Professional Documents
Culture Documents
Network Layer Samia'
Network Layer Samia'
The entire Internet Protocol suite -- a set of rules and procedures -- is commonly referred to as TCP/IP.
TCP and IP are the two main protocols, though others are included in the suite . The TCP/IP protocol
suite functions as an abstraction layer between internet applications and the routing/switching fabric.
TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications that
identify how it should be broken into packets, addressed, transmitted, routed and received at the
destination. TCP/IP requires little central management, and it is designed to make networks reliable,
with the ability to recover automatically from the failure of any device on the network.
The two main protocols in the Internet Protocol suite serve specific functions. TCP defines how
applications can create channels of communication across a network. It also manages how a message is
assembled into smaller packets before they are then transmitted over the internet and reassembled in
the right order at the destination address.
IP defines how to address and route each packet to make sure it reaches the right destination.
Each gateway computer on the network checks this IP address to determine where to forward the
message.
A subnet mask is what tells a computer, or other network device, what portion of the IP address is used
to represent the network and what part is used to represent hosts (other computers) on the network.
Common protocols of TCP/IP include the following:
Network layer
The network layer is the third level of the Open Systems Interconnection Model (OSI
Model) and the layer that provides data routing paths for network communication. Data
is transferred in the form of packets via logical network paths in an ordered format
controlled by the network layer.
Transport Layer responsibilities
Prerequisite – Layers of OSI Model
Transport Layer is the second layer of the TCP/IP model. It is an end-to-end layer used to deliver
messages to a host. It is termed as an end-to-end layer because it provides a point-to-point
connection rather than hop-to- hop, between the source host and destination host to deliver
the services reliably. The unit of data encapsulation in Transport Layer is a segment.
While Data Link Layer requires the MAC address (48 bits address contained inside the
Network Interface Card of every host machine) of source-destination hosts to correctly
deliver a frame and Network layer requires the IP address for appropriate routing of
packets , in a similar way Transport Layer requires a Port number to correctly deliver the
segments of data to the correct process amongst the multiple processes running on a
particular host. A port number is a 16 bit address used to identify any client-server
program uniquely.
The transport layer is also responsible for creating the end-to-end Connection between
hosts for which it mainly uses TCP and UDP. TCP is a secure, connection- orientated
protocol which uses a handshake protocol to establish a robust connection between two
end- hosts. TCP ensures reliable delivery of messages and is used in various applications.
UDP, on the other hand, is a stateless and unreliable protocol which ensures best-effort
delivery. It is suitable for the applications which have little concern with flow or error
control and requires to send the bulk of data like video conferencing. It is often used in
multicasting protocols.
Multiplexing and Demultiplexing –
Congestion Control –
Congestion is a situation in which too many sources over a network attempt to send data
and the router buffers start overflowing due to which loss of packets occur. As a result
retransmission of packets from the sources increases the congestion further. In this
situation, the Transport layer provides Congestion Control in different ways. It uses open
loop congestion control to prevent the congestion and closed loop congestion control to
remove the congestion in a network once it occurred. TCP provides AIMD- additive
increase multiplicative decrease, leaky bucket technique for congestion control.
Transport layer checks for errors in the messages coming from application layer by using
error detection codes, computing checksums, it checks whether the received data is not
corrupted and uses the ACK and NACK services to inform the sender if the data has
arrived or not and checks for the integrity of data.
Flow control –
The transport layer provides a flow control mechanism between the adjacent layers of the
TCP/IP model. TCP also prevents data loss due to a fast sender and slow receiver by
imposing some flow control techniques. It uses the method of sliding window protocol
which is accomplished by the receiver by sending a window back to the sender informing
the size of data it can receive.
Application layer
An application layer is an abstraction layer that specifies the shared communications
protocols and interface methods used by hosts in a communications
network.The application layer abstraction is used in
both of the standard models of computer
networking: the Internet Protocol Suite (TCP/IP) and
the OSI model.
Call setup: some network architectures require router call setup along path before
data flows
Network Layer – The network layer is responsible for creating routing table, and based on
routing table, forwarding of the input request. Some of the Devices used in Network Layer are,
Routers:
A router is a switch like device that routes/forwards data packets based on their IP
addresses. Routers normally connect Local Area Network (LANs) and Wide Are Network
(WANs) together and have a dynamically updating routing table based on which they
make decisions on routing the incoming packets.
Brouters:
A bridge router or brouter is a network device that works as a bridge and as a router. The
brouter routes packets for known protocols and simply forwards all other packets as a
bridge would. Brouters operate at both the network layer for routable protocols (or
between network with different data link layer protocol ex. one is running on ethernet
(802.3) and other network is running on Token ring (802.5)) and at the data link layer for
non-routable protocols (or both network are using same data link layer protocol).
Figure: Typical interconnection of Router, Switch, Hub and Bridge
Gateways:
In computer networking, a gateway is a component that is part of two networks, which
use different protocols. The gateway is a protocol converter which will translate one
protocol into the other. A router is a special case of a gateway.
Firewall:
A firewall is a system designed to prevent unauthorized access to or from a private
network, some of the functionalities of firewall are, packet filtering and as a proxy server.