The network interface layer - fundamentals of networks, Computer Networking

The Network Interface Layer

The functions  of the data  link layer and the physical  layer of   the OSI model  have been  combined into a  single  layer called  the network interface layer in the TCP/IP reference model. This layer is  responsible  for dividing the data  sent  by the  internet layer into logical groups called forms. Depending on the type of connection  which could  be connection oriented or connectionless this layer  adds appropriate headers to  the frames. If the  session is a connection oriented session the  frames need to be resembled in the destination. The network  layer at the receiving and then assembles all the  constituent frames and sends them to the other layers. This layer ensure that all the frames are received property  by a method called the cyclic redundancy check (CRC).

Posted Date: 3/3/2013 10:16:55 PM | Location : United States

Related Discussions:- The network interface layer - fundamentals of networks, Assignment Help, Ask Question on The network interface layer - fundamentals of networks, Get Answer, Expert's Help, The network interface layer - fundamentals of networks Discussions

Write discussion on The network interface layer - fundamentals of networks
Your posts are moderated
Related Questions
Question 1 How can one set up internet on a PC and test it?? Explain Setting up a new connection Testing internet connection Question 2 What are the rules for wri

Two broad classes of middleware are a) General middleware b) Service-specific middleware.

What common software problems can lead to network defects? Software related problems can be any or a combination of the following: - Client server problems - Application

Question 1 Explain the basic communication model with its block diagram Question 2 List and explain the functions of network monitoring Question 3 Explain the get and se

• This device creates one big collision domain and one large broadcast domain.

DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

In Windows 2000, a domain describes both an administrative boundary and a security boundary for a collection of objects that are relevant to a particular group of users on a networ

Q. Show the Congestion avoidance in TCP? Slow Start (SS) & Additive Increase (AI) (AI=Congestion Avoidance) start with the congestion window (cwnd) = max segment si

Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e