Page 154 - Computer_Science_F5
P. 154

S/n Key issues to    Action        Description
                    consider
               6.   Security        Protecting    Security threats like eavesdropping and data     Chapter Three: Advanced Computer Networks
                                    data          manipulation exist on networks. The network
                                                  layer might be involved  in implementing
          FOR ONLINE READING ONLY
                                                  basic security measures to protect data in
                                                  transit, such as access control lists (ACLs)
                                                  or encryption (although higher-level  layers
                                                  typically handle more robust security).

               7.   Interoperability Speaking     Networks  often consist of devices from
                                     the same     different vendors using various protocols.
                                    language      The network layer plays a role in ensuring
                                                  these devices can communicate  seamlessly
                                                  by adhering to standardised protocols like
                                                  TCP/IP



              Network layer routing                    Virtual circuit service: This establishes a
              The  network  layer  plays  a  crucial   pre-defined connection between source
              role  in getting  data  packets  from their   and destination, similar to a phone call.
              source to their  intended destination    Packets follow this established path for
              across a network. This layer relies on a   more reliable delivery.
              special  tool  called  a  routing  algorithm
              to  determine  the  optimal  path  for   Power of routing protocols
              packet transmission. Imagine sending a  Routing algorithms are implemented
              package across town. You would not just  through software programs called
              pick any random route; you would likely  routing protocols. These  protocols
              use a map or GPS to find the fastest or  constantly  exchange  information  about
              most  efficient  path.  Similarly,  routing  network conditions (traffic, congestion)
              algorithms  act  as  a  guide  for  network  with other devices.  This allows them
              devices, helping them choose the best  to dynamically calculate the best paths
              path  (least-cost  path)  to forward  data  for data packets, ensuring efficient and
              packets to their destination. The network  reliable data delivery.
              layer can offer two main service types:
                                                       Categories of routing algorithms
              Datagram service:  Packets are treated   There are three main categories of
              independently, like  sending individual   routing algorithms namely, adaptive
              letters. Each packet finds its way to the   routing algorithms, non-adaptive routing
              destination using the routing algorithm.  algorithms, and hybrid routing algorithms.


                                                    145
               Student’s Book  Form Five



     Computer Science Form 5.indd   145                                                     23/07/2024   12:33
   149   150   151   152   153   154   155   156   157   158   159