20230107
20230107
20230107
org/data-link-layer/
https://edukedar.com/data-link-layer/
https://heimdalsecurity.com/blog/osi-layers/
https://digitalthinkerhelp.com/data-link-layer-in-osi-model-protocols-examples-functions-devices-
services/#:~:text=Definition%3A%20Data%20Link%20Layer%20is%20layer%202%20of,to%20upper
%20layer%20like%20as%20source%20of%20communication.
https://securityintelligence.com/articles/osi-layers-data-link-layer/
What is DLL ?
The Data-link layer is the second layer from the bottom in the OSI (Open System Interconnection)
network architecture model.
DLL is also responsible to encode, decode and organize the outgoing and incoming data.
This is considered the most complex layer of the OSI model as it hides all the underlying
complexities of the hardware from the other above layers.
There are various protocols in the data link layer, which are as follows:
Synchronous Data Link Protocol (SDLC)
There are several devices which are used in the Data Link Layer; below explain each one –
Bridge: Bridge is electronic device that is used in the computer networking and it helps to establish
interconnection along with another bridge under similar protocol.
Switches: Switch is a hardware device that is worked at the data link layer of OSI model, and it helps
to link multiple devices over the network. It uses various packet switching for receiving, sending data
packets over the entire network.
Modem: Modem stands for “Modulator – De-modulator“, and it is used for moving data from one
computer network to other computer networks via telephone lines.
Modulator helps to convert all data from digital form to analog form over the transmitting point,
and other end De-Modulator offer the functionality for converting the similar from analog mode to
digital mode at receiving mode.
Network Interface Card: It is also known as “Network Interface Controller“, “Network Adapter” or
“LAN Adapter“. NIC is a circuit board that is installed in the computer systems which deliver
dedicated network connection with computer.
Type of hacking?