SlideShare a Scribd company logo
NETWORK LAYER
TOPICS:
NETWORK LAYER
NETWORK LAYER DESIGN ISSUES
ROUTING ALGORITHMS,
M Indraja,Assistant Prof,RGUKT-Srikakulam. 1
What is network layer ?
It is responsible for the source to destination delivery of a packets across multiple networks.
Routing:-
It Provide a mechanism to transmit data over independent networks that are linked
together.
Logical addressing:-
Adds Logical addresses of sender and Receiver.
The network layer also defines how to fragment a packet into smaller packets to
accommodate different media.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 2
Network layer Design Issues:
Store-and-forward packet switching
Services provided to transport layer
Implementation of connectionless service
Implementation of connection-oriented service
Comparison of virtual-circuit and datagram networks
M Indraja,Assistant Prof,RGUKT-Srikakulam. 3
Store-and-forward packet switching:
In this store and forward packet switching can be used for packet(message from
source to destination).
In this 1st design issues explore about the
 How routing was happening in the network ?
 How to store the packet in a router ? and
 Analysis to forward the packet by host to host.
 So, here we discuss about the ISP and different host networks.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 4
Store-and-forward packet switching: (conti..)
 In this one of the major components of the network is ISP’s (Internet Services
Providers) equipment (routers connected by transmission lines).
 Host H1 is directly connected to one of the ISP’s routers. Host H2 is on a LAN, it
might be an office Ethernet, with a router “F” owned and operated by the
customer’s. The “F” is outside the oval because is does not belong to the ISP.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 5
 The host with a packet to send transmits it to the nearest router, either on its own
LAN or over a point-to-point link to the ISP.
 The packet is stored there until it has fully arrived and the link has finished its
processing by verifying the checksum.
 Then it is forwarded to the next router along the path until it reaches the
destination host, where it is delivered. This mechanism is store-and-forward
packet switching.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 6
Services Provided to the Transport Layer:
It provides services at network layer transport layer interface
It is the interface between carrier and customer i.e, the subnet boundary,
Its job is to deliver packets given to it by customers.
The network layer services are designed with the following goals:
 The Services should be independent of router technology.
 The transport layer should be shielded from number, type, topology of routers.
 The network addresses made available to the transport layer should use a uniform numbering plan,
even across LANs and WANs
M Indraja,Assistant Prof,RGUKT-Srikakulam. 7
M Indraja,Assistant Prof,RGUKT-Srikakulam. 8
Implementation of Connectionless Service:
If connectionless service is offered, packets are injected into the network individually and routed
independently of each other.
No advance setup is needed. In this context, the packets are frequently called datagrams (in analogy
with telegrams) and the network is called a datagram network.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 9
M Indraja,Assistant Prof,RGUKT-Srikakulam. 10
 In this the process p1 has a long message for p2.So, in hands the message to the transport layer with
instructions to deliver it to process p2 on host h2. The transport layer sends data to network layer within
operating system.
 The above diagram and table representing the message is four times longer than the maximum packet size,
so the network layer has to break it into four packets, 1,2,3 and 4 and send each of the them in turn to
router A using some point-to-point protocol, for example, PPP.
 At this point the ISP takes over. Every router has an internal table telling it where to send packets for each
of the possible destinations. Each table entry is a pair consisting of a destination and the outgoing line to
use for that destination. Only directly connected lines can be used.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 11
Implementation of Connection-Oriented Service:
 The implementation of connection-oriented service, we need a virtual circuit
network.
 A connection is established, a route from the source machine to the destination
machine is chosen as part of the connection setup and stored in tables inside the
routers.
 The router should maintain a traffic flow (it may like a telephone system works) .
 When the connection is released, the VC is also terminated. By connection-
oriented service, each packet carries a identifier telling which vc it belongs to.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 12
If Host h1 has established connection
1 with host h2.The connection
remembered as the first entry in the
each of the routing tables.
So, the first line of A’s table says that
if a packet bearing connection
identifier 1 comes in from H1, it is to
be sent to router C and given
connection identifier 1.
 Similarly, the first entry at C routes
the packet to E, also with connection
identifier 1.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 13
 let us consider what happens if H3 also wants to establish a connection to H2. It chooses
connection identifier 1 (because it is initiating the connection and this is its only
connection) and tells the network to establish the virtual circuit.
 This leads to the second row in the tables. Note that we have a conflict here because
although A can easily distinguish connection 1 packets from H1 from connection 1
packets from H3, C cannot do this. For this reason, A assigns a different connection
identifier to the outgoing traffic for the second connection.
 Avoiding conflicts of this kind is why routers need the ability to replace connection
identifiers in outgoing packets. This process is called label switching.
 Ex: A connection-oriented network service is MPLS (MultiProtocol Label Switching).It
is used within ISP networks in the Internet, with IP packets wrapped in an MPLS header
having a 20-bit connection identifier or label.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 14
Comparison of Virtual-Circuit and Datagram Networks:
Both virtual circuits and datagrams have their supporters and their detractors.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 15
Routing Algorithms:
 It is the process of selecting best paths in a network.
 Routing is performed for All kind of Networks.
Technically:
 It is the process of determining, selecting the best outgoing path that a packet has to take in a network.
Two Types of Routings:
 They are Static (Non Adaptive)
 Dynamic (Adaptive)
M Indraja,Assistant Prof,RGUKT-Srikakulam. 16
Static and Dynamic
Non Adaptive:
Routing decisions computed in advance, off-line and downloaded
Adaptive:
To changes in topology and Get Information (locally, from adjacent routers, from all routers)
M Indraja,Assistant Prof,RGUKT-Srikakulam. 17
Shortest Path Algorithm:
 Routing algorithms with a simple technique for computing optimal paths given a complete picture of the
network.
 The idea is to build a graph of the network, with each node of the graph representing a router.
 Each edge of the graph representing a communication line or link.
 When ever a shortest path is discovered, the table is updated. Such that it may be useful for the future.
 The easiest way to find out the shortest path is to count the no.of hops.
 The shortest path may be calculated by adding up the labels next to the nodes.These lables may be the
function of: distance, bandwidth, average traffic, communication cost, mean queue length and other factors.
 ABC is clearly much longer than ABE.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 18
M Indraja,Assistant Prof,RGUKT-Srikakulam. 19
Flooding :
This adapts the technique in which every incoming packet is sent on every outgoing line except from which it arrived.
One problem with this is that packets may go in loop and as a result of which a node may receive duplicate packets.
These problems can be overcome with the help of sequence numbers, hop count and spanning tree.
Every packet is sent out on every outgoing line except the one it arrived at.
M Indraja,Assistant Prof,RGUKT-Srikakulam. 20
Distances Vector Routing:
 A distance vector routing algorithm operates by having each router maintain a table (i.e., a vector) giving the best known distance to
each destination and which link to use to get there. These tables are updated by exchanging information with the neighbors. Eventually,
every router knows the best link to reach each destination.
 The distance vector routing algorithm is sometimes called by other names, most commonly the distributed Bellman-Ford routing
algorithm, after the researchers who developed it (Bellman, 1957; and Ford and Fulkerson, 1962). It was the original ARPANET routing
algorithm and was also used in the Internet under the name RIP (Routing Information Protocol)
 In distance vector routing, each router maintains a routing table indexed by, and containing one entry for each router in the network. This
entry has two parts:
1. The preferred outgoing line to use for that destination and an estimate of the distance to that destination.
2. The distance might be measured as the number of hops or using another metric, as we discussed for computing shortest paths
M Indraja,Assistant Prof,RGUKT-Srikakulam. 21
M Indraja,Assistant Prof,RGUKT-Srikakulam. 22

More Related Content

PPTX
Physical Layer of ISO-OSI model and Devices
PDF
Wireless Network Architecture
PPTX
Networking devices
PPTX
Network Layer
PPT
data-link layer protocols
PPTX
Las 7 Capas OSI, SWITCH, ROUTER, ADAPTADOR NIC,
PDF
W-LAN (Wireless Local Area Network)
PDF
Fault tolerance
Physical Layer of ISO-OSI model and Devices
Wireless Network Architecture
Networking devices
Network Layer
data-link layer protocols
Las 7 Capas OSI, SWITCH, ROUTER, ADAPTADOR NIC,
W-LAN (Wireless Local Area Network)
Fault tolerance

What's hot (20)

PPTX
Virtual LAN
PPTX
Computer Network - Network Layer
PDF
Spanning tree protocol (stp)
PPTX
Networking basics
PPTX
Network layer
PDF
Networking devices
PPT
Ethernet protocol
PDF
Handoff in cellular systems
PPT
OSI 7 Layer Model
PPT
iso osi model
PPTX
Routing Protocols.pptx
PPT
Network devices
PPT
Transport protocols
PPTX
Ip address presentation
PPTX
Network devices
PPTX
PPTX
Physical Layer
PDF
FIREWALL
PPTX
Physical and logical topologies in computer network and client server
PPTX
Bridging in Networking
Virtual LAN
Computer Network - Network Layer
Spanning tree protocol (stp)
Networking basics
Network layer
Networking devices
Ethernet protocol
Handoff in cellular systems
OSI 7 Layer Model
iso osi model
Routing Protocols.pptx
Network devices
Transport protocols
Ip address presentation
Network devices
Physical Layer
FIREWALL
Physical and logical topologies in computer network and client server
Bridging in Networking
Ad

Similar to Network layer u3 (20)

PDF
Network layer (Unit 3) part1.pdf
PPTX
Network layer new
PDF
Opportunistic Data Forwarding in Manet
PDF
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
PPTX
Unit 3 Network layer and protocols.pptx
PPTX
Computer networks for cse Unit-3 (1).pptx
PPTX
Network Layer
DOCX
Data Communication and Networking(DCACN)
PDF
Ip protocol tedting
 
PPTX
Computer Networks
PDF
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
PDF
An Insight on Routing
PDF
Be31390392
PDF
E1073644
PDF
International Journal of Engineering Research and Development
PDF
Mq3624532158
PDF
Destination Aware APU Strategy for Geographic Routing in MANET
PDF
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PDF
An Even Data-Distribution Protocolfor Highly Dynamic VANET
PDF
CN WEEK 11.pdf
Network layer (Unit 3) part1.pdf
Network layer new
Opportunistic Data Forwarding in Manet
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Unit 3 Network layer and protocols.pptx
Computer networks for cse Unit-3 (1).pptx
Network Layer
Data Communication and Networking(DCACN)
Ip protocol tedting
 
Computer Networks
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
An Insight on Routing
Be31390392
E1073644
International Journal of Engineering Research and Development
Mq3624532158
Destination Aware APU Strategy for Geographic Routing in MANET
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
An Even Data-Distribution Protocolfor Highly Dynamic VANET
CN WEEK 11.pdf
Ad

More from IndrajaMeghavathula (9)

PDF
Networking Technologies Basic's complete notes
PPTX
Multiple access protocol
PPTX
Data link layer
PPTX
Basics of Computer Networks
PPTX
Cache memory
PPTX
Memory Unit
PDF
Arithmetic and logic unit Continue...
PDF
Arithmetic and logic unit
PDF
computer organization and architecture
Networking Technologies Basic's complete notes
Multiple access protocol
Data link layer
Basics of Computer Networks
Cache memory
Memory Unit
Arithmetic and logic unit Continue...
Arithmetic and logic unit
computer organization and architecture

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Business Ethics Teaching Materials for college
PDF
Classroom Observation Tools for Teachers
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
VCE English Exam - Section C Student Revision Booklet
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Basic Mud Logging Guide for educational purpose
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Module 4: Burden of Disease Tutorial Slides S2 2025
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Anesthesia in Laparoscopic Surgery in India
human mycosis Human fungal infections are called human mycosis..pptx
TR - Agricultural Crops Production NC III.pdf
RMMM.pdf make it easy to upload and study
Business Ethics Teaching Materials for college
Classroom Observation Tools for Teachers

Network layer u3

  • 1. NETWORK LAYER TOPICS: NETWORK LAYER NETWORK LAYER DESIGN ISSUES ROUTING ALGORITHMS, M Indraja,Assistant Prof,RGUKT-Srikakulam. 1
  • 2. What is network layer ? It is responsible for the source to destination delivery of a packets across multiple networks. Routing:- It Provide a mechanism to transmit data over independent networks that are linked together. Logical addressing:- Adds Logical addresses of sender and Receiver. The network layer also defines how to fragment a packet into smaller packets to accommodate different media. M Indraja,Assistant Prof,RGUKT-Srikakulam. 2
  • 3. Network layer Design Issues: Store-and-forward packet switching Services provided to transport layer Implementation of connectionless service Implementation of connection-oriented service Comparison of virtual-circuit and datagram networks M Indraja,Assistant Prof,RGUKT-Srikakulam. 3
  • 4. Store-and-forward packet switching: In this store and forward packet switching can be used for packet(message from source to destination). In this 1st design issues explore about the  How routing was happening in the network ?  How to store the packet in a router ? and  Analysis to forward the packet by host to host.  So, here we discuss about the ISP and different host networks. M Indraja,Assistant Prof,RGUKT-Srikakulam. 4
  • 5. Store-and-forward packet switching: (conti..)  In this one of the major components of the network is ISP’s (Internet Services Providers) equipment (routers connected by transmission lines).  Host H1 is directly connected to one of the ISP’s routers. Host H2 is on a LAN, it might be an office Ethernet, with a router “F” owned and operated by the customer’s. The “F” is outside the oval because is does not belong to the ISP. M Indraja,Assistant Prof,RGUKT-Srikakulam. 5
  • 6.  The host with a packet to send transmits it to the nearest router, either on its own LAN or over a point-to-point link to the ISP.  The packet is stored there until it has fully arrived and the link has finished its processing by verifying the checksum.  Then it is forwarded to the next router along the path until it reaches the destination host, where it is delivered. This mechanism is store-and-forward packet switching. M Indraja,Assistant Prof,RGUKT-Srikakulam. 6
  • 7. Services Provided to the Transport Layer: It provides services at network layer transport layer interface It is the interface between carrier and customer i.e, the subnet boundary, Its job is to deliver packets given to it by customers. The network layer services are designed with the following goals:  The Services should be independent of router technology.  The transport layer should be shielded from number, type, topology of routers.  The network addresses made available to the transport layer should use a uniform numbering plan, even across LANs and WANs M Indraja,Assistant Prof,RGUKT-Srikakulam. 7
  • 9. Implementation of Connectionless Service: If connectionless service is offered, packets are injected into the network individually and routed independently of each other. No advance setup is needed. In this context, the packets are frequently called datagrams (in analogy with telegrams) and the network is called a datagram network. M Indraja,Assistant Prof,RGUKT-Srikakulam. 9
  • 11.  In this the process p1 has a long message for p2.So, in hands the message to the transport layer with instructions to deliver it to process p2 on host h2. The transport layer sends data to network layer within operating system.  The above diagram and table representing the message is four times longer than the maximum packet size, so the network layer has to break it into four packets, 1,2,3 and 4 and send each of the them in turn to router A using some point-to-point protocol, for example, PPP.  At this point the ISP takes over. Every router has an internal table telling it where to send packets for each of the possible destinations. Each table entry is a pair consisting of a destination and the outgoing line to use for that destination. Only directly connected lines can be used. M Indraja,Assistant Prof,RGUKT-Srikakulam. 11
  • 12. Implementation of Connection-Oriented Service:  The implementation of connection-oriented service, we need a virtual circuit network.  A connection is established, a route from the source machine to the destination machine is chosen as part of the connection setup and stored in tables inside the routers.  The router should maintain a traffic flow (it may like a telephone system works) .  When the connection is released, the VC is also terminated. By connection- oriented service, each packet carries a identifier telling which vc it belongs to. M Indraja,Assistant Prof,RGUKT-Srikakulam. 12
  • 13. If Host h1 has established connection 1 with host h2.The connection remembered as the first entry in the each of the routing tables. So, the first line of A’s table says that if a packet bearing connection identifier 1 comes in from H1, it is to be sent to router C and given connection identifier 1.  Similarly, the first entry at C routes the packet to E, also with connection identifier 1. M Indraja,Assistant Prof,RGUKT-Srikakulam. 13
  • 14.  let us consider what happens if H3 also wants to establish a connection to H2. It chooses connection identifier 1 (because it is initiating the connection and this is its only connection) and tells the network to establish the virtual circuit.  This leads to the second row in the tables. Note that we have a conflict here because although A can easily distinguish connection 1 packets from H1 from connection 1 packets from H3, C cannot do this. For this reason, A assigns a different connection identifier to the outgoing traffic for the second connection.  Avoiding conflicts of this kind is why routers need the ability to replace connection identifiers in outgoing packets. This process is called label switching.  Ex: A connection-oriented network service is MPLS (MultiProtocol Label Switching).It is used within ISP networks in the Internet, with IP packets wrapped in an MPLS header having a 20-bit connection identifier or label. M Indraja,Assistant Prof,RGUKT-Srikakulam. 14
  • 15. Comparison of Virtual-Circuit and Datagram Networks: Both virtual circuits and datagrams have their supporters and their detractors. M Indraja,Assistant Prof,RGUKT-Srikakulam. 15
  • 16. Routing Algorithms:  It is the process of selecting best paths in a network.  Routing is performed for All kind of Networks. Technically:  It is the process of determining, selecting the best outgoing path that a packet has to take in a network. Two Types of Routings:  They are Static (Non Adaptive)  Dynamic (Adaptive) M Indraja,Assistant Prof,RGUKT-Srikakulam. 16
  • 17. Static and Dynamic Non Adaptive: Routing decisions computed in advance, off-line and downloaded Adaptive: To changes in topology and Get Information (locally, from adjacent routers, from all routers) M Indraja,Assistant Prof,RGUKT-Srikakulam. 17
  • 18. Shortest Path Algorithm:  Routing algorithms with a simple technique for computing optimal paths given a complete picture of the network.  The idea is to build a graph of the network, with each node of the graph representing a router.  Each edge of the graph representing a communication line or link.  When ever a shortest path is discovered, the table is updated. Such that it may be useful for the future.  The easiest way to find out the shortest path is to count the no.of hops.  The shortest path may be calculated by adding up the labels next to the nodes.These lables may be the function of: distance, bandwidth, average traffic, communication cost, mean queue length and other factors.  ABC is clearly much longer than ABE. M Indraja,Assistant Prof,RGUKT-Srikakulam. 18
  • 20. Flooding : This adapts the technique in which every incoming packet is sent on every outgoing line except from which it arrived. One problem with this is that packets may go in loop and as a result of which a node may receive duplicate packets. These problems can be overcome with the help of sequence numbers, hop count and spanning tree. Every packet is sent out on every outgoing line except the one it arrived at. M Indraja,Assistant Prof,RGUKT-Srikakulam. 20
  • 21. Distances Vector Routing:  A distance vector routing algorithm operates by having each router maintain a table (i.e., a vector) giving the best known distance to each destination and which link to use to get there. These tables are updated by exchanging information with the neighbors. Eventually, every router knows the best link to reach each destination.  The distance vector routing algorithm is sometimes called by other names, most commonly the distributed Bellman-Ford routing algorithm, after the researchers who developed it (Bellman, 1957; and Ford and Fulkerson, 1962). It was the original ARPANET routing algorithm and was also used in the Internet under the name RIP (Routing Information Protocol)  In distance vector routing, each router maintains a routing table indexed by, and containing one entry for each router in the network. This entry has two parts: 1. The preferred outgoing line to use for that destination and an estimate of the distance to that destination. 2. The distance might be measured as the number of hops or using another metric, as we discussed for computing shortest paths M Indraja,Assistant Prof,RGUKT-Srikakulam. 21