What are the 2 functions of the Data Link Mac layer?
* Handles access to shared media
* Manages protocol access to the physical network medium
* Provides SAPs for higher level protocols
* Allows multiple devices to uniquely identify one another
on the data link layer
Answers were Sorted based on User's Feedback
Answer / sunilbaglur
Answer:
Manages protocol access to the physical network medium
Allows multiple devices to uniquely identify one another
on the data link layer
Media Access Control (MAC) -The MAC sublayer manages
protocol access to the physical network medium. The IEEE
MAC specification defines MAC addresses, which allow
multiple devices to uniquely identify one another at the
data link layer.
231 Describe End to End network services: (Choose all that
apply)
| Is This Answer Correct ? | 16 Yes | 2 No |
Answer / swaroop
handles access to shred media
manages protocol access to the physical network medium
| Is This Answer Correct ? | 11 Yes | 3 No |
Answer / vikas mohila
allows multiple devices to uniquely identify one another on
the data link layer
| Is This Answer Correct ? | 6 Yes | 2 No |
Answer / cerepx
* Handles access to shared media
* Allows multiple devices to uniquely identify one another
on the data link layer
there are 2 correct answers
| Is This Answer Correct ? | 6 Yes | 2 No |
Answer / raghavendraswami
IT handles access to shred media
it use nic for this purposemanages protocol access to the
physical network medium
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / suresh
MAC LAyer provides 2 functions
1) It provides access to SHARED MEDIA.
2) Allow Multiple devices to UNIQUELY identify each other
in the DATA LINK LAYER
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / vardhan
It allocate the channel to one user at a time.
It avoids collision.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / parag
Handles access to shared media
Allows multiple devices to uniquely identify one another
on the data link layer
| Is This Answer Correct ? | 4 Yes | 4 No |
What is the scope of linux administration. If i start a from scratch will I get a linux administrator job. I have 5 and half years of different experience which is tech support exp... If any can give me appropriate suggestions and feed back
I have to do a project in transport domain in J2EE.How can i find informations regarding transport domain and why do we use that?
You see the following subnet addresses ; what is the subnet mask ? 252.4.0 252.8.0 252.12.0 252.16.0 a. 255.255.255.0 b. 255.255.192.0 c. 255.255.240.0 d. 255.255.252.0
If a default router is used, then which 2 daemons need to started ?
i am using intel core 2 duo system, i ws installed linux 5.0 it has gigabyte ethernet card. we cant assigning ip adress to that. we used many commads to assign but no use wt to do please answer me.
what is spyware,firmware?
True/False: DNS gives you the ability to restrict queries from machines in a particular zone.
Which layer regulates transmission of unstructured bit streams over a transmission medium with regards to transmission speed, representation of signals and connection technique.
what mean this error The Instruction at "0x7c8396d0" referenced memory at "0x00000014" , The memory could not be "read"
You have connected a Token Ring Network (4MBit/s) and an Ethernet Network. Copying a 5MB File from Ethernet to Token Ring takes 30 seconds. Copying from Token Ring to Ethernet takes 2 Minutes. Why? a. the Token Ring network is slower b. the packet size is larger with Ethernet than Token Ring. c. the packet size is larger with Token Ring than Ethernet. d. TCP windows size
List the different network protocols that are supported by windows rras services?
suposse u r working in compny n they provide u an email id to get information , only u know ur id password , can ur boss hack or open ur email? without knowing password ?