SlideShare a Scribd company logo
1 of 9
By: Bharat Kunwar
 It is a second layer of the seven OSI layer
Model.
 It handles the moving of data in and out across
a physical link in a network.
 It provides reliable data transfer by transmitting
packets with the necessary synchronization,
error control and flow control.
 Data link layer is divided into two sub
layers: Media access control (MAC) and
Logical link control (LLC) layer.
 It is used to transfer data between network
nodes that are in a wide area network, or
between nodes which lie on the same local area
network segment.
 Provide service interface to the network layer
 Dealing with transmission errors
 Regulating data flow
 Ethernet
 Token Ring
 FDDI(Fiber Distributed Data Interface)
 IEEE 802.11 (WLAN, Wi-Fi)
 ATM(Asynchronous Transfer Mode)
 PPP(Point-to-Point Protocol)
 HDLC(High-Level Data Link Control)
 MPLS(Multiprotocol Label Switching)
 ADCCP (Advanced Data Communication
Control Procedures)
 Bridges
 Switches
 Hubs
 Router
 Distributed Interactive
Simulation protocol
data unit
 Frame (networking)
 MAC protocol data
unit
 Network packet
 Smart card
application protocol
data unit
The Media Access Control (MAC) sublayer:
o Media Access Control Layer is one of two
sublayers that make up the Data Link Layer of
the OSI model.
o The MAC layer is responsible for moving
data packets to and from one Network Interface
Card(NIC) to another across a shared channel.
The Logical Link Control (LLC) sublayer:
o Logical Link Control layer is one of two sublayers
that make up the Data Link Layer of the OSI
model.
o The Logical Link Control layer controls frame
synchronization, flow control and error checking.
Function of MAC:
 Protection against errors, generally by means of
generating and checking frame check
sequences
 Control of access to the physical transmission
medium
Function of LLC:
 Accepts data from higher layers and forms it into
standard frames
 Recognizes and deals with frame errors
Packets: Packet is one unit of binary data capable of
being routed through a computer network. To improve
communication performance and reliability, each
message sent between two network devices is often
subdivided into packets by the underlying hardware and
software.
Frame: Frame is data that is transmitted between
network points as a unit complete with addressing and
necessary protocol control information. A frame is
usually transmitted serial bit by bit and contains a
header field and a trailer field that "frame" the data.
(Some control frames contain no data.)
Segment: Segment is a specially-configured
subset of a larger network. The boundaries of a
network segment are established by devices
capable of regulating the flow of packets into and
out of the segment, including routers, switches,
hubs, bridges, or multi-homed gateways (but not
simple repeaters).

More Related Content

What's hot

Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference ModelVishnu Vardhan
 
iso osi model
 iso osi model iso osi model
iso osi modelvishnu1204
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Internet stack protocol
Internet stack protocolInternet stack protocol
Internet stack protocolYash Patel
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelShreyash Agarwal
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 

What's hot (20)

Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
OSI 7 Layer model
OSI 7 Layer modelOSI 7 Layer model
OSI 7 Layer model
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
iso osi model
 iso osi model iso osi model
iso osi model
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Iso osi
Iso osiIso osi
Iso osi
 
Bhargavi osi
Bhargavi osiBhargavi osi
Bhargavi osi
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Internet stack protocol
Internet stack protocolInternet stack protocol
Internet stack protocol
 
Iso layers
Iso layersIso layers
Iso layers
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Osi model
Osi modelOsi model
Osi model
 

Similar to Data link layer

seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI modelManjeet MN
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfSALES97
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfGandhibabu8
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi ModelBELKA08
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introductionPRADEEP
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBapanKar2
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networkingsheikhparvez4
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)Pooja Bhojwani
 
The osi model layers
The osi model layersThe osi model layers
The osi model layersINFitunes
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolSajith Ekanayaka
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And DisadvantagesRenee Jones
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Diwash Sapkota
 

Similar to Data link layer (20)

seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdf
 
Network session 1 OSI Model
Network session 1 OSI ModelNetwork session 1 OSI Model
Network session 1 OSI Model
 
OSI model
OSI modelOSI model
OSI model
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
 
OSI model
OSI modelOSI model
OSI model
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Note 6
Note 6Note 6
Note 6
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Osi model
Osi model Osi model
Osi model
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Data link layer

  • 2.  It is a second layer of the seven OSI layer Model.  It handles the moving of data in and out across a physical link in a network.  It provides reliable data transfer by transmitting packets with the necessary synchronization, error control and flow control.  Data link layer is divided into two sub layers: Media access control (MAC) and Logical link control (LLC) layer.
  • 3.  It is used to transfer data between network nodes that are in a wide area network, or between nodes which lie on the same local area network segment.  Provide service interface to the network layer  Dealing with transmission errors  Regulating data flow
  • 4.  Ethernet  Token Ring  FDDI(Fiber Distributed Data Interface)  IEEE 802.11 (WLAN, Wi-Fi)  ATM(Asynchronous Transfer Mode)  PPP(Point-to-Point Protocol)  HDLC(High-Level Data Link Control)  MPLS(Multiprotocol Label Switching)  ADCCP (Advanced Data Communication Control Procedures)
  • 5.  Bridges  Switches  Hubs  Router  Distributed Interactive Simulation protocol data unit  Frame (networking)  MAC protocol data unit  Network packet  Smart card application protocol data unit
  • 6. The Media Access Control (MAC) sublayer: o Media Access Control Layer is one of two sublayers that make up the Data Link Layer of the OSI model. o The MAC layer is responsible for moving data packets to and from one Network Interface Card(NIC) to another across a shared channel. The Logical Link Control (LLC) sublayer: o Logical Link Control layer is one of two sublayers that make up the Data Link Layer of the OSI model. o The Logical Link Control layer controls frame synchronization, flow control and error checking.
  • 7. Function of MAC:  Protection against errors, generally by means of generating and checking frame check sequences  Control of access to the physical transmission medium Function of LLC:  Accepts data from higher layers and forms it into standard frames  Recognizes and deals with frame errors
  • 8. Packets: Packet is one unit of binary data capable of being routed through a computer network. To improve communication performance and reliability, each message sent between two network devices is often subdivided into packets by the underlying hardware and software. Frame: Frame is data that is transmitted between network points as a unit complete with addressing and necessary protocol control information. A frame is usually transmitted serial bit by bit and contains a header field and a trailer field that "frame" the data. (Some control frames contain no data.)
  • 9. Segment: Segment is a specially-configured subset of a larger network. The boundaries of a network segment are established by devices capable of regulating the flow of packets into and out of the segment, including routers, switches, hubs, bridges, or multi-homed gateways (but not simple repeaters).