Network Protocols: CRC, MAC, Token Ring, and Bridging
Classified in Geology
Written on in English with a size of 3.75 KB
Fabric Description and Techniques
This document describes fabric techniques.
Data Link Layer and Network Delimitation
The data link layer is based on data flow. It transmits data and uses key methods. It also uses the physical MDIO method and character account. It includes the insertion of special characters and bit insertion for code violation.
CRC16 and Error Correction
What is CRC16?
CRC16 is used to verify and correct errors. It is used for:
- No errors with odd bits.
- Bursty errors with a length of 16 or inferior.
- Very high bursty errors percentage of greater length.
MAC and Link Layer
Keys Exist When the MAC?
The link layer is divided into two sublayers:
- LLC (Logical Link Control): Performs functions typical of the data link layer.
- MAC (Medium Access