Show data link and physical vs subnet, Computer Networking

Assignment Help:

Q. Show Data link and Physical vs Subnet?

- Data link layer

  • The function of the Data Link Layer is -offers for the control of the physical layer and detects and possibly corrects errors which may occur? (IOS/IEC 7498:1984). In another prose the Data Link Layer transforms a stream of raw bits (0s and 1s) from the physical into a data frame and provides an error-free transfer from one node to another allowing the layers above it to assume virtually error-free transmission

- Physical layer

  • The function of the Physical Layer is to offer - electrical, mechanical, functional and procedural means to activate a physical connection for bit transmission? (ISO/IEC 7498:1984). Fundamentally this signifies that the typical role of the physical layer is to transform bits in a computer system into electromagnetic (or equivalent) signals for a particular transmission medium (fiber, wire etc.)

Related Discussions:- Show data link and physical vs subnet

Internet client control task, Internet Client Control Task A distribut...

Internet Client Control Task A distributed system is to be implemented using networked PCs. The role of the system in this task is to implement an environmental control sys

For making assignment, can you make the assignment plagiarism free and when...

can you make the assignment plagiarism free and when you give me back the assignment. Thanks

Error detection-redundancy, Q. Error Detection-Redundancy? In its p...

Q. Error Detection-Redundancy? In its place of repeating the entire data stream a shorter group of bits may be appended to the end of each unit. Called as -redundancy?

Explain the bit-level encryption, Q. Explain the Bit-Level Encryption? ...

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

Explain the characteristics of mobile computing applications, Question : ...

Question : a) In your view, what are the top three strengths and weaknesses of wireless systems? Rank them in order of priority. What can be done to address the weaknesses?

What do you meant by triple x in networks, What do you meant by "triple X" ...

What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is defined in a document known as X.3. The standard protocol has been explaine

Requests types in distributed enrollment protocol , Control Commands: The ...

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly. The server must simply send a positive command res

Use of two-layer switch, Q. Use of Two-Layer Switch? - Performs at the ...

Q. Use of Two-Layer Switch? - Performs at the physical as well as data link layer - A bridge with many ports designed for faster performance - Allocates unique port to ea

Reliable data transfer - transport layer, Reliable Data Transfer Figur...

Reliable Data Transfer Figure illustrate the  framework for reliable  transfer. The service  abstraction provided  to the upper  layer  entities is that  of a reliable channel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd