SlideShare a Scribd company logo
NETWORK LAYER
MODULE II
Network Layer Services
 1. Packetizing
 2. Routing and Forwarding
 3. Other Services
 Expected services are
■ Error Control
■ Flow Control
■ Congestion Control
■ Quality of Service
■ Security
1. Packetizing
 Packetizing: Encapsulating the payload (data received from
upper layer) in a network-layer packet at the source and
decapsulating the payload from the network-layer packet at the
destination.
 Carry a payload from the source to the destination without
changing it or using it.
 If the packet is too large, it is fragmented by the intermediate
routers.
 All the fragments have the same header as the original
(especially source and destination addresses), with small changes
to specify fragments.
 The fragments are reassembled at the destination.
2. Routing and Forwarding
 Routing: In a large network, there will be a number of
routes in between the source and destination devices.
 Network layer finds the best route based on some
specific strategies(load, bandwidth, hops, etc.)
 The strategies are mostly defined by the Routing
protocols.
 The strategies are used to create a decision-making
table, called the routing table for each router.
 Routing is applying strategies and running some routing
protocols to create the decision-making tables for each
router.
Forwarding
 The action applied by a router when a packet arrives at
one of its interfaces.
 Forwarding is done with the help of Forwarding table or
Routing table.
 On receiving a packet at an interface, the router reads
the destination address/label in the incoming packet,
find the output interface number from the table and
forwards the packet.
 The packet forwarding can be;
■ to another attached network (in unicast routing) or
■ to some attached networks (in multicast routing).
FORWARDING TABLE
3.Other Services
 Other services expected from this layer are;
 Error Control
 Flow Control
 Congestion Control
 Quality of Service
 Security
 Error Control: Packets in the network layer may be
fragmented at routers, which makes error checking at
this layer inefficient.
 A checksum field in the datagram controls any
corruption in the header, but not in the whole datagram
Flow Control
 Network layer does not directly provide flow control,
because;
1. To make the network layer at the receiver is so
simple .
2. The upper layers can implement buffers to receive
data from the network layer.
3. Flow control is provided for most of the upper-layer
protocols, so another level of flow control makes the
network layer more complicated and less efficient.
 Congestion Control
■ Congestion: Too many datagrams are present in an area
of the internet.
■ Happens if the number of datagrams sent by source
computers is beyond the capacity of the network or
routers.
■ Hence, some routers may drop some of the datagrams.
■ Due to the error control mechanism at the upper layers,
the sender may send duplicates of the lost packets.
■ If the congestion continues, sometimes the system
collapses and no datagrams are delivered.
 Quality of Service (QoS)
■ To keep the network layer simple and untouched,
QoS is implemented in upper layers.
 Security
■ The network layer was created with no security
provision.
■ To make the network layer secure, a connection
oriented virtual layer service (called IPSec) is
created.
NETWORK LAYER PERFORMANCE
● Can be measured in terms of;
○ Delay
○ Throughput
○ Packet loss
● Congestion control also improves performance.
Delay
 A packet, from its source to its destination,
encounters delays.
 Can be subdivided into;
i. Transmission delay
ii. Propagation delay
iii. Processing delay
iv. Queuing delay.
v. Total Delay
1.(i) Transmission Delay
● A sender puts the bits in a packet on the line one by one.
● If the first bit of the packet is put on the line at time t1 and the last bit is
put on the line at time t2 , transmission delay of the packet is (t2 − t1).
○ Delaytr = (Packet length) / (Transmission rate).
● The longer the packet, the longer the transmission delay.
● Eg: For a Fast Ethernet LAN (100 million bits/sec) with a packet size of
10,000 bits, the transmission delay is (10,000)/(100,000,000) or 100
microseconds
1.(ii) Propagation Delay
● The time taken for a bit to travel from point A to point B in the
transmission media.
○ Delaypg = (Distance) / (Propagation speed).
● Eg: If the distance of a cable link in a point-to-point WAN is 2000 meters
and the propagation speed of the bits in the cable is 2 × 108
meters/second, then the propagation delay is 10 microseconds.
1.(iii) Processing Delay
The time required for a router or a destination host to receive a packet
from its input port, remove the header, perform an error
detectionprocedure, and deliver the packet to the output port (in the case
of a router) or deliver the packet to the upper-layer protocol (in the case of
the destination host).
● May be different for each packet, but normally is calculated as an
average.
○ Delaypr = Time required to process a packet in a router or a
destination host.
1.(iv) Queuing Delay
● Happen in a router.
● A router has an input queue connected to each of its input ports to store
packets waiting to be processed.
● Also an output queue connected to each of its output ports to store
packets waiting to be transmitted.
● Queuing delay is the time a packet waits in the input queue and output
queue of a router.
○ Delayqu = The time a packet waits in input and output queues in a router
1.(v) Total Delay
● The total delay (source-to-destination delay) a packet encounters is the
sum of all the above delays in all the devices and routers that a packet
transfers between the source and destination, including them.
● If there are n routers in between;
○ Total delay = (n + 1) (Delaytr + Delaypg + Delaypr ) + (n) (Delayqu)

More Related Content

Similar to MODULE II.pdf

Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdf
WifiCren
 
tcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppttcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppt
Radwan Mahmoud
 
A018120105
A018120105A018120105
A018120105
IOSR Journals
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
Dr. Shivashankar
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
SushmaShivani
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
ushabarad142
 
unit3-220228110900.pptx
unit3-220228110900.pptxunit3-220228110900.pptx
unit3-220228110900.pptx
LAVANYAsrietacin
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedtingH K
 
Network layer new
Network layer newNetwork layer new
Network layer new
reshmadayma
 
B21DA0201_03.ppt
B21DA0201_03.pptB21DA0201_03.ppt
B21DA0201_03.ppt
DrPreethiD1
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
Destro Destro
 
network devices, types of delay
network devices, types of delaynetwork devices, types of delay
network devices, types of delay
university of Gujrat, pakistan
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
Aalok Shah
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
TharuniDiddekunta
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
Ronoh Kennedy
 

Similar to MODULE II.pdf (20)

Aceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdfAceleracion TCP Mikrotik.pdf
Aceleracion TCP Mikrotik.pdf
 
tcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppttcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppt
 
A018120105
A018120105A018120105
A018120105
 
Lecture set 1
Lecture set 1Lecture set 1
Lecture set 1
 
MODULE-4_CCN.pptx
MODULE-4_CCN.pptxMODULE-4_CCN.pptx
MODULE-4_CCN.pptx
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
unit3-220228110900.pptx
unit3-220228110900.pptxunit3-220228110900.pptx
unit3-220228110900.pptx
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
B21DA0201_03.ppt
B21DA0201_03.pptB21DA0201_03.ppt
B21DA0201_03.ppt
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
network devices, types of delay
network devices, types of delaynetwork devices, types of delay
network devices, types of delay
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
3
33
3
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 

More from ADARSHN40

mc-mod2new.ppt
mc-mod2new.pptmc-mod2new.ppt
mc-mod2new.ppt
ADARSHN40
 
NIM module 1 31122017.pdf
NIM module 1 31122017.pdfNIM module 1 31122017.pdf
NIM module 1 31122017.pdf
ADARSHN40
 
AI in healthcare
AI in healthcare AI in healthcare
AI in healthcare
ADARSHN40
 
unit1-150104123127-conversion-gate01 logistics sople.pdf
unit1-150104123127-conversion-gate01 logistics sople.pdfunit1-150104123127-conversion-gate01 logistics sople.pdf
unit1-150104123127-conversion-gate01 logistics sople.pdf
ADARSHN40
 
PMSE pdf
PMSE pdfPMSE pdf
PMSE pdf
ADARSHN40
 
SE_Module2.pdf
SE_Module2.pdfSE_Module2.pdf
SE_Module2.pdf
ADARSHN40
 
SE_Module1new.ppt
SE_Module1new.pptSE_Module1new.ppt
SE_Module1new.ppt
ADARSHN40
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdf
ADARSHN40
 
Cnetwork
CnetworkCnetwork
Cnetwork
ADARSHN40
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdf
ADARSHN40
 

More from ADARSHN40 (10)

mc-mod2new.ppt
mc-mod2new.pptmc-mod2new.ppt
mc-mod2new.ppt
 
NIM module 1 31122017.pdf
NIM module 1 31122017.pdfNIM module 1 31122017.pdf
NIM module 1 31122017.pdf
 
AI in healthcare
AI in healthcare AI in healthcare
AI in healthcare
 
unit1-150104123127-conversion-gate01 logistics sople.pdf
unit1-150104123127-conversion-gate01 logistics sople.pdfunit1-150104123127-conversion-gate01 logistics sople.pdf
unit1-150104123127-conversion-gate01 logistics sople.pdf
 
PMSE pdf
PMSE pdfPMSE pdf
PMSE pdf
 
SE_Module2.pdf
SE_Module2.pdfSE_Module2.pdf
SE_Module2.pdf
 
SE_Module1new.ppt
SE_Module1new.pptSE_Module1new.ppt
SE_Module1new.ppt
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdf
 
Cnetwork
CnetworkCnetwork
Cnetwork
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdf
 

Recently uploaded

Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 

Recently uploaded (20)

Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 

MODULE II.pdf

  • 2. Network Layer Services  1. Packetizing  2. Routing and Forwarding  3. Other Services  Expected services are ■ Error Control ■ Flow Control ■ Congestion Control ■ Quality of Service ■ Security
  • 3. 1. Packetizing  Packetizing: Encapsulating the payload (data received from upper layer) in a network-layer packet at the source and decapsulating the payload from the network-layer packet at the destination.  Carry a payload from the source to the destination without changing it or using it.  If the packet is too large, it is fragmented by the intermediate routers.  All the fragments have the same header as the original (especially source and destination addresses), with small changes to specify fragments.  The fragments are reassembled at the destination.
  • 4. 2. Routing and Forwarding  Routing: In a large network, there will be a number of routes in between the source and destination devices.  Network layer finds the best route based on some specific strategies(load, bandwidth, hops, etc.)  The strategies are mostly defined by the Routing protocols.  The strategies are used to create a decision-making table, called the routing table for each router.  Routing is applying strategies and running some routing protocols to create the decision-making tables for each router.
  • 5. Forwarding  The action applied by a router when a packet arrives at one of its interfaces.  Forwarding is done with the help of Forwarding table or Routing table.  On receiving a packet at an interface, the router reads the destination address/label in the incoming packet, find the output interface number from the table and forwards the packet.  The packet forwarding can be; ■ to another attached network (in unicast routing) or ■ to some attached networks (in multicast routing).
  • 7. 3.Other Services  Other services expected from this layer are;  Error Control  Flow Control  Congestion Control  Quality of Service  Security  Error Control: Packets in the network layer may be fragmented at routers, which makes error checking at this layer inefficient.  A checksum field in the datagram controls any corruption in the header, but not in the whole datagram
  • 8. Flow Control  Network layer does not directly provide flow control, because; 1. To make the network layer at the receiver is so simple . 2. The upper layers can implement buffers to receive data from the network layer. 3. Flow control is provided for most of the upper-layer protocols, so another level of flow control makes the network layer more complicated and less efficient.
  • 9.  Congestion Control ■ Congestion: Too many datagrams are present in an area of the internet. ■ Happens if the number of datagrams sent by source computers is beyond the capacity of the network or routers. ■ Hence, some routers may drop some of the datagrams. ■ Due to the error control mechanism at the upper layers, the sender may send duplicates of the lost packets. ■ If the congestion continues, sometimes the system collapses and no datagrams are delivered.
  • 10.  Quality of Service (QoS) ■ To keep the network layer simple and untouched, QoS is implemented in upper layers.  Security ■ The network layer was created with no security provision. ■ To make the network layer secure, a connection oriented virtual layer service (called IPSec) is created.
  • 11. NETWORK LAYER PERFORMANCE ● Can be measured in terms of; ○ Delay ○ Throughput ○ Packet loss ● Congestion control also improves performance.
  • 12. Delay  A packet, from its source to its destination, encounters delays.  Can be subdivided into; i. Transmission delay ii. Propagation delay iii. Processing delay iv. Queuing delay. v. Total Delay
  • 13. 1.(i) Transmission Delay ● A sender puts the bits in a packet on the line one by one. ● If the first bit of the packet is put on the line at time t1 and the last bit is put on the line at time t2 , transmission delay of the packet is (t2 − t1). ○ Delaytr = (Packet length) / (Transmission rate). ● The longer the packet, the longer the transmission delay. ● Eg: For a Fast Ethernet LAN (100 million bits/sec) with a packet size of 10,000 bits, the transmission delay is (10,000)/(100,000,000) or 100 microseconds
  • 14. 1.(ii) Propagation Delay ● The time taken for a bit to travel from point A to point B in the transmission media. ○ Delaypg = (Distance) / (Propagation speed). ● Eg: If the distance of a cable link in a point-to-point WAN is 2000 meters and the propagation speed of the bits in the cable is 2 × 108 meters/second, then the propagation delay is 10 microseconds.
  • 15. 1.(iii) Processing Delay The time required for a router or a destination host to receive a packet from its input port, remove the header, perform an error detectionprocedure, and deliver the packet to the output port (in the case of a router) or deliver the packet to the upper-layer protocol (in the case of the destination host). ● May be different for each packet, but normally is calculated as an average. ○ Delaypr = Time required to process a packet in a router or a destination host.
  • 16. 1.(iv) Queuing Delay ● Happen in a router. ● A router has an input queue connected to each of its input ports to store packets waiting to be processed. ● Also an output queue connected to each of its output ports to store packets waiting to be transmitted. ● Queuing delay is the time a packet waits in the input queue and output queue of a router. ○ Delayqu = The time a packet waits in input and output queues in a router
  • 17. 1.(v) Total Delay ● The total delay (source-to-destination delay) a packet encounters is the sum of all the above delays in all the devices and routers that a packet transfers between the source and destination, including them. ● If there are n routers in between; ○ Total delay = (n + 1) (Delaytr + Delaypg + Delaypr ) + (n) (Delayqu)