Network laye - fundamentals of networks , Computer Networking

Assignment Help:

Network Laye

The network  layer provides  communication  between the multiple networks. Whereas the  data link  layer provides the  communication between  two systems on the same  network of two systems are connected to the same link  there is usually more need for a network layer. However if the systems are attached to the different networks ( links) with connecting devices there is often  a need for the network layer to accomplish sources to destination delivery. It defines addressing and routing ( logical link) between sources and  destination. This  layer also makes sure  that data packets are transmitted across the  networks correctly.Other  responsibilities of the network  layer include the followings.

  • Logical addressing. The physical addressing implemented by the data link layer handles the addressing problems locally. If a packet passes the network boundary we need another addressing systems to help distinguish the source and destination systems. A header to the packet coming from the upper layer the among other things includes the logical addresses of the sender and receiver.
  • Routing. When independent networks or links are connected to create internet works of a large network the connecting devices ( called routers or switches) route or switch the packets to their final destination. One of the functions of the networks layer is to provide this mechanism.

 

 


Related Discussions:- Network laye - fundamentals of networks

Merits of message passage-shared memory, Gives excellent low-level control ...

Gives excellent low-level control of parallelism; Portable; Minimal overhead in data distribution and parallel synchronisation; and It is less error prone. Drawb

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

Classes and dotted decimal notation, The relationship between dotted decima...

The relationship between dotted decimal notation and classes is shown as follows. In class A the three octets managed to a host suffix. In class B the last most two octets ar

Describe flow and error control mechanisms, Q. Describe Flow and Error Cont...

Q. Describe Flow and Error Control Mechanisms? Flow and Error Control Mechanisms - Stop and Wait ARQ - Go-Back ARQ - Selective Repeat ARQ

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Name the connecting devices of bridges, Connecting Devices of bridges -...

Connecting Devices of bridges - Five kinds: - Repeaters - Hubs - Bridges - Two- and three-layer switches - Repeaters and hubs - layer one of Internet model -

Maximum hop count for link-state protocols, Normal 0 false fa...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Recognize the command to verify if cdp is enabled, show cdp is the command...

show cdp is the command to verify if CDP is enabled.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd