Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Network Layer and Routing
As discussed in previous chapters the physical layer provides connection sand services to the data link layer while the data link layer is connected with the construction of frames error control flow control and the transmission of frames over the physical circuit connection between computers or even between different types of networks. The frames may have to go through a number of nodes ( computer networks ) which may be connected in different topologies. The network layer entity uses the services of the data link layer and provides services( routing of packets relaying congestion control etc) to its higher layer ( transport) and also to different types of intermediate networks of sub networks. The primary function of the network layer are routing selection of appropriate faults controlling of overloading or congestion of traffic on communication lines. Efficient use of various communication liens, etc. This layer manages network layer connections and provides an end to end reliable packet delivery mechanism. This provides user to user connection for exchange of data between them.
The network layer in the OSI model is also known as the subnet which may run on internet where the network layer runs on interface message processors. The transport layer of the OSI model runs on the horsts. The control and management of the network layer are provided by different organization in different countries such as PTT. At and t etc PTT is very poplar in European countries and undeveloped countries . thus the network layer not only provides services to the transport layer an different sub networks but also defines an interface and connection different hosts and different type of networks.
shows a simple network with two hosts. H1 and H2. And several routers on the path between H1 and H2. Suppose that H1. Is sending information to H2.and consider the role of the network layer in these hosts and in the intervening grouters. The network layer in H1 takes segments from the transport layer inH1. Encapsulated each segment into a datagram ( that is a network layer packet) and then starts the datagram's on their journey to their destination that is it sends the datagram's to its nearby router R1. At the receiving host H2. The network receiver the datagram's from its nearly router R2 extracts the transport layer segments and delivers the segments up to the transport layer atH2 the primary role of the routers is to forward datagram's from input links to output links. Note that the routers in figure are show with a truncated protocols stack that is with no upper layers above the network because router do not run application and transport layer protocols.
What is CRC The CRC is computed while transmission and appended to output stream as soon as last bit goes out onto wire. If the CRC were in header, it will be necessary to make
Distance covered, Based on size, ownership and physical architecture - LAN (Local Area Network) - Suitable for smaller geographical area - MAN (Metropolitan Area Network) - S
Circuit switching is a term used in communication where the communicating nodes will be connected through a dedicated channel before any communication may take place. The methodolo
Features 1. Simple to install; 2. Simple to configure; 3. Multiple applications from one user can implement; 4. Multiple users can each use PVM concurrently; 5. C, C++, and
What is NOS? NOS, or Network Operating System, are specialized software whose major task is to give network connectivity to a computer in order for it to be able to converse wi
is DVMRP multicast prtocol supports IPV6?
LAN Topologies The term topology explains the geographic arrangement of networking devices. It explains the actual layout of the network hardware. Given the location of worksta
What is ESP (Encapsulating Security Payload)?
State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain
Algorithm: Odd-Even Transposition //Input: N numbers that are in the unsorted form //Assume that element bi is assigned to pi for I=1 to N { If (I%2 != 0) //i.e Odd
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd