Show data link and physical vs subnet, Computer Networking

Assignment Help:

Q. Show Data link and Physical vs Subnet?

- Data link layer

  • The function of the Data Link Layer is -offers for the control of the physical layer and detects and possibly corrects errors which may occur? (IOS/IEC 7498:1984). In another prose the Data Link Layer transforms a stream of raw bits (0s and 1s) from the physical into a data frame and provides an error-free transfer from one node to another allowing the layers above it to assume virtually error-free transmission

- Physical layer

  • The function of the Physical Layer is to offer - electrical, mechanical, functional and procedural means to activate a physical connection for bit transmission? (ISO/IEC 7498:1984). Fundamentally this signifies that the typical role of the physical layer is to transform bits in a computer system into electromagnetic (or equivalent) signals for a particular transmission medium (fiber, wire etc.)

Related Discussions:- Show data link and physical vs subnet

Connectionless multiplexing and de multiplexing, Connectionless Multiplexi...

Connectionless Multiplexing  and De multiplexing Java program running in a host can create a UDP socket  with the  line Datagram's socket my socket =  new datagram's socket

What do mean by tunnel mode, What do mean by tunnel mode? This is a mod...

What do mean by tunnel mode? This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is linking their LANs to

Whitney houston, contribution to afican American history

contribution to afican American history

Sonet sdh , SONET SDH To satisfy the  requirements  of ever inc...

SONET SDH To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utili

Types of vts sonet sdh, Types of VTs There are  several  option for  pa...

Types of VTs There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexi

SAN, Case study on SAN Providers and Products available in the market.

Case study on SAN Providers and Products available in the market.

Prompt ''router'', Recognize the mode reflected by the following prompt 'Ro...

Recognize the mode reflected by the following prompt 'Router '? Ans) RXBoot

Illustrate the bellman-ford algorithm, Illustrate the Bellman-Ford algorith...

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

What is meant by transparency, Transparency really means adumbrating the ne...

Transparency really means adumbrating the network and its servers from the users and even the application programmers.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd