SlideShare a Scribd company logo
NETWORK LAYER
MODULE II
Network Layer Services
 1. Packetizing
 2. Routing and Forwarding
 3. Other Services
 Expected services are
■ Error Control
■ Flow Control
■ Congestion Control
■ Quality of Service
■ Security
1. Packetizing
 Packetizing: Encapsulating the payload (data received from
upper layer) in a network-layer packet at the source and
decapsulating the payload from the network-layer packet at the
destination.
 Carry a payload from the source to the destination without
changing it or using it.
 If the packet is too large, it is fragmented by the intermediate
routers.
 All the fragments have the same header as the original
(especially source and destination addresses), with small changes
to specify fragments.
 The fragments are reassembled at the destination.
2. Routing and Forwarding
 Routing: In a large network, there will be a number of
routes in between the source and destination devices.
 Network layer finds the best route based on some
specific strategies(load, bandwidth, hops, etc.)
 The strategies are mostly defined by the Routing
protocols.
 The strategies are used to create a decision-making
table, called the routing table for each router.
 Routing is applying strategies and running some routing
protocols to create the decision-making tables for each
router.
Forwarding
 The action applied by a router when a packet arrives at
one of its interfaces.
 Forwarding is done with the help of Forwarding table or
Routing table.
 On receiving a packet at an interface, the router reads
the destination address/label in the incoming packet,
find the output interface number from the table and
forwards the packet.
 The packet forwarding can be;
■ to another attached network (in unicast routing) or
■ to some attached networks (in multicast routing).
FORWARDING TABLE
3.Other Services
 Other services expected from this layer are;
 Error Control
 Flow Control
 Congestion Control
 Quality of Service
 Security
 Error Control: Packets in the network layer may be
fragmented at routers, which makes error checking at
this layer inefficient.
 A checksum field in the datagram controls any
corruption in the header, but not in the whole datagram
Flow Control
 Network layer does not directly provide flow control,
because;
1. To make the network layer at the receiver is so
simple .
2. The upper layers can implement buffers to receive
data from the network layer.
3. Flow control is provided for most of the upper-layer
protocols, so another level of flow control makes the
network layer more complicated and less efficient.
 Congestion Control
■ Congestion: Too many datagrams are present in an area
of the internet.
■ Happens if the number of datagrams sent by source
computers is beyond the capacity of the network or
routers.
■ Hence, some routers may drop some of the datagrams.
■ Due to the error control mechanism at the upper layers,
the sender may send duplicates of the lost packets.
■ If the congestion continues, sometimes the system
collapses and no datagrams are delivered.
 Quality of Service (QoS)
■ To keep the network layer simple and untouched,
QoS is implemented in upper layers.
 Security
■ The network layer was created with no security
provision.
■ To make the network layer secure, a connection
oriented virtual layer service (called IPSec) is
created.
NETWORK LAYER PERFORMANCE
● Can be measured in terms of;
○ Delay
○ Throughput
○ Packet loss
● Congestion control also improves performance.
Delay
 A packet, from its source to its destination,
encounters delays.
 Can be subdivided into;
i. Transmission delay
ii. Propagation delay
iii. Processing delay
iv. Queuing delay.
v. Total Delay
1.(i) Transmission Delay
● A sender puts the bits in a packet on the line one by one.
● If the first bit of the packet is put on the line at time t1 and the last bit is
put on the line at time t2 , transmission delay of the packet is (t2 − t1).
○ Delaytr = (Packet length) / (Transmission rate).
● The longer the packet, the longer the transmission delay.
● Eg: For a Fast Ethernet LAN (100 million bits/sec) with a packet size of
10,000 bits, the transmission delay is (10,000)/(100,000,000) or 100
microseconds
1.(ii) Propagation Delay
● The time taken for a bit to travel from point A to point B in the
transmission media.
○ Delaypg = (Distance) / (Propagation speed).
● Eg: If the distance of a cable link in a point-to-point WAN is 2000 meters
and the propagation speed of the bits in the cable is 2 × 108
meters/second, then the propagation delay is 10 microseconds.
1.(iii) Processing Delay
The time required for a router or a destination host to receive a packet
from its input port, remove the header, perform an error
detectionprocedure, and deliver the packet to the output port (in the case
of a router) or deliver the packet to the upper-layer protocol (in the case of
the destination host).
● May be different for each packet, but normally is calculated as an
average.
○ Delaypr = Time required to process a packet in a router or a
destination host.
1.(iv) Queuing Delay
● Happen in a router.
● A router has an input queue connected to each of its input ports to store
packets waiting to be processed.
● Also an output queue connected to each of its output ports to store
packets waiting to be transmitted.
● Queuing delay is the time a packet waits in the input queue and output
queue of a router.
○ Delayqu = The time a packet waits in input and output queues in a router
1.(v) Total Delay
● The total delay (source-to-destination delay) a packet encounters is the
sum of all the above delays in all the devices and routers that a packet
transfers between the source and destination, including them.
● If there are n routers in between;
○ Total delay = (n + 1) (Delaytr + Delaypg + Delaypr ) + (n) (Delayqu)

More Related Content

Similar to MODULE II.pdf (20)

PPTX
Unit 1 Circuit and Packet Switching.pptx
Vikas Goyal
 
PDF
Network layer (Unit 3) part1.pdf
BharatiPatelPhDStude
 
PPT
A427 nic card
surajbhai
 
PDF
Aceleracion TCP Mikrotik.pdf
WifiCren
 
PPT
tcp-wireless-tutorial.ppt
Radwan Mahmoud
 
PDF
A018120105
IOSR Journals
 
PPTX
unit 3 computer networks-switching,packet switching,internet protocol.
venigkrish89
 
PPTX
CS3591- Computer Networks Unit-2 Transport layer
LOGANATHANK24
 
PDF
Lecture set 1
Gopi Saiteja
 
PPTX
MODULE-4_CCN.pptx
Dr. Shivashankar
 
PDF
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
PPT
9_Network.ppt
SushmaShivani
 
PPTX
Application Layer in Computer Networks part 2
NatarajC5
 
PPTX
switching multiple access control data communication
krishnakumararunacha5
 
PPT
Chapter 4
ushabarad142
 
PPTX
unit3-220228110900.pptx
LAVANYAsrietacin
 
PDF
Ip protocol tedting
H K
 
PPTX
Network layer new
reshmadayma
 
PPT
B21DA0201_03.ppt
DrPreethiD1
 
PPTX
Transport Layer In Computer Network
Destro Destro
 
Unit 1 Circuit and Packet Switching.pptx
Vikas Goyal
 
Network layer (Unit 3) part1.pdf
BharatiPatelPhDStude
 
A427 nic card
surajbhai
 
Aceleracion TCP Mikrotik.pdf
WifiCren
 
tcp-wireless-tutorial.ppt
Radwan Mahmoud
 
A018120105
IOSR Journals
 
unit 3 computer networks-switching,packet switching,internet protocol.
venigkrish89
 
CS3591- Computer Networks Unit-2 Transport layer
LOGANATHANK24
 
Lecture set 1
Gopi Saiteja
 
MODULE-4_CCN.pptx
Dr. Shivashankar
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
9_Network.ppt
SushmaShivani
 
Application Layer in Computer Networks part 2
NatarajC5
 
switching multiple access control data communication
krishnakumararunacha5
 
Chapter 4
ushabarad142
 
unit3-220228110900.pptx
LAVANYAsrietacin
 
Ip protocol tedting
H K
 
Network layer new
reshmadayma
 
B21DA0201_03.ppt
DrPreethiD1
 
Transport Layer In Computer Network
Destro Destro
 

More from ADARSHN40 (10)

PPT
mc-mod2new.ppt
ADARSHN40
 
PDF
NIM module 1 31122017.pdf
ADARSHN40
 
PPTX
AI in healthcare
ADARSHN40
 
PDF
unit1-150104123127-conversion-gate01 logistics sople.pdf
ADARSHN40
 
PDF
PMSE pdf
ADARSHN40
 
PDF
SE_Module2.pdf
ADARSHN40
 
PPT
SE_Module1new.ppt
ADARSHN40
 
PDF
CN 5151(15) Module I part 1.3 21072020.pdf
ADARSHN40
 
PDF
Cnetwork
ADARSHN40
 
PDF
CN 5151(15) Module II part 2 13082020.pdf
ADARSHN40
 
mc-mod2new.ppt
ADARSHN40
 
NIM module 1 31122017.pdf
ADARSHN40
 
AI in healthcare
ADARSHN40
 
unit1-150104123127-conversion-gate01 logistics sople.pdf
ADARSHN40
 
PMSE pdf
ADARSHN40
 
SE_Module2.pdf
ADARSHN40
 
SE_Module1new.ppt
ADARSHN40
 
CN 5151(15) Module I part 1.3 21072020.pdf
ADARSHN40
 
Cnetwork
ADARSHN40
 
CN 5151(15) Module II part 2 13082020.pdf
ADARSHN40
 
Ad

Recently uploaded (20)

PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays
 
PPTX
apidays Singapore 2025 - Designing for Change, Julie Schiller (Google)
apidays
 
PPTX
Module-5-Measures-of-Central-Tendency-Grouped-Data-1.pptx
lacsonjhoma0407
 
PPTX
apidays Helsinki & North 2025 - API access control strategies beyond JWT bear...
apidays
 
PPTX
apidays Helsinki & North 2025 - From Chaos to Clarity: Designing (AI-Ready) A...
apidays
 
PDF
R Cookbook - Processing and Manipulating Geological spatial data with R.pdf
OtnielSimopiaref2
 
PDF
AUDITABILITY & COMPLIANCE OF AI SYSTEMS IN HEALTHCARE
GAHI Youssef
 
PPTX
Numbers of a nation: how we estimate population statistics | Accessible slides
Office for National Statistics
 
PPTX
SlideEgg_501298-Agentic AI.pptx agentic ai
530BYManoj
 
PPTX
apidays Helsinki & North 2025 - Vero APIs - Experiences of API development in...
apidays
 
PPTX
ER_Model_Relationship_in_DBMS_Presentation.pptx
dharaadhvaryu1992
 
PDF
Product Management in HealthTech (Case Studies from SnappDoctor)
Hamed Shams
 
PDF
Web Scraping with Google Gemini 2.0 .pdf
Tamanna
 
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays
 
PDF
The European Business Wallet: Why It Matters and How It Powers the EUDI Ecosy...
Lal Chandran
 
PDF
Driving Employee Engagement in a Hybrid World.pdf
Mia scott
 
PDF
apidays Helsinki & North 2025 - API-Powered Journeys: Mobility in an API-Driv...
apidays
 
PDF
Development and validation of the Japanese version of the Organizational Matt...
Yoga Tokuyoshi
 
PPT
AI Future trends and opportunities_oct7v1.ppt
SHIKHAKMEHTA
 
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays
 
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays
 
apidays Singapore 2025 - Designing for Change, Julie Schiller (Google)
apidays
 
Module-5-Measures-of-Central-Tendency-Grouped-Data-1.pptx
lacsonjhoma0407
 
apidays Helsinki & North 2025 - API access control strategies beyond JWT bear...
apidays
 
apidays Helsinki & North 2025 - From Chaos to Clarity: Designing (AI-Ready) A...
apidays
 
R Cookbook - Processing and Manipulating Geological spatial data with R.pdf
OtnielSimopiaref2
 
AUDITABILITY & COMPLIANCE OF AI SYSTEMS IN HEALTHCARE
GAHI Youssef
 
Numbers of a nation: how we estimate population statistics | Accessible slides
Office for National Statistics
 
SlideEgg_501298-Agentic AI.pptx agentic ai
530BYManoj
 
apidays Helsinki & North 2025 - Vero APIs - Experiences of API development in...
apidays
 
ER_Model_Relationship_in_DBMS_Presentation.pptx
dharaadhvaryu1992
 
Product Management in HealthTech (Case Studies from SnappDoctor)
Hamed Shams
 
Web Scraping with Google Gemini 2.0 .pdf
Tamanna
 
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays
 
The European Business Wallet: Why It Matters and How It Powers the EUDI Ecosy...
Lal Chandran
 
Driving Employee Engagement in a Hybrid World.pdf
Mia scott
 
apidays Helsinki & North 2025 - API-Powered Journeys: Mobility in an API-Driv...
apidays
 
Development and validation of the Japanese version of the Organizational Matt...
Yoga Tokuyoshi
 
AI Future trends and opportunities_oct7v1.ppt
SHIKHAKMEHTA
 
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays
 
Ad

MODULE II.pdf

  • 2. Network Layer Services  1. Packetizing  2. Routing and Forwarding  3. Other Services  Expected services are ■ Error Control ■ Flow Control ■ Congestion Control ■ Quality of Service ■ Security
  • 3. 1. Packetizing  Packetizing: Encapsulating the payload (data received from upper layer) in a network-layer packet at the source and decapsulating the payload from the network-layer packet at the destination.  Carry a payload from the source to the destination without changing it or using it.  If the packet is too large, it is fragmented by the intermediate routers.  All the fragments have the same header as the original (especially source and destination addresses), with small changes to specify fragments.  The fragments are reassembled at the destination.
  • 4. 2. Routing and Forwarding  Routing: In a large network, there will be a number of routes in between the source and destination devices.  Network layer finds the best route based on some specific strategies(load, bandwidth, hops, etc.)  The strategies are mostly defined by the Routing protocols.  The strategies are used to create a decision-making table, called the routing table for each router.  Routing is applying strategies and running some routing protocols to create the decision-making tables for each router.
  • 5. Forwarding  The action applied by a router when a packet arrives at one of its interfaces.  Forwarding is done with the help of Forwarding table or Routing table.  On receiving a packet at an interface, the router reads the destination address/label in the incoming packet, find the output interface number from the table and forwards the packet.  The packet forwarding can be; ■ to another attached network (in unicast routing) or ■ to some attached networks (in multicast routing).
  • 7. 3.Other Services  Other services expected from this layer are;  Error Control  Flow Control  Congestion Control  Quality of Service  Security  Error Control: Packets in the network layer may be fragmented at routers, which makes error checking at this layer inefficient.  A checksum field in the datagram controls any corruption in the header, but not in the whole datagram
  • 8. Flow Control  Network layer does not directly provide flow control, because; 1. To make the network layer at the receiver is so simple . 2. The upper layers can implement buffers to receive data from the network layer. 3. Flow control is provided for most of the upper-layer protocols, so another level of flow control makes the network layer more complicated and less efficient.
  • 9.  Congestion Control ■ Congestion: Too many datagrams are present in an area of the internet. ■ Happens if the number of datagrams sent by source computers is beyond the capacity of the network or routers. ■ Hence, some routers may drop some of the datagrams. ■ Due to the error control mechanism at the upper layers, the sender may send duplicates of the lost packets. ■ If the congestion continues, sometimes the system collapses and no datagrams are delivered.
  • 10.  Quality of Service (QoS) ■ To keep the network layer simple and untouched, QoS is implemented in upper layers.  Security ■ The network layer was created with no security provision. ■ To make the network layer secure, a connection oriented virtual layer service (called IPSec) is created.
  • 11. NETWORK LAYER PERFORMANCE ● Can be measured in terms of; ○ Delay ○ Throughput ○ Packet loss ● Congestion control also improves performance.
  • 12. Delay  A packet, from its source to its destination, encounters delays.  Can be subdivided into; i. Transmission delay ii. Propagation delay iii. Processing delay iv. Queuing delay. v. Total Delay
  • 13. 1.(i) Transmission Delay ● A sender puts the bits in a packet on the line one by one. ● If the first bit of the packet is put on the line at time t1 and the last bit is put on the line at time t2 , transmission delay of the packet is (t2 − t1). ○ Delaytr = (Packet length) / (Transmission rate). ● The longer the packet, the longer the transmission delay. ● Eg: For a Fast Ethernet LAN (100 million bits/sec) with a packet size of 10,000 bits, the transmission delay is (10,000)/(100,000,000) or 100 microseconds
  • 14. 1.(ii) Propagation Delay ● The time taken for a bit to travel from point A to point B in the transmission media. ○ Delaypg = (Distance) / (Propagation speed). ● Eg: If the distance of a cable link in a point-to-point WAN is 2000 meters and the propagation speed of the bits in the cable is 2 × 108 meters/second, then the propagation delay is 10 microseconds.
  • 15. 1.(iii) Processing Delay The time required for a router or a destination host to receive a packet from its input port, remove the header, perform an error detectionprocedure, and deliver the packet to the output port (in the case of a router) or deliver the packet to the upper-layer protocol (in the case of the destination host). ● May be different for each packet, but normally is calculated as an average. ○ Delaypr = Time required to process a packet in a router or a destination host.
  • 16. 1.(iv) Queuing Delay ● Happen in a router. ● A router has an input queue connected to each of its input ports to store packets waiting to be processed. ● Also an output queue connected to each of its output ports to store packets waiting to be transmitted. ● Queuing delay is the time a packet waits in the input queue and output queue of a router. ○ Delayqu = The time a packet waits in input and output queues in a router
  • 17. 1.(v) Total Delay ● The total delay (source-to-destination delay) a packet encounters is the sum of all the above delays in all the devices and routers that a packet transfers between the source and destination, including them. ● If there are n routers in between; ○ Total delay = (n + 1) (Delaytr + Delaypg + Delaypr ) + (n) (Delayqu)