the routing table of Solaris system Question 3 Explain following concepts a) MIM

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Ring: It is a simple linear array where end nodes are associated.  It is equal to a mesh with wrap around connections.  The data transfer in a ring is generally one direction. So,