Copyright

Network Layer of the OSI Model: Functions, Design & Security

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: Presentation Layer of the OSI Model: Definition, Functions & Protocols

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
 Replay
Your next lesson will play in 10 seconds
  • 0:04 The Network Layer
  • 0:35 Network Layer Functions
  • 2:01 Design Issues of the OSI Model
  • 3:00 Insecurity & Network…
  • 4:02 Lesson Summary
Save Save Save

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up

Timeline
Autoplay
Autoplay
Speed Speed

Recommended Lessons and Courses for You

Lesson Transcript
Instructor: Lonny Meinecke

Lonny teaches psychology classes at King University, and has a bachelor's degree in IT and a doctorate in psychology.

In this lesson, we'll introduce the network layer of the OSI model. The network layer is the stage concerned with host-to-host communication tasks like protocols, switching, routing, and addressing.

The Network Layer

Just so we are on the same page, the network layer is one of seven layers in the Open Systems Interconnection (OSI) Model - layer three to be exact. Think of the OSI model as a standard way for computers on a network to talk to each other. It's just conceptual really, but it helps us coordinate the transfer of information.

The sent message goes down a vertical stack of layers to the connecting medium (a wired or wireless channel that can pass information) and right back up a similar stack somewhere else. Here's a picture:


OSI Model Diagram


Network Layer Functions

This version of a famous limerick might sound familiar to you:

'What kind of work would a network work, if a network could net-work?' (sung to the tune of 'The Woodchuck Song').

Well, the network layer has to figure out where stuff is going to go. It figures out which of the ways between you and your receiver would work out best for this situation. For example, it handles protocols, switching, routing, forwarding, addressing, and error handling.

It can even break up the message into smaller pieces so the whole thing will reassemble at the destination in one meaningful piece (known as packet switching and sequencing). You might want to think of this fiddling with message bits like a kind of traffic policeman; the network layer's traffic director can tell the sending station to ease up on the throttle a bit if it's too much to handle right now. Here's a picture of store-and-forward packet switching. CRC means cyclic redundancy check: It's a way to verify the data before going to the next step.


Store and Forward Packet Switching Diagram


The network layer also converts logical addresses (or virtual addresses) into physical addresses (as in real addresses aka MAC addresses, which each of our hardware devices uses as its physical location and identity on the network). So, in addition to a traffic policeman, the network layer is a postman that puts zip codes on electrical messages.

The last thing we'll mention that this layer does is accounting (yes, this layer wears many uniforms - even that of a number-cruncher!). Someone has to keep track of all this to provide billing information.

Design Issues of the OSI Model

Remember that the OSI Model is a conceptualization; it's up to design teams to figure out how to implement it. If you take a course in network design, you'll probably run into the following issues at least:

  • (a) How to handle store-and-forward packet switching - This is about how to break up the message into smaller pieces so the whole thing will reassemble at the destination in one meaningful piece.
  • (b) What services are you going to provide for the transport layer just above - This lets the layer above know what the network layer can be expected to do - there isn't really a standard, so it's a design issue.
  • (c) How you're going to implement a connection-based service - Wired connections need to be handled on this layer.
  • (d) How you're going to implement a connection-less service - Wireless connections also need to be handled here.
  • (e) Whether you are going to use virtual circuits or datagrams - This is a bit out of our scope, but just realize it's important to know which of these will be used since each has its pros and cons.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account
Support