Skip to main content

Networking (Lecture 8)

                            MARWARI COLLEGE,RANCHI                                                           (UNDER RANCHI UNIVERSITY RANCHI) 

NAME : RAJU MANJHI,PRAKASH KUMAR
SUB: NETWORKING 
SEM : IT /CA IV
_________________________________________________________
Network Layer:
Network layer is the third layer in the OSI model and here are some of the functionalities of the network layer:

Logical Addressing

In the internet world, there are two kinds of addressing, data link layer addressing and logical addressing at the network layer. While physical addressing at the data link layer is defined by the MAC address of a device, on the other hand, IP addressing is defined at the network layer of the OSI model. IP addressing is also known as logical addressing.

Routing

Routing is a method to route a data packet from source to destination. We can think of routing as follows:
·         When you want to access some data from Facebook, you open your laptop, type Facebook's URL and send an HTTP request to facebook.com for some data.
·         Since Facebook's server is situated outside your local area network, your request is forwarded to Facebook through the default gateway or router of your institution.
·         This forwarding of a data request to the destined server or user is known as routing.
This functionality is done at the network layer of the OSI model.

Fragmentation and Reassembly

The network layer must send messages down to the data link layer for transmission. The data that network layer receives is in the form of a packet and the data that data link layer forwards is called a frame
Fragmentation and reassembly have to be done by the network layer because some data link layer technologies have limits on the length of any message that can be sent. If the packet that the network layer wants to send is too large, the network layer must split the packet up, send each piece to the data link layer, and then have pieces reassembled once they arrive at the network layer on the destination machine.

Path determination

Between two computers on the internet, thousands of path topology may exist to connect the one device to another. Some of the networks might be private networks; to use some of the networks to send your data you might have to pay; some of the networks en route might be very busy. But network layer is so smart to find out these things within milliseconds.
 _______________________________________________________________________
Q. Describe the ICMP .
_______________________________________________________________________________
Internet Control Message Protocol (ICMP) is a network layer protocol that reports errors and provides information related to IP packet processing. ICMP is used by network devices to send error messages indicating, for example, that a requested service is not available or that a host isn’t reachable.
ICMP is commonly used by network tools such as ping or traceroute. For example, consider the following example that illustrates how ping can be used to test the reachability of a host:

Host A wants to test whether it can reach Server over the network. Host A will start the ping utility that will send ICMP Echo Request packets to Server. If Server is reachable, it will respond with ICMP Echo Reply packets. If Host A receives no response from Server, there might be a problem on the network.

 ICMP messages are encapsulated in IP datagrams.

One other common ICMP message is the Destination unreachable message. Here is an example:


Host A sends a packet to Host B. Because the R1’s interface connected to Host B is down, the router will send an ICMP Destination unreachable message to Host A, informing it that the destination host is unreachable.
·        



Comments

Popular posts from this blog

EDP INTRODUCTION

                                                     MARWARI COLLEGE RANCHI                                                (UNDER RANCHI UNIVERSITY ,RANCHI) RAJU MANJHI  DEP. OF B.Sc(CA) ,MCR ________________________________________________________________________________ SEMESTER : VI BCA/IT/BCM  SUBJECT : EDP TOPIC : DEFINITION OF EDP : Entrepreneurship 1.        Concept:            Entrepreneurship is derived from French root, which means to undertake. But people today call it by various names - adventuresome (to start something different from others), risk taking, thrill seeking (much of up’s and down’s), innovating (something new). Hence the word entrepreneurship in today’s concept can be called an event of adventuresome which takes risks, seeks thrills and innovative. I.         According to Higgins: Entrepreneurship is the function of seeking investment and production opportunity, organizing an enterprise to undertake a new function process, raising ca

EDP (LECTURE 3)

MARWARI COLLEGE,RANCHI (UNDER RANCHI UNIVERSITY,RANCHI) NAME : RAJU MANJHI SUB: EDP SEM: VI(CA/IT/CM) ______________________________________________________________________________ Identification of business opportunities. An entrepreneur perceives an   opportunity for marketing a product or service, then he establishes a business unit on the basis of his or her perception, finally he manages his enterprise, expanding, growing or diversifying over a period of time. In order to establish an entrepreneurial system an entrepreneur needs to take following steps for identification of right opportunity. 1)        Search for business idea: The task of promotion begins with the search of suitable business idea and opportunity. The idea may generate from various sources and should be rated to the starting of a new business or taking over an existing business enterprise. The idea should be sound and workable, so that it may be exploited. It should yield suitable return

Lecture 5 (BCM)

Benefits of Using Proxy Servers 1. Your IP Address Is Hidden One of the best proxy server advantages – by using a proxy, the website you access will not be able to log your real IP address, as it will log the proxy server’s IP address instead. Yes, that means you’re somewhat anonymous when you browse online. D on’t forget –   your IP address   ca n tell someone a lot about yourself, like what country and city you are from. Crafty cyber criminals can even go the extra mile and use your IP address to find out things like who your ISP is, what your zip code is, and even what street you live on.   How would a hacker get access to your IP address, you ask? Sadly, a data breach or leak on a website you visit could be enough for them to get their hands on this info. So, something like this is definitely useful nowadays. 2. You Can Access Geo-Blocked or Restricted Content Unfortunately, a lot of online content is actually hidden behind  geo-restrictions  – mostly because of net