Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Link Layer
To move to packet from one node( host or packet swtich0 to net node in the route the network layer relies on the services of the link layer. Particularly at each node the network layer passes the datagram down to the link layer which delivers the datagram to the next node along the route the link layer passes the datagram up to the network layer.
The services provided by the link layer depend the specific link layer protocol that is employed over the link. For example some protocol provide delivery on a link basis that is from transmitting node over link to receiving node. Note that this reliable delivery service is different from the reliable delivery service of TCP, which provides reliable delivery from one end system to another. Example of link layers include Ethernet and the point to point protocol (PPP). As Datagram's typically need to traverse several links to travel from sources to destination a datagram's may be handle by different link layer protocol at different links along its route. For example a datagram may be handled by Ethernet on one link and by PPP on the next link. The network layer will receive a different service from each of the different link layer protocols. Link layer packets are known as frames.
ROLE OF DESIGN IN ACHIEVING RELIABILITY One of the most important methods for achieving high reliability is through design. Use reliability cannot be higher than the design re
Identify the 3 major functions at layer 3 of the OSI model Ans) Layer three explains the path, forwards the packet and executes software / logical addressing.
Error Detection- 2D/LRC Adds an additional character (instead of a bit) A block of bits is prearranged in a table The Parity Bit for every data unit is calculate
Q. What do you mean by Addressing? Addressing Require to uniquely and universally identify every device to allow global communication Internet address or IP address is us
Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll
Question: (a) What do you understand by the following terms related to LCDs: Reflective LCDs Backlit LCDs (b) By using an example, explain the main steps of the B
State the Security concerns The history of security concerns is not new. They have been of great worry to man and for many centuries man has been endeavouring to devise new tec
Question 1: a) Give three examples of Shells in Linux. b) Differentiate between the Join command and the Paste command in Linux, use an example to support your answer.
Can you describe Session layer in OSI model
Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd