Network Layer
Network Layer
Last
Offers CCNA certification, .... and excellent
time management abilities.
Results driven
Client relations skills
Project Management
Process improvement
Customer service
Performance driven
Windows Server Adminstration
Desktop Support
Last
Demonstrates excellent communication skills,
and ....., making a valuable addition to any IT
team.
Adept at Collaborating with Cross-functional
teams, continuously improving processes
and ....
Last
Certied in CCNA ROUTING AND SWITCHING.
Last/
Trained in Computer Networking, ....and...
/
Certified Networking Associate with well
develoed networking abilities. Q
https://www.cybrary.it/
CAREER DEVELOPMENT
Cybersecurity Internships:
Where to Find & How to Get
CYBRARY STAFF
SHARE
Responsibilities of a
Cybersecurity Intern
A cybersecurity intern’s duties will depend on
the type of internship, their skillset,
cybersecurity specialization, and the
organization. Here are some everyday
responsibilities an intern should expect:
Technical Skills
Vulnerability Assessment
Documentation
Compliance
Troubleshooting
Non-Technical Skills
Communication
Willingness to learn
Innovation
Detail oriented
Critical thinking
Types of Cybersecurity
Internships
Each cybersecurity internship is unique. So,
when looking for an internship, first understand
the type you prefer. Let’s look at your options:
Cybersecurity Externship
An externship means shadowing a
cybersecurity expert at work. The intern follows
the cybersecurity professional throughout the
day, assisting them with tasks and learning
about the job.
Conclusion
Cybersecurity internships help you gain
practical experience, build networks, and
accelerate your chances of securing a
permanent position. But you need the right skill
set to be chosen in the first place.
Related Posts
All Blogs
JUNE 7, 2023
How to Make the Most of Blending
Learning with Cybrary Live
Learn how to get the most from your
cybersecurity training platform by blending on-
demand learning with virtual, live courses led
by industry experts.
NEWS & EVENTS
JUNE 7, 2023
Sign in
or sign up with
Solutions
For Individuals
For Teams
Government
Company
About
Careers
Press
Platform
Catalog
Instructors
Alliances
Resources
Blog
Help Center
Report a Vulnerability
Advertisements
Join Tata’s Cybersecurity
Internship for Free in 2024
Courses, Latest Notification, Science and
Tech /
By Admin
Project 1: Cryptanalysis
Leave a Comment
You must be logged in to post a comment.
https://studentera.in/iim-shillong-assistant-
professor-recruitment/
https://studentera.in/rpsc-ras-syllabus-2023-
free-pdf-download/
RPSC RAS Syllabus 2023 in Hindi
& English
FREE PDF Download [Pre+Mains]
https://studentera.in/synthetic-human-embryos/
Revolutionary Breakthrough:
Synthetic Human Embryos Unlock
Early Development Secrets
https://studentera.in/pet-insurance-for-
students/
https://studentera.in/colleges-in-the-us-for-
indian-students/
https://studentera.in/journey-to-the-usa-a-
guide-for-indian-students/
https://studentera.in/teen-girl-commits-suicide-
in-kota-rajasthan/
https://studentera.in/jee-mains-2024-exam-
admit-card/
https://studentera.in/smart-college-finance/
https://studentera.in/nfts-student-investment/
https://studentera.in/student-loan-repayment-
strategies/
https://studentera.in/pet-insurance-for-
students/
https://studentera.in/colleges-in-the-us-for-
indian-students/
https://studentera.in/journey-to-the-usa-a-
guide-for-indian-students/
https://studentera.in/teen-girl-commits-suicide-
in-kota-rajasthan/
https://studentera.in/jee-mains-2024-exam-
admit-card/
https://studentera.in/smart-college-finance/
https://studentera.in/nfts-student-investment/
https://studentera.in/student-loan-repayment-
strategies/
https://studentera.in/pet-insurance-for-
students/
1
2
3
4
5
6
7
8
Home
Computer Network
DBMS
DS
DAA
Operating Systems
Computer Fundamentals
Java
Python
HTML
Selenium
JavaScript
jQuery
Interview Q
Computer Network
TutorialIntroductionFeaturesArchitectureComp
onentsComputer Network
TypesTopologiesTransmission Modes
Models
ModelsOSI ModelTCP/IP Model
Physical Layer
Digital TransmissionTransmission
MediaGuided MediaUnGuided
MediaMultiplexingSwitchingSwitching
ModesSwitching Techniques
Network Layer
Network LayerNetwork
AddressingRoutingNetwork Layer Protocols
Routing Algorithm
Routing AlgorithmDistance VectorLink State
Routing
Transport Layer
Transport LayerTransport Layer Protocols
Application Layer
Application LayerClient & Server Model
Application Protocols
DNSFTPTelnetSMTPSNMPHTTP
Network Security
SecurityPrivacyDigital SignaturePGP
Misc
What is RouterOSI vs TCP/IPTCP vs
UDPTCPTCP PortIPv4 vs IPv6ARP Packet
FormatARP TableWorking of ARPFTP
ClientFTP CommandsFTP ServerI2P
ProtocolSliding Window ProtocolSNMPSPI
ProtocolIPARP CommandsARP RequestARP -
Address Resolution ProtocolARP and its
typesTCP RetransmissionCAN ProtocolHTTP
Status CodesHTTP vs HTTPSRIP
ProtocolUDP ProtocolICMP
ProtocolMQTT ProtocolOSPF ProtocolStop &
Wait ProtocolIMAP ProtocolPOP
ProtocolCIFSDASDIMMiSCSINASNFSNVMeS
ANBGPGo-Back-N ARQRJ CableConnection-
Oriented vs Connectionless ServiceCDMA vs
GSMWhat is MAC AddressModem vs
RouterSwitch vs RouterUSB 2.0 vs USB
3.0CSMA CA vs CSMA CDMultiple Access
ProtocolsURI vs URLIMAP vs. POP3SSH
MeaningUTP vs STPStatus Code 400MIME
ProtocolIP addressWhat is a proxy server and
how does it workHow to set up and use a proxy
serverWhat is network securityWWW is based
on which modelProxy Server ListFundamentals
of Computer NetworkingIP Address Format
and TableBus topology vs Ring topologyBus
topology vs Star topologyCircuit Switching vs
Packet switchingstar vs ring topologyRouter vs
BridgeTCP Connection TerminationImage
SteganographyNetwork NeutralityOnion
RoutingASA featuresRelabel-to-front
AlgorithmTypes of Server Virtualization in
Computer NetworkAccess Lists (ACL)Digital
Subscriber Line (DSL)Operating system based
VirtualizationContext based Access Control
(CBAC)Cristian's AlgorithmService Set
Identifier (SSID) in Computer NetworkVoice
over Internet Protocol (VoIP)Challenge
Response Authentication Mechanism
(CRAM)Extended Access ListLi-fi vs. Wi-
fiReflexive Access ListSynchronous Optical
Network (SONET)Wifi protected access
(WPA)Wifi Protected Setup (WPS)Standard
Access ListTime Access ListWhat is 3D
Internet4G Mobile Communication
TechnologyTypes of Wireless Transmission
MediaBest Computer Networking CoursesData
RepresentationNetwork CriteriaClassful vs
Classless addressingDifference between
BOOTP and RARP in Computer
NetworkingWhat is AGP
(Accelerated Graphics Port)Advantages and
Disadvantages of Satellite
CommunicationExternal IP
AddressAsynchronous Transfer Mode (ATM) in
Computer NetworkTypes of Authentication
ProtocolsWhat is a CISCO Packet TracerHow
does BOOTP workSubnetting in Computer
NetworksMesh Topology Advantages and
DisadvantagesRing Topology Advantages and
DisadvantagesStar Topology Advantages and
DisadvantagesTree Topology Advantages and
DisadvantagesZigbee Technology-The smart
home protocolNetwork Layer in OSI
ModelPhysical Layer in OSI ModelData Link
Layer in OSI ModelInternet explorer shortcut
keysNetwork Layer Security | SSL
ProtocolsPresentation Layer in OSI
ModelSession Layer in OSI ModelSUBNET
MASKTransport Layer Security | Secure
Socket Layer (SSL) and SSL
ArchitectureFunctions, Advantages and
Disadvantages of Network LayerFunctions,
Advantages and Disadvantages of the Physical
LayerTypes of Internet ConnectionNoisy and
Noiseless ChannelAdvantages and
Disadvantages of Bus TopologyAdvantages
and Disadvantages of Ring
TopologyAdvantages and Disadvantages of
Star TopologyFunctions, Advantages and
Disadvantages of Network LayerProtocols in
Noiseless and Noisy ChannelAdvantages and
Disadvantages of Mesh TopologyCloud
Networking - Managing and Optimizing Cloud-
Based NetworksCollision Domain and
Broadcast DomainCount to Infinity Problem in
Distance Vector RoutingDifference Between
Go-Back-N and Selective Repeat
ProtocolDifference between Stop and Wait,
GoBackN, and Selective RepeatNetwork
Function Virtualization (NFV): transforming
Network Architecture with Virtualized
FunctionsNetwork-Layer Security | IPSec
ModesNetwork-Layer Security | IPSec
Protocols and ServicesPing vs
TracerouteSoftware Defined Networking
(SDN): Benefits and Challenges of Network
VirtualizationSoftware Defined Networking
(SDN) vs. Network Function Virtualization
(NFV)Virtual Circuits vs Datagram
NetworksBlueSmack Attack in Wireless
NetworksBluesnarfing Attack in Wireless
NetworksDirect Sequence Spread
SpectrumWarchalking in Wireless
NetworksWEP (Wired Equivalent
Privacy)Wireless security encryptionWireless
Security in an EnterpriseQuantum
NetworkingNetwork AutomationDifference
between MSS and MTUWhat is MTUMesh
Networks: A decentralized and Self-Organizing
Approach to NetworkingWhat is Autonomous
SystemWhat is MSSCyber security and
Software securityInformation security and
Network securitySecurity Engineer and
Security ArchitectProtection Methods for
Network SecurityTrusted Systems in Network
SecurityWhat are Authentication Tokens in
Network securityCookies in Network
SecurityIntruders in Network SecurityNetwork
Security Toolkit (NST) in virtual boxPivoting-
Moving Inside a NetworkSecurity Environment
in Computer NetworksVoice Biometric
technique in Network SecurityAdvantages and
Disadvantages of Conventional
TestingDifference between Kerberos and
LDAPCyber security and Information
SecurityGraphQL Attacks and
SecurityApplication Layer in OSI
ModelApplications of Remote SensingSeven
Layers of IT SecurityWhat is Ad Hoc TCPWhat
is Server Name Indication(SNI)Difference
Between Infrastructure and Infrastructure Less
NetworkCollision Avoidance in Wireless
NetworksDifference Engine and Analytical
EngineHotspot 2.0Intrusion Prevention System
(IPS)Modes of Connection BluetoothNoisy
Channel
protocolsParzen Windows density Estimation
TechniquePrinciple of Information System
SecurityWhat are Bots, Botnets, and
ZombiesWindows Memory
ManagementWireless dos attack on Wifi
MCQ
Computer Network MCQComputer Network
MCQ Part2
Interview Questions
Networking Questions
ADVERTISEMENT
Next →← Prev
Network Layer
The Network Layer is the third layer of the OSI
model.
ADVERTISEMENT
ADVERTISEMENT
← PrevNext →
https://www.facebook.com/sharer.php?
u=https://www.javatpoint.com/network-layer
https://twitter.com/share?url=https://
www.javatpoint.com/network-layer
https://www.pinterest.com/pin/create/button/?
url=https://www.javatpoint.com/network-layer
Swagger
Transact-SQL
Tumblr
ReactJS
Regex
Reinforcement Learning
R Programming
RxJS
React Native
Python Pillow
Python Turtle
Keras
Preparation
Aptitude
Reasoning
Verbal Ability
Interview Questions
Company Questions
Trending Technologies
Artificial Intelligence
AWS
Selenium
Cloud Computing
Hadoop
ReactJS
Data Science
Angular 7
Blockchain
Git
Machine Learning
DevOps
B.Tech / MCA
DBMS
Data Structures
DAA
Operating System
Computer Network
Compiler Design
Computer Organization
Discrete Mathematics
Ethical Hacking
Computer Graphics
Software Engineering
Web Technology
Cyber Security
Automata
C Programming
C++
Java
.Net
Python
Programs
Control System
Data Mining
Data Warehouse
Open In App
GEEKSFORGEEKS
Packetizing
Routing
Forwarding
1. Packetizing
The process of encapsulating the data
received from the upper layers of the network
(also called payload) in a network layer packet
at the source and decapsulating the
payload from the network layer packet at the
destination is known as packetizing.
2. Routing
Routing is the process of moving data from one
device to another device. These are two other
services offered by the network layer. In a
network, there are a number of routes
available from the source to the destination.
The network layer specifies some strategies
which find out the best possible route. This
process is referred to as routing. There are a
number of routing protocols that are used in
this process and they should be run to help the
routers coordinate with each other and help in
establishing communication throughout the
network.
Routing
3. Forwarding
Forwarding is simply defined as the action
applied by each router when a packet arrives
at one of its interfaces. When a router receives
a packet from one of its attached networks, it
needs to forward the packet to another
attached network (unicast routing) or to some
attached networks (in the case of multicast
routing). Routers are used on the network for
forwarding a packet from the local network to
the remote network. So, the process of routing
involves packet forwarding from an entry
interface out to an exit interface.
Forwarding
Flow Control
Congestion Control
1. Error Control
Although it can be implemented in the network
layer, it is usually not preferred because the
data packet in a network layer may be
fragmented at each router, which makes error-
checking inefficient in the network layer.
2. Flow Control
It regulates the amount of data a source can
send without overloading the receiver. If the
source produces data at a very faster rate than
the receiver can consume it, the receiver will
be overloaded with data. To control the flow of
data, the receiver should send feedback to the
sender to inform the latter that it is overloaded
with data.
There is a lack of flow control in the design of
the network layer. It does not directly provide
any flow control. The datagrams are sent by
the sender when they are ready, without any
attention to the readiness of the receiver.
3. Congestion Control
Congestion occurs when the number of
datagrams sent by the source is beyond the
capacity of the network or routers. This is
another issue in the network layer protocol. If
congestion continues, sometimes a situation
may arrive where the system collapses and no
datagrams are delivered. Although congestion
control is indirectly implemented in the network
layer, still there is a lack of congestion control
in the network layer.
Advantages of Network Layer
Services
Packetization service in the network layer
provides ease of transportation of the data
packets.
Disadvantages of Network
Layer Services
There is a lack of flow control in the design of
the network layer.
Computer Networks
GATE CS
Computer Networks-Network Layer
Recommended Articles
Company
About Us
Legal
Careers
In Media
Contact Us
Advertise with us
Explore
Master CP
GeeksforGeeks Videos
Geeks Community
Languages
Python
Java
C++
PHP
GoLang
SQL
R Language
Android Tutorial
Tutorials Archive
DSA
Data Structures
Algorithms
DSA Roadmap
ML Maths
Data Visualisation Tutorial
Pandas Tutorial
NumPy Tutorial
NLP Tutorial
HTML
CSS
Web Templates
CSS Frameworks
Bootstrap
Tailwind CSS
SASS
LESS
Web Design
Python
Django Tutorial
Python Projects
Python Tkinter
Web Scraping
Computer Science
GATE CS Notes
Operating Systems
Computer Network
Software Engineering
Engineering Maths
DevOps
Git
AWS
Docker
Kubernetes
Azure
GCP
DevOps Roadmap
Competitive Programming
Top 50 Tree
Top 50 Graph
Top 50 Array
Top 50 String
Top 50 DP
Interview Guide
Design Patterns
OOAD
Interview Questions
JavaScript
JavaScript Examples
TypeScript
ReactJS
NextJS
AngularJS
NodeJS
Lodash
Web Browser
NCERT Solutions
Class 12
Class 11
Class 10
Class 9
Class 8
School Subjects
Mathematics
Physics
Chemistry
Biology
Social Science
English Grammar
Commerce
Accountancy
Business Studies
Economics
Management
HR Management
Finance
Income Tax
Polity Notes
Geography Notes
History Notes
Economy Notes
Ethics Notes
Previous Year Papers
SSC/ BANKING
IBPS PO Syllabus
Colleges
IIT Colleges
NIT Colleges
IIIT Colleges
Companies
Fintech Companies
EdTech Companies
Preparation Corner
Experienced Interviews
Internship Interviews
Competitive Programming
Aptitude Preparation
Puzzles
Exams
JEE Mains
JEE Advanced
GATE CS
NEET
UGC NET
More Tutorials
Software Development
Software Testing
Product Management
SAP
Linux
Excel
Typing Test
Image Editor
Code Formatters
Code Converters
Currency Converter
Random Number Generator
Write an Article
Improve an Article
Internships
Networking
Home
Network infrastructure
DEFINITION
Network layer
Andrew Froehlich, West Gate Networks
ANDREW FROEHLICH
https://www.techtarget.com/searchnetworking/
definition/TCPhttps://www.techtarget.com/
searchnetworking/definition/Address-
Resolution-Protocol-ARPhttps://
www.techtarget.com/searchdisasterrecovery/
definition/Network-Load-Balancing-
NLBhttps://www.techtarget.com/
searchnetworking/definition/Session-layer
session layer
-ADS BY GOOGLE
UNIFIED COMMUNICATIONS
MOBILE COMPUTING
DATA CENTER
IT CHANNEL
Unified Communications
About Us
Contact Us
Advertisers
Partner with Us
Media Kit
Corporate Site
Contributors
Reprints
Answers
Definitions
E-Products
Events
Features
Guides
Opinions
Photo Stories
Quizzes
Tips
Tutorials
Videos
All Rights Reserved,Copyright 2000 - 2024,
TechTarget
Privacy Policy
Do Not Sell or Share My Personal Information
Open In App
GEEKSFORGEEKS
2. Routing
Routing is the process of identifying the best
path to transmit the packets, Network Layer not
only just sends packets from sender to
receiver, but also determines the best route to
send them. Numerous routers are used to find
out the best and safest route to transmit the
data packets. Various routing algorithms are
used to determine the best path, like link state
routing, Distance Vector
Routing, Flooding, Random Walk etc. The
header of each data packet holds the
information regarding the path they need to
follow to reach their destination via different
routers. Usually there are multiple routers
between the sender and
the receiver, so the data packets are routed by
using all these available routers.
3. Host-to-Host delivery
Host-to-Host delivery also known as
Forwarding is the process in which the network
layer transmits or forwards the data packets via
routers, after determining the best path/route.
In some cases it takes more than one router to
reach the destination, Network Layer takes
care of those too, it forwards packets from
each router to the another router until it
reaches the destination securely.
4. Logical Subnetting
Network Layer also allows a bigger network to
be divided into smaller chunks of network
known as Logical Subnetting. It helps the IP
addresses to be used more efficiently and less
amount of IP address will be wasted. It is also
helpful to manage a larger network more
efficiently. Due to smaller networks, it would be
easier to find the device if any troubleshooting
is needed.
5. Fragmentation and Reassembly
Each device / node has a maximum capacity to
receive data (it may differ from Node to Node),
which is called Maximum Transmission Unit
(MTU). If the total size of data packets
exceedes that size limit, then those data
packets are fragmented into more smaller
packets / fragmented so that they can fit the
MTU. After fragmentation those packets are
being send to the receiver, and at the receiving
end all those fragmented packets are
rearranged to create the actual data in order.
The fragmentation is taken care by the routers.
6. Error Handling
Network Layer also check for errors and
handles them. Network Layer uses various
error detection techniques like Cylic
Redundancy Check (CRC) , Checksums etc.
Apart from just detecting, it also handle those
errors using different approaches like Forward
Error Correction (FEC), Hamming Code, Reed-
Solomon Codes etc. It also re-transmit the
packets which are either erroneous or didn’t
reach the receiver. It uses the ACK messages
to determine whether a packet has been
successfully reached the receiver or not, if
there is a Negative ACK, then it means that
there is some error with the packet, and the
receiver will ask the sender to resend that
packet.
9. Congestion Control
Just like MTU, if there is an excessive load on
the network which it can’t handle, the network
become congested. Due to which the entire
process of sending and receiving data comes
to a pause. Congestion can be dealt with using
different algorithms like Leaky Bucket
Algorithm and Token Bucket Algorithm. In case
of the leaky bucket algorithm, whatever might
be the speed or amount of data flow into the
bucket, the data leaks at a constant rate, which
reduces the congestion in the network. In case
of the Token Bucket Algorithm, tokens are
being added into the bucket one by one, until it
has reached the maximum capacity, then one
by one according the token sequence each
data packet is transmitted.
IPsec
ICMP
IGMP
GRE
Article Tags :
Computer Networks
Recommended Articles
Company
About Us
Legal
Careers
In Media
Contact Us
Advertise with us
GFG Corporate Solution
Hack-A-Thon
DSA in JAVA/C++
Master CP
GeeksforGeeks Videos
Geeks Community
Languages
Python
Java
C++
PHP
GoLang
SQL
R Language
Android Tutorial
Tutorials Archive
DSA
Data Structures
Algorithms
DSA Roadmap
ML Maths
Pandas Tutorial
NumPy Tutorial
NLP Tutorial
HTML
CSS
Web Templates
CSS Frameworks
Bootstrap
Tailwind CSS
SASS
LESS
Web Design
Python
Django Tutorial
Python Projects
Python Tkinter
Web Scraping
Computer Science
GATE CS Notes
Operating Systems
Computer Network
Software Engineering
Digital Logic Design
Engineering Maths
DevOps
Git
AWS
Docker
Kubernetes
Azure
GCP
DevOps Roadmap
Competitive Programming
Top 50 Tree
Top 50 Graph
Top 50 Array
Top 50 String
Top 50 DP
System Design
UML Diagrams
Interview Guide
Design Patterns
OOAD
Interview Questions
JavaScript
JavaScript Examples
TypeScript
ReactJS
NextJS
AngularJS
NodeJS
Lodash
Web Browser
NCERT Solutions
Class 12
Class 11
Class 10
Class 9
Class 8
School Subjects
Mathematics
Physics
Chemistry
Biology
Social Science
English Grammar
Commerce
Accountancy
Business Studies
Economics
Management
HR Management
Finance
Income Tax
Polity Notes
Geography Notes
History Notes
Science and Technology Notes
Economy Notes
Ethics Notes
SSC/ BANKING
SBI PO Syllabus
IBPS PO Syllabus
Colleges
IIT Colleges
NIT Colleges
IIIT Colleges
Companies
Fintech Companies
EdTech Companies
Preparation Corner
Experienced Interviews
Internship Interviews
Competitive Programming
Aptitude Preparation
Puzzles
Exams
JEE Mains
JEE Advanced
GATE CS
NEET
UGC NET
More Tutorials
Software Development
Software Testing
Product Management
SAP
Excel
Image Editor
Code Formatters
Code Converters
Currency Converter
Write an Article
Improve an Article
Internships
@GeeksforGeeks, Sanchhaya Education
Private Limited, All rights reserved
MenuLogin
Menu
HTML
CSS
Javascript
SQL
Python
Java
C
C++
PHP
Scala
C#
Node.Js
MySQL
MongoDB
PL/SQL
Swift
Bootstrap
R
Machine Learning
Blockchain
Angular
React Native
Computer Fundamentals
Compiler Design
Operating System
Computer Network
DBMS
Excel
DCN Tutorial
Data Comm & Networks Home
DCN - Overview
Physical Layer
Network Layer
DCN - Routing
DCN - Internetworking
Transport Layer
Selected Reading
HR Interview Questions
Computer Glossary
Who is Who
Network Layer Introduction
Previous
Next
Layer-3 Functionalities
Devices which work on Network Layer mainly
focus on routing. Routing may include various
tasks aimed to achieve a single goal. These
can be:
Addressing devices and networks.
Security
Print Page
PreviousNext
Advertisements
https://play.google.com/store/apps/details?
id=com.tutorialspoint.onlineviewer
TUTORIALSARTICLESJOBSCOURSESCERT
IFICATIONSANNUAL MEMBERSHIP
Languages
Python Tutorial
Java Tutorial
C++ Tutorial
C Programming Tutorial
C# Tutorial
PHP Tutorial
R Tutorial
Go Tutorial
Web Technologies
HTML Tutorial
CSS Tutorial
JavaScript Tutorial
ReactJS Tutorial
Bootstrap Tutorial
AngularJS Tutorial
Node.js Tutorial
TypeScript Tutorial
Database
SQL Tutorial
MySQL Tutorial
DBMS Tutorial
MongoDB Tutorial
SQLite Tutorial
PL/SQL Tutorial
PostgreSQL Tutorial
Excel Tutorial
Editors
Trending Technologies
Cloud Computing Tutorial
Docker Tutorial
Kubernetes Tutorial
Compilers
Online C Compiler
Online C# Compiler
Online R Terminal
NLP Tutorial
NumPy Tutorial
Cryptography Tutorial
Power BI Tutorial
Computer Science
DSA Tutorial
Unix Tutorial
Microprocessor Tutorial
Flutter Tutorial
Top Certifications
DevOps Certification
Game Development Certification
Generative AI Certification
Java Certification
JavaScript Certification
Apache Spark Certification
https://www.techopedia.com/
Dictionary
Dictionary
Trending Terms
Techopedia Terms
Artificial Intelligence
Cryptocurrency
Data Management
Networking
Cybersecurity
Careers
Careers
Job Board
More
More
All Topics
Antivirus
CRM Software
Gambling
Gaming
Hosting
HR Software
Investing
Laptops
Password Manager
Project Management
Spy
Trading Robots
VoIP
VPN
Tutorials
Q&A
Downloads
Webinars
About Us
Advertising Info
Contributors
Newsletters
Write For Us
https://twitter.com/techopediahttps://
www.techopedia.com/definition/24204/network-
layer#search-bar-wrapper-mobilehttps://
www.techopedia.com/
Dictionary
Data Management
Network Layer
Margaret Rouse
Technology Expert
https://twitter.com/intent/tweet?text=Network
%20Layer+-+https://www.techopedia.com/
definition/24204/network-layer
Advertisements
IP
IPsec
IPX/SPX
ICMP
IGMP
GRE
Advertisements
Related Terms
Application Layer
Presentation Layer
Session Layer
Data Link Layer
Transport Layer
Physical Layer
Related Reading
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
TAGS
DATA MANAGEMENT
INTERNET
NETWORKING
https://www.linkedin.com/in/margaretrouse/
Margaret Rouse is an award-winning technical
writer and teacher known for her ability to
explain complex technical subjects to a non-
technical, business audience. Over the past
twenty years her explanations have appeared
on TechTarget websites and she's been cited
as an authority in articles by the New York
Times, Time Magazine, USA Today, ZDNet, PC
Magazine and Discovery Magazine.Margaret's
idea of a fun day is helping IT and business
professionals learn to speak each other’s
highly specialized languages. If you have a
suggestion for a new definition or how to
improve a technical explanation, please email
Margaret or contact her…
DATA MANAGEMENT
Differential Privacy
Full Explanation
Advertisements
DATA MANAGEMENT
CPanel
Full Explanation
TECH 101
Full Explanation
https://www.techopedia.com/thailand-offers-
crypto-tax-breakshttps://www.techopedia.com/
trends-in-llm-development-business-owners-
need-to-watchhttps://www.techopedia.com/
solana-outage-why-uptime-and-stability-matter-
for-mainstream-cryptohttps://
www.techopedia.com/sol-price-reclaims-100-
new-solana-meme-coin-smog-hits-top-crypto-
gainers-listhttps://
www.techopedia.com/want-to-make-huge-
profits-in-crypto-take-look-at-green-bitcoin-
gbtc-and-its-predict-to-earn-featurehttps://
www.techopedia.com/how-to-use-ai-for-
investing-use-cases
INVESTING
Popular Categories
Show All
Antivirus
Artificial Intelligence
Audio
CRM
Cryptocurrency
Gambling
Gaming
HR
Investing
Laptops
Network
Password Managers
Project Management
Spy
VoIP
VPN
https://www.techopedia.com/https://
twitter.com/techopediahttps://
www.facebook.com/techopedia/https://
www.linkedin.com/company/techopedia/https://
www.youtube.com/c/Techopedia
Techopedia Terms
https://indeed.com/
Sign in
Career Guide
Career Development
Part-time jobs
Full-time jobs
Remote jobs
Urgently hiring jobs
IP
IPsec
IPX/SPX
ICMP
IGMP
GRE
What is a network?
Understanding this layer begins with seeing a
network as two or more connected computer
devices. These devices connect to a central
hub, such as a router and include smaller
divisions of the network. Subnetworking allows
IT professionals to manage thousands of
internet protocol (IP) addresses and connected
devices in large and geographically distant
networks.
Routing
This function defines this layer as it selects the
correct route between the source and
destination device to move data across a
series of interconnected networks. Incoming
packets come from various sources, with this
layer in the
network determining their final destination and
the route they can take. The best path provides
the least delay and greatest available
bandwidth.
Logical addressing
Each device that communicates over a network
connects with a logical address. Logical
addresses do not depend on the hardware and
are instead unique across an entire connected
network. For example, you may access a
network device by using this layer's protocol to
translate logical addresses to an address you
assign.
Datagram encapsulation
Another function of this layer is to encapsulate
messages from higher layers by placing them
into datagrams, also known as packets, under
the layer header. This function is much like
writing a letter, placing it in an envelope with a
name and address, then giving it to a courier
who places that envelope in a larger delivery
box. The IP is the place where most data
encapsulation occurs as data passes to the IP
from one of two protocols, TCP or UDP.
Congestion control
Another function of this layer controls
congestion on a network device. These
devices can only handle so much data and
congestion control lowers the amount of data a
device receives by slowing sending activity.
This function takes the form of algorithms that
control the entry of data packets into the
network and reduce the chances of a collapse
or errors in the network.
Share:
Sign in
Job Seekers
Employers
About
©2024 Indeed
Accessibility at Indeed
Privacy Centre
Cookies
Privacy
Terms