StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Link Layer Protocol Services to the Network Layer - Assignment Example

Cite this document
Summary
Homework Assignment (Author’s name) (Institutional Affiliation) 1. Link layer protocol services to the network layer In the OSI model (layered architecture) the protocol in one layer provides services to the protocol in the next layer while receiving services from the protocol in the lower layer of the architecture…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Link Layer Protocol Services to the Network Layer
Read Text Preview

Extract of sample "Link Layer Protocol Services to the Network Layer"

Download file to see previous pages

(Keith 2008) The services offered by the link layer to the network layer are usually hidden from the network layer which only sees the services as a reliable communication channel which can send and receive data packets as frames. Framing, addressing, error detection, error correction, flow control, link management and acknowledgement of frames are some of the services provided by the link protocols. The link layer groups bits of the physical layer into frames enabling transmission of data in a form that can be understood by the network layer.

Since various network stations have different speed of operation, the link layer protocol provides flow control service that ensures no station in the network is swamped with data from fast devices within the network. In addition the link layer provides a link management services through collision handling and avoidance. (Nancy 1988) One major services offered by the link layer protocol is error detection and correction. It has error check included in the frame header which provides a more sophisticated error detection and correction since it can detect single bit and a wide range of common multiple -bit errors.

Error detection in link layer uses checksum which is the same as those used in IP in the network layer as well as TCP in the transport layer. . The frames are organized in seven fields: PREAMBLE which is 7 bits long used to warm the receiver that data is coming, SOF indicates that the next bit of data will be the destination address, DA the destination address which identifies the receiver of the data, SA identifies the source address, Length which indicate the length of the payload data, DATA contains the data transmitted its length varies with the size of data and FCS which is used for error checking.

In 10BASE-T the PRE field is used for receiver synchronization while 100BASE-T does not require the PRE field for transmission since it has an electrical encoding that is different from 10BASE-T. The signal of 10BASE-T frame is zero when it is not transmitting while 100BASE-T transmits and idle signal between frames. Collision detection Figure 5.14 According to the figure node D detects collision first before the other node B detects since its transmission start time is greater than the transmission start time of node D.

Node D detects the collision before node B since it started transmission later after D had already started. Furthermore node D has a shorter round trip time as compared to node B. Node A does not realize that detection has occurred between node B and D since it is not involved in transmission. Node A only waits for the signal from B in case of a collision since after the collision Node B will try to retransmit the signal after random times until it reaches its destination. Jamming signal is a signal sent by the data station, informing the other stations not to transmit.

In this case the jamming signal is sent by node D since it is the node that detects a collision

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Link Layer Protocol Services to the Network Layer Assignment”, n.d.)
Link Layer Protocol Services to the Network Layer Assignment. Retrieved from https://studentshare.org/information-technology/1446799-week
(Link Layer Protocol Services to the Network Layer Assignment)
Link Layer Protocol Services to the Network Layer Assignment. https://studentshare.org/information-technology/1446799-week.
“Link Layer Protocol Services to the Network Layer Assignment”, n.d. https://studentshare.org/information-technology/1446799-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Link Layer Protocol Services to the Network Layer

Optimizing Network Services

First, QoS has been known and practiced in layer 2 protocols: IEEE 802.... Second, layer 3 QoS may be considered for two classes of IP networks: 1) IP WANs, where virtual channels between sites are realized using Frame Relay or ATM; and 2) IP VPNs, where Multi-Protocol Label Switching (MPLS), also known as layer 3 switching, is used for defining layer 3 flows through coloring corresponding IP packets Third and last, QoS can be implemented through one of two architectures, in the order of their development (RFC 2998): Integrated services (Insert) and differential services (Diffuser)....
10 Pages (2500 words) Essay

Network Management Issues

Access methods include the SNMP, Command Line Interfaces (CLIs), custom XML, CMIP, Transaction Language 1, CORBA, netconf, and the Java Management Extensions - JMX. Data for network… nt is collected through several mechanisms, including agents installed on infrastructure, synthetic monitoring that simulates transactions, logs of activity, sniffers and real user monitoring.... In the past network management mainly consisted of monitoring whether devices were up r down; today performance management has become a crucial part of the IT teams role which brings about a host of challenges -- especially for global organizations....
24 Pages (6000 words) Essay

Network Protocol Issues

The paper "Network Protocol" discusses that the data link layer of the OSI model has been assessed to the widely used in networks.... The layer is reserved for routers for their highly specific communication.... The hardware resources that are used in a network represent the physical layer.... In the same token, the presentation layer deals with the production of services that rely on application program such as MSWindows....
1 Pages (250 words) Essay

Network Access Protocols, Data Delivery

(Forouzan & Fegan, 2006)Physical data transmission on the media and data link management is the two primary functions, which are described by the network access protocols.... The appropriate standards for the media being used are implemented by the transceivers on the network interface cards.... The paper "Network Access Protocols, Data Delivery" states that the information, which is found in the header of PDU at layer 4, does not find a destination network or a destination host....
8 Pages (2000 words) Essay

Analysis of Internet Protocol Networks

Protocol developers were not entirely concerned with the movement of data from the network to another.... his layer allows for the interoperability of the application programs that a user interacts with like email, downloading files.... Support protocols in this layer include protocols that will provide booting, management services and hostname mapping.... hellip; Protocols in data communication are the rules and procedures that govern communications between different devices on a network....
13 Pages (3250 words) Coursework

How Packet Data Travels through the Networks

TCP/IP architectural model combines some layers in the OSI model and has got five different layers which include the application layer, transport layer, network layer, link layer, and physical layer... hellip; It's pointed out that while accessing an X-stream server from a remote location like home, several network and protocol processes take place in the network.... This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network....
8 Pages (2000 words) Case Study

Why MAC Address Is Unique

It functions at the data link layer and the network layer of the OSI Reference Model thus support any packet protocol.... The routing process consults its routing table which is build using the following sources of information:the network segments in which the router is connected.... Hub is a central meeting point for all the machines used in the network.... … Medium Access Control (MAC) is a protocol used to give the link layer of the data in the Ethernet Local Area Network while the WiFi MAC layer is a protocol that allows the sender to avoid collisions of data and transmit small request to send packets Medium Access Control (MAC) is a protocol used to give the link layer of the data in the Ethernet Local Area Network while the WiFi MAC layer is a protocol that allows the sender to avoid collisions of data and transmit small request to send packets by using CSMA....
6 Pages (1500 words) Assignment

Network Protocol Services

This term paper "Network protocol services" describes computer networks that constitute a major aspect of the global economy in terms of communication, operation, efficiency and reliability.... According to Princeton University (2013), the second layer of the OSI model named the data link layer serves both LAN and WAN nodes by transferring data between them.... Princeton University (2013) explains that the data link layer has the mechanism to detect and correct errors that occur within the physical layer....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us