Network Layer

Mark wiens

Timeļ¼š01-15

To solve the problem of delivery through several links the network layer was designed. The network layer is responsible for a host to host delivery and for routing the packets through the routers. The network layer is m designed as a packet-switched network. i.e. the packet at a source is divided into manageable packets called as datagrams. Individual datagrams are then transferred from source to destination. At the destination, the received datagrams are assembled before recreating the original message. The packet-switched was designed as a connectionless service, but recently there is a tendency to change this to connection orientated Service.

Web development, programming languages, Software testing & others

View Courses600+ Online Courses 50+ projects 3000+ Hours Verifiable Certificates Lifetime Access

When the Internet was started, the network layer was designed to provide connectionless service, in which network layer protocol treats each packet independently. Packets in the message may or may not travel the same path to their destination. The network layer is only responsible for delivering the packet from source to destination. Switch in this type of network are called routers.

Each packet is routed based on information contained in its header source and destination address. Source address defines where it comes from, and destination address defines where it should go. The router routes the packet based on the destination address. Source address may be used to send error messages to the source of the packet is discarded.

In connection orientated packet-switched network, the forwarding decision is based on the label of the packet.

To create connection orientated service, three phases are used namely the setup phase, data transfer phase, and teardown phase.

a. Setup phase:In the setup phase, the source and destination address of the sender and receiver is used to make for the entries for connection-orientated service. Request packet and acknowledgment be packet need to be exchanged between the sender and receiver.

Request packet:The request packet is sent from source to destination.

Source X sends a request packet to router R1.

Router R1 receives the request packet and bided on the information it sends this packet to Router R3.

Router R3 receives the request packet. Router R3 sends this packet to R4.

Destination Y receives the setup packet and if it is ready to receive a packet from X, it assigns a label to an incoming packet that comes from X. This label lets the destination that packet comes from X and not other sources.

Acknowledgment packet:A special packet is called an acknowledge packet which completes entries into the switching table.

Destination Y sends the acknowledgment packet to router R4, which carries both source and destination address so the router knows which encryption the table is to be completed. This packet carries the label.

Router R4 sends this acknowledge packet to router R3.

Finally, R1 sends this source X that contains the incoming labels in the table.

Source uses this as the outgoing label for the data packet both be sent to destination Y.

b. Data transfer phase:T is the second phase in connection-orientated service. After all, routers have created their routing table for a specific virtual circuit then the network layer packets belonging to one message can be sent one after another.

c. Teardown phase:In the teardown phase, after sending all packets to destination Y, source X sends the special packet i.e. teardown packet to destination Y. In response to source X, destination Y sends the confirmation packet to X. All routers delete the corresponding entry from their tables.

The first duty of the network layer is to encapsulate the data coming from the upper layer in a datagram. This is done by adding a header to the data that contains the logical source and destination address of the packet, information about fragmentation, protocol ID of the protocol that has requested the service, data length, and possibly some options. The network layer also includes the checksum which is calculated over the datagram header.

The prepared datagram contains the source and destination address of the packet. The datagrams may have to pass through various many networks to reach their final destination. If the destination computer is jot connected to the same network as the source and, the datagram should be delivered to the next router. The network layer at the source computer needs to consult the routing table to find the logical address of the next hop.

The network layer does not actually deliver the datagram to the next hop, it is the duty of the data link layer. The data links layer needs to the MAC address of the next-hop to do the delivery. To find a MAC address of the next-hop, the network layer could use another table to map the next-hop logical address to the MAC address.

The datagram prepared at the network layer may be larger than the limit. The datagram needs to be fragmented into smaller units before being passed to the data link layer. Fragmentation needs to preserve the information at the header of the datagram.

Given below are the issues related to the network layer:

Error control means the process of including a mechanism for detecting corrupt, lost, or duplicate datagrams. It also includes a mechanism for correcting the error after that have been detected. The network layer does not provide the real error control mechanism.

Flow control regulates the amount of data a source can send without overwhelming the receiver. To control the flow of data, the receiver needs to send some feedback to the sender both inform the latter it is overwhelmed with data. The network layer does not directly provide any flow control.

Congestion in the network layer is a situation in which too many datagrams are present bin an area of the internet. It may occur if the number of datagrams sends by a source to a destination are beyond the capacity of the network or router. If congestion continues, sometimes a situation may reach a point that collapses the systems and no datagram is delivered.

In this article, we saw the network layer with its working to see the delivery of packets from source to destination. We have also seen the services provided by the network layer and its issues.

This is a guide to Network Layer. Here we discuss the introduction, packet switching, network layer services and issues respectively. You may also have a look at the following articles to learn more

© 2022 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

C Programming, Conditional Constructs, Loops, Arrays, OOPS Concept

By signing up, you agree to ourTerms of UseandPrivacy Policy.

By signing up, you agree to ourTerms of UseandPrivacy Policy.

Web development, programming languages, Software testing & others

By signing up, you agree to ourTerms of UseandPrivacy Policy.

By signing up, you agree to ourTerms of UseandPrivacy Policy.

By signing up, you agree to ourTerms of UseandPrivacy Policy.

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to ourPrivacy Policy

Explore 1000+ varieties of Mock testsView more

Disclaimer: All information on this website is collected from the Internet, which does not represent our opinion. This website is not responsible for its authenticity and legitimacy. If any information violates your rights and interests, please inform us and we will deal with it immediately.