Get premium membership and access questions with answers, video lessons as well as revision papers.
1. Framing: Frames are the streams of bits received from the network layer into manageable data units. This division of stream of bits is done by Data Link Layer.
2. Physical Addressing: The Data Link layer adds a header to the frame in order to define physical address of the sender or receiver of the frame, if the frames are to be distributed to different systems on the network.
3. Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow receiver by buffering the extra bit is provided by flow control. This prevents traffic jam at the receiver side.
4. Error Control: Error control is achieved by adding a trailer at the end of the frame. Duplication of frames are also prevented by using this mechanism. Data Link Layers adds mechanism to prevent duplication of frames.
5. Access Control: Protocols of this layer determine which of the devices has control over the link at any given time, when two or more devices are connected to the same link.
Titany answered the question on November 30, 2021 at 11:46
- Difference between broadcast and collision domains as used in data transmission(Solved)
Difference between broadcast and collision domains as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption(Solved)
Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption
Date posted: November 30, 2021. Answers (1)
- Differentiate between pre-shared key and digital signature
(Solved)
Differentiate between pre-shared key and digital signature
Date posted: November 30, 2021. Answers (1)
- Explain uses of internet in business firms(Solved)
Explain uses of internet in business firms
Date posted: November 30, 2021. Answers (1)
- TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement(Solved)
TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement
Date posted: November 30, 2021. Answers (1)
- ) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment(Solved)
) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment
Date posted: November 30, 2021. Answers (1)
- Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established(Solved)
Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established
Date posted: November 30, 2021. Answers (1)
- Distinguish between multicast and broadcast IP addresses(Solved)
Distinguish between multicast and broadcast IP addresses
Date posted: November 30, 2021. Answers (1)
- Outline two parts of to a point point protocol (PPP)(Solved)
Outline two parts of to a point point protocol (PPP)
Date posted: November 30, 2021. Answers (1)
- Explain two characteristics of a Storage Area Network(Solved)
Explain two characteristics of a Storage Area Network
Date posted: November 30, 2021. Answers (1)
- Access Points (AP) are critical in wireless networks. Describe two types of AP that are likely to be used(Solved)
Access Points (AP) are critical in wireless networks. Describe two types of AP that are likely to be used
Date posted: November 30, 2021. Answers (1)
- Computer networks are vulnerable to various types of physical threats. Outline four types of these threats(Solved)
Computer networks are vulnerable to various types of physical threats. Outline four types of these threats
Date posted: November 30, 2021. Answers (1)
- Rene was required to select a network operating system (NOS) for his company’s network. Explain two categories of NOS that he could make his choice(Solved)
Rene was required to select a network operating system (NOS) for his company’s network. Explain two categories of NOS that he could make his choice
Date posted: November 30, 2021. Answers (1)
- Explain the following terms as used in the internet
i) add on
ii)URL
(Solved)
Explain the following terms as used in the internet
i) add on
ii)URL
Date posted: November 30, 2021. Answers (1)
- Anne recommended a converged network design for a client. Explain three benefits of the design that could influence the decision(Solved)
Anne recommended a converged network design for a client. Explain three benefits of the design that could influence the decision
Date posted: November 30, 2021. Answers (1)
- John was troubleshooting a computer that was not connecting to network. Outline four possible causes of the problem(Solved)
John was troubleshooting a computer that was not connecting to network. Outline four possible causes of the problem
Date posted: November 30, 2021. Answers (1)
- Outline three factors that should be used when selecting the type of computer network(Solved)
Outline three factors that should be used when selecting the type of computer network
Date posted: November 30, 2021. Answers (1)
- Functions of Intermediary Devices(Solved)
Functions of Intermediary Devices
Date posted: November 30, 2021. Answers (1)
- Distinguish between intermediary and host devices(Solved)
Distinguish between intermediary and host devices
Date posted: November 30, 2021. Answers (1)
- Explain two circumstances under which unshielded twisted pair (UTP) cables are most applicable in network installation(Solved)
Explain two circumstances under which unshielded twisted pair (UTP) cables are most applicable in network installation
Date posted: November 30, 2021. Answers (1)