Great Deal! Get Instant $25 FREE in Account on First Order + 10% Cashback on Every Order Order Now

1) The responsibility of the OSI data link layer is to carry out physical addressing, network topology, error notification, flow control, and sequencing of frames. Within this layer falls IEEE 802,...

1 answer below »


The responsibility of the OSI data link layer is to carry out physical addressing, network topology, error notification, flow control, and sequencing of frames. Within this layer falls IEEE 802, which is a collection of networking standards which is divided into twenty-two parts that deal with both the datalink and physical layer specifications for different technologies such as the Ethernet and Wi-Fi. These conditions may apply to both LAN’s and MAN’s and vary accordingly. These same standards are also responsible for aiding in ensuring multi-supplier interoperability by promoting such standards to be followed by all.(Gillis, 2020) Fundamentally, the IEEE 802 standards supports the idea of making sure internet services and technologies adhere to an established set of advised practices to allow all network devices to work simultaneously without error. The family of standards is developed and maintained by the LMSC also referred to as the IEEE 802 LAN/MAN Standards Committee, are the individuals responsible for developing and preserving such standards.

Some of the more commonly utilized standards include those used for Ethernet, bridging and virtual bridged LANs, wireless LAN, wireless PAN, MAN and radio access networks as well as media independent handover services.(Gillis, 2020) Some of the well-established specifications include those of the XXXXXXXXXXBluetooth/ZigBee, 802.3 Ethernet, and/or XXXXXXXXXXWi-Fi. For the purpose of this discussion board, I was asked to select one type of IEEE 802 standard and discuss it more in-depth. The standard I wish to speak on is XXXXXXXXXXWi-Fi as I utilized this on a continuous basis in my everyday life. Wireless LAN Media Access Control and Physical Layer specification. 802.11a, b, g, and so on are revisions of the original XXXXXXXXXXstandard. Products that implement XXXXXXXXXXstandards must pass tests allowing them to be labelled as Wi-Fi certified.(Gillis, 2020) In this technology era with so many smart devices that can connect wirelessly this is crucial. Therefore the term Wi-Fi is tantamount with wireless access with disregards to the fact that it is a specific trademark owned by the Wi-Fi Alliance, whom is dedicated to certifying that all Wi-Fi products meet the standards of the IEEE’s XXXXXXXXXXShaw, 2020) These growing standards, with handles like 802.11ac and 802.11b, encompass a group of specifications dated back to the 90s. These same standards codify enhancements that are responsible for boosting wireless outputs and/or ranges, in addition to the utilization of new frequencies as they become readily available. And another bonus is they additionally address novel technologies that successfully decrease the consumption of power.

Today so many of the devices we utilize on a day to day need to connect to the internet via Wi-Fi in order to gain the full access to all the smart features they are capable of delivering. Let’s take smartphones, watches, televisions, and tablets are also able to connect to the IoT but in turn many can also become a device used as a Wi-Fi hotspot. This is accomplished by utilizing using their service cellular network connections to provide wireless internet connectivity to computers and other devices that are not connected to a cellular plan. In order to access Wi-Fi from a device they need to be equipped with a wireless adapter.(Phifer, 2017) The standards required by the Wi-Fi association then allows your device to search for and identify available Wi-Fi network automatically when in range. These networks can consist of either be open networks or secured networks, for which I only trust connecting to those protected by a passphrase.

In general Wi-Fi networks consist of two different topologies, just the same as wired networks do. Nevertheless, Wi-Fi networks only utilize two logical topologies which are Star and Point-to-point.(Woligroski, 2011) The topology I would select is the star technology as it is utilized by Wi-Fi IEEE XXXXXXXXXXbased devices within the infrastructure mode. This resembles that of the topology that is utilized by 10BASE-T and speedier versions of the Ethernet which uses a switch and/or hub. Allowing the access point to take the spot of switches due to the stations connecting by way of an access point, instead of directly with one another. While this method may be more costly it facilitates performance in supererogatory of that of 10BASE-T Ethernet speeds with an additional bonus of being more user friendly and simpler to administer.

In closing, due to the fact that wireless networks can be accessed or seen by anyone that is within range with a NIC that matches the same IEEE standards as that device wireless network the NIC’s as well as access points provide some options for encryption. Many access points also prove end-users with the capability to limit who connects to the access point by utilizing a list of authorized MAC numbers to limit unauthorized usage. And while MAC address can be successful of filtering and preventing others within range from stealing bandwidth it is not capable of completely stopping attacks as there is a margin for which spoofs can occur, so encryptions and adding passphrases is crucial. So, with as many devices I connect to the IoT without wireless IEEE 802 standards I would be in the dark and all my smart devices would be pretty useless.


Gillis, A. S. (2020, October 01).IEEE 802 Wireless Standards. Retrieved from Tech Target:,metropolitan%20area%20networks%20(MAN).

Phifer, L. (2017, January 31).Wi-Fi (802.11x standard). Retrieved from Tech Target:

Shaw, K. (2020, April 23).802.11x: Wi-Fi standards and speeds explained. Retrieved from Networkworld:

Woligroski, D. (2011, November 02).LAN 102: Network Hardware And Assembly. Retrieved from Tom's Hardware:,3035-7.html


The OSI data link layer is responsible for physical addressing, network topology, error notification, sequencing of frames and flow control. IEEE has defined numerous protocols used with TCP/IP at the OSI data link layer. They are called the IEEE 802 Standards.

IEEE 802 is a collection of networking standards that cover the physical and data-link layer specifications for technologies such Ethernet and Wireless. These specifications apply to Local Area Network (LAN) and Metropolitan Area Network (MAN). IEEE 802 a;so aids in ensuring multi-vendor interoperability by promoting standards for vendors to follow.

Essentially, the IEEE 802 standards help make sure internet services and technologies follow a set of recommended practices so network devices can all work together smoothly

IEEE 802 is divided into 2.2 parts that cover the physical and data-link aspects of networking. The family of standards is developed and maintained by the IEEE 802 LAN?MAN Standards Committee, also known as LMSC. IEEE stands for Institute of Electrical and Electronics Engineers.

I will attempt to explain the IEEE XXXXXXXXXXwhich is the Wi-Fi , this standard covers the Wi-Fi . Wireless LAN Media Access Control and physical layer specification. 802.11a, b, g, etc. are ammendments to the original 802.11Standard Products that implement XXXXXXXXXXstandards must pass tests and are referred to as Wi-Fi certified.


Answered Same DayMar 19, 2022


Neha answered on Mar 19 2022
71 Votes
Post 1
In this post it discussed about the responsibility of the OSI data link layer. In this post it clearly explains each and every point of the data link layer. It discusses about the different protocols and the standards followed in the network. It talks about the IEEE 802, and it is defined as the collections of all the networking standard which are further divided into twenty-two parts, and they are able to maintain the data link layer and physical layer...

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here