献血前检查什么项目| 蓝色妖姬是什么意思| 喉咙痛鼻塞吃什么药| 梦见吃李子是什么意思| 吃什么血脂降的最快| 肚脐上三指是什么地方| 胃疼吃什么药好的快| 总是犯困是什么原因| 外阴有白色的东西是什么| 老年痴呆症是什么原因引起的| 尿分叉吃什么药好得快| 餐饮行业五行属什么| 痛经 吃什么| 蛇胆是什么| 茶叶五行属什么| 宫寒吃什么| 舌头发白吃什么药| 香蕉皮擦脸有什么作用与功效| 甲亢有什么症状表现| 宗人府是干什么的| 维生素b是补什么的| 什么叫流产| 615是什么星座| 属猴和什么属相相克| 老人尿失禁吃什么药最好| 杜甫的号是什么| 猛虎下山是什么意思| 心包积液挂什么科| 巨人观是什么| 阿奇霉素主治什么| 左心室舒张功能减退是什么意思| 什么是牙线| 假借是什么意思| 嗜睡挂什么科| 女人大姨妈来了吃什么最好| 北京大学校长什么级别| 奶霜是什么| 男人鼻头有痣代表什么| 这什么情况| 大宗商品是什么意思| 咆哮是什么意思| 结婚送什么| tbs和tct有什么区别| 贫血有什么危害| 血糖高吃什么可以降下来| 穷奢极欲什么意思| 做爱时间短吃什么药好| 起伏不定是什么意思| 活化部分凝血活酶时间偏高是什么意思| 脑蛋白治疗什么病| 黑无常叫什么| 为什么叫马桶| 老是叹气是什么原因| 啤酒兑什么饮料好喝| ob是什么| icicle是什么牌子| 水鱼煲鸡汤放什么药材| 上嘴角有痣代表什么| 血小板计数高是什么原因| 曹字五行属什么| 梦见自己大便是什么意思| 湿疹吃什么药| 左眼跳什么右眼跳什么| 可乐饼为什么叫可乐饼| 铁蛋白高吃什么食物好| 炫的意思是什么| 数九寒天是什么意思| 封神榜是什么意思| 什么食物含dha| 性状是什么意思| 橘络的功效与作用是什么| 一生辛苦不得财是什么生肖| 蓝天白云是什么生肖| 卧底大结局是什么| 腋下是什么经络| 7月28日是什么星座| 行房出血是什么原因| 血月代表什么| 干燥症是什么原因引起的| 中暑喝什么水| 豆油什么牌子的好| 肝胆湿热用什么药| 吃柿子有什么好处和坏处| 胃气胀是什么原因怎么解决| 梦见被雷劈什么意思| 眼睛充血什么原因| 肛裂涂什么药膏能愈合| 阴唇为什么一个大一个小| 大便颗粒状是什么原因| 荡气回肠是什么意思| 女人胆固醇高什么原因| 张起灵和吴邪什么关系| 喉咙痛可以吃什么| 贪心不足蛇吞象什么意思| 女人脸色发黄吃什么补得最快| 人咬人有什么危害| 血压低吃什么补得快| 妇科臭氧治疗的作用是什么| 莳字五行属什么| 养胃吃什么食物最好| 1984年属鼠五行属什么| ft是什么| 总是嗜睡是什么原因| 甲状腺回声不均匀什么意思| 畏手畏脚是什么意思| 七宗罪都是什么| 知是什么意思| 乌岽单丛是什么茶| 颈椎疼挂什么科| 支教是什么意思| 左右逢源是什么生肖| 牛肉和什么菜炒好吃| 骨骼清奇什么意思| 喝茶对人体有什么好处| 什么的夏天| 什么是阿尔茨海默症| 男生为什么会晨勃| 脂蛋白a是什么| 孕妇生气对胎儿有什么影响| 频繁打喷嚏是什么原因| 什么叫次日| 洋芋是什么| 男性尿出血什么原因| 股票洗盘是什么意思| 尿蛋白是什么原因造成的| 国印贵人是什么意思| 过期茶叶有什么用途| 吴亦凡属什么| 心房颤动是什么意思| 男人鼻子大代表什么| 总胆红素高是什么病| 高筋面粉是什么意思| pose是什么意思| 翡翠和玉有什么不同| 看望病人送什么花合适| 脂肪肝是什么引起的| 宝宝发烧吃什么药| 孕妇梦见鱼是什么意思| 末法时期是什么意思| 远香近臭是什么意思| 地图舌是什么原因引起的| 前列腺多发钙化灶是什么意思| 胃食管反流用什么药| 指是什么意思| 18岁属什么| 广西属于什么气候| 血管是什么颜色的| 囧是什么意思| 雌激素是什么东西| 应用心理学是什么| 桃胶有什么作用| 狮子座和什么座最配| 呕吐是什么原因| 生肖本命带红花是什么生肖| 吃什么药能推迟月经| 小鸭子吃什么食物| 舌苔白吃什么药效果好| 什么叫人彘| a型rhd阳性是什么意思| 霜降吃什么| 子宫直肠窝积液是什么意思| 腰扭伤吃什么药最有效| 脑疝是什么原因引起的| 怀男孩和女孩有什么区别| 什么叫穿刺| 嘴上有痣代表什么| 梦见手机失而复得是什么意思| ubras是什么牌子| 夏朝前面是什么朝代| 为什么会紫外线过敏| 维生素D有什么食物| 荨麻疹挂什么科| 内分泌代谢科是看什么病的| 五心烦热是什么意思| 洛什么意思| 亦木读什么| 6月30日是什么节日| 多喝酸奶有什么好处| 原本是什么意思| 国字五行属什么| 吃什么补胰腺最好| 优势卵泡是什么意思| 牛什么饭| 鲭鱼是什么鱼| 世界上最小的动物是什么| 通灵是什么意思| 男性下体瘙痒用什么药| 2003年属什么| 壮丁是什么意思| 高尿酸有什么症状| 免疫性疾病是什么意思| 结婚20周年属于什么婚| 吐口水有血是什么原因| 鸭肚是鸭的什么部位| spo2过低是什么意思| 乌龟不吃食是什么原因| 什么宠物好养又干净| 什么东西不能托运| 花笺是什么意思| 尿道炎用什么药治疗最好| 儿童便秘吃什么最管用| 什么是直接胆红素| 陋习什么意思| 什么叫| 薇字五行属什么| 嗜睡什么意思| 阉割什么意思| 自闭什么意思| 婴儿大便绿色是什么原因| 胃暖气是什么症状| 什么是物理防晒| foreplay是什么意思| 去痘印用什么药膏好| 麻了是什么意思| 登高望远是什么生肖| 息斯敏是什么药| 躲春是什么意思| 现充是什么| 吾日三省吾身是什么意思| 芒果过敏吃什么药| hp是什么意思| 干预是什么意思| 故宫为什么叫紫禁城| 女性尿浑浊是什么原因| 受害者是什么意思| 马六甲板材是什么木材| 生目念什么| 尿检白细胞弱阳性是什么意思| 混油皮是什么特征| 涵字五行属什么| 女生被操是什么感觉| 为什么会腰疼| 凤鸾是什么意思| 指甲上有竖纹是什么原因| 蛐蛐吃什么食物| 什么是血铅| 血脂低是什么原因| 梦见自己得了重病预示什么| 狡黠什么意思| 黄雀是什么鸟| 吝啬的意思是什么| 梦见芝麻是什么意思| 二垒是什么意思| 白醋洗脸有什么效果| 64年出生属什么| 晚上20点是什么时辰| 刺激是什么意思| lmp医学上什么意思| 4月18号是什么星座| pp1是什么意思| 破执是什么意思| 粘米粉是什么粉| 什么水果含钾高| 左眼皮跳什么意思| 容易打嗝是什么原因| 小儿厌食吃什么药最好| 小孩咳嗽吃什么药好| 混剪是什么意思| 身份证借给别人有什么危害性| 耳朵热是什么原因| 世界上最长的蛇是什么| 胰腺炎为什么喝水就死| 支气管炎咳嗽吃什么药| 什么钱最不值钱| 百度Jump to content

便黑色大便是什么情况

From Wikipedia, the free encyclopedia
百度 显然,要做总裁的女人,不光要领出去面上有光,也要能hold住各种场面。

The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer.[2] The data link layer provides the functional and procedural means to transfer data between network entities and may also provide the means to detect and possibly correct errors that can occur in the physical layer.

The data link layer is concerned with local delivery of frames between nodes on the same level of the network. Data-link frames, as these protocol data units are called, do not cross the boundaries of a local area network. Inter-network routing and global addressing are higher-layer functions, allowing data-link protocols to focus on local delivery, addressing, and media arbitration. In this way, the data link layer is analogous to a neighborhood traffic cop; it endeavors to arbitrate between parties contending for access to a medium, without concern for their ultimate destination. When devices attempt to use a medium simultaneously, frame collisions occur. Data-link protocols specify how devices detect and recover from such collisions, and may provide mechanisms to reduce or prevent them.

Examples of data link protocols are Ethernet, the IEEE 802.11 WiFi protocols, ATM and Frame Relay. In the Internet Protocol Suite (TCP/IP), the data link layer functionality is contained within the link layer, the lowest layer of the descriptive model, which is assumed to be independent of physical infrastructure.

Function

[edit]

The data link provides for the transfer of data frames between hosts connected to the physical link. Within the semantics of the OSI network architecture, the protocols of the data link layer respond to service requests from the network layer, and perform their function by issuing service requests to the physical layer. That transfer can be reliable or unreliable; many data link protocols do not have acknowledgments of successful frame reception and acceptance, and some data link protocols might not even perform any check for transmission errors. In those cases, higher-level protocols must provide flow control, error checking, acknowledgments, and retransmission.

The frame header contains the source and destination addresses that indicate which device originated the frame and which device is expected to receive and process it. In contrast to the hierarchical and routable addresses of the network layer, layer 2 addresses are flat, meaning that no part of the address can be used to identify the logical or physical group to which the address belongs.

In some networks, such as IEEE 802 local area networks, the data link layer is described in more detail with media access control (MAC) and logical link control (LLC) sublayers; this means that the IEEE 802.2 LLC protocol can be used with all of the IEEE 802 MAC layers, such as Ethernet, Token Ring, IEEE 802.11, etc., as well as with some non-802 MAC layers such as FDDI. Other data-link-layer protocols, such as HDLC, are specified to include both sublayers, although some other protocols, such as Cisco HDLC, use HDLC's low-level framing as a MAC layer in combination with a different LLC layer. In the ITU-T G.hn standard, which provides a way to create a high-speed (up to 1 Gigabit/s) local area network using existing home wiring (power lines, phone lines and coaxial cables), the data link layer is divided into three sub-layers (application protocol convergence, logical link control and media access control).

Sublayers

[edit]

The data link layer is often divided into two sublayers: logical link control (LLC) and media access control (MAC).[3]

[edit]

The uppermost sublayer, LLC, multiplexes protocols running at the top of the data link layer, and optionally provides flow control, acknowledgment, and error notification. The LLC provides addressing and control of the data link. It specifies which mechanisms are to be used for addressing stations over the transmission medium and for controlling the data exchanged between the originator and recipient machines.

Media access control sublayer

[edit]

MAC may refer to the sublayer that determines who is allowed to access the media at any one time (e.g. CSMA/CD). Other times it refers to a frame structure delivered based on MAC addresses inside.

There are generally two forms of media access control: distributed and centralized.[4] Both of these may be compared to communication between people. In a network made up of people speaking, i.e. a conversation, they will each pause a random amount of time and then attempt to speak again, effectively establishing a long and elaborate game of saying "no, you first".

The Media Access Control sublayer also performs frame synchronization, which determines the start and end of each frame of data in the transmission bitstream. It entails one of several methods: timing-based detection, character counting, byte stuffing, and bit stuffing.

  • The time-based approach expects a specified amount of time between frames.
  • Character counting tracks the count of remaining characters in the frame header. This method, however, is easily disturbed if this field is corrupted.
  • Byte stuffing precedes the frame with a special byte sequence such as DLE STX and succeeds it with DLE ETX. Appearances of DLE (byte value 0x10) have to be escaped with another DLE. The start and stop marks are detected at the receiver and removed as well as the inserted DLE characters.
  • Similarly, bit stuffing replaces these start and end marks with flags consisting of a special bit pattern (e.g. a 0, six 1 bits and a 0). Occurrences of this bit pattern in the data to be transmitted are avoided by inserting a bit. To use the example where the flag is 01111110, a 0 is inserted after 5 consecutive 1's in the data stream. The flags and the inserted 0's are removed at the receiving end. This makes for arbitrary long frames and easy synchronization for the recipient. The stuffed bit is added even if the following data bit is 0, which could not be mistaken for a sync sequence, so that the receiver can unambiguously distinguish stuffed bits from normal bits.

Services

[edit]

The services provided by the data link layer are:

Error detection and correction

[edit]

In addition to framing, the data link layer may also detect and recover from transmission errors. For a receiver to detect transmission errors, the sender must add redundant information as an error detection code to the frame sent. When the receiver obtains a frame it verifies whether the received error detection code matches a recomputed error detection code.

An error detection code can be defined as a function that computes the r (amount of redundant bits) corresponding to each string of N total number of bits. The simplest error detection code is the parity bit, which allows a receiver to detect transmission errors that have affected a single bit among the transmitted N + r bits. If there are multiple flipped bits then the checking method might not be able to detect this on the receiver side. More advanced methods than parity error detection do exist providing higher grades of quality and features.

H E L L O
8 5 12 12 15

A simple example of how this works using metadata is transmitting the word "HELLO", by encoding each letter as its position in the alphabet. Thus, the letter A is coded as 1, B as 2, and so on as shown in the table on the right. Adding up the resulting numbers yields 8 + 5 + 12 + 12 + 15 = 52, and 5 + 2 = 7 calculates the metadata. Finally, the "8 5 12 12 15 7" numbers sequence is transmitted, which the receiver will see on its end if there are no transmission errors. The receiver knows that the last number received is the error-detecting metadata and that all data before is the message, so the receiver can recalculate the above math and if the metadata matches it can be concluded that the data has been received error-free. Though, if the receiver sees something like a "7 5 12 12 15 7" sequence (first element altered by some error), it can run the check by calculating 7 + 5 + 12 + 12 + 15 = 51 and 5 + 1 = 6, and discard the received data as defective since 6 does not equal 7.

More sophisticated error detection and correction algorithms are designed to reduce the risk that multiple transmission errors in the data would cancel each other out and go undetected. An algorithm that can even detect if the correct bytes are received but out of order is the cyclic redundancy check or CRC. This algorithm is often used in the data link layer.

Protocol examples

[edit]

Relation to the TCP/IP model

[edit]

In the Internet Protocol Suite (TCP/IP), OSI's data link layer functionality is contained within its lowest layer, the link layer. The TCP/IP link layer has the operating scope of the link a host is connected to, and only concerns itself with hardware issues to the point of obtaining hardware (MAC) addresses for locating hosts on the link and transmitting data frames onto the link. The link-layer functionality was described in RFC 1122 and is defined differently than the data link layer of OSI, and encompasses all methods that affect the local link.

The TCP/IP model is not a top-down comprehensive design reference for networks. It was formulated for the purpose of illustrating the logical groups and scopes of functions needed in the design of the suite of internetworking protocols of TCP/IP, as needed for the operation of the Internet. In general, direct or strict comparisons of the OSI and TCP/IP models should be avoided, because the layering in TCP/IP is not a principal design criterion and in general, considered to be "harmful" (RFC 3439). In particular, TCP/IP does not dictate a strict hierarchical sequence of encapsulation requirements, as is attributed to OSI protocols.

See also

[edit]

References

[edit]
  1. ^ "X.225 : Information technology – Open Systems Interconnection – Connection-oriented Session protocol: Protocol specification". Archived from the original on February 1, 2021. Retrieved March 10, 2023.
  2. ^ "What is layer 2, and Why Should You Care?". accel-networks.com. Archived from the original on February 18, 2010. Retrieved September 29, 2009.
  3. ^ Regis J. Bates and Donald W. Gregory (2007). Voice & data communications handbook (5th ed.). McGraw-Hill Professional. p. 45. ISBN 978-0-07-226335-0.
  4. ^ Guowang Miao; Guocong Song (2014). Energy and spectrum efficient wireless network design. Cambridge University Press. ISBN 978-1107039889.
[edit]
右边脸颊长痘是什么原因 高筋面粉适合做什么 doosan挖掘机是什么牌子 人类是什么动物 手痒脱皮是什么原因
什么叫应届毕业生 红枣桂圆泡水喝有什么好处和坏处 喝什么茶清肺效果最好 女鼠和什么属相最配对 新生儿用什么奶粉好
高考推迟月经吃什么药 气血虚吃什么补最快女人 夸加包念什么 男戴观音女戴佛是什么意思 提报是什么意思
人湿气重有什么症状 日仄念什么 seeyou是什么意思 卖酒需要办理什么证 从头再来什么意思
产后腰疼是什么原因ff14chat.com 新生儿c反应蛋白高说明什么hcv9jop6ns1r.cn 脸长的人适合什么发型hcv9jop8ns3r.cn 办离婚证需要带什么证件creativexi.com 梦见发大水是什么预兆hcv7jop6ns8r.cn
合是什么生肖hcv9jop2ns2r.cn 掉头发严重是什么原因hcv7jop6ns2r.cn 荨麻疹可以吃什么gysmod.com 眩晕症是什么hcv9jop6ns8r.cn 叩首是什么意思hcv7jop4ns8r.cn
七手八脚是什么意思hcv9jop5ns3r.cn 猪头猪脑是什么生肖hcv7jop4ns8r.cn 来月经不能吃什么水果hcv8jop8ns7r.cn 软蛋是什么意思hcv9jop0ns8r.cn 血糖高可以吃什么蔬菜hcv9jop5ns2r.cn
5月13号是什么星座hcv8jop8ns1r.cn 碧字五行属什么hcv9jop2ns1r.cn 家什是什么意思zhongyiyatai.com 小米配什么熬粥最好hcv7jop9ns4r.cn 肚子胀气吃什么naasee.com
百度