Show data link and physical vs subnet, Computer Networking

Assignment Help:

Q. Show Data link and Physical vs Subnet?

- Data link layer

  • The function of the Data Link Layer is -offers for the control of the physical layer and detects and possibly corrects errors which may occur? (IOS/IEC 7498:1984). In another prose the Data Link Layer transforms a stream of raw bits (0s and 1s) from the physical into a data frame and provides an error-free transfer from one node to another allowing the layers above it to assume virtually error-free transmission

- Physical layer

  • The function of the Physical Layer is to offer - electrical, mechanical, functional and procedural means to activate a physical connection for bit transmission? (ISO/IEC 7498:1984). Fundamentally this signifies that the typical role of the physical layer is to transform bits in a computer system into electromagnetic (or equivalent) signals for a particular transmission medium (fiber, wire etc.)

Related Discussions:- Show data link and physical vs subnet

Ip checksum, This code properly implements the IP checksum function on a 32...

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

Find the appropriate layer of the OSI or hub, • This device creates one big...

• This device creates one big collision domain and one large broadcast domain.

Explain concept of permutation network, Concept Of Permutation Network ...

Concept Of Permutation Network In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nodes and po

Circuit switched networks, Question 1 Write about                       Ci...

Question 1 Write about                       Circuit Switched Networks                       Packet Switched Networks Question 2 Write about                       Protocol Indep

Illustrate about rsa encryption, Q. Illustrate about RSA Encryption? R...

Q. Illustrate about RSA Encryption? RSA Encryption - Public key encryption technique - Encryption steps: - Encode data to be encrypted as a number to create the pla

How is an intranet different from an internet, QUESTION a) How is an In...

QUESTION a) How is an Intranet different from an Internet? b) State the main differences between a router and a switch c) Explain the function of a modem d) Calculate

Briefly describe nat and rip, Briefly describe NAT and RIP NAT is Netwo...

Briefly describe NAT and RIP NAT is Network Address Translation. This is a protocol that gives a way for multiple computers on a common network to share one connection to the I

Tech ed, can you help me convert binary into decimals?

can you help me convert binary into decimals?

What are proxy server, What are proxy servers and how do they protect compu...

What are proxy servers and how do they protect computer networks? Proxy servers primarily stop external users who identifying the IP addresses of an internal network. Without i

Determine the method to protect the web servers, Determine the method to pr...

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd