SlideShare a Scribd company logo
1 of 7
I NETWORK LAYER
The NetworkLayeristhe thirdlayerof the OSI model.Ithandlesthe service requestsfromthe
transportlayerand furtherforwardsthe service requesttothe data linklayer.The networklayer
translatesthe logical addressesinto physical addresses.
Functionsof Network Layer
DeviceswhichworkonNetworkLayermainlyfocusonrouting.Routingmayinclude varioustasks
aimedtoachieve a single goal.These canbe:
 Addressingdevicesandnetworks.
 Populatingroutingtablesorstaticroutes.
 Queuingincomingandoutgoingdataandthenforwardingthemaccordingtoqualityof
service constraintssetforthose packets.
 Internetworkingbetweentwodifferentsubnets.
 Deliveringpacketstodestinationwithbestefforts.
 Providesconnectionorientedandconnectionlessmechanism.
Network Layer Features
Withits standardfunctionalities,Layer3can provide variousfeaturesas:
 Qualityof service management
 Load balancingandlinkmanagement
 Security
 Interrelationof differentprotocolsand subnetswithdifferentschema.
 Differentlogical networkdesignoverthe physical networkdesign.
 L3 VPN andtunnelscanbe usedtoprovide endtoenddedicated
connectivity.
1.1ROUTING ALGORITHMS:
Types ofRouting
Routingisa processwhichisperformedbylayer3 (or networklayer) devicesinorderto
deliverthe packetbychoosinganoptimal pathfromone networktoanother.
There are 3 typesof routing:
1. Static Routing
2. DefaultRouting
3. DynamicRouting
1. Static routing
Staticroutingis a processinwhichwe have to manuallyaddroutesinroutingtable.
Advantages
 No routingoverheadforrouterCPUwhichmeansa cheaperroutercan be usedto
do routing.
 It addssecuritybecause onlyadministratorcanallow routingtoparticular networks
only.
 No bandwidthusage betweenrouters.
Disadvantage
 For a large network,itisa hectictaskfor administratortomanuallyaddeachroute
for the networkinthe routingtable oneach router.
 The administratorshouldhave goodknowledgeof the topology.If anew
administratorcomes,thenhe hasto manuallyaddeachroute so he shouldhave
verygoodknowledge of the routesof the topology.
2. DefaultRouting
 Thisis the methodwhere the routerisconfiguredtosendall packetstowardsasingle router
(nexthop).
 It doesn’tmattertowhichnetworkthe packetbelongs,itisforwardedouttorouterwhichis
configuredfordefaultrouting.
 It isgenerallyusedwithstubrouters.A stubrouterisa routerwhichhas onlyone route to
reach all othernetworks.
3. DynamicRouting–
Dynamicroutingmakesautomaticadjustmentof the routesaccordingtothe current state of the
route inthe routingtable.Dynamicroutingusesprotocolstodiscovernetworkdestinationsandthe
routesto reachit. RIPand OSPFare the bestexamplesof dynamicroutingprotocol.Automatic
adjustmentwillbe made toreach the networkdestinationif one route goesdown.
3.Dynamic Protocol
A dynamicprotocol have followingfeatures:
 The routersshouldhave the same dynamicprotocol runninginorderto exchange routes.
 Whena router findsachange in the topologythenrouteradvertisesittoall otherrouters.
Advantages
 Easy to configure.
 More effectiveatselectingthe bestroute toa destinationremote networkandalsofor
discoveringremote network.
Disadvantage
 Consumesmore bandwidthforcommunicatingwithotherneighbors.
 Lesssecure than staticrouting.
RoutingProtocols:
The Protocolsare
RIP RoutingInformationProtocol
OSPFOpenShortestPath
BGPBorderGatewayProtocol
RIP:
III CONGESTION CONTROL ALGORITHMS:
What is congestion?
A state occurringin networklayerwhenthe message trafficissoheavythatit slowsdown
networkresponse time.
Effectsof Congestion
 As delayincreases,performance decreases.
 If delayincreases,retransmissionoccurs,makingsituationworse.
 Congestioncontrol algorithms
CongestionControl Technique:
OpenLoop CongestionControl- Openloopcongestioncontrol policiesare appliedtoprevent
congestionbefore ithappens.The congestioncontrol ishandledeitherbythe source or the
destination.
ClosedLoop CongestionControl- Closed-loopcongestioncontrol mechanismstrytoalleviate
congestionafterithappens.Several mechanismshave beenusedbydifferentprotocols.
Leaky Bucket Algorithm
Let usconsideran example tounderstand
Imagine abucketwitha small hole inthe bottom.Nomatterat whatrate waterentersthe
bucket,the outflowisatconstantrate.When the bucketisfull withwateradditional waterentering
spillsoverthe sidesandislost.
Figure(A)
Leaky Bucket
Similarly,eachnetworkinterface containsaleakybucketandthe followingstepsare involvedin
 leaky bucketalgorithm:
Whenhost wantsto sendpacket,packetisthrownintothe bucket.
The bucketleaksata constantrate,meaningthe networkinterface transmitspacketsata constant
rate.
Bursty trafficisconvertedtoa uniformtrafficbythe leakybucket.
In practice the bucketisa finite queuethatoutputsata finite rate.
 Token bucketAlgorithm
Needoftoken bucket Algorithm:-
The leakybucketalgorithmenforcesoutputpatternatthe average rate,nomatterhow burstythe
trafficis.So inorder todeal withthe burstytrafficwe needa flexible algorithmsothatthe data is
not lost.One suchalgorithmistokenbucketalgorithm.
 Stepsof this algorithm can be describedas follows:
 In regularintervalstokensare thrownintothe bucket.ƒ
 The buckethas a maximum capacity.ƒ
 If there is a readypacket,a tokenisremovedfromthe bucket,andthe packetis sent.
 If there is notokeninthe bucket,the packetcannotbe sent.
 Ways inwhich token bucket issuperior to leakybucket:
The leakybucketalgorithmcontrols the rate at whichthe packetsare introducedinthe network,but
it isveryconservative innature.Some flexibilityisintroducedinthe tokenbucketalgorithm.Inthe
tokenbucket,algorithmtokensare generatedateachtick(up to a certainlimit).For anincoming
packetto be transmitted,itmustcapture a tokenandthe transmissiontakesplace atthe same rate.
Hence some of the bustypacketsare transmittedatthe same rate if tokensare available andthus
introducessome amountof flexibilityinthe system.
Formula:M * s = C + ρ * s
where S – istime taken
M – Maximumoutputrate
ρ – Tokenarrival rate
C – Capacityof the tokenbucketinbyte
Figure(b)
Let’sunderstandwithanexample,
In figure (A) we see abucketholdingthree tokens,withfive packetswaitingtobe transmitted.Fora
packetto be transmitted,itmustcapture and destroyone token.Infigure (B) We see thatthree of
the five packetshave gottenthrough,butthe othertwoare stuck waitingformore tokenstobe
generated.
Transport Layer
 The OSI model consistsof sevenprotocol layersandeachlayerperformsasupportive
communicationtask.
 The Transport layeristhe fourthlayerin the OSImodel,whichprovidescommunication
servicesbetweenthe computersconnectedinthe network.
 For example:The transportlayerprovidesanerrorcheckingservice duringthe transmission
of data packetsfromsource computerto destinationcomputer.
 Process-to-ProcessDelivery
 The data linklayerhelpstodeliverthe framesbetweentwoneighboringnodesoveralink.
Thisprocessis calledasnode-to-node delivery.
 The networklayerhelpstodeliverthe datagramsbetweentwohosts.Thisprocessiscalled
as host-to-hostdelivery.
 Several processesare carriedoutonthe source host and destinationhost.Some mechanism
isneededtocomplete the deliveryprocessbetweenthe source hostanddestinationhost.
 The transport layerhelpstocarry out the process-to-processdeliveryi.e.the deliveryof a
packetor part of message fromone processto anotherprocess.

More Related Content

What's hot

A QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCHA QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCHecij
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
 
Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...ijcsit
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...ijait
 
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGY
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGYQoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGY
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGYSyed Nizamudeen
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathIMPULSE_TECHNOLOGY
 
Scaling PageRank to 100 Billion Pages
Scaling PageRank to 100 Billion PagesScaling PageRank to 100 Billion Pages
Scaling PageRank to 100 Billion PagesSubhajit Sahu
 
A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksVishal Sharma, Ph.D.
 
Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...ijngnjournal
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacherySenthilvel S
 
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsEM Legacy
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03hinalala
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsVijay Karan
 
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)Amulya Naik
 

What's hot (20)

A QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCHA QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCH
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
 
Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...
 
Routing basics
Routing basicsRouting basics
Routing basics
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGY
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGYQoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGY
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGY
 
Mpls
MplsMpls
Mpls
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
 
Scaling PageRank to 100 Billion Pages
Scaling PageRank to 100 Billion PagesScaling PageRank to 100 Billion Pages
Scaling PageRank to 100 Billion Pages
 
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
 
A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM Networks
 
10
1010
10
 
Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
 

Similar to Network layer

Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
Fpga implementation of scalable queue manager
Fpga implementation of scalable queue managerFpga implementation of scalable queue manager
Fpga implementation of scalable queue managerIAEME Publication
 
Fpga implementation of scalable queue manager
Fpga implementation of scalable queue managerFpga implementation of scalable queue manager
Fpga implementation of scalable queue manageriaemedu
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingMeenakshiGupta233101
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theKamal Spring
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
Traffic Managers in Stratix II Devices
Traffic Managers in Stratix II DevicesTraffic Managers in Stratix II Devices
Traffic Managers in Stratix II DevicesGautam Kavipurapu
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systemskingGovindi
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
 

Similar to Network layer (20)

Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
StateKeeper Report
StateKeeper ReportStateKeeper Report
StateKeeper Report
 
Fpga implementation of scalable queue manager
Fpga implementation of scalable queue managerFpga implementation of scalable queue manager
Fpga implementation of scalable queue manager
 
Fpga implementation of scalable queue manager
Fpga implementation of scalable queue managerFpga implementation of scalable queue manager
Fpga implementation of scalable queue manager
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
Service mesh
Service meshService mesh
Service mesh
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
F04503057062
F04503057062F04503057062
F04503057062
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
Traffic Managers in Stratix II Devices
Traffic Managers in Stratix II DevicesTraffic Managers in Stratix II Devices
Traffic Managers in Stratix II Devices
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
 

More from Bathshebaparimala

More from Bathshebaparimala (20)

C programming structures & union
C programming structures & unionC programming structures & union
C programming structures & union
 
An enhanced liver stages classification in 3 d ct and 3d-us images using glrl...
An enhanced liver stages classification in 3 d ct and 3d-us images using glrl...An enhanced liver stages classification in 3 d ct and 3d-us images using glrl...
An enhanced liver stages classification in 3 d ct and 3d-us images using glrl...
 
Assessment
AssessmentAssessment
Assessment
 
Normalization
NormalizationNormalization
Normalization
 
Protocols and its standards
Protocols and its standardsProtocols and its standards
Protocols and its standards
 
Unit v
Unit vUnit v
Unit v
 
Hint for transmission media
Hint for transmission mediaHint for transmission media
Hint for transmission media
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 
Creating a rainbow using graphics programming in c
Creating a rainbow using graphics programming in cCreating a rainbow using graphics programming in c
Creating a rainbow using graphics programming in c
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
Assembly language
Assembly languageAssembly language
Assembly language
 
Routing
RoutingRouting
Routing
 
Transport layer
Transport layerTransport layer
Transport layer
 
Generation of Computer Network
Generation of Computer NetworkGeneration of Computer Network
Generation of Computer Network
 
Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
 
Segmentation of Machine learning Algorithm
Segmentation of Machine learning AlgorithmSegmentation of Machine learning Algorithm
Segmentation of Machine learning Algorithm
 
Osireferencemodel
OsireferencemodelOsireferencemodel
Osireferencemodel
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Osi model
Osi modelOsi model
Osi model
 
Relational dbms
Relational dbmsRelational dbms
Relational dbms
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Network layer

  • 1. I NETWORK LAYER The NetworkLayeristhe thirdlayerof the OSI model.Ithandlesthe service requestsfromthe transportlayerand furtherforwardsthe service requesttothe data linklayer.The networklayer translatesthe logical addressesinto physical addresses. Functionsof Network Layer DeviceswhichworkonNetworkLayermainlyfocusonrouting.Routingmayinclude varioustasks aimedtoachieve a single goal.These canbe:  Addressingdevicesandnetworks.  Populatingroutingtablesorstaticroutes.  Queuingincomingandoutgoingdataandthenforwardingthemaccordingtoqualityof service constraintssetforthose packets.  Internetworkingbetweentwodifferentsubnets.  Deliveringpacketstodestinationwithbestefforts.  Providesconnectionorientedandconnectionlessmechanism. Network Layer Features Withits standardfunctionalities,Layer3can provide variousfeaturesas:  Qualityof service management  Load balancingandlinkmanagement  Security  Interrelationof differentprotocolsand subnetswithdifferentschema.  Differentlogical networkdesignoverthe physical networkdesign.  L3 VPN andtunnelscanbe usedtoprovide endtoenddedicated connectivity. 1.1ROUTING ALGORITHMS: Types ofRouting
  • 2. Routingisa processwhichisperformedbylayer3 (or networklayer) devicesinorderto deliverthe packetbychoosinganoptimal pathfromone networktoanother. There are 3 typesof routing: 1. Static Routing 2. DefaultRouting 3. DynamicRouting 1. Static routing Staticroutingis a processinwhichwe have to manuallyaddroutesinroutingtable. Advantages  No routingoverheadforrouterCPUwhichmeansa cheaperroutercan be usedto do routing.  It addssecuritybecause onlyadministratorcanallow routingtoparticular networks only.  No bandwidthusage betweenrouters. Disadvantage  For a large network,itisa hectictaskfor administratortomanuallyaddeachroute for the networkinthe routingtable oneach router.  The administratorshouldhave goodknowledgeof the topology.If anew administratorcomes,thenhe hasto manuallyaddeachroute so he shouldhave verygoodknowledge of the routesof the topology. 2. DefaultRouting  Thisis the methodwhere the routerisconfiguredtosendall packetstowardsasingle router (nexthop).  It doesn’tmattertowhichnetworkthe packetbelongs,itisforwardedouttorouterwhichis configuredfordefaultrouting.  It isgenerallyusedwithstubrouters.A stubrouterisa routerwhichhas onlyone route to reach all othernetworks. 3. DynamicRouting– Dynamicroutingmakesautomaticadjustmentof the routesaccordingtothe current state of the route inthe routingtable.Dynamicroutingusesprotocolstodiscovernetworkdestinationsandthe routesto reachit. RIPand OSPFare the bestexamplesof dynamicroutingprotocol.Automatic adjustmentwillbe made toreach the networkdestinationif one route goesdown. 3.Dynamic Protocol
  • 3. A dynamicprotocol have followingfeatures:  The routersshouldhave the same dynamicprotocol runninginorderto exchange routes.  Whena router findsachange in the topologythenrouteradvertisesittoall otherrouters. Advantages  Easy to configure.  More effectiveatselectingthe bestroute toa destinationremote networkandalsofor discoveringremote network. Disadvantage  Consumesmore bandwidthforcommunicatingwithotherneighbors.  Lesssecure than staticrouting. RoutingProtocols: The Protocolsare RIP RoutingInformationProtocol OSPFOpenShortestPath BGPBorderGatewayProtocol RIP:
  • 4. III CONGESTION CONTROL ALGORITHMS: What is congestion? A state occurringin networklayerwhenthe message trafficissoheavythatit slowsdown networkresponse time. Effectsof Congestion  As delayincreases,performance decreases.  If delayincreases,retransmissionoccurs,makingsituationworse.  Congestioncontrol algorithms CongestionControl Technique: OpenLoop CongestionControl- Openloopcongestioncontrol policiesare appliedtoprevent congestionbefore ithappens.The congestioncontrol ishandledeitherbythe source or the destination. ClosedLoop CongestionControl- Closed-loopcongestioncontrol mechanismstrytoalleviate congestionafterithappens.Several mechanismshave beenusedbydifferentprotocols.
  • 5. Leaky Bucket Algorithm Let usconsideran example tounderstand Imagine abucketwitha small hole inthe bottom.Nomatterat whatrate waterentersthe bucket,the outflowisatconstantrate.When the bucketisfull withwateradditional waterentering spillsoverthe sidesandislost. Figure(A) Leaky Bucket Similarly,eachnetworkinterface containsaleakybucketandthe followingstepsare involvedin  leaky bucketalgorithm: Whenhost wantsto sendpacket,packetisthrownintothe bucket.
  • 6. The bucketleaksata constantrate,meaningthe networkinterface transmitspacketsata constant rate. Bursty trafficisconvertedtoa uniformtrafficbythe leakybucket. In practice the bucketisa finite queuethatoutputsata finite rate.  Token bucketAlgorithm Needoftoken bucket Algorithm:- The leakybucketalgorithmenforcesoutputpatternatthe average rate,nomatterhow burstythe trafficis.So inorder todeal withthe burstytrafficwe needa flexible algorithmsothatthe data is not lost.One suchalgorithmistokenbucketalgorithm.  Stepsof this algorithm can be describedas follows:  In regularintervalstokensare thrownintothe bucket.ƒ  The buckethas a maximum capacity.ƒ  If there is a readypacket,a tokenisremovedfromthe bucket,andthe packetis sent.  If there is notokeninthe bucket,the packetcannotbe sent.  Ways inwhich token bucket issuperior to leakybucket: The leakybucketalgorithmcontrols the rate at whichthe packetsare introducedinthe network,but it isveryconservative innature.Some flexibilityisintroducedinthe tokenbucketalgorithm.Inthe tokenbucket,algorithmtokensare generatedateachtick(up to a certainlimit).For anincoming packetto be transmitted,itmustcapture a tokenandthe transmissiontakesplace atthe same rate. Hence some of the bustypacketsare transmittedatthe same rate if tokensare available andthus introducessome amountof flexibilityinthe system. Formula:M * s = C + ρ * s where S – istime taken M – Maximumoutputrate ρ – Tokenarrival rate C – Capacityof the tokenbucketinbyte Figure(b) Let’sunderstandwithanexample, In figure (A) we see abucketholdingthree tokens,withfive packetswaitingtobe transmitted.Fora packetto be transmitted,itmustcapture and destroyone token.Infigure (B) We see thatthree of
  • 7. the five packetshave gottenthrough,butthe othertwoare stuck waitingformore tokenstobe generated. Transport Layer  The OSI model consistsof sevenprotocol layersandeachlayerperformsasupportive communicationtask.  The Transport layeristhe fourthlayerin the OSImodel,whichprovidescommunication servicesbetweenthe computersconnectedinthe network.  For example:The transportlayerprovidesanerrorcheckingservice duringthe transmission of data packetsfromsource computerto destinationcomputer.  Process-to-ProcessDelivery  The data linklayerhelpstodeliverthe framesbetweentwoneighboringnodesoveralink. Thisprocessis calledasnode-to-node delivery.  The networklayerhelpstodeliverthe datagramsbetweentwohosts.Thisprocessiscalled as host-to-hostdelivery.  Several processesare carriedoutonthe source host and destinationhost.Some mechanism isneededtocomplete the deliveryprocessbetweenthe source hostanddestinationhost.  The transport layerhelpstocarry out the process-to-processdeliveryi.e.the deliveryof a packetor part of message fromone processto anotherprocess.