What are different protocals are in data link layer?
Answers
Answered by
1
In networking and communications, the transmission of a unit of data (frame, packet) from one node to another. Known as a "layer 2 protocol," the data link protocol is responsible for ensuring that the bits and bytes received are identical to the bits and bytes sent. For example, in a local network, if a message is split into 100 packets and a station receives 97, the data link protocol ensures those 97 are error free, but it is not aware of the three missing ones. TCP and other higher-layer protocols make sure all 100 are delivered. Following are major types:
Asynchronous Transmission
Originating from mechanical teletypes, each byte is treated as a separate unit with start and stop bits tacked on. It is the common form of transmission between a computer and an analog modem, and there is often only minimal error checking.
Synchronous Transmission
Developed for mainframe terminals, synchronous transmission sends contiguous blocks of data, with sending and receiving stations synchronized to each other's timing. Error checking is included. Examples are IBM's SDLC, the international HDLC and Digital Equipment's DDCMP (DECnet).
Local Networks (LANs)
Designed for higher transmission speeds, Ethernet and Wi-Fi networks use methods that sense the presence of a carrier and include error checking.
Asynchronous Transmission
Originating from mechanical teletypes, each byte is treated as a separate unit with start and stop bits tacked on. It is the common form of transmission between a computer and an analog modem, and there is often only minimal error checking.
Synchronous Transmission
Developed for mainframe terminals, synchronous transmission sends contiguous blocks of data, with sending and receiving stations synchronized to each other's timing. Error checking is included. Examples are IBM's SDLC, the international HDLC and Digital Equipment's DDCMP (DECnet).
Local Networks (LANs)
Designed for higher transmission speeds, Ethernet and Wi-Fi networks use methods that sense the presence of a carrier and include error checking.
Similar questions