Show the network layer in an internetwork, Computer Networking

Assignment Help:

Q. Show the Network layer in an internetwork?

- Receives data from Transport layer

- Responsible for creating Packet

- Each packet contains

- Universal Address of Source

- Universal Address of Destination

- Makes sure the pkt is correct size.

- If the packet is too large,

- Then it will be fragmented

- Also add fields for error control

159_Show the Network layer in an internetwork.png

Figure Network layer at a Router

- Responsible for routing the packet

- When packet arrives, router finds the interface from which the pkt must be sent.

- This is done by utilizing routing Table.

- If necessary, perform fragmentation

Network layer at the destination

258_Show the Network layer in an internetwork1.png

- Responsible for Address Verification.

- Ensure the destination is correct.

- As well checks to see the packet has been corrupted during transmission.

- If corrupted then discards the packet.

- If the packet is fragment, it waits all fragments have arrived


Related Discussions:- Show the network layer in an internetwork

Medium earth orbiting satellite, Medium Earth Orbiting satellite is an orbi...

Medium Earth Orbiting satellite is an orbit which is located just above the few hundred miles to a few thousands above the earth surface. It is of higher advantage than Low orbit s

Connection, how to connect two pc in lan?

how to connect two pc in lan?

Wifi and 3g, what is similarity of wifi and 3g

what is similarity of wifi and 3g

Introduction to performance evaluations, INTRODUCTION In this part, th...

INTRODUCTION In this part, the topic of performance evaluation shows those parameters that are devised to calculate the performances of various parallel systems. Achieving the

One basic component is the network device, QUESTION 1. A system analyst...

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

Disadvantages - point to point , Disadvantages You typically  would  no...

Disadvantages You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages. a. Low securit

Security and reciprocity of RSA, Q. Security and Reciprocity of RSA? S...

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Basic working of spanning tree, Q. Basic working of Spanning Tree? Spa...

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

Show the use of flow control, Q. Show the Use of flow control? Flow co...

Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control

Matlab chi square functioning, Create a custom chi-square function in matla...

Create a custom chi-square function in matlab, MATLAB in Statistics

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd