Show data link and physical vs subnet, Computer Networking

Assignment Help:

Q. Show Data link and Physical vs Subnet?

- Data link layer

  • The function of the Data Link Layer is -offers for the control of the physical layer and detects and possibly corrects errors which may occur? (IOS/IEC 7498:1984). In another prose the Data Link Layer transforms a stream of raw bits (0s and 1s) from the physical into a data frame and provides an error-free transfer from one node to another allowing the layers above it to assume virtually error-free transmission

- Physical layer

  • The function of the Physical Layer is to offer - electrical, mechanical, functional and procedural means to activate a physical connection for bit transmission? (ISO/IEC 7498:1984). Fundamentally this signifies that the typical role of the physical layer is to transform bits in a computer system into electromagnetic (or equivalent) signals for a particular transmission medium (fiber, wire etc.)

Related Discussions:- Show data link and physical vs subnet

Show the parity check - performance, Q. Show the Parity Check - Performance...

Q. Show the Parity Check - Performance? Parity Check - Performance Is able to detect all single-bit errors Can as well detect burst errors if the total number of

Itc597, restore the scrambled bits to their original order

restore the scrambled bits to their original order

Explain about switched ethernet, Switched Ethernet In switched netw...

Switched Ethernet In switched networks a switch device identifies the destination address and routes the frame to the specific port to which the destination station is conn

Explain what is meant by circuit switching, Question 1: (a) Explain wh...

Question 1: (a) Explain what is meant by circuit switching? Give its main shortcoming and explain its relevance in telephone systems. (b) Outline the differences betwee

Networking, discuss the interdependence of workstation hardware with releva...

discuss the interdependence of workstation hardware with relevant software

Merits of a network based ids and a host based ids, Question: (a) Descr...

Question: (a) Describe the following biometric techniques:- (i) Retina scan, (ii) Fingerprint, (iii) Iris Scan. Your answer should consider the following: the data storage requ

What are firewalls, What are firewalls? Firewalls serve to protect an i...

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

What rate rtcp will limit, Consider an RTP session consisting of five users...

Consider an RTP session consisting of five users, all of which are sending and receiving RTP packets into the same multicast address. Each user sends video at 200kbps. a)  What

Two commands that save the running-config to a tftp server, Name the two co...

Name the two commands that save the running-config to a TFTP server Ans)  Two commands are:- a) copy running tftp  b) write network

Explain the hubs and repeaters, Hubs/Repeaters Hubs/Repeaters are used ...

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd