0% found this document useful (0 votes)
168 views

Network Layer

The OSI network layer

Uploaded by

janerie71
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views

Network Layer

The OSI network layer

Uploaded by

janerie71
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 309

Solution oriented

Problem solving skills

Last
Offers CCNA certification, .... and excellent
time management abilities.

Highly professional attitude


Ability to perform and work well in team
environments.

Results driven
Client relations skills
Project Management
Process improvement
Customer service
Performance driven
Windows Server Adminstration
Desktop Support

Last
Demonstrates excellent communication skills,
and ....., making a valuable addition to any IT
team.
Adept at Collaborating with Cross-functional
teams, continuously improving processes
and ....

Last
Certied in CCNA ROUTING AND SWITCHING.
Last/
Trained in Computer Networking, ....and...
/
Certified Networking Associate with well
develoed networking abilities. Q

Seeking an IT support internship position with


company where my practical knowledge will
used for the betterment of your company or
organization and also improve my competence.
(and also enable my career growth)

Proactive ....... with a unique blend of ......skills.

Proactive.... specializing in computer


networking, security and databases.
Adept at Collaborating with diverse Cross-
functional teams on technical projects to
design IT solutions and drive continuous
improvement.
With passion for problem solving and a drive

Information Technology internship

Dear Recruitment Team.


Dear Hiring Team.
Life is beautiful, wonderful, glorious embrace it
and it. Live each day as if it was your last.
Keep it up, don't anything bring you down

I will do anything humanly possible to save


you.

What you do today you will pay for a big time


tomorrow.
You have the narrow road and you have the
wide road so take your pick wisely. I don't want
see you go on a path you will regret.

No more: helplessness, pain, sorrows, tears,


homelessness, loneliness,

You raise me up by Westlife


Soul provider by Romain Virgo
Wait for me by Johnny Drille

Thought of the day


Baseline For Teams Is Here!

Understand where your team stands


on a global scale
UNDERSTAND NOW

https://www.cybrary.it/

CAREER DEVELOPMENT

Cybersecurity Internships:
Where to Find & How to Get
CYBRARY STAFF

SHARE

Although there's a skills shortage in


cybersecurity, employers won't take just
anybody, even for entry-level roles. You'll need
to demonstrate a certain level of skill and
experience to stand a chance. That's why it's
crucial to take advantage of cybersecurity
internships.

Here, we’ll discuss everything you need to


know about cybersecurity internships and how
to get one.
What is a Cybersecurity
Internship, and How Can It
Benefit You?
A cybersecurity internship offers an opportunity
to gain real-world cybersecurity experience in
an established firm. It introduces you to the
work environment and the day-to-day
responsibilities of a cybersecurity professional.
You’ll deal with real threats trying to access,
change, or destroy confidential company
resources.

As an aspiring cybersecurity professional, you


need the skills, certifications, and experience to
convince potential employers. While you can
level up your skills with online courses and
earn certificates, experience may be tricky to
come by.

This makes cybersecurity internships one of


the best decisions if you’re new to the industry.

The Benefits of Cybersecurity


Internships
Whether you’re a recent graduate or still
training, cybersecurity internships help you
accumulate job experience quickly. Interning
reinforces your classroom knowledge with
hands-on experience, strengthens your
resume, and gives you a competitive
advantage.

In addition, cybersecurity internships offer a


chance to build valuable networks in the
industry. This is such a competitive
field, and it's not just about what you know; it's
also about who you know.

Interns can establish connections with


professionals, other participants, and mentors.
This helps build reliable, professional
connections for the future.

A cybersecurity internship can help you secure


a permanent role in the same organization.
Companies will prefer to hire their best interns
rather than onboarding new employees.

By the end of your internship, you'll already be


familiar with the company’s cybersecurity
policies and procedures. As such, your
cybersecurity internship can turn into a job
offer if you successfully prove your skills,
knowledge, and abilities.

But what can you do to prove your worth during


an internship? Let’s take a look at what your
day-to-day responsibilities will look like.

Responsibilities of a
Cybersecurity Intern
A cybersecurity intern’s duties will depend on
the type of internship, their skillset,
cybersecurity specialization, and the
organization. Here are some everyday
responsibilities an intern should expect:

Ÿ Detecting vulnerabilities in network security.

Ÿ Minor incident response and handling.


Ÿ Helping out with tools such as SIEM, Netflow,
IPS, DLP, and email gateway protection.

Ÿ Assisting with penetration testing and


vulnerability assessments.

Ÿ Testing web application security and creating


reports on findings.

Ÿ Researching cybersecurity threats.

Ÿ Record and track security incidents such as


email threats, copyright violations, abuse
reports, and compromised accounts.

Ÿ Assisting digital forensics analysis efforts and


fact gathering.

Ÿ Debugging malicious software.

Ÿ Monitoring inbound security data.

Ÿ Providing first-level compliance monitoring.

Ÿ Any other duties assigned.


Understanding what you would be expected to
do during an internship will help you audit your
current skillset and find gaps you need to fill.

In the following section, you’ll learn the skills


required to perform the duties above.
Skills Needed to Secure a
Cybersecurity Internship
Generally, an internship transforms classroom
knowledge into practical experience. It’s not a
place to learn from scratch, so you’ll need to
bring some skills on board.

Before applying for cybersecurity internships,


having the required skills and knowledge to
perform potential duties is vital.

Although technical skills are essential,


employers also prioritize interpersonal skills
like communication and teamwork. This is
because cybersecurity requires seamless
collaboration between multiple people and
departments.

We’ve compiled a list of skills from real


cybersecurity internship postings. This will
provide insights into what a potential employer
will expect you to bring.

In addition, it’s a good idea to use the following


skills as resume keywords when applying for a
cybersecurity internship. Since these are the
most in-demand skills, your application will
rank well with companies using applicant
tracking software.

Technical Skills

Ÿ Programming Languages, e.g., Python, Java,


and PHP
Ÿ A working knowledge of Microsoft Word, Excel,
Visio, TCP/IP, and basic web design.

Ÿ Vulnerability Assessment

Ÿ Operating systems, e.g., Linux

Ÿ Documentation

Ÿ Compliance

Ÿ Risk analysis and management

Ÿ Troubleshooting

Non-Technical Skills

Ÿ Teamwork and Collaboration

Ÿ Communication

Ÿ Willingness to learn

Ÿ Innovation
Ÿ Detail oriented

Ÿ Critical thinking

If you don’t have any of the technical skills


above, don’t worry. Cybrary provides
free entry-level cybersecurity
training that teaches you foundational skills
needed during an internship. This course is
taught by an industry leader and helps you
prepare for entry-level positions, including an
internship. You’ll learn the fundamentals of
computer networking, security controls,
incident response, and compliance.

Types of Cybersecurity
Internships
Each cybersecurity internship is unique. So,
when looking for an internship, first understand
the type you prefer. Let’s look at your options:

Paid Cybersecurity Internships


Paid internship programs are becoming
increasingly popular, especially in information
technology and cybersecurity.

Depending on the employer, interns may earn


less than entry-level cybersecurity
professionals or the same.
Paid internships frequently have a set end date
and offer little in the way of additional benefits
or rewards beyond the chance to gain
beneficial work experience. If you're still in
school, a paid internship provides additional
income while you study.

Unpaid Cybersecurity Internships


As the name suggests, unpaid internships
don’t offer
monetary rewards. The only purpose is to
prepare you for the workforce with hands-on
training.

Most internships, such as summer, are unpaid.


As a budding cybersecurity professional,
experience should be the priority. Although
some unpaid internships have no
compensation, they usually have many
opportunities to gain valuable skills and
experience.

Cybersecurity Externship
An externship means shadowing a
cybersecurity expert at work. The intern follows
the cybersecurity professional throughout the
day, assisting them with tasks and learning
about the job.

Externships are more focused on a


cybersecurity career path. If you’ve chosen
cybersecurity specialization, this could be an
excellent choice to pursue. Externship
timeframes are not as clearly defined as
internship timeframes, which typically last for
an entire season. Students may spend a single
day or several months observing the expert.

Cybersecurity Internship for


Credits
Money isn't the only reward you can get from
an internship. Some colleges may allow
students to earn credits by completing an
internship.

The requirements for internships to earn


credits will vary between schools. These
internships usually take place
during the summer when there are no classes.
Note that internships for credits can also be
paid.

How to Secure the Right


Cybersecurity Internship
Applying for an internship is like applying for a
job. Companies won’t give it out just because
you asked. You must stand out among many
candidates to secure the right cybersecurity
internship.

Employers will prioritize excellent grades and


extracurricular activities associated with
cybersecurity if you're a student.

Non-students will also need to demonstrate


their skills and suitability for the internship.

Here are steps to follow to secure a


cybersecurity internship:

1. Choose a Preferred Internship Pathway


There are many cybersecurity positions
available in the public and private sectors. So,
choosing a career path before applying for
internships is essential.

Working in government agencies will allow you


to tackle terrorist activities, gather intelligence
on espionage, and protect against foreign
sabotage.

On the other hand, the private sector will offer


the opportunity to fight threats peculiar to the
organization.
Students may speak with their advisor about
opportunities suited to their preferred
pathways.

Before applying, you should also decide


whether you want a remote or on-site
internship.

2. Ensure You Meet Intern Skills


Requirements
Most cybersecurity internships don’t require
experience or certifications. But there are
common skills requirements that we've
mentioned above. Make sure you meet them or
the specific requirements for the internship you
plan to apply for.

Some organizations, especially government


agencies, may require you to be a US citizen.

As a student, you should also ensure your


grades, credentials, degree program, and
schedule align with the company’s
requirements.
3. Prepare Your Resume
Some internships require students to submit a
resume and cover letter. Since it's unlikely that
you will have many experiences, your resume
should highlight your cybersecurity education
and accomplishments.

This could include contributions to open-source


projects, cybersecurity contests or bug bounty,
volunteer work, skills, certifications earned,
personal projects, and other extracurricular
activities.

Don’t forget to include any other roles where


you worked with
computers, software, or similar tools. Write
about your career goals and make sure they
align with the program.

4. Find Cybersecurity Internship


Opportunities
Armed with a completed resume and cover
letter, it’s time to apply for cybersecurity
internships. A strong reference, such as a
professor or former employer, can improve
your opportunities. Leverage professional sites
like LinkedIn when looking for an internship.
There are many places to find cybersecurity
internships. We’ll mention them in the following
paragraphs.

Where to Find the Right


Cybersecurity Internship
Let's look at where you can find the right
cybersecurity internship, depending on your
needs.

Government Cybersecurity Internships


Government agencies typically have numerous
cybersecurity and information technology
internship opportunities. Some government-
sponsored internship programs in the United
States include:

Ÿ Central Intelligence Agency (CIA) Student


Programs: This paid CIA cybersecurity
internship is open to graduates and
undergraduates. Participants will work
alongside industry experts and gain real-world
experience.

Ÿ The National Security Agency (NSA)


Cooperative
Ÿ Education Program: The NSA offers
development programs for people already
employed to gain the skills necessary for a
career switch and internships for high school
and college students. This is a paid
opportunity, and the length depends on the
program.

Ÿ Cybersecurity & Infrastructure Security Agency


(CISA) Internship: CISA’s paid internships are
open to students in accredited programs. It
covers students in high school to graduate
level, including recent graduates. Interns will
tour labs, meet senior management, and
attend local conferences.

Ÿ Department of Homeland Security (DHS)


Internship: Held in Washington DC, this 10-
week cybersecurity internship places
undergraduates and graduates interested in
cybersecurity alongside other industry
professionals in the DHS.

Ÿ Federal Bureau of Investigation (FBI)


Cybersecurity Intern Program: The FBI’s
cybersecurity intern program is a 10-week paid
program open to current undergraduates and
graduate students.

Private Cybersecurity Internships


If you prefer to work in non-government
agencies, here are some private organizations
with reputable internship opportunities.

Ÿ IBM Security Services Specialist Internships:


IBM’s programs don’t require you to have a
degree. You can
Ÿ become a cybersecurity intern or apprentice by
applying to one of their entry-level programs.

Ÿ Palo Alto Networks: The 12-week internship


program trains the next generation of
cybersecurity talent. Interns will solve
challenging projects and grow their
professional network in a fast-paced
environment.

Ÿ Meta: Formerly Facebook, Meta provides


internship opportunities for aspiring
cybersecurity and IT professionals. Interns will
be paired with a mentor and contribute to real-
world projects.

There are many more private companies with


internship programs. Platforms like Indeed,
ZipRecruiter, and LinkedIn are excellent when
looking for cybersecurity internships.

The work doesn’t end when you get in the


door. You’re there to gain valuable industry
experience. Whether or not it’s a paid position,
ensure you get the best on-the-job experience
that will help you down the way. Remember to
build relationships and create a reliable
network of professionals.

Conclusion
Cybersecurity internships help you gain
practical experience, build networks, and
accelerate your chances of securing a
permanent position. But you need the right skill
set to be chosen in the first place.

Cybrary’s accessible and affordable platform is


trusted by over 3 million other cybersecurity
professionals. It provides a
guided pathway to level up your cybersecurity
skills, certification preparation to validate your
skills, and hands-on labs to apply theoretical
knowledge. Start learning for free on Cybrary.

Start learning with Cybrary

Create a free account

Related Posts
All Blogs

BUILDING A SECURITY TEAM


JUNE 27, 2023

Digital Forensics and Incident


Response: What It Is, When You
Need It, and How to Implement It
A quick guide to digital forensics and incident
response (DFIR): what it is, when it’s needed,
how to implement a cutting-edge program, and
how to develop DFIR skills on your team.

BUILDING A SECURITY TEAM

JUNE 28, 2023

How to Build a Red Team


An overview of what a red team is (and isn’t),
and practical tips on how to build a Red Team
and develop offensive security skills in your
team.

TOOLS & APPLICATIONS

JUNE 7, 2023
How to Make the Most of Blending
Learning with Cybrary Live
Learn how to get the most from your
cybersecurity training platform by blending on-
demand learning with virtual, live courses led
by industry experts.
NEWS & EVENTS

JUNE 7, 2023

Introducing the New Cybrary


Learner Experience
Cybrary is launching a key update to the
Cybrary Learner experience to elevate hands-
on learning and measurement as guiding
tenets of Cybrary’s mission.

Start learning for free today


Join over 3 million professionals and 96% of
Fortune 1000 companies improving their
cybersecurity capabilities with Cybrary.
Ÿ
Create a free account

Create a Free Account

Sign in

or sign up with

Cybrary for teams

View all SSO options

Solutions

For Individuals

For Teams

Government

Company

About

Careers
Press

Platform

Catalog
Instructors

Alliances

Resources

Blog

Help Center

The Cybrary Podcast

Report a Vulnerability

Privacy PolicyTerms of Service

Cybrary, Inc.© 2024

Advertisements
Join Tata’s Cybersecurity
Internship for Free in 2024
Courses, Latest Notification, Science and
Tech /

By Admin

Cybersecurity is one of the most in-demand


and lucrative fields in the world today. With the
increasing threats and challenges posed by
hackers, cybercriminals, and malicious actors,
there is a need for skilled and competent
professionals who can protect and defend the
digital assets and infrastructure of various
organizations and individuals.

If you are interested in pursuing a career in


cybersecurity, or want to enhance your existing
skills and knowledge in this domain, then you
should not miss the opportunity to join Tata’s
cybersecurity internship for free in 2024. This is
a unique and comprehensive program that will
provide you with the theoretical and practical
training, guidance, and exposure that you need
to become a successful cybersecurity expert.

In this article, we will tell you everything you


need to know about this internship, such as:

Ÿ What is Tata’s cybersecurity internship and why


is it
Ÿ important?

Ÿ Who can apply and what are the benefits of


joining?

Ÿ How to register and what are the deadlines?

Ÿ What are the topics and skills covered in the


internship?

Ÿ Who are the TCS experts and mentors who will


guide you?

Ÿ How will the training be delivered and


assessed?

Ÿ What are the real-world projects and


challenges that you will work on?

Ÿ How will you showcase your work and get


feedback?

Ÿ What are the certificates and rewards that you


will earn?

Ÿ How will this internship help you advance your


career in cybersecurity?

Ÿ What are the next steps and resources to


continue learning?

Ÿ How to contact Tata and TCS for any queries


or support?

Let’s get started!

What would you like to read? Choose


Introduction

What is Tata’s cybersecurity


internship and why is it important?
Tata’s cybersecurity internship is a 12-week
online program that is designed to provide you
with the essential knowledge and skills in the
field of cybersecurity. It is offered by Tata
Consultancy Services (TCS), which is one of
the leading IT services and consulting
companies in the world, and a part of the Tata
Group, which is one of the largest and most
respected business conglomerates in India.

The internship is aimed at creating a pool of


talented and qualified cybersecurity
professionals who can meet the current and
future demands of the industry and society. It is
also a way of fulfilling Tata’s vision of
empowering and enabling the youth of India
and the world to achieve their full potential and
contribute to the nation’s growth and
development.
The internship is important because it will help
you to:

Ÿ Learn the fundamentals and advanced


concepts of cybersecurity, such as
cryptography, network security, web security,
cloud security, mobile security, IoT security,
ethical hacking, digital forensics, cyber laws,
and more.
Ÿ Gain hands-on experience and exposure to the
real-world scenarios and challenges faced by
the cybersecurity experts and practitioners in
various domains and sectors, such as banking,
healthcare, education, government, retail, etc.

Ÿ Develop and enhance your technical,


analytical, problem-solving, communication,
and teamwork skills that are essential for a
successful career in cybersecurity.

Ÿ Interact and network with the TCS experts and


mentors who have years of experience and
expertise in the field of cybersecurity, and who
will guide you throughout the internship and
beyond.

Ÿ Earn valuable certificates and rewards that will


boost your resume and portfolio, and increase
your chances of getting hired by the top
employers and organizations in the
cybersecurity domain.

Who can apply and what are the


benefits of joining?
The internship is open to anyone who has a
passion and interest in learning and exploring
the field of cybersecurity. You do not need to
have any prior knowledge or experience in
cybersecurity to join the internship. However,
you should have a basic understanding of
computer science, mathematics, and logic, and
be willing to learn and work hard.

The benefits of joining the internship are:


Ÿ You will get access to the high-quality and
updated curriculum and content that is curated
and delivered by the TCS experts and mentors,
who are the best in the industry and academia.

Ÿ You will get to learn at your own pace and


convenience, as the internship is completely
online and flexible. You can access the course
materials, videos, quizzes, assignments, and
projects anytime and anywhere, as long as you
have a stable internet connection and a
compatible device.

Ÿ You will get to work on the real-world projects


and challenges that are relevant and applicable
to the current and emerging trends and
technologies in the field of cybersecurity. You
will also get to use the latest tools and
platforms that are used by the professionals
and practitioners in the industry.

Ÿ You will get to showcase your work and get


feedback from the TCS experts and mentors,
who will evaluate your performance and
progress, and provide you with constructive
and personalized suggestions and tips to
improve your skills and knowledge.

Ÿ You will get to earn the certificates and rewards


that will recognize and validate your learning
and achievements in the internship. You will
also get to add them to your resume and
portfolio, and share them with your potential
employers and recruiters.
Ÿ You will get to join the Tata’s cybersecurity
community, which is a network of like-minded
and enthusiastic learners and experts who
share their insights, experiences, and
opportunities in the field of cybersecurity. You
will also get to participate in the events,
webinars, workshops, and competitions that
are organized by the community, and enhance
your learning and exposure.

Ÿ You will get to avail the career guidance and


support that is provided by the TCS experts
and mentors, who will help you to prepare for
the interviews, tests, and assessments that are
conducted by the employers and organizations
in the cybersecurity domain. You will also get to
access the job opportunities and referrals that
are offered by the TCS and its partners, and
increase your chances of getting hired.

How to register and what are the


deadlines?
The registration process for the internship is
simple and easy. You just need to follow these
steps:
Ÿ Visit the official website of the internship, which
is https://www.tcs.com/careers/india/internship.

Ÿ Click on the “Apply Now” button, and fill in the


online application form with your personal and
academic details, such as your name, email,
phone number, college, degree, etc.
Ÿ Upload your resume and a passport-sized
photo, and submit the application form.

Ÿ Wait for the confirmation email from the TCS


team, which will inform you about the status of
your application and the next steps.

The deadlines for the registration and the


internship are as follows:

Ÿ The registration for the internship will start


on February 1, 2024, and will end
on February 28, 2024.

Ÿ The internship will start on March 15, 2024,


and will end on June 15, 2024.

You should register for the internship as soon


as possible, as the seats are limited and the
applications are accepted on a first-come, first-
served basis.

Curriculum and Training

What are the topics and skills


covered in the internship?
The internship covers a wide range of topics
and skills that are essential and relevant for the
field of cybersecurity. The curriculum is divided
into four modules, each consisting of several
lessons, quizzes, assignments, and projects.
The modules are:
Ÿ Module 1: Fundamentals of Cybersecurity

Ÿ This module will introduce you to the basics


and core concepts of cybersecurity, such as
the definition, scope, objectives, principles, and
challenges of cybersecurity. You will also learn
about the various types and sources of cyber
threats and attacks, such as malware,
phishing, ransomware, denial-of-service, etc.,
and the common methods and techniques
used by the attackers, such as social
engineering, brute force, password cracking,
etc. You will also learn about the basic
terminologies and concepts of cryptography,
such as encryption, decryption, keys,
algorithms, etc., and the common types and
applications of cryptography, such as
symmetric, asymmetric, hash, digital signature,
etc. You will also learn about the basic
concepts and components of network security,
such as the OSI model, TCP/IP, protocols,
ports, firewalls, etc., and the common tools and
techniques used for network security, such as
scanning, sniffing, spoofing, etc.

Ÿ Module 2: Web and Cloud Security


Ÿ This module will teach you about the concepts
and aspects of web security, such as the web
architecture, web protocols, web vulnerabilities,
web attacks, web defenses, etc. You will also
learn about the concepts and aspects of cloud
security, such as the cloud models, cloud
services, cloud risks, cloud attacks, cloud
controls, etc. You will also learn about the
common tools and platforms used for web and
cloud security,
Ÿ such as OWASP, Burp Suite, Nmap,
Metasploit, AWS, Azure, etc.

Ÿ Module 3: Mobile and IoT Security

Ÿ This module will teach you about the concepts


and aspects of mobile security, such as the
mobile architecture, mobile platforms, mobile
applications, mobile vulnerabilities, mobile
attacks, mobile defenses, etc. You will also
learn about the concepts and aspects of IoT
security, such as the IoT architecture, IoT
devices, IoT protocols, IoT vulnerabilities, IoT
attacks, IoT defenses, etc. You will also learn
about the common tools and platforms used for
mobile and IoT security, such as Android
Studio, Xcode, Frida, Drozer, MQTT, CoAP,
etc.

Ÿ Module 4: Ethical Hacking and Digital


Forensics

Ÿ This module will teach you about the concepts


and aspects of ethical hacking, such as the
definition, scope, ethics, phases, and tools of
ethical hacking. You will also learn about the
concepts and aspects of digital forensics, such
as the definition, scope, methods, and tools of
digital forensics. You will also learn about the
common types and applications of digital
forensics, such as disk forensics, memory
forensics, network forensics, malware
forensics, etc.

Projects and Certificates


What are the real-world projects
and challenges that you will work
on?
The internship will provide you with the
opportunity to work on the real-world projects
and challenges that are based on the topics
and skills that you have learned in the
modules. The projects and challenges will
simulate the scenarios and situations that are
faced by the cybersecurity experts and
practitioners in various domains and sectors.
You will also get to use the latest tools and
platforms that are used by the professionals
and practitioners in the industry.

Some of the examples of the projects and


challenges that you will work on are:

Ÿ Project 1: Cryptanalysis

Ÿ In this project, you will apply your knowledge


and skills of cryptography to analyze and break
various types of encryption schemes and
algorithms, such as Caesar cipher, Vigenere
cipher, RSA, AES, etc. You will also learn how
to use tools such as Cryptool, CrypTool-Online,
etc. to perform cryptanalysis.

Ÿ Project 2: Web Application Penetration Testing

Ÿ In this project, you will apply your knowledge


and skills of web security to perform
penetration testing on a vulnerable web
application, such as DVWA, WebGoat, etc. You
will also learn how to use tools such as
OWASP
Ÿ ZAP, Burp Suite, Nmap, Metasploit, etc. to
perform web application penetration testing.

Ÿ Project 3: Cloud Security Assessment

Ÿ In this project, you will apply your knowledge


and skills of cloud security to perform security
assessment on a cloud service provider, such
as AWS, Azure, etc. You will also learn how to
use tools such as CloudMapper, ScoutSuite,
CloudSploit, etc. to perform cloud security
assessment.

Ÿ Project 4: Mobile Application Reverse


Engineering

Ÿ In this project, you will apply your knowledge


and skills of mobile security to perform reverse
engineering on a mobile application, such as
WhatsApp, Instagram, etc. You will also learn
how to use tools such as APKTool, dex2jar, JD-
GUI, Frida, Drozer, etc. to perform mobile
application reverse engineering.

Ÿ Project 5: IoT Device Hacking


Ÿ In this project, you will apply your knowledge
and skills of IoT security to perform hacking on
an IoT device, such as a smart bulb, a smart
lock, a smart camera, etc. You will also learn
how to use tools such as Shodan, Nmap,
MQTT.fx, CoAPthon, etc. to perform IoT device
hacking.

Ÿ Challenge 1: Capture the Flag


Ÿ In this challenge, you will apply your
knowledge and skills of ethical hacking to
participate in a capture the flag (CTF)
competition, which is a gamified way of testing
your cybersecurity skills. You will also learn
how to use tools such as Kali Linux, Wireshark,
Hydra, John the Ripper, etc. to participate in a
CTF competition.

Ÿ Challenge 2: Digital Forensics Investigation

Ÿ In this challenge, you will apply your


knowledge and skills of digital forensics to
conduct a digital forensics investigation, which
is a process of collecting, preserving,
analyzing, and presenting digital evidence. You
will also learn how to use tools such as
Autopsy, FTK Imager, Volatility, Wireshark, etc.
to conduct a digital forensics investigation.

How will you showcase your work


and get feedback?
The internship will provide you with the
platform and opportunity to showcase your
work and get feedback from the TCS experts
and mentors, who will evaluate your
performance and progress, and provide you
with constructive and personalized suggestions
and tips to improve your skills and knowledge.

You will showcase your work and get feedback


in the following ways:

Ÿ You will submit your projects and challenges on


the
Ÿ online portal of the internship, where the TCS
experts and mentors will review and grade
them, and provide you with the feedback and
comments.

Ÿ You will present your projects and challenges


on the online sessions of the internship, where
the TCS experts and mentors will give you the
feedback and suggestions, and also answer
your queries and doubts.

Ÿ You will share your projects and challenges on


the online community of the internship, where
the TCS experts and mentors, as well as your
fellow interns, will give you the feedback and
appreciation, and also exchange their ideas
and experiences.

What are the certificates and


rewards that you will earn?
The internship will provide you with the
certificates and rewards that will recognize and
validate your learning and achievements in the
internship. You will also get to add them to your
resume and portfolio, and share them with your
potential employers and recruiters.

You will earn the certificates and rewards in the


following ways:

Ÿ You will earn the certificate of completion for


the internship, which will certify that you have
successfully completed the 12-week online
program on
Ÿ cybersecurity, and have acquired the essential
knowledge and skills in the field of
cybersecurity.

Ÿ You will earn the certificate of excellence for


the internship, which will certify that you have
performed exceptionally well in the projects
and challenges, and have demonstrated the
advanced knowledge and skills in the field of
cybersecurity.

Ÿ You will earn the certificate of merit for the


internship, which will certify that you have
participated actively and enthusiastically in the
events, webinars, workshops, and
competitions, and have contributed to the
learning and growth of the internship
community.

Ÿ You will earn the rewards and incentives for the


internship, which will include the cash prizes,
vouchers, coupons, merchandise, etc., that will
be given to the top performers and participants
in the projects, challenges, events, webinars,
workshops, and competitions.
Conclusion

How will this internship help you


advance your career in
cybersecurity?
The internship will help you advance your
career in cybersecurity in the following ways:

Ÿ It will provide you with the theoretical and


practical training, guidance, and exposure that
you need to
Ÿ become a successful cybersecurity expert.

Ÿ It will help you to develop and enhance your


technical, analytical, problem-solving,
communication, and teamwork skills that are
essential for a successful career in
cybersecurity.

Ÿ It will help you to build and showcase your


resume and portfolio, and increase your
chances of getting hired by the top employers
and organizations in the cybersecurity domain.

Ÿ It will help you to join and network with the


Tata’s cybersecurity community, which is a
network of like-minded and enthusiastic
learners and experts who share their insights,
experiences, and opportunities in the field of
cybersecurity.

Ÿ It will help you to avail the career guidance and


support that is provided by the TCS experts
and mentors, who will help you to prepare for
the interviews, tests, and assessments that are
conducted by the employers and organizations
in the cybersecurity domain.
Ÿ It will help you to access the job opportunities
and referrals that are offered by the TCS and
its partners, and increase your chances of
getting hired.

What are the next steps and


resources to continue learning?
The internship will provide you with the next
steps and resources to continue learning and
exploring the field of cybersecurity. You can
follow these steps and resources to further
enhance your skills and knowledge in the field
of cybersecurity:

Ÿ You can enroll in the advanced courses and


certifications on cybersecurity that are offered
by the TCS and its partners, such as the TCS
iON Digital Learning Hub, the TCS iON
ProCert, the TCS iON Career Edge, etc. These
courses and certifications will provide you with
the in-depth and specialized knowledge and
skills in the various domains and areas of
cybersecurity, such as cyber defense, cyber
offense, cyber governance, cyber resilience,
etc.

Ÿ You can participate in the online and offline


events and competitions on cybersecurity that
are organized by the TCS and its partners,
such as the TCS CodeVita, the TCS
HackQuest, the TCS Cybersecurity Challenge,
etc. These events and competitions will provide
you with the opportunity to test and showcase
your cybersecurity skills, and also win exciting
prizes and rewards.

Ÿ You can join and follow the online and offline


communities and platforms on cybersecurity
that are created and curated by the TCS and
its partners, such as the TCS Cybersecurity
Community, the TCS Cybersecurity Blog, the
TCS Cybersecurity Podcast, the TCS
Cybersecurity YouTube Channel, etc. These
communities and platforms will provide you
with the
Ÿ latest news, updates, trends, and best
practices on cybersecurity, and also enable
you to interact and network with the
cybersecurity experts and enthusiasts.

Ÿ You can read and watch the books and videos


on cybersecurity that are recommended by the
TCS and its partners, such as the
Cybersecurity Essentials by Charles P.
Pfleeger, Shari Lawrence Pfleeger, and
Jonathan Margulies, the Hacking: The Art of
Exploitation by Jon Erickson, the The Art of
Deception by Kevin D. Mitnick and William L.
Simon, the The Hacker Playbook by Peter Kim,
the Mr. Robot by Sam Esmail, etc. These
books and videos will provide you with the
comprehensive and practical knowledge and
skills on cybersecurity, and also inspire and
motivate you to pursue your passion and
interest in cybersecurity.

How to contact Tata and TCS for


any queries or support?
The internship will provide you with the contact
details and support channels of Tata and TCS
for any queries or support that you may have
regarding the internship or the field of
cybersecurity. You can contact and reach out to
Tata and TCS in the following ways:

Ÿ You can email your queries or feedback to the


TCS team at cybersecurity-
[email protected], and they will respond to
you within 24 hours.

Ÿ You can call or text your queries or feedback to


the TCS
Ÿ team at +91-22-6778-9999, and they will
respond to you as soon as possible.

Ÿ You can visit the official website of the


internship, which
is https://www.tcs.com/careers/india/internship,
and check the FAQ section, which has the
answers to the most common and frequently
asked questions about the internship.

Ÿ You can also follow the social media handles of


the TCS and its partners, such as the TCS
Facebook, Twitter, LinkedIn, Instagram, etc.,
and get the latest updates and information
about the internship and the field of
cybersecurity.

We hope that this article has given you a clear


and comprehensive overview of the Tata’s
cybersecurity internship for free in 2024, and
has motivated and encouraged you to join and
benefit from this amazing and exciting
opportunity. If you have any queries or
feedback, please feel free to contact us
anytime. We look forward to hearing from you
and seeing you in the internship. Thank you
and happy learning! 😊
Print 🖨PDF 📄

Leave a Comment
You must be logged in to post a comment.

About The Author


Ÿ

https://studentera.in/iim-shillong-assistant-
professor-recruitment/

IIM Shillong Assistant Professor


Recruitment: Online Application
Process | Apply Here
Ÿ

https://studentera.in/rpsc-ras-syllabus-2023-
free-pdf-download/
RPSC RAS Syllabus 2023 in Hindi
& English
FREE PDF Download [Pre+Mains]
Ÿ

https://studentera.in/synthetic-human-embryos/

Revolutionary Breakthrough:
Synthetic Human Embryos Unlock
Early Development Secrets
Ÿ

https://studentera.in/pet-insurance-for-
students/

https://studentera.in/colleges-in-the-us-for-
indian-students/
https://studentera.in/journey-to-the-usa-a-
guide-for-indian-students/
Ÿ

https://studentera.in/teen-girl-commits-suicide-
in-kota-rajasthan/

https://studentera.in/jee-mains-2024-exam-
admit-card/

https://studentera.in/smart-college-finance/

https://studentera.in/nfts-student-investment/
https://studentera.in/student-loan-repayment-
strategies/

https://studentera.in/pet-insurance-for-
students/
Ÿ

https://studentera.in/colleges-in-the-us-for-
indian-students/

https://studentera.in/journey-to-the-usa-a-
guide-for-indian-students/

https://studentera.in/teen-girl-commits-suicide-
in-kota-rajasthan/

https://studentera.in/jee-mains-2024-exam-
admit-card/
https://studentera.in/smart-college-finance/
Ÿ https://studentera.in/nfts-student-investment/

https://studentera.in/student-loan-repayment-
strategies/

https://studentera.in/pet-insurance-for-
students/

Pet Insurance for Students

January 16, 2024 No Comments

Introduction Pets are more than just animals.


They are loyal companions, stress relievers,
and sources...
Learn more

Ÿ 1

Ÿ 2

Ÿ 3
Ÿ 4

Ÿ 5

Ÿ 6

Ÿ 7

Ÿ 8

Copyright ©2023-2024 Studentera | All Rights


Reserved.

5 years from now I will Unleash my craft to the


world
When you didn't start from the bottom, it's
incredibly difficult to paint a picture of odds
being stacked against you.

I make a promise to the man in the mirror


today, I will help him be the best version of
himself by Jan vallone.

Sometimes we're what we wish to forget it


chapter 2

Always remember where you came from.


It ain't done unless you say it is.

Ÿ Home

Ÿ Computer Network

Ÿ DBMS

Ÿ DS

Ÿ DAA

Ÿ Operating Systems

Ÿ Computer Fundamentals

Ÿ Java

Ÿ Python

Ÿ HTML
Ÿ Selenium

Ÿ JavaScript
Ÿ jQuery

Ÿ Interview Q

Computer Network
TutorialIntroductionFeaturesArchitectureComp
onentsComputer Network
TypesTopologiesTransmission Modes

Models
ModelsOSI ModelTCP/IP Model

Physical Layer
Digital TransmissionTransmission
MediaGuided MediaUnGuided
MediaMultiplexingSwitchingSwitching
ModesSwitching Techniques

Data Link layer


Data Link layerError DetectionError
CorrectionData Link Controls

Network Layer
Network LayerNetwork
AddressingRoutingNetwork Layer Protocols
Routing Algorithm
Routing AlgorithmDistance VectorLink State
Routing

Transport Layer
Transport LayerTransport Layer Protocols

Application Layer
Application LayerClient & Server Model

Application Protocols
DNSFTPTelnetSMTPSNMPHTTP

Network Security
SecurityPrivacyDigital SignaturePGP

Misc
What is RouterOSI vs TCP/IPTCP vs
UDPTCPTCP PortIPv4 vs IPv6ARP Packet
FormatARP TableWorking of ARPFTP
ClientFTP CommandsFTP ServerI2P
ProtocolSliding Window ProtocolSNMPSPI
ProtocolIPARP CommandsARP RequestARP -
Address Resolution ProtocolARP and its
typesTCP RetransmissionCAN ProtocolHTTP
Status CodesHTTP vs HTTPSRIP
ProtocolUDP ProtocolICMP
ProtocolMQTT ProtocolOSPF ProtocolStop &
Wait ProtocolIMAP ProtocolPOP
ProtocolCIFSDASDIMMiSCSINASNFSNVMeS
ANBGPGo-Back-N ARQRJ CableConnection-
Oriented vs Connectionless ServiceCDMA vs
GSMWhat is MAC AddressModem vs
RouterSwitch vs RouterUSB 2.0 vs USB
3.0CSMA CA vs CSMA CDMultiple Access
ProtocolsURI vs URLIMAP vs. POP3SSH
MeaningUTP vs STPStatus Code 400MIME
ProtocolIP addressWhat is a proxy server and
how does it workHow to set up and use a proxy
serverWhat is network securityWWW is based
on which modelProxy Server ListFundamentals
of Computer NetworkingIP Address Format
and TableBus topology vs Ring topologyBus
topology vs Star topologyCircuit Switching vs
Packet switchingstar vs ring topologyRouter vs
BridgeTCP Connection TerminationImage
SteganographyNetwork NeutralityOnion
RoutingASA featuresRelabel-to-front
AlgorithmTypes of Server Virtualization in
Computer NetworkAccess Lists (ACL)Digital
Subscriber Line (DSL)Operating system based
VirtualizationContext based Access Control
(CBAC)Cristian's AlgorithmService Set
Identifier (SSID) in Computer NetworkVoice
over Internet Protocol (VoIP)Challenge
Response Authentication Mechanism
(CRAM)Extended Access ListLi-fi vs. Wi-
fiReflexive Access ListSynchronous Optical
Network (SONET)Wifi protected access
(WPA)Wifi Protected Setup (WPS)Standard
Access ListTime Access ListWhat is 3D
Internet4G Mobile Communication
TechnologyTypes of Wireless Transmission
MediaBest Computer Networking CoursesData
RepresentationNetwork CriteriaClassful vs
Classless addressingDifference between
BOOTP and RARP in Computer
NetworkingWhat is AGP
(Accelerated Graphics Port)Advantages and
Disadvantages of Satellite
CommunicationExternal IP
AddressAsynchronous Transfer Mode (ATM) in
Computer NetworkTypes of Authentication
ProtocolsWhat is a CISCO Packet TracerHow
does BOOTP workSubnetting in Computer
NetworksMesh Topology Advantages and
DisadvantagesRing Topology Advantages and
DisadvantagesStar Topology Advantages and
DisadvantagesTree Topology Advantages and
DisadvantagesZigbee Technology-The smart
home protocolNetwork Layer in OSI
ModelPhysical Layer in OSI ModelData Link
Layer in OSI ModelInternet explorer shortcut
keysNetwork Layer Security | SSL
ProtocolsPresentation Layer in OSI
ModelSession Layer in OSI ModelSUBNET
MASKTransport Layer Security | Secure
Socket Layer (SSL) and SSL
ArchitectureFunctions, Advantages and
Disadvantages of Network LayerFunctions,
Advantages and Disadvantages of the Physical
LayerTypes of Internet ConnectionNoisy and
Noiseless ChannelAdvantages and
Disadvantages of Bus TopologyAdvantages
and Disadvantages of Ring
TopologyAdvantages and Disadvantages of
Star TopologyFunctions, Advantages and
Disadvantages of Network LayerProtocols in
Noiseless and Noisy ChannelAdvantages and
Disadvantages of Mesh TopologyCloud
Networking - Managing and Optimizing Cloud-
Based NetworksCollision Domain and
Broadcast DomainCount to Infinity Problem in
Distance Vector RoutingDifference Between
Go-Back-N and Selective Repeat
ProtocolDifference between Stop and Wait,
GoBackN, and Selective RepeatNetwork
Function Virtualization (NFV): transforming
Network Architecture with Virtualized
FunctionsNetwork-Layer Security | IPSec
ModesNetwork-Layer Security | IPSec
Protocols and ServicesPing vs
TracerouteSoftware Defined Networking
(SDN): Benefits and Challenges of Network
VirtualizationSoftware Defined Networking
(SDN) vs. Network Function Virtualization
(NFV)Virtual Circuits vs Datagram
NetworksBlueSmack Attack in Wireless
NetworksBluesnarfing Attack in Wireless
NetworksDirect Sequence Spread
SpectrumWarchalking in Wireless
NetworksWEP (Wired Equivalent
Privacy)Wireless security encryptionWireless
Security in an EnterpriseQuantum
NetworkingNetwork AutomationDifference
between MSS and MTUWhat is MTUMesh
Networks: A decentralized and Self-Organizing
Approach to NetworkingWhat is Autonomous
SystemWhat is MSSCyber security and
Software securityInformation security and
Network securitySecurity Engineer and
Security ArchitectProtection Methods for
Network SecurityTrusted Systems in Network
SecurityWhat are Authentication Tokens in
Network securityCookies in Network
SecurityIntruders in Network SecurityNetwork
Security Toolkit (NST) in virtual boxPivoting-
Moving Inside a NetworkSecurity Environment
in Computer NetworksVoice Biometric
technique in Network SecurityAdvantages and
Disadvantages of Conventional
TestingDifference between Kerberos and
LDAPCyber security and Information
SecurityGraphQL Attacks and
SecurityApplication Layer in OSI
ModelApplications of Remote SensingSeven
Layers of IT SecurityWhat is Ad Hoc TCPWhat
is Server Name Indication(SNI)Difference
Between Infrastructure and Infrastructure Less
NetworkCollision Avoidance in Wireless
NetworksDifference Engine and Analytical
EngineHotspot 2.0Intrusion Prevention System
(IPS)Modes of Connection BluetoothNoisy
Channel
protocolsParzen Windows density Estimation
TechniquePrinciple of Information System
SecurityWhat are Bots, Botnets, and
ZombiesWindows Memory
ManagementWireless dos attack on Wifi

MCQ
Computer Network MCQComputer Network
MCQ Part2

Interview Questions
Networking Questions

ADVERTISEMENT

Next →← Prev

Network Layer
Ÿ The Network Layer is the third layer of the OSI
model.

Ÿ It handles the service requests from the


transport layer and further forwards the service
request to the data link layer.

Ÿ The network layer translates the logical


addresses into physical addresses
Ÿ It determines the route from the source to the
destination and also manages the traffic
problems such as switching, routing and
controls the congestion of data packets.

Ÿ The main role of the network layer is to move


the packets from sending host to the receiving
host.

The main functions performed by


the network layer are:
ADVERTISEMENT

Ÿ Routing: When a packet reaches the router's


input link, the router will move the packets to
the router's output link. For example, a packet
from S1 to R1 must be forwarded to the next
router on the path to S2.

Ÿ Logical Addressing: The data link layer


implements the physical addressing and
network layer implements the logical
addressing. Logical addressing is also used to
distinguish between source and destination
system. The network layer adds a header to
the packet which includes the logical
addresses of both the sender and the receiver.

Ÿ Internetworking: This is the main role of the


network layer that it provides the logical
connection between different types of
networks.
Ÿ Fragmentation: The fragmentation is a
process of breaking the packets into the
smallest individual data units that travel
through different networks.

Forwarding & Routing


ADVERTISEMENT

In Network layer, a router is used to forward


the packets. Every router has a forwarding
table. A router forwards a packet by examining
a packet's header field and then using the
header field value to index into the forwarding
table. The value stored in the forwarding table
corresponding to the header field value
indicates the router's outgoing interface link to
which the packet is to be forwarded.

For example, the router with a header field


value of 0111 arrives at a router, and then
router indexes this header value into the
forwarding table that determines the output link
interface is 2. The router forwards the packet to
the interface 2. The routing algorithm
determines the values that are inserted in the
forwarding table. The routing algorithm can be
centralized or decentralized.

ADVERTISEMENT
Ÿ

Services Provided by the Network


Layer
ADVERTISEMENT

Ÿ Guaranteed delivery: This layer provides the


service which guarantees that the packet will
arrive at its destination.

Ÿ Guaranteed delivery with bounded


delay: This service guarantees that the packet
will be delivered within a specified host-to-host
delay bound.
Ÿ In-Order packets: This service ensures that
the packet arrives at the destination in the
order in which they are sent.

Ÿ Guaranteed max jitter: This service ensures


that the amount of time taken between two
successive transmissions at the sender is
equal to the time between their receipt at the
destination.

Ÿ Security services: The network layer provides


security by using a session key between the
source and destination host. The network layer
in the source host
Ÿ encrypts the payloads of datagrams being sent
to the destination host. The network layer in
the destination host would then decrypt the
payload. In such a way, the network layer
maintains the data integrity and source
authentication services.

Next TopicNetwork Addressing

ADVERTISEMENT

← PrevNext →

Ÿ https://www.facebook.com/sharer.php?
u=https://www.javatpoint.com/network-layer
https://twitter.com/share?url=https://
www.javatpoint.com/network-layer
https://www.pinterest.com/pin/create/button/?
url=https://www.javatpoint.com/network-layer

Learn Latest Tutorials


Splunk
SPSS

Swagger

Transact-SQL

Tumblr

ReactJS

Regex
Reinforcement Learning
R Programming

RxJS

React Native

Python Design Patterns

Python Pillow

Python Turtle

Keras
Preparation

Aptitude
Reasoning

Verbal Ability

Interview Questions

Company Questions

Trending Technologies

Artificial Intelligence
AWS

Selenium
Cloud Computing

Hadoop

ReactJS

Data Science

Angular 7

Blockchain
Git

Machine Learning
DevOps

B.Tech / MCA

DBMS

Data Structures

DAA

Operating System

Computer Network
Compiler Design
Computer Organization

Discrete Mathematics

Ethical Hacking

Computer Graphics

Software Engineering

Web Technology
Cyber Security

Automata
C Programming

C++

Java

.Net

Python

Programs
Control System

Data Mining
Data Warehouse

Open In App

GEEKSFORGEEKS

Network Layer Services-


Packetizing, Routing and
Forwarding
Pre-Requisite: OSI Model

The network Layer is the third layer in the OSI


model of computer networks. Its main function
is to transfer network packets from the source
to the destination. It is involved both the source
host and the destination host. At the source, it
accepts a packet from the transport layer,
encapsulates it in a datagram, and then
delivers the packet to the data link layer so that
it can further be sent to the receiver. At the
destination, the datagram is decapsulated, and
the packet is extracted and delivered to the
corresponding transport layer.

Features of Network Layer


Ÿ The main responsibility of the Network layer is
to carry the data packets from the source to the
destination without changing or using them.

Ÿ If the packets are too large for delivery, they


are fragmented i.e., broken down into smaller
packets.

Ÿ It decides the route to be taken by the packets


to travel from the source to the destination
among the multiple routes available in a
network (also called routing).

Ÿ The source and destination addresses are


added to the data packets inside the network
layer.

Services Offered by Network


Layer
The services which are offered by the network
layer protocol are as follows:

Ÿ Packetizing
Ÿ Routing

Ÿ Forwarding

1. Packetizing
The process of encapsulating the data
received from the upper layers of the network
(also called payload) in a network layer packet
at the source and decapsulating the
payload from the network layer packet at the
destination is known as packetizing.

The source host adds a header that contains


the source and destination address and some
other relevant information required by the
network layer protocol to the payload received
from the upper layer protocol and delivers the
packet to the data link layer.

The destination host receives the network layer


packet from its data link layer, decapsulates
the packet, and delivers the payload to the
corresponding upper layer protocol. The
routers in the path are not allowed to change
either the source or the destination address.
The routers in the path are not allowed to
decapsulate the packets they receive unless
they need to be fragmented.
Packetizing

2. Routing
Routing is the process of moving data from one
device to another device. These are two other
services offered by the network layer. In a
network, there are a number of routes
available from the source to the destination.
The network layer specifies some strategies
which find out the best possible route. This
process is referred to as routing. There are a
number of routing protocols that are used in
this process and they should be run to help the
routers coordinate with each other and help in
establishing communication throughout the
network.

Routing

3. Forwarding
Forwarding is simply defined as the action
applied by each router when a packet arrives
at one of its interfaces. When a router receives
a packet from one of its attached networks, it
needs to forward the packet to another
attached network (unicast routing) or to some
attached networks (in the case of multicast
routing). Routers are used on the network for
forwarding a packet from the local network to
the remote network. So, the process of routing
involves packet forwarding from an entry
interface out to an exit interface.

Forwarding

Difference between Routing and


Forwarding
Routing
Forwarding
Routing is the process of moving data from one
device to another device.Forwarding is simply
defined as the action applied by each router
when a packet arrives at one of its
interfaces.Operates on the Network
Layer.Operates on the Network Layer.Work is
based on Forwarding Table.Checks the
forwarding table and work according to
that.Works on protocols like Routing
Information Protocol (RIP) for Routing.Works
on protocols like UDP Encapsulating Security
Payloads

Other Services Expected from


Network Layer
Ÿ Error Control

Ÿ Flow Control

Ÿ Congestion Control

1. Error Control
Although it can be implemented in the network
layer, it is usually not preferred because the
data packet in a network layer may be
fragmented at each router, which makes error-
checking inefficient in the network layer.

2. Flow Control
It regulates the amount of data a source can
send without overloading the receiver. If the
source produces data at a very faster rate than
the receiver can consume it, the receiver will
be overloaded with data. To control the flow of
data, the receiver should send feedback to the
sender to inform the latter that it is overloaded
with data.
There is a lack of flow control in the design of
the network layer. It does not directly provide
any flow control. The datagrams are sent by
the sender when they are ready, without any
attention to the readiness of the receiver.

3. Congestion Control
Congestion occurs when the number of
datagrams sent by the source is beyond the
capacity of the network or routers. This is
another issue in the network layer protocol. If
congestion continues, sometimes a situation
may arrive where the system collapses and no
datagrams are delivered. Although congestion
control is indirectly implemented in the network
layer, still there is a lack of congestion control
in the network layer.
Advantages of Network Layer
Services
Ÿ Packetization service in the network layer
provides ease of transportation of the data
packets.

Ÿ Packetization also eliminates single points of


failure in data communication systems.
Ÿ Routers present in the network layer reduce
network traffic by creating collision and
broadcast domains.

Ÿ With the help of Forwarding, data packets are


transferred from one place to another in the
network.

Disadvantages of Network
Layer Services
Ÿ There is a lack of flow control in the design of
the network layer.

Ÿ Congestion occurs sometimes due to the


presence of too many datagrams in a network
that is beyond the capacity of the network or
the routers. Due to this, some routers may drop
some of the datagrams, and some important
pieces of information may be lost.

Ÿ Although indirect error control is present in the


network layer, there is a lack of proper error
control mechanisms as due to the presence of
fragmented data packets, error control
becomes difficult to implement.
Article Tags :

Computer Networks

GATE CS
Computer Networks-Network Layer

Recommended Articles

1. Difference Between Network Layer


Protocols and Application Layer Protocols

2. Why Flow Control is Used in Both Data Link


Layer and Network Layer?

3. Selective forwarding Attack in wireless


Sensor Network

4. Difference between Classful Routing and


Classless Routing

5. Difference between Distance vector routing


and Link State routing

6. What is Routing Loop and How to Avoid


Routing Loop?

7. Unicast Routing - Link State Routing

8. Difference between layer-2 and layer-3


switches
9. Difference between Secure Socket Layer
(SSL) and Transport Layer Security (TLS)

10. Cisco Discovery Protocol (CDP) and Link


Layer Discovery Protocol (LLDP) in Data Link
Layer

11. Inter VLAN Routing by Layer 3 Switch

12. Services provided by Data Link Layer


13. Port Forwarding on Router and Why do we
need It

14. Difference Between SSH Local and


Remote Port Forwarding

15. Program for IP forwarding table lookup

16. SSH Port Forwarding

17. Internal/External Forwarding Rule in GCP

18. Frame forwarding methods on Switches

19. Routing Tables in Computer Network

20. Hierarchical Ad-hoc Network Routing


Protocol

21. What is Dynamic Routing in Computer


Network?

22. Routing v/s Routed Protocols in Computer


Network
23. Computer Networks | Network Layer |
Question 1

24. Computer Networks | Network Layer |


Question 2

25. Fragmentation at Network Layer

Read Full Article

A-143, 9th Floor, Sovereign Corporate Tower,


Sector-136,
Noida, Uttar Pradesh - 201305

Ÿ Company

Ÿ About Us

Ÿ Legal

Ÿ Careers

Ÿ In Media

Ÿ Contact Us

Ÿ Advertise with us

Ÿ GFG Corporate Solution

Ÿ Placement Training Program

Ÿ Apply for Mentor

Ÿ Explore

Ÿ Job-A-Thon Hiring Challenge


Ÿ Hack-A-Thon

Ÿ GfG Weekly Contest

Ÿ Offline Classes (Delhi/NCR)


Ÿ DSA in JAVA/C++

Ÿ Master System Design

Ÿ Master CP

Ÿ GeeksforGeeks Videos

Ÿ Geeks Community

Ÿ Languages

Ÿ Python

Ÿ Java

Ÿ C++

Ÿ PHP

Ÿ GoLang

Ÿ SQL

Ÿ R Language
Ÿ Android Tutorial

Ÿ Tutorials Archive

Ÿ DSA
Ÿ Data Structures

Ÿ Algorithms

Ÿ DSA for Beginners

Ÿ Basic DSA Problems

Ÿ DSA Roadmap

Ÿ Top 100 DSA Interview Problems

Ÿ DSA Roadmap by Sandeep Jain

Ÿ All Cheat Sheets

Ÿ Data Science & ML

Ÿ Data Science With Python

Ÿ Data Science For Beginner

Ÿ Machine Learning Tutorial

Ÿ ML Maths
Ÿ Data Visualisation Tutorial

Ÿ Pandas Tutorial
Ÿ NumPy Tutorial

Ÿ NLP Tutorial

Ÿ Deep Learning Tutorial

Ÿ HTML & CSS

Ÿ HTML

Ÿ CSS

Ÿ Web Templates

Ÿ CSS Frameworks

Ÿ Bootstrap

Ÿ Tailwind CSS

Ÿ SASS

Ÿ LESS

Ÿ Web Design
Ÿ Python

Ÿ Python Programming Examples

Ÿ Django Tutorial
Ÿ Python Projects

Ÿ Python Tkinter

Ÿ Web Scraping

Ÿ OpenCV Python Tutorial

Ÿ Python Interview Question

Ÿ Computer Science

Ÿ GATE CS Notes

Ÿ Operating Systems

Ÿ Computer Network

Ÿ Database Management System

Ÿ Software Engineering

Ÿ Digital Logic Design

Ÿ Engineering Maths
Ÿ DevOps

Ÿ Git

Ÿ AWS
Ÿ Docker

Ÿ Kubernetes

Ÿ Azure

Ÿ GCP

Ÿ DevOps Roadmap

Ÿ Competitive Programming

Ÿ Top DS or Algo for CP

Ÿ Top 50 Tree

Ÿ Top 50 Graph

Ÿ Top 50 Array

Ÿ Top 50 String

Ÿ Top 50 DP

Ÿ Top 15 Websites for CP


Ÿ System Design

Ÿ High Level Design

Ÿ Low Level Design


Ÿ UML Diagrams

Ÿ Interview Guide

Ÿ Design Patterns

Ÿ OOAD

Ÿ System Design Bootcamp

Ÿ Interview Questions

Ÿ JavaScript

Ÿ JavaScript Examples

Ÿ TypeScript

Ÿ ReactJS

Ÿ NextJS

Ÿ AngularJS

Ÿ NodeJS
Ÿ Lodash

Ÿ Web Browser
Ÿ NCERT Solutions

Ÿ Class 12

Ÿ Class 11

Ÿ Class 10

Ÿ Class 9

Ÿ Class 8

Ÿ Complete Study Material

Ÿ School Subjects

Ÿ Mathematics

Ÿ Physics

Ÿ Chemistry

Ÿ Biology

Ÿ Social Science
Ÿ English Grammar

Ÿ Commerce

Ÿ Accountancy
Ÿ Business Studies

Ÿ Economics

Ÿ Management

Ÿ HR Management

Ÿ Finance

Ÿ Income Tax

Ÿ UPSC Study Material

Ÿ Polity Notes

Ÿ Geography Notes

Ÿ History Notes

Ÿ Science and Technology Notes

Ÿ Economy Notes

Ÿ Ethics Notes
Ÿ Previous Year Papers

Ÿ SSC/ BANKING

Ÿ SSC CGL Syllabus


Ÿ SBI PO Syllabus

Ÿ SBI Clerk Syllabus

Ÿ IBPS PO Syllabus

Ÿ IBPS Clerk Syllabus

Ÿ SSC CGL Practice Papers

Ÿ Colleges

Ÿ Indian Colleges Admission & Campus


Experiences

Ÿ List of Central Universities - In India

Ÿ Colleges in Delhi University

Ÿ IIT Colleges

Ÿ NIT Colleges

Ÿ IIIT Colleges
Ÿ Companies

Ÿ META Owned Companies

Ÿ Alphabhet Owned Companies


Ÿ TATA Group Owned Companies

Ÿ Reliance Owned Companies

Ÿ Fintech Companies

Ÿ EdTech Companies

Ÿ Preparation Corner

Ÿ Company Wise Preparation

Ÿ Preparation for SDE

Ÿ Experienced Interviews

Ÿ Internship Interviews

Ÿ Competitive Programming

Ÿ Aptitude Preparation

Ÿ Puzzles

Ÿ Exams
Ÿ JEE Mains

Ÿ JEE Advanced

Ÿ GATE CS
Ÿ NEET

Ÿ UGC NET

Ÿ More Tutorials

Ÿ Software Development

Ÿ Software Testing

Ÿ Product Management

Ÿ SAP

Ÿ SEO - Search Engine Optimization

Ÿ Linux

Ÿ Excel

Ÿ Free Online Tools

Ÿ Typing Test

Ÿ Image Editor
Ÿ Code Formatters

Ÿ Code Converters

Ÿ Currency Converter
Ÿ Random Number Generator

Ÿ Random Password Generator

Ÿ Write & Earn

Ÿ Write an Article

Ÿ Improve an Article

Ÿ Pick Topics to Write

Ÿ Share your Experiences

Ÿ Internships

@GeeksforGeeks, Sanchhaya Education


Private Limited, All rights reserved

Networking
Ÿ Home

Ÿ Network infrastructure
DEFINITION

Network layer
Ÿ Andrew Froehlich, West Gate Networks

What is the network layer?


Located at Layer 3 of the Open Systems
Interconnection (OSI) communications model,
the primary function of the network layer is to
move data into and through other networks.
Network layer protocols accomplish this goal
by packaging data with correct network
address information, selecting the appropriate
network routes and forwarding the packaged
data up the stack to the transport layer (Layer
4).

Existing protocols that generally map to the


OSI network layer include the IP portion of the
Transmission Control Protocol/Internet Protocol
(TCP/IP) model -- both IPv4 and IPv6 -- as well
as NetWare Internetwork Packet
Exchange/Sequenced Packet Exchange
(IPX/SPX). Nearly all enterprise networks use
the TCP/IP stack, as well as cellular data
networks, including 3G, 4G LTE and most
recently, 5G networks.

The routing information contained within a


packet includes the source address of the
sending host and the eventual destination host
address of the remote host. This information is
contained within the network layer header that
encapsulates network frames at the data link
layer (Layer 2). The key difference -- and
importance -- between transport
information contained at Layer 2 when
compared to transport information contained at
the network layer is that the information can
move beyond the local network to reach hosts
in remote network locations or different
network segments. The following network
topology diagram depicts devices in one IP
subnet using Layer 3 routing to communicate
with devices in a second IP subnet.

ANDREW FROEHLICH

How Layer 3 of the OSI model works

Functions of the network layer


The primary function of the network layer is to
enable different networks to be interconnected.
It does this by forwarding packets to network
routers, which rely on algorithms to determine
the best paths for the data to travel. These
paths are known as "virtual circuits." The
network layer relies on the Internet Control
Message Protocol (ICMP) for error control
handling and diagnostics to ensure packets are
sent correctly. Quality of Service (QoS) is also
available to permit certain traffic to be
prioritized over other traffic. The network layer
can support either connection-oriented
or connectionless networks, but such a
network data transmission can only be of one
type and not both.

What is the OSI model and its 7


layers?
OSI is a communications reference model to
help conceptualize how data can be
transmitted and received on a network. The
model consists of seven distinct layers forming
a stack. Each layer in the stack is performed in
a step-by-step manner: first, moving up the
stack during data transmissions and then from
the top of the stack down once the data
reaches its destination. The layers of the OSI
model, including the network layer, are shown
below:

https://www.techtarget.com/searchnetworking/
definition/TCPhttps://www.techtarget.com/
searchnetworking/definition/Address-
Resolution-Protocol-ARPhttps://
www.techtarget.com/searchdisasterrecovery/
definition/Network-Load-Balancing-
NLBhttps://www.techtarget.com/
searchnetworking/definition/Session-layer

session layer

By: Gavin Wright

-ADS BY GOOGLE
Ÿ UNIFIED COMMUNICATIONS

Ÿ MOBILE COMPUTING

Ÿ DATA CENTER
Ÿ IT CHANNEL

Unified Communications

Ÿ How AI is transforming unified communications

AI in unified communications can take


employee collaboration and productivity to the
next level. But AI does carry risks that ...

Ÿ Strategic benefits of managed UC services

Managed UC services offer several benefits for


businesses, including improved network
connections, communication software ...

Ÿ About Us

Ÿ Editorial Ethics Policy

Ÿ Meet The Editors

Ÿ Contact Us
Ÿ Advertisers

Ÿ Partner with Us
Ÿ Media Kit

Ÿ Corporate Site

Ÿ Contributors

Ÿ Reprints

Ÿ Answers

Ÿ Definitions

Ÿ E-Products

Ÿ Events

Ÿ Features

Ÿ Guides

Ÿ Opinions

Ÿ Photo Stories

Ÿ Quizzes
Ÿ Tips

Ÿ Tutorials

Ÿ Videos
All Rights Reserved,Copyright 2000 - 2024,
TechTarget

Privacy Policy
Do Not Sell or Share My Personal Information

Open In App

GEEKSFORGEEKS

Network Layer in OSI Model


OSI stands for Open Systems Interconnection.
It was developed by the ISO – ‘International
Organization for Standardization‘, in the year
1984. It is a 7-layer architecture with each layer
having specific functionality to perform. All
these 7 layers work collaboratively to transmit
the data from one person to another across the
globe.

What is a Network Layer?


The Network Layer is the 5th Layer from the
top and the 3rd layer from the Bottom of
the OSI Model. It is one of the most important
layers which plays a key role in data
transmission. The main job of this layer is to
maintain the quality of the data and pass and
transmit it from its source to its destination. It
also handles routing, which means that it
chooses the best path to transmit the data from
the source to its destination, not just
transmitting the packet. There are
several important protocols that work in this
layer.

Functions of Network Layer


Network Layer serves various important
functions in the data transport mechanism. It is
also responsible for the routing mechanism in
which it selects the best path to transfer the
data from source to it’s destination. It divides
the entire data into smaller packets which
eases the transfer procedure. It is also
responsible for attaching the logical address to
the devices between which the data
transmission is happening, so that the packets
reach correct destination and the destination
can confirm that it is the same packet it was
looking for. Some of the most important
functions of the network layer is given below.
1. Assigning Logical Address
Network layer is solely responsible for
assigning logical addresses to devices which
are either sending or receiving data packets. It
is useful to uniquely identify each devices in a
certain network. The data packets sent or
received consists the IP address of both the
sender device and the receiver device. It is
useful to confirm that the packets are sent or
received by the desired parties. There are two
part in an IP address, a Host ID and Network
ID, using the Host ID it can be confirmed that
the packets were sent by the authorized
sender and it has successfully reached the
desired receiver.

2. Routing
Routing is the process of identifying the best
path to transmit the packets, Network Layer not
only just sends packets from sender to
receiver, but also determines the best route to
send them. Numerous routers are used to find
out the best and safest route to transmit the
data packets. Various routing algorithms are
used to determine the best path, like link state
routing, Distance Vector
Routing, Flooding, Random Walk etc. The
header of each data packet holds the
information regarding the path they need to
follow to reach their destination via different
routers. Usually there are multiple routers
between the sender and
the receiver, so the data packets are routed by
using all these available routers.

3. Host-to-Host delivery
Host-to-Host delivery also known as
Forwarding is the process in which the network
layer transmits or forwards the data packets via
routers, after determining the best path/route.
In some cases it takes more than one router to
reach the destination, Network Layer takes
care of those too, it forwards packets from
each router to the another router until it
reaches the destination securely.

4. Logical Subnetting
Network Layer also allows a bigger network to
be divided into smaller chunks of network
known as Logical Subnetting. It helps the IP
addresses to be used more efficiently and less
amount of IP address will be wasted. It is also
helpful to manage a larger network more
efficiently. Due to smaller networks, it would be
easier to find the device if any troubleshooting
is needed.
5. Fragmentation and Reassembly
Each device / node has a maximum capacity to
receive data (it may differ from Node to Node),
which is called Maximum Transmission Unit
(MTU). If the total size of data packets
exceedes that size limit, then those data
packets are fragmented into more smaller
packets / fragmented so that they can fit the
MTU. After fragmentation those packets are
being send to the receiver, and at the receiving
end all those fragmented packets are
rearranged to create the actual data in order.
The fragmentation is taken care by the routers.

6. Error Handling
Network Layer also check for errors and
handles them. Network Layer uses various
error detection techniques like Cylic
Redundancy Check (CRC) , Checksums etc.
Apart from just detecting, it also handle those
errors using different approaches like Forward
Error Correction (FEC), Hamming Code, Reed-
Solomon Codes etc. It also re-transmit the
packets which are either erroneous or didn’t
reach the receiver. It uses the ACK messages
to determine whether a packet has been
successfully reached the receiver or not, if
there is a Negative ACK, then it means that
there is some error with the packet, and the
receiver will ask the sender to resend that
packet.

7. Quality of Service (QoS)


Network layer also keep track of the important
data or the particular quality of data which is
needed to be send first. Based on
the QoS settings, it determines and prioritize
the important data types which needed to be
send first. It ensures that there is no delay in
receiving the important data in any condition.

8. Network Address Translation


(NAT)
Network Layer also takes care of the Network
Address Translation (NAT), means that it
converts any private IP address into a public IP
address which is required to communicate
between the sender and the receiver.

9. Congestion Control
Just like MTU, if there is an excessive load on
the network which it can’t handle, the network
become congested. Due to which the entire
process of sending and receiving data comes
to a pause. Congestion can be dealt with using
different algorithms like Leaky Bucket
Algorithm and Token Bucket Algorithm. In case
of the leaky bucket algorithm, whatever might
be the speed or amount of data flow into the
bucket, the data leaks at a constant rate, which
reduces the congestion in the network. In case
of the Token Bucket Algorithm, tokens are
being added into the bucket one by one, until it
has reached the maximum capacity, then one
by one according the token sequence each
data packet is transmitted.

10. Encapsulation and


Decapsulation
Network Layer encapsulates the data coming
from the Transport Layer, and also adds
important header parts to the packets, which
consists of the necessary information like
source IP address and destination IP address.
After receiving the data packets on the
destination side it decapsulates those and
make them of original size.

Working of Network Layer


The network layer will initially receive data from
the OSI model’s transport layer as part of the
data flow between that layer and other OSI
levels. These data packets are handled by the
network layer by include their source and
destination addresses. Additionally, it
incorporates the network protocols for proper
transfer to the data-link layer over the network
channel.

Responsibilities of the Network


Layer
In the network channel and communication
channel, the network layer is in charge of the
responsibilities listed below:

Ÿ It is in charge of managing the network


channel’s quickest routing path for the data
packet.

Ÿ The network layer packages the data that has


been received for transmission.

Ÿ maintains the network traffic in the channel by


handling the network layer protocols.

Protocols Used at Network


Layer
A protocol is an agreed-upon way of formatting
data so that two or more devices are able to
communicate with and understand each other.
A number of different protocols make
connections, testing, routing, and encryption
possible at the network layer, including:
Ÿ IP

Ÿ IPsec

Ÿ ICMP

Ÿ IGMP

Ÿ GRE

FAQs on Network Layer in OSI

Q.1: Which is network layer


device?
Answer:

Routers is network layer device. A router is a


device that routes data packets based on IP
addresses.

Q.2: What services are offered by


Network Layer in general?
Answer:

Packetizing, Forwarding and Routing are the


three general services offered by Network
Layer.

Q.3: Which algorithms are used by


network layer when there is a
congestion in the
network?
Answer:

Network layer uses algorithms like Token


Bucket Algorithm and Leaky Bucket
Algorithm to handle congestion.

Article Tags :

Computer Networks

Recommended Articles

1. What is OSI Model? - Layers of OSI Model

2. Physical Layer in OSI Model

3. Application Layer in OSI Model

4. Presentation Layer in OSI model

5. Session Layer in OSI model


6. Functions of Physical layer in OSI Model

7. Data Link Layer in OSI Model

8. Transport Layer in OSI Model

9. This is exactly why we still use the OSI


model when we
have TCP/IP Model

10. Difference Between OSI Model and TCP/IP


Model

11. Similarities between TCP/IP model and OSI


model

12. Difference Between Network Layer


Protocols and Application Layer Protocols

13. Why Flow Control is Used in Both Data


Link Layer and Network Layer?

14. Difference between layer-2 and layer-3


switches

15. Difference between Secure Socket Layer


(SSL) and Transport Layer Security (TLS)

16. Cisco Discovery Protocol (CDP) and Link


Layer Discovery Protocol (LLDP) in Data Link
Layer

17. OSI Model Full Form in Computer


Networking
18. Critique of OSI Model and Protocols

19. How Communication happens using OSI


model

20. Why Does the OSI Reference Model


Matter?

21. Working of ISO-OSI Model

22. Devices used in each layer of TCP/IP


model
23. Fragmentation at Network Layer

24. Design Issues in Network Layer

25. Network Layer Services- Packetizing,


Routing and Forwarding

Read Full Article

A-143, 9th Floor, Sovereign Corporate Tower,


Sector-136, Noida, Uttar Pradesh - 201305

Ÿ Company

Ÿ About Us

Ÿ Legal

Ÿ Careers

Ÿ In Media

Ÿ Contact Us

Ÿ Advertise with us
Ÿ GFG Corporate Solution

Ÿ Placement Training Program

Ÿ Apply for Mentor


Ÿ Explore

Ÿ Job-A-Thon Hiring Challenge

Ÿ Hack-A-Thon

Ÿ GfG Weekly Contest

Ÿ Offline Classes (Delhi/NCR)

Ÿ DSA in JAVA/C++

Ÿ Master System Design

Ÿ Master CP

Ÿ GeeksforGeeks Videos

Ÿ Geeks Community

Ÿ Languages

Ÿ Python

Ÿ Java
Ÿ C++

Ÿ PHP
Ÿ GoLang

Ÿ SQL

Ÿ R Language

Ÿ Android Tutorial

Ÿ Tutorials Archive

Ÿ DSA

Ÿ Data Structures

Ÿ Algorithms

Ÿ DSA for Beginners

Ÿ Basic DSA Problems

Ÿ DSA Roadmap

Ÿ Top 100 DSA Interview Problems

Ÿ DSA Roadmap by Sandeep Jain


Ÿ All Cheat Sheets

Ÿ Data Science & ML

Ÿ Data Science With Python


Ÿ Data Science For Beginner

Ÿ Machine Learning Tutorial

Ÿ ML Maths

Ÿ Data Visualisation Tutorial

Ÿ Pandas Tutorial

Ÿ NumPy Tutorial

Ÿ NLP Tutorial

Ÿ Deep Learning Tutorial

Ÿ HTML & CSS

Ÿ HTML

Ÿ CSS

Ÿ Web Templates

Ÿ CSS Frameworks
Ÿ Bootstrap

Ÿ Tailwind CSS

Ÿ SASS
Ÿ LESS

Ÿ Web Design

Ÿ Python

Ÿ Python Programming Examples

Ÿ Django Tutorial

Ÿ Python Projects

Ÿ Python Tkinter

Ÿ Web Scraping

Ÿ OpenCV Python Tutorial

Ÿ Python Interview Question

Ÿ Computer Science

Ÿ GATE CS Notes

Ÿ Operating Systems
Ÿ Computer Network

Ÿ Database Management System

Ÿ Software Engineering
Ÿ Digital Logic Design

Ÿ Engineering Maths

Ÿ DevOps

Ÿ Git

Ÿ AWS

Ÿ Docker

Ÿ Kubernetes

Ÿ Azure

Ÿ GCP

Ÿ DevOps Roadmap

Ÿ Competitive Programming

Ÿ Top DS or Algo for CP

Ÿ Top 50 Tree
Ÿ Top 50 Graph

Ÿ Top 50 Array
Ÿ Top 50 String

Ÿ Top 50 DP

Ÿ Top 15 Websites for CP

Ÿ System Design

Ÿ High Level Design

Ÿ Low Level Design

Ÿ UML Diagrams

Ÿ Interview Guide

Ÿ Design Patterns

Ÿ OOAD

Ÿ System Design Bootcamp

Ÿ Interview Questions

Ÿ JavaScript
Ÿ JavaScript Examples

Ÿ TypeScript

Ÿ ReactJS
Ÿ NextJS

Ÿ AngularJS

Ÿ NodeJS

Ÿ Lodash

Ÿ Web Browser

Ÿ NCERT Solutions

Ÿ Class 12

Ÿ Class 11

Ÿ Class 10

Ÿ Class 9

Ÿ Class 8

Ÿ Complete Study Material

Ÿ School Subjects
Ÿ Mathematics

Ÿ Physics

Ÿ Chemistry
Ÿ Biology

Ÿ Social Science

Ÿ English Grammar

Ÿ Commerce

Ÿ Accountancy

Ÿ Business Studies

Ÿ Economics

Ÿ Management

Ÿ HR Management

Ÿ Finance

Ÿ Income Tax

Ÿ UPSC Study Material

Ÿ Polity Notes
Ÿ Geography Notes

Ÿ History Notes
Ÿ Science and Technology Notes

Ÿ Economy Notes

Ÿ Ethics Notes

Ÿ Previous Year Papers

Ÿ SSC/ BANKING

Ÿ SSC CGL Syllabus

Ÿ SBI PO Syllabus

Ÿ SBI Clerk Syllabus

Ÿ IBPS PO Syllabus

Ÿ IBPS Clerk Syllabus

Ÿ SSC CGL Practice Papers

Ÿ Colleges

Ÿ Indian Colleges Admission & Campus


Experiences
Ÿ List of Central Universities - In India

Ÿ Colleges in Delhi University

Ÿ IIT Colleges
Ÿ NIT Colleges

Ÿ IIIT Colleges

Ÿ Companies

Ÿ META Owned Companies

Ÿ Alphabhet Owned Companies

Ÿ TATA Group Owned Companies

Ÿ Reliance Owned Companies

Ÿ Fintech Companies

Ÿ EdTech Companies

Ÿ Preparation Corner

Ÿ Company Wise Preparation

Ÿ Preparation for SDE

Ÿ Experienced Interviews
Ÿ Internship Interviews

Ÿ Competitive Programming

Ÿ Aptitude Preparation
Ÿ Puzzles

Ÿ Exams

Ÿ JEE Mains

Ÿ JEE Advanced

Ÿ GATE CS

Ÿ NEET

Ÿ UGC NET

Ÿ More Tutorials

Ÿ Software Development

Ÿ Software Testing

Ÿ Product Management

Ÿ SAP

Ÿ SEO - Search Engine Optimization


Ÿ Linux

Ÿ Excel

Ÿ Free Online Tools


Ÿ Typing Test

Ÿ Image Editor

Ÿ Code Formatters

Ÿ Code Converters

Ÿ Currency Converter

Ÿ Random Number Generator

Ÿ Random Password Generator

Ÿ Write & Earn

Ÿ Write an Article

Ÿ Improve an Article

Ÿ Pick Topics to Write

Ÿ Share your Experiences

Ÿ Internships
@GeeksforGeeks, Sanchhaya Education
Private Limited, All rights reserved

MenuLogin
Menu

Ÿ HTML

Ÿ CSS

Ÿ Javascript

Ÿ SQL

Ÿ Python

Ÿ Java

Ÿ C

Ÿ C++

Ÿ PHP

Ÿ Scala

Ÿ C#

Ÿ Node.Js
Ÿ MySQL

Ÿ MongoDB
Ÿ PL/SQL

Ÿ Swift

Ÿ Bootstrap

Ÿ R

Ÿ Machine Learning

Ÿ Blockchain

Ÿ Angular

Ÿ React Native

Ÿ Computer Fundamentals

Ÿ Compiler Design

Ÿ Operating System

Ÿ Data Structure And Algorithms

Ÿ Computer Network
Ÿ DBMS

Ÿ Excel

Ÿ DCN Tutorial
Ÿ Data Comm & Networks Home

Ÿ DCN - Overview

Ÿ DCN - Computer Network Types

Ÿ DCN - Network LAN Technologies

Ÿ DCN - Computer Network Topologies

Ÿ DCN - Computer Network Models

Ÿ DCN - Computer Network Security

Ÿ Physical Layer

Ÿ DCN - Physical Layer Introduction

Ÿ DCN - Digital Transmission

Ÿ DCN - Analog Transmission

Ÿ DCN - Transmission media

Ÿ DCN - Wireless Transmission


Ÿ DCN - Multiplexing

Ÿ DCN - Network Switching

Ÿ Data Link Layer


Ÿ DCN - Data Link Layer Introduction

Ÿ DCN - Error detection and Correction

Ÿ DCN - Data Link Control & Protocols

Ÿ Network Layer

Ÿ DCN - Network Layer Introduction

Ÿ DCN - Network Addressing

Ÿ DCN - Routing

Ÿ DCN - Internetworking

Ÿ DCN - Network Layer Protocols

Ÿ Transport Layer

Ÿ DCN - Transport Layer Introduction

Ÿ DCN - Transmission Control Protocol

Ÿ DCN - User Datagram Protocol


Ÿ Application Layer

Ÿ DCN - Application Layer Introduction

Ÿ DCN - Client-Server Model


Ÿ DCN - Application Protocols

Ÿ DCN - Network Services

Ÿ DCN Useful Resources

Ÿ DCN - Quick Guide

Ÿ DCN - Useful Resources

Ÿ Selected Reading

Ÿ UPSC IAS Exams Notes

Ÿ Developer's Best Practices

Ÿ Questions and Answers

Ÿ Effective Resume Writing

Ÿ HR Interview Questions

Ÿ Computer Glossary

Ÿ Who is Who
Network Layer Introduction
Previous
Next

Layer-3 in the OSI model is called Network


layer. Network layer manages options
pertaining to host and network addressing,
managing sub-networks, and internetworking.

Network layer takes the responsibility for


routing packets from source to destination
within or outside a subnet. Two different subnet
may have different addressing schemes or
non-compatible addressing types. Same with
protocols, two different subnet may be
operating on different protocols which are not
compatible with each other. Network layer has
the responsibility to route the packets from
source to destination, mapping different
addressing schemes and protocols.

Layer-3 Functionalities
Devices which work on Network Layer mainly
focus on routing. Routing may include various
tasks aimed to achieve a single goal. These
can be:
Ÿ Addressing devices and networks.

Ÿ Populating routing tables or static routes.

Ÿ Queuing incoming and outgoing data and then


forwarding them according to quality of service
constraints set for those packets.

Ÿ Internetworking between two different subnets.


Ÿ Delivering packets to destination with best
efforts.

Ÿ Provides connection oriented and connection


less mechanism.

Network Layer Features


With its standard functionalities, Layer 3 can
provide various features as:

Ÿ Quality of service management

Ÿ Load balancing and link management

Ÿ Security

Ÿ Interrelation of different protocols and subnets


with different schema.

Ÿ Different logical network design over the


physical network design.

Ÿ L3 VPN and tunnels can be used to provide


end to end dedicated connectivity.
Internet protocol is widely respected and
deployed Network Layer protocol which helps
to communicate end to end devices over the
internet. It comes in two flavors. IPv4 which
has ruled the world for decades but now is
running out of address space. IPv6 is created
to replace IPv4 and hopefully
mitigates limitations of IPv4 too.

Print Page

PreviousNext

Advertisements

https://play.google.com/store/apps/details?
id=com.tutorialspoint.onlineviewer

TUTORIALSARTICLESJOBSCOURSESCERT
IFICATIONSANNUAL MEMBERSHIP

Languages

Ÿ Python Tutorial

Ÿ Java Tutorial

Ÿ C++ Tutorial

Ÿ C Programming Tutorial

Ÿ C# Tutorial
Ÿ PHP Tutorial

Ÿ R Tutorial

Ÿ Go Tutorial
Web Technologies

Ÿ HTML Tutorial

Ÿ CSS Tutorial

Ÿ JavaScript Tutorial

Ÿ ReactJS Tutorial

Ÿ Bootstrap Tutorial

Ÿ AngularJS Tutorial

Ÿ Node.js Tutorial

Ÿ TypeScript Tutorial

Database

Ÿ SQL Tutorial

Ÿ MySQL Tutorial
Ÿ DBMS Tutorial

Ÿ MongoDB Tutorial

Ÿ SQLite Tutorial
Ÿ PL/SQL Tutorial

Ÿ PostgreSQL Tutorial

Ÿ Excel Tutorial

Editors

Ÿ Online SQL Editor

Ÿ Online Html Editor

Ÿ Online Css Editor

Ÿ Online Javascript Editor

Ÿ Online Latext Editor

Ÿ Online TEX Editor

Ÿ Online Mathml Compiler

Ÿ Online Markdown Editor

Trending Technologies
Ÿ Cloud Computing Tutorial

Ÿ Amazon Web Services Tutorial

Ÿ Microsoft Azure Tutorial


Ÿ Git Tutorial

Ÿ Ethical Hacking Tutorial

Ÿ Docker Tutorial

Ÿ Kubernetes Tutorial

Compilers

Ÿ Online Java Compiler

Ÿ Online C Compiler

Ÿ Online C++ Compiler

Ÿ Online C# Compiler

Ÿ Online Php Compiler

Ÿ Online Matlab Compiler

Ÿ Online Bash Compiler


Terminals

Ÿ Online Unix Terminal

Ÿ Online Python3 Terminal

Ÿ Online Php Terminal


Ÿ Online Nodejs Terminal

Ÿ Online R Terminal

Ÿ Online Numpy Terminal

Ÿ Online Octave Terminal

Data Science & ML

Ÿ NLP Tutorial

Ÿ NumPy Tutorial

Ÿ Python Pandas Tutorial

Ÿ Machine Learning Tutorial

Ÿ Big Data Analytics Tutorial

Ÿ Cryptography Tutorial

Ÿ Power BI Tutorial
Computer Science

Ÿ DSA Tutorial

Ÿ Spring Boot Tutorial


Ÿ SDLC Tutorial

Ÿ Unix Tutorial

Ÿ Operating System Tutorial

Ÿ Assembly Programming Tutorial

Ÿ Digital Circuits Tutorial

Ÿ Microprocessor Tutorial

Ÿ System Analysis and Design Tutorial

Ÿ Flutter Tutorial

Top Certifications

Ÿ Business Analytics Certification

Ÿ Java & Spring Boot Advanced Certification

Ÿ Data Science Advanced Certification

Ÿ Advanced Certification In Cloud Computing


And DevOps
Ÿ Advanced Certification In Business Analytics

Ÿ Artificial Intelligence And Machine Learning


Certification

Ÿ DevOps Certification
Ÿ Game Development Certification

Ÿ Front-End Developer Certification

Ÿ AWS Certification Training

Ÿ Python Programming Certification

Ÿ Generative AI Certification

Ÿ Microsoft Excel Certification Training

Ÿ Java Certification

Ÿ Cyber Security Certification

Ÿ Coding For Beginners Certification

Ÿ JavaScript Certification
Ÿ Apache Spark Certification

Ÿ Advanced Python Certification

Ÿ Back-End Developer Certification


Ÿ Front-End Developer Certification

Ÿ Web Developer Advanced Certification

Ÿ Linux System Administrator Certification

Ÿ Automation Testing Certification Training

© Copyright 2024. All Rights Reserved.

https://www.techopedia.com/

Ÿ Dictionary

Dictionary

Ÿ Trending Terms

Ÿ Techopedia Terms

Ÿ Artificial Intelligence

Ÿ Cryptocurrency

Ÿ Data Management
Ÿ Networking

Ÿ Cybersecurity

Ÿ Careers
Careers

Ÿ Job Board

Ÿ More

More

Ÿ All Topics

Ÿ Antivirus

Ÿ CRM Software

Ÿ Gambling

Ÿ Gaming

Ÿ Hosting

Ÿ HR Software

Ÿ Investing

Ÿ Laptops
Ÿ Password Manager

Ÿ Project Management

Ÿ Spy
Ÿ Trading Robots

Ÿ VoIP

Ÿ VPN

Ÿ Tutorials

Ÿ Q&A

Ÿ Downloads

Ÿ Webinars

Ÿ About Us

Ÿ Advertising Info

Ÿ Contributors

Ÿ Newsletters

Ÿ Write For Us

https://twitter.com/techopediahttps://
www.techopedia.com/definition/24204/network-
layer#search-bar-wrapper-mobilehttps://
www.techopedia.com/

Ÿ Dictionary

Ÿ Data Management
Network Layer

Margaret Rouse

Technology Expert

https://twitter.com/intent/tweet?text=Network
%20Layer+-+https://www.techopedia.com/
definition/24204/network-layer

What Does Network Layer


Mean?
The network layer is a portion of online
communications that allows for the connection
and transfer of data packets between different
devices or networks.

Advertisements

The network layer is the third level (Layer 3) of


the Open
Systems Interconnection Model (OSI Model)
and the layer that provides data routing paths
for network communication. Data is transferred
to the receiving device in the form of packets
via logical network paths in an ordered format
controlled by the network layer.

Logical connection setup, data forwarding,


routing and delivery error reporting are the
network layer’s primary responsibilities. Layer
3 can be either able to support connection-
oriented or connectionless networks (but not
both of them at the same time).

Techopedia Explains Network


Layer
The network layer is considered the backbone
of the OSI Model. It selects and manages the
best logical path (virtual circuit) for data
transfer between nodes by assigning
destination and source IP addresses to each
data segment.

In the OSI model, the network layer responds


to requests from the layer above it (transport
layer) and issues requests to the layer below it
(data link layer). Information about the source
and destination hosts is already contained in
the data link layer (Layer 2), but it’s the
network layer that interconnects different
networks allowing data to move between them.
Quality of Service (QoS) allows for the
prioritization of certain types of traffic.

Data is checked for errors by the Internet


Control Message Protocol (ICMP), which
ensures that packets are sent correctly by
Layer 3.
Layer 3 contains hardware devices such as
routers, bridges, firewalls and switches, but it
actually creates a logical image of the most
efficient communication route and implements
it with a physical medium.

Network layer protocols exist in every host or


router. The router examines the header fields
of all the IP packets that pass through it.
Networking software is used to attach the
header to each data packet sent as well as to
read it to determine how the packet is handled
at the receiving end.

All the connection, encryption, checking, and


routing processes occur at the network layer
and are made by several different protocols,
including:

Ÿ IP

Ÿ IPsec

Ÿ IPX/SPX
Ÿ ICMP

Ÿ IGMP

Ÿ GRE

Internet Protocol (IP) and Netware IPX/SPX


are the most common protocols associated
with the network layer.

The network layer infrastructure is inherently


vulnerable to
malicious attacks since it is exposed on the
Internet. Distributed denial-of-service (DDoS)
attacks can be launched to overwhelm all the
physical network interfaces such as routers
and stop data transmission.

Although this comparison can be misleading,


the OSI network layer is often referenced as
the equivalent of the Internet layer of the
TCP/IP model. However, there are several
differences between the two, and the TCP/IP
Internet layer only has a limited amount of the
functions covered by the OSI network layer.

Advertisements

Related Terms

Ÿ Open Systems Interconnection Model

Ÿ Application Layer

Ÿ Presentation Layer

Ÿ Session Layer
Ÿ Data Link Layer

Ÿ Transport Layer

Ÿ Physical Layer

Ÿ Local Area Network


Ÿ Wide Area Network

Ÿ Internet Protocol Address

Related Reading

Ÿ An Introduction to the OSI Model

Ÿ 10G Broadband is Coming: Here’s What You


Need to Know

Ÿ Network Virtualization: The Future of the OSI


Model

Ÿ Considering a VPN? Make the Right Choice for


Your Needs

Ÿ #

Ÿ A
Ÿ B

Ÿ C

Ÿ D
Ÿ E

Ÿ F

Ÿ G

Ÿ H

Ÿ I

Ÿ J

Ÿ K

Ÿ L

Ÿ M

Ÿ N

Ÿ O

Ÿ P

Ÿ Q
Ÿ R

Ÿ S

Ÿ T
Ÿ U

Ÿ V

Ÿ W

Ÿ X

Ÿ Y

Ÿ Z

About Techopedia’s Editorial


Process

Techopedia’s editorial policy is centered on


delivering thoroughly researched, accurate,
and unbiased content. We uphold strict
sourcing standards, and each page undergoes
diligent review by our team of top technology
experts and seasoned editors. This process
ensures the integrity, relevance, and value of
our content for our readers.

TAGS
Ÿ DATA MANAGEMENT

Ÿ INTERNET

Ÿ NETWORKING

https://www.linkedin.com/in/margaretrouse/
Margaret Rouse is an award-winning technical
writer and teacher known for her ability to
explain complex technical subjects to a non-
technical, business audience. Over the past
twenty years her explanations have appeared
on TechTarget websites and she's been cited
as an authority in articles by the New York
Times, Time Magazine, USA Today, ZDNet, PC
Magazine and Discovery Magazine.Margaret's
idea of a fun day is helping IT and business
professionals learn to speak each other’s
highly specialized languages. If you have a
suggestion for a new definition or how to
improve a technical explanation, please email
Margaret or contact her…

All Posts by Margaret Rouse

Most Popular Term

DATA MANAGEMENT

Differential Privacy

What is Differential Privacy? Differential privacy


is a mathematical framework for determining a
quantifiable and adjustable level of privacy
protection....

Full Explanation

MARGARET ROUSETechnology Expert

Advertisements
DATA MANAGEMENT

CPanel

What is cPanel Used For? cPanel is a crucial


tool to help you access hosting features via a
simple, non-technical...

Full Explanation

ILIJIA MILJKOVACTechnology Writer

TECH 101

Operational Technology (OT)

What is Operational Technology? Operational


Technology, or OT, refers to the hardware and
software systems that are used to control...

Full Explanation
https://www.techopedia.com/thailand-offers-
crypto-tax-breakshttps://www.techopedia.com/
trends-in-llm-development-business-owners-
need-to-watchhttps://www.techopedia.com/
solana-outage-why-uptime-and-stability-matter-
for-mainstream-cryptohttps://
www.techopedia.com/sol-price-reclaims-100-
new-solana-meme-coin-smog-hits-top-crypto-
gainers-listhttps://
www.techopedia.com/want-to-make-huge-
profits-in-crypto-take-look-at-green-bitcoin-
gbtc-and-its-predict-to-earn-featurehttps://
www.techopedia.com/how-to-use-ai-for-
investing-use-cases

INVESTING

How to Use AI for Investing: 6 Use


Cases
LINDA ROSENCRANCE4 years

Popular Categories

Show All

Antivirus

Artificial Intelligence
Audio

CRM
Cryptocurrency

Gambling

Gaming

HR

Investing

Laptops
Network

Password Managers
Project Management

Spy

VoIP

VPN

Get Techopedia's Daily Newsletter in your


inbox every Weekday.

Trending NewsLatest GuidesReviewsTerm of


the Day

By signing up, you agree to our Terms of Use


and acknowledge the data practices in our
Privacy Policy. You may unsubscribe at any
time.

https://www.techopedia.com/https://
twitter.com/techopediahttps://
www.facebook.com/techopedia/https://
www.linkedin.com/company/techopedia/https://
www.youtube.com/c/Techopedia

Techopedia Terms

REGULATION & HIGH RISK INVESTMENT


WARNING: Trading Forex, CFDs and
Cryptocurrencies is highly speculative, carries
a level of risk and may not be suitable for all
investors. You may lose some or all of your
invested capital, therefore you should not
speculate with capital that you cannot afford to
lose. The content on this site should not be
considered investment advice. Investing is
speculative. When investing your capital is at
risk. Crypto promotions on this site do not
comply with the UK Financial Promotions
Regime and is not intended for UK consumers.
Please note that we do receive advertising fees
for directing users to open an account with the
brokers/advertisers and/or for driving traffic to
the advertiser website

Registered Address: Tower Financial Centre,


12th Floor, 50th Street & Corner of Elvira,
Panama City, Panama. © Techopedia. All
Rights Reserved.
Ÿ

https://indeed.com/

Sign in

Start of main content

Career Guide
Ÿ Career Development

Ÿ What Is the Network Layer? (With Functions


and Examples)

What Is the Network Layer?


(With Functions and
Examples)
Indeed Editorial Team

Updated October 1, 2022

Network layers are part of network-to-network


connections that make the Internet possible.
This layer is the portion of the communications
process during these connections when
packets of data are sent between different
networks. Learning about this layer can help
you advance your IT career and explore
specializations in this field. In this article, we
define the network layer, note the differences
between the internet and networks, explain
networks and all layers in a system, describe
the layer's functions, and review examples.

Explore jobs on Indeed

Part-time jobs

Full-time jobs

Remote jobs
Urgently hiring jobs

View more jobs on Indeed

What is the network layer?


The network layer is a part of online
communication that connects and transfers
data packets between different networks or
devices. As the foundation of the open systems
interconnection model, the layer manages and
selects the best logical path for data transfer
between nodes. It assigns source and
destination internet protocol addresses to each
data segment.

The primary responsibilities of this layer are


logical connection setup, data forwarding,
routing, and delivery error reporting. The layer
can either support connectionless networks or
connection-oriented networks. Encryption,
connection checking, and routing processes
happen at this layer and use several different
protocols, including:

Ÿ IP
Ÿ IPsec

Ÿ IPX/SPX

Ÿ ICMP

Ÿ IGMP
Ÿ GRE

Related: How to Become a Network Engineer


(With Job Roles and Salary)

What is a network?
Understanding this layer begins with seeing a
network as two or more connected computer
devices. These devices connect to a central
hub, such as a router and include smaller
divisions of the network. Subnetworking allows
IT professionals to manage thousands of
internet protocol (IP) addresses and connected
devices in large and geographically distant
networks.

Computers on a network may link through


cables, radio waves, telephone lines, infrared
light beams, or satellites. Common types of
networks include a local area network (LAN) or
wide area network (WAN). Other network types
are wireless LAN, wireless WAN, and
metropolitan area networks (MAN).

Differences between networks


and the internet
Learning about this layer involves knowing the
differences between a network and the internet
as both often behave similarly. A network
consists of computers that physically connect
and may share data with each other in the
layer structure and on the Internet technology
links networks and
can build a complex network. Key differences
include:

Ÿ Network coverage is limited while the internet


covers a large geographical area

Ÿ Networks link many computers and network-


enabled devices, and the internet connects
many networks

Ÿ Types of networks are LAN, MAN, WAN, CAN,


and HAM and the internet type is the world
wide web

Ÿ Networks link several thousand systems


simultaneously, and the Internet connects
millions of computers at the same time

Ÿ Networks need fewer hardware devices while


the internet requires a wide array of devices

Layers in a standard model


Layers exist in the open systems
interconnection model. This interconnection
model is conceptual, a description of how the
Internet works, and allows different computer
systems to communicate using standard
protocols. This model is a universal language
for computer networking and splits a
communication system into seven abstract
layers stacked on each other.

Functions that send data over the Internet


involve those seven stacked layers, with each
relying on the other in order. Each layer activity
prepares data to move over cables, wires,
and radio waves as a series of sections. This
standardized model includes these layers:

Ÿ Application layer: This layer directly interacts


with data from the user and relies on protocols,
including HTTP and SMTP, and data
manipulation to provide data.

Ÿ Presentation layer: Because layers stack in a


certain order, this layer prepares data through
translation, compression, or translation, for use
by the application layer.

Ÿ Session layer: This layer opens and closes


communication between two devices and
synchronizes data transfer with checkpoints to
prevent the loss of an entire transfer owing to a
crash or disconnect.

Ÿ Transport layer: The transport layer ensures


end-to-end communication between two
devices by sending data in sections to the next
layer, reassembling these segments,
performing error control, and limiting
transmission speed.

Ÿ Network layer: This third layer facilitates data


transfer between two different networks by
breaking up segments from the transport layer
into smaller units and routes the data to its
destination.

Ÿ Data link layer: Although much like the


previous layer, the data link layer is different
because it facilitates data transfer in small
pieces called frames between two devices on
the same network.
Ÿ Physical layer: This layer involves the physical
equipment for the data transfer, such as
switches and cables, and where data converts
into a bitstream as a string of 0s and 1s.

Related: How to Get Into IT (With Tips to Build


Your IT Career)

Functions of the layer


The third layer's main functions involve
providing the means to transfer packets from a
source to a destination using one or more
networks. Data is sent as packets or small
sections for reassembly on another computer.
These packets include a header that contains
information about the packet and the body,
which is the data being sent.

At this layer, networking software attaches a


header to each packet and on the receiving
end, networking software uses the header to
understand how to handle the packet. A header
includes information about the content,
destination, and source of each packet. This
layer also carries out some of these functions:

Routing
This function defines this layer as it selects the
correct route between the source and
destination device to move data across a
series of interconnected networks. Incoming
packets come from various sources, with this
layer in the
network determining their final destination and
the route they can take. The best path provides
the least delay and greatest available
bandwidth.

Related: What Is a Network Firewall? (With


Key Terms and Benefits)

Logical addressing
Each device that communicates over a network
connects with a logical address. Logical
addresses do not depend on the hardware and
are instead unique across an entire connected
network. For example, you may access a
network device by using this layer's protocol to
translate logical addresses to an address you
assign.

Datagram encapsulation
Another function of this layer is to encapsulate
messages from higher layers by placing them
into datagrams, also known as packets, under
the layer header. This function is much like
writing a letter, placing it in an envelope with a
name and address, then giving it to a courier
who places that envelope in a larger delivery
box. The IP is the place where most data
encapsulation occurs as data passes to the IP
from one of two protocols, TCP or UDP.

Fragmentation and reassembly


Fragmentation occurs in this layer when the
size of a packet, or datagram, exceeds the size
of data that can be held in a
frame. This layer divides the package it
receives from the transport layer into fragments
so that no disruption happens in data flows.
The reassembly of fragments takes place at
the destination because packets take
independent paths and may arrive out of order.

Related: What Is a Dedicated Server?


(Including Benefits and Tips)

Error handling and diagnostics


Error handling and diagnostics are critical
aspects of this layer. For example, certain
protocols at this layer allow devices that
connect logically, or that try to route traffic, to
exchange information about the status of hosts
on the devices themselves or on the network.
One protocol, Internet Control Message
Protocol (ICMP), handles errors and
diagnostics.

Congestion control
Another function of this layer controls
congestion on a network device. These
devices can only handle so much data and
congestion control lowers the amount of data a
device receives by slowing sending activity.
This function takes the form of algorithms that
control the entry of data packets into the
network and reduce the chances of a collapse
or errors in the network.

Examples of the layer


This third layer is at work during many
communications using computer systems. For
example, when messaging someone, this layer
assigns destination and source IP addresses to
the data segments. This layer finds the best
paths for the delivery of data between your IP
address as the source and the address of your
friend, customer, and colleague as the
destination.

Another example of this layer at work involves


communications happening in the same
network. Greg and Juan may connect in the
same local area network, and Greg sends Juan
a message. Because Juan is on a different
local area network, Greg's message involves
this layer's process to allow the message to
reach Juan's computer.

 

Share:

Explore your next job opportunity on


IndeedFind jobs
Explore more articles
Ÿ What Is a Design Strategy? (With Benefits and
Examples)

Ÿ Applied Research: What It Is and How


Companies Use It

Ÿ How to Give Feedback to Your Boss (With


Examples and FAQs)
Ÿ How To Apologize for the Delay Over Email
Like a Pro

Ÿ How to End an Email to a Professor (With


Examples)

Ÿ Onboarding and Offboarding Employees:


Definition and Steps

Ÿ What Does an Accounting Manager Do? (And


How to Become One)

Ÿ 9 Essential Front-End Languages (With


Definitions)

Ÿ 10 Marketing Certifications to Help Advance


Your Career

Ÿ Feedback Examples and Why It’s Important


(Plus Tips)

Ÿ Writing an Email for a Follow up Meeting (With


Examples)

Ÿ 10 Ways to Lead the Leaders and Why It's


Important

Ÿ Sign in

Ÿ Job Seekers

Ÿ Employers

Ÿ About

©2024 Indeed
Ÿ Accessibility at Indeed

Ÿ Privacy Centre

Ÿ Cookies

Ÿ Privacy

Ÿ Terms

You might also like