Close Menu
    Facebook X (Twitter) Instagram
    Dutta TechDutta Tech
    • Home
    • Courses
      • Computer Network
        • Basic Introduction on Computer System
        • Basic Introduction on Computer Network
        • Features Of Computer network
        • Computer Network Architecture
        • Computer Network Components
        • Computer Network Types
        • Internetwork
        • Topology
        • Computer Network Models
        • TCP/IP model
        • OSI Model
        • Digital Transmission
        • Digital-to-Digital Conversion
        • Analog to Digital Conversion
        • Digital-to-Analog Conversion
        • Analog-to-Analog Conversion
        • UnGuided Transmission
        • Guided Media
        • Multiplexing
        • Switching
        • Switching Modes
    • School
      • Class-9
        • Syllabus-Computer Science-Class-9
      • Class-10
        • Syllabus-Computer Science-Class-10
      • Class-11
        • Syllabus-Computer Science-Class-11
      • Class-12
        • Syllabus-Computer Science-Class-12
    Facebook X (Twitter) Instagram
    Dutta TechDutta Tech
    Computer Network

    Network Layer

    PrabhakerBy PrabhakerJanuary 27, 2022Updated:December 14, 2022No Comments4 Mins Read

    The Network layer is the third layer in the OSI model. The network layer controls host and network addressing, sub-network management, and internetworking.

    The network layer is in charge of routing packets from a source to a destination within or outside of a subnet.
    Different addressing schemes or non-compatible addressing types may exist between two subnets.
    In the same way, two separate subnets may use different protocols that are incompatible with one another.
    The network layer is in charge of routing packets from source to destination while mapping various addressing schemes and protocols.

    • The Network Layer is the OSI model’s third layer.
    • It takes care of service requests coming in from the transport layer and passes them on to the data link layer.
    • The logical addresses are translated into physical addresses by the network layer.
    • It determines the path from the source to the destination, as well as managing traffic issues such as switching, routing, and controlling data packet congestion.
    • The network layer’s primary function is to transport packets from a sending host to a receiving host.

    The network layer’s primary functions are as follows:

    • Routing: When a packet arrives at the router’s input link, it is forwarded to the router’s output link.
      A packet sent from S1 to R1 must, for example, be sent to the next router on the path to S2.
    • Physical addressing is implemented by the data connection layer, whereas logical addressing is implemented by the network layer.
      To distinguish between the source and destination systems, logical addressing is also used.
      The network layer adds a header to the packet that includes the sender and receiver’s logical addresses.
    • Internetworking: The network layer’s primary function is to enable logical connections between various types of networks.
    • Fragmentation is the process of breaking down packets into the smallest individual data units that can travel across multiple networks.
    •  Fragmentation is a process of breaking the packets into the smallest individual data units that travel through different networks.

    Forwarding & Routing

    A router is used to forward packets to the network layer. A forwarding table is found on every router. A router passes a packet by checking the header field and then indexing it into the forwarding table using the header field value. The router’s outgoing interface link to which the packet is to be sent is indicated by the value recorded in the forwarding table corresponding to the header field value.

    For example, if a router arrives with a header field value of 0111, the router indexes this value into the forwarding table, which determines that the output link interface is 2. The packet is forwarded to interface 2 by the router. The values that are entered into the forwarding table are determined by the routing algorithm. It is possible to have a centralized or decentralized routing algorithm.

    The Network Layer Provides Services

    • Guaranteed delivery: This layer provides a service that ensures the packet arrives at its intended location.
    • Guaranteed delivery with bounded delay: This service ensures that the packet arrives within a defined host-to-host delay bound.
    • In-Order Packets: With this service, packets arrive at their destination in the order in which they were sent.
    • Guaranteed maximum jitter: With this service, the time between two consecutive transmissions at the sender is the same as the time between their receipt at the destination.
    • Services of security:
      A session key between the source and destination hosts is used by the network layer to guarantee security.
      The payloads of datagrams delivered to the destination host are encrypted by the network layer of the source host.
      The payload would then be decrypted by the network layer on the target host.
      The data integrity and source authentication services are maintained by the network layer in this manner.
    •  The network layer provides security by using a session key between the source and destination host. The network layer in the source host encrypts the payloads of datagrams being sent to the destination host. The network layer in the destination host would then decrypt the payload. In such a way, the network layer maintains the data integrity and source authentication services.
    computer network Network Layer OSI Model
    Prabhaker
    • Website
    • X (Twitter)

    Related Posts

    Routing Algorithm

    July 1, 2025
    Read More

    Transmission modes

    March 31, 2022
    Read More

    Transport Layer

    March 30, 2022
    Read More

    Comments are closed.

    Recent Posts
    • Routing Algorithm
    • Transmission modes
    • Transport Layer
    • Network Layer Protocols
    • Routing
    • Types of Routing
    • Network Layer Addressing
    • Data Link Control
    • Network Layer
    • Error Detection and Correction
    • Data Link Layer
    • Switching Techniques
    • Switching Modes
    • Switching
    • Multiplexing
    • Home
    • School
    • Courses
      • Computer Network
    • Contact Us
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Terms and Conditions
    • Privacy Policy
    • Disclaimer
    • Contact Us
    • Terms & conditions
    © 2025 DuttaTech.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    Preferences
    {title} {title} {title}