What are the 2 functions of the Data Link Mac layer?
* Handles access to shared media
* Manages protocol access to the physical network medium
* Provides SAPs for higher level protocols
* Allows multiple devices to uniquely identify one another
on the data link layer
Answers were Sorted based on User's Feedback
Answer / sunilbaglur
Answer:
Manages protocol access to the physical network medium
Allows multiple devices to uniquely identify one another
on the data link layer
Media Access Control (MAC) -The MAC sublayer manages
protocol access to the physical network medium. The IEEE
MAC specification defines MAC addresses, which allow
multiple devices to uniquely identify one another at the
data link layer.
231 Describe End to End network services: (Choose all that
apply)
| Is This Answer Correct ? | 16 Yes | 2 No |
Answer / swaroop
handles access to shred media
manages protocol access to the physical network medium
| Is This Answer Correct ? | 11 Yes | 3 No |
Answer / vikas mohila
allows multiple devices to uniquely identify one another on
the data link layer
| Is This Answer Correct ? | 6 Yes | 2 No |
Answer / cerepx
* Handles access to shared media
* Allows multiple devices to uniquely identify one another
on the data link layer
there are 2 correct answers
| Is This Answer Correct ? | 6 Yes | 2 No |
Answer / raghavendraswami
IT handles access to shred media
it use nic for this purposemanages protocol access to the
physical network medium
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / suresh
MAC LAyer provides 2 functions
1) It provides access to SHARED MEDIA.
2) Allow Multiple devices to UNIQUELY identify each other
in the DATA LINK LAYER
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / vardhan
It allocate the channel to one user at a time.
It avoids collision.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / parag
Handles access to shared media
Allows multiple devices to uniquely identify one another
on the data link layer
| Is This Answer Correct ? | 4 Yes | 4 No |
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks
what is Organiser? what is work
Explain backbone network?
What is the BOOT P protocol used for, where might you find it in windows network infrastructure?
What IP network addresses are set aside for class A (for private use)? a. 1.0.0.0 (mask 255.0.0.0) b. 10.0.0.0 (mask 255.0.0.0) c. 10.0.0.0 (mask 255.255.0.0) d. 100.0.0.0 (mask 255.0.0.0) e. 100.0.0.0 (mask 255.255.0.0)
main roll of network administrator
Which of the following provide correct information about a protocol at the transport layer of the OSI model? * UDP - Provides Connectionless datagrams service * TCP - Provides Connection Oriented Services * SMTP - Provides Mail Exchange * IP - Route determination * TCP - Provides Flow Control and Error Checking * FTP - Transfers of Files
Can you please explain the difference between hub and a switch?
What are the advantages of RIP ?
Which command would shutdown the sendmail daemon ?
What is the last major networking problem you troubleshot and solved on your own in the last year?
Give one disadvantage of a peer to peer network?