Show data link and physical vs subnet, Computer Networking

Assignment Help:

Q. Show Data link and Physical vs Subnet?

- Data link layer

  • The function of the Data Link Layer is -offers for the control of the physical layer and detects and possibly corrects errors which may occur? (IOS/IEC 7498:1984). In another prose the Data Link Layer transforms a stream of raw bits (0s and 1s) from the physical into a data frame and provides an error-free transfer from one node to another allowing the layers above it to assume virtually error-free transmission

- Physical layer

  • The function of the Physical Layer is to offer - electrical, mechanical, functional and procedural means to activate a physical connection for bit transmission? (ISO/IEC 7498:1984). Fundamentally this signifies that the typical role of the physical layer is to transform bits in a computer system into electromagnetic (or equivalent) signals for a particular transmission medium (fiber, wire etc.)

Related Discussions:- Show data link and physical vs subnet

Dns working - domain name server, DNS Working While discussing about t...

DNS Working While discussing about the working of the DNS, there are many things which need to consider and play Avery significant role. This can the type of communication bet

Give examples of icmp, Ping and Traceroute are used by ICMP for Testing. ...

Ping and Traceroute are used by ICMP for Testing. Destination Unreachable messages are obtained by a router when it does not have a route to the network.

Describe some common threats to the hardware, Describe some common threats ...

Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan

Explain the term- encryption, Explain the term- Encryption Because all ...

Explain the term- Encryption Because all of the user traffic, as well as control traffic, is digitized in second generation systems, it is a relatively simple matter to encrypt

Relevance and protection regarding dns attacks, Relevance and Protection re...

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Thick ethernet wiring, THICK ETHERNET WIRING:  It needs thick coax cab...

THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Ip checksum, This code properly implements the IP checksum function on a 32...

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

Write down the purpose of arp?, Address Resolution Protocol resolves the MA...

Address Resolution Protocol resolves the MAC address if the IP address is known. It is a layer 3 protocol.

Create a wireless can, You are the network administrator for the City of Jo...

You are the network administrator for the City of Joshua Texas. The city government offices are located in five buildings separated by a State Highway controlled by the State of Te

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd