Show the network layer in an internetwork, Computer Networking

Assignment Help:

Q. Show the Network layer in an internetwork?

- Receives data from Transport layer

- Responsible for creating Packet

- Each packet contains

- Universal Address of Source

- Universal Address of Destination

- Makes sure the pkt is correct size.

- If the packet is too large,

- Then it will be fragmented

- Also add fields for error control

159_Show the Network layer in an internetwork.png

Figure Network layer at a Router

- Responsible for routing the packet

- When packet arrives, router finds the interface from which the pkt must be sent.

- This is done by utilizing routing Table.

- If necessary, perform fragmentation

Network layer at the destination

258_Show the Network layer in an internetwork1.png

- Responsible for Address Verification.

- Ensure the destination is correct.

- As well checks to see the packet has been corrupted during transmission.

- If corrupted then discards the packet.

- If the packet is fragment, it waits all fragments have arrived


Related Discussions:- Show the network layer in an internetwork

Describe the dsdm life-cycle with a suitable diagram, Question : (a) De...

Question : (a) Describe how ‘prototyping' is important to RAD. (b) List main features of ‘prototyping'. (c) List main principles of DSDM. (d) Describe the DSDM life-

Concurrently read exclusively write (crew), This  is one of the models base...

This  is one of the models based on PRAM. In this, the processors access the memory location parallel for reading while exclusively for writing operations. In the algorithm which u

What are the categories of traditional ethernet, Categories of traditional ...

Categories of traditional Ethernet a)  Baseband - digital signals using Manchester encoding b) 10Base2, 10-Base-T, 10Base5, 10Base-FL c)  First number signifies data rate

Low frequency cut-off of the band-pass, Question Approximately what is ...

Question Approximately what is the low frequency cut-off of the band-pass filter shown in the figure?

Maximum hop count for link-state protocols, Normal 0 false fa...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Why mac address called physical address, MAC address called Physical addres...

MAC address called Physical address Because it's not changeable

Require class and how many different types of class exists, Why do we requi...

Why do we require class and how many different parts of class exists?

Encrypted with a symmetric key, Alice sends a message to Bob, encrypted wit...

Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver

Challenge handshake authentication protocols (chap), Challenge Handshake Au...

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd