Utilizzando questo sito, accetti il politica sulla riservatezza.
Accettare
EnterineEnterineEnterine
  • CASA
  • PROFESSIONISTA
  • TECNICA
  • Microsoft
    • Azzurro
    • ConfigMgr/SCCM
    • Dpm
    • Orchestratore
    • Hyper-V
    • Microsoft Edge Insider
    • MSI
    • Ufficio 365
    • Insider dell'ufficio
    • Potenza BI
    • Skype
    • SQLServer
    • Squadre
  • FINESTRE
    • Centro di amministrazione di Windows
    • Cliente Windows
    • Windows Server
  • Elenco raccolte query SCCM
Lettura: L1 L2 L3 What’s the Difference
Ridimensionamento dei caratteriAa
EnterineEnterine
Ridimensionamento dei caratteriAa
  • CASA
  • PROFESSIONISTA
  • TECNICA
  • Microsoft
  • FINESTRE
  • Elenco raccolte query SCCM
Ricerca
  • CASA
  • PROFESSIONISTA
  • TECNICA
  • Microsoft
    • Azzurro
    • ConfigMgr/SCCM
    • Dpm
    • Orchestratore
    • Hyper-V
    • Microsoft Edge Insider
    • MSI
    • Ufficio 365
    • Insider dell'ufficio
    • Potenza BI
    • Skype
    • SQLServer
    • Squadre
  • FINESTRE
    • Centro di amministrazione di Windows
    • Cliente Windows
    • Windows Server
  • Elenco raccolte query SCCM
Rete

L1 L2 L3 What’s the Difference

Pubblicato: Febbraio 18, 2024
5 Lettura minima
CONDIVIDERE

L1 L2 L3 What’s the Difference.

Contenuto
Layer 1: Physical LayerDataEquipmentLayer 2: Data Link LayerDataEquipmentLayer 2A – Medium Access ControlLayer 2B – Logical Link ControlLayer 3: Network LayerDataEquipment

Layer 1: Physical Layer

It covers the physical aspects of networking, and is the lowest and most physical layer of the OSI model. Wiring standards play an important role in this layert. In Layer 1, it utilizes physical cabling and radio frequency standards along with the conversion of data to bits.

Data

Data at this layer is simply bits sent across a wire, many many zeros and ones. This is the network layer where that happens so that it can be transmitted somewhere else.

Equipment

The type of equipment involved in Layer 1 uses little to no logic (DUMB) when operating: copper ethernet cables, fiber optic cables, and ethernet hubs. This is not only limited to physical cables though. The physical transmission aspects of Wi-Fi, Bluetooth, Microwave, and other over the air technologies fall under this layer.

An easy-to-understand non-network example of this is electricity. For the most part you simply plug your appliance into the outlet and power is delivered. In the OSI model, swap out power with data.

Layer 2: Data Link Layer

This layer is primarily involved in transmitting data from one specific node to another. These nodes are usually directly connected, whether that’s via LAN, WAN or MAN.

Two sublayers exist here, Medium Access Control (MAC) and Logical Link Control (LLC). It is important to understand that each protocol implements its lower layers differently. Ethernet follows IEEE 802 and allows for variable sized data, while protocols like ATM (Asynchronous Transfer Mode) have fixed 53 bytes of data that it calls “cells.”

In ethernet, Virtual LAN (VLAN) is an important technology implemented here. VLANs help split up broadcast domains by allowing you to segment devices to their own dedicated LAN. When combining VLANs over a single port, they are differentiated with a VLAN header. 802.1Q is the standard today.

Data

Data at this layer is referred to as a frame. Frames have basic data in them such as a source address and a destination address as well as payload. That basic data is often referred to as a header, a type of metadata.

Equipment

Equipment at this layer is a little more intelligent and consists of switches, bridges, and network cards. It can use the headers of the packet to determine exactly where it goes. A switch can read the destination MAC address and forward it directly to the specific port the MAC address is plugged into.

Layer 2A – Medium Access Control

Medium Access Control entails quite a few important functions. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a mechanism ethernet uses to help deal with collisions on half duplex networks.

Layer 2B – Logical Link Control

One of LLC’s main features is that it is a helper layer to assist between Layer 2’s MAC and Layer 3. It does this by providing mechanisms for multiplexing Layer 3 Protocols.

Layer 3: Network Layer

The “IP” in TCP/IP is a Layer 3 protocol. IPX was a very popular Layer 3 protocol within the IPX/SPX protocol group in NetWare’s heyday.

The network layer provides a logical address of an endpoint. Layer 2 addresses are typically automatically generated by the vendor during the manufacturing process. But layer 3 addresses are usually configured. This could be a static IP configuration or a DHCP automated configuration.

Data

Data at this layer is referred to as a packet, which is a stateless grouping of data. Devices that forward packets do not validate that the other end receives the data. Invece, devices leave it to higher layer protocols to implement — should they choose. For example, in the case of Layer 4 protocol TCP, it does. Layer 4 protocol, UDP, however, does not.

Equipment

Routers are the common equipment used at this layer but there are many others. Layer 3 switches are also very common. Those are essentially Layer 2 switches with a router built into the backplane for speed. Firewalls, while able to operate at higher layers, can operate purely at this layer.

TAGGATO:LANLinuxReteFinestre
Articolo precedente Insider dell'ufficio 2110 per Windows
Articolo successivo PostgreSQL DROP Database
Lascia un commento Lascia un commento

Lascia una risposta Annulla risposta

Il tuo indirizzo email non verrà pubblicato. I campi obbligatori sono contrassegnati *

Questo sito utilizza Akismet per ridurre lo spam. Scopri come vengono elaborati i dati dei tuoi commenti.

Traduzione

English中文(简体)DanskNederlandsFrançaisDeutschItaliano한국어PolskiPortuguêsRomânăEspañolУкраїнська
di Transposh - plugin di traduzione per wordpress

Post popolari

Requisiti di sistema per Windows Server 2016
Windows Server
Elenco raccolte query di Gestione configurazione
Elenco raccolte query di Gestione configurazione
ConfigMgr
Navigazione strutturata/gestita abilitata nelle pagine moderne nei siti del team classici
Tecnologia
SCCM Impossibile ottenere le posizioni DP come versione prevista da MP
ConfigMgr

Post recenti

Installazione e configurazione di Fail2ban per la protezione SSH su Ubuntu 24.04
Linux
Abilitazione e configurazione di FirewallD su AlmaLinux
Linux
Creazione utente e configurazione chiave SSH in AlmaLinux
Linux
Come reimpostare la password su AlmaLinux
Linux

© 2023 Enterine

Vai alla versione mobile
Bentornato!

Accedi al tuo account

Nome utente o indirizzo e-mail
Password

Hai perso la password?