{"id":143256,"date":"2023-12-14T09:54:15","date_gmt":"2023-12-14T02:54:15","guid":{"rendered":"https:\/\/it.telkomuniversity.ac.id\/osi-layer-2\/"},"modified":"2025-02-12T10:43:40","modified_gmt":"2025-02-12T03:43:40","slug":"osi-layer-2","status":"publish","type":"post","link":"https:\/\/it.telkomuniversity.ac.id\/en\/osi-layer-2\/","title":{"rendered":"OSI Layer 2: Functions, Protocols, and Technologies Used"},"content":{"rendered":"\n<p><strong>OSI Layer 2, commonly referred to as the Data Link Layer, is an essential part of the OSI (Open Systems Interconnection) model. This model serves as a conceptual framework that aids in understanding and implementing network communications.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is OSI Layer 2<\/strong><\/h2>\n\n\n<p data-start=\"165\" data-end=\"764\">The Data Link Layer, also known as OSI Layer 2, is a crucial component of the 7 Layer OSI Model. This layer is responsible for managing access to physical media and controlling data transmission between adjacent network nodes in a wide area network (WAN) or between nodes within a local area network (LAN) segment. The process involves Media Access Control (MAC) and Logical Link Control (LLC), enabling communication between devices. Additionally, OSI Layer 2 supports protocols such as Ethernet and Wi-Fi, which regulate data transmission across networks.<\/p>\n<p data-start=\"805\" data-end=\"1019\">The primary role of OSI Layer 2 is to present data that will be processed by higher layers and ultimately used by applications. The functions, protocols, and technologies within this layer are detailed below.<\/p>\n<figure id=\"attachment_141055\" aria-describedby=\"caption-attachment-141055\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-141055 size-full\" title=\"OSI Layer 2 is Data Link\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2023\/12\/Data-Link-Layer-adalah.png\" alt=\"OSI Layer 2 is Data Link\" width=\"640\" height=\"290\" srcset=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2023\/12\/Data-Link-Layer-adalah.png 640w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2023\/12\/Data-Link-Layer-adalah-300x136.png 300w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2023\/12\/Data-Link-Layer-adalah-255x116.png 255w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-141055\" class=\"wp-caption-text\">OSI Layer 2 is Data Link<\/figcaption><\/figure>\n<h2 data-start=\"1026\" data-end=\"1060\"><strong data-start=\"1030\" data-end=\"1058\">Functions of OSI Layer 2<\/strong><\/h2>\n<p data-start=\"1062\" data-end=\"1151\">Within the OSI Layer Model, the second layer has several critical responsibilities:<\/p>\n<ul data-start=\"1153\" data-end=\"1786\">\n<li data-start=\"1153\" data-end=\"1339\">Managing Access to Physical Media: OSI Layer 2 ensures that multiple devices can efficiently share network resources, whether through Ethernet cables or wireless connections.<\/li>\n<li data-start=\"1340\" data-end=\"1479\">Data Transmission Management: It segments data into frames before sending them over the network, ensuring structured communication.<\/li>\n<li data-start=\"1480\" data-end=\"1603\">MAC Address Assignment: This layer assigns a unique MAC address to each device, enabling precise data delivery.<\/li>\n<li data-start=\"1604\" data-end=\"1786\">Error Detection and Correction: OSI Layer 2 performs error checking using mechanisms such as checksum or Cyclic Redundancy Check (CRC) to maintain data integrity.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>Also Read : <a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/difference-between-a-mac-address-and-an-ip-address\/\" target=\"_blank\" rel=\"noopener\">Difference Between a Mac Address and an IP Address<\/a><\/strong><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2 data-start=\"1793\" data-end=\"1827\"><strong data-start=\"1797\" data-end=\"1825\">Protocols in OSI Layer 2<\/strong><\/h2>\n<p data-start=\"1829\" data-end=\"1937\">The OSI Layer 2 protocol defines communication rules at the Data Link Layer. Key examples include:<\/p>\n<ul data-start=\"1939\" data-end=\"2343\">\n<li data-start=\"1939\" data-end=\"2045\">Ethernet \u2013 Commonly used in wired LANs, enabling seamless communication between networked devices.<\/li>\n<li data-start=\"2046\" data-end=\"2135\">Point-to-Point Protocol (PPP) \u2013 Facilitates direct connections between two nodes.<\/li>\n<li data-start=\"2136\" data-end=\"2240\">HDLC (High-Level Data Link Control) and ADCCP \u2013 Used for reliable, point-to-point data exchange.<\/li>\n<li data-start=\"2241\" data-end=\"2343\">Wi-Fi \u2013 A wireless networking protocol that allows devices to connect without physical cables.<\/li>\n<\/ul>\n<p data-start=\"2345\" data-end=\"2491\">These OSI Layer 2 protocols regulate access to physical media, define MAC addressing, and ensure effective error detection and recovery.<\/p>\n<p data-start=\"2345\" data-end=\"2491\">\u00a0<\/p>\n<p data-start=\"2345\" data-end=\"2491\"><strong>Also Read : <a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/osi-layer-1\/\" target=\"_blank\" rel=\"noopener\">OSI Layer 1<\/a><\/strong><\/p>\n<p data-start=\"2345\" data-end=\"2491\">\u00a0<\/p>\n<p data-start=\"2345\" data-end=\"2491\">\u00a0<\/p>\n<h2 data-start=\"2498\" data-end=\"2535\"><strong data-start=\"2502\" data-end=\"2533\">Technologies in OSI Layer 2<\/strong><\/h2>\n<p data-start=\"2537\" data-end=\"2655\">The Data Link Layer incorporates various technologies to manage communication within OSI Layer 2, including:<\/p>\n<ul data-start=\"2657\" data-end=\"2884\">\n<li data-start=\"2657\" data-end=\"2734\">Ethernet \u2013 Uses copper or fiber optic cables to link network devices.<\/li>\n<li data-start=\"2735\" data-end=\"2805\">Token Ring \u2013 Employs a token-passing method to control access.<\/li>\n<li data-start=\"2806\" data-end=\"2884\">Wi-Fi \u2013 Relies on wireless technology for cable-free connectivity.<\/li>\n<\/ul>\n<p data-start=\"2886\" data-end=\"3007\">These OSI Layer 2 technologies play a vital role in ensuring stable, efficient, and reliable network communication.<\/p>\n<h2 data-start=\"3014\" data-end=\"3034\"><strong data-start=\"3018\" data-end=\"3032\">Conclusion<\/strong><\/h2>\n<p data-start=\"3036\" data-end=\"3310\">In summary, OSI Layer 2 within the 7 Layer OSI Model is essential for managing physical access, data frames, MAC addressing, and error detection. Various protocols and technologies within this layer ensure smooth communication in computer networks.<\/p>\n<p data-start=\"3312\" data-end=\"3616\">Examples of Data Link Layer protocols include Ethernet for local area networks (multi-node) and PPP, HDLC, and ADCCP for point-to-point (dual-node) connections. By understanding OSI Layer 2, networking professionals can optimize data transmission and improve network efficiency.<\/p>\n<h2 style=\"text-align: justify;\"><span id=\"Sumber\" class=\"ez-toc-section\"><\/span>Source :<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/osi-model.com\/data-link-layer\/\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/osi-model.com\/data-link-layer\/<\/strong><\/a><\/p>\n<p style=\"text-align: justify;\"><strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_link_layer\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Data_link_layer<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>OSI Layer 2, commonly referred to as the Data Link Layer, is an essential part of the OSI (Open Systems Interconnection) model. This model serves as a conceptual framework that aids in understanding and implementing network communications. What is OSI Layer 2 The Data Link Layer, also known as OSI Layer 2, is a crucial [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":141057,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":182,"footnotes":""},"categories":[182,2828],"tags":[3515,3516,3517,3521,3519,3513,3512,915,2488,3514,3511,3520,3518,2665,1836],"class_list":["post-143256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs-en","category-networking","tag-computer-networks","tag-data-link-layer","tag-ethernet","tag-internet-protocol","tag-layer-2-switching","tag-mac-address-2","tag-network-protocols","tag-network-security-en","tag-networking-en","tag-osi-layer-3","tag-osi-layer-2","tag-osi-model","tag-switches","tag-tcp-ip-en","tag-vlan-en"],"blocksy_meta":[],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts\/143256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/comments?post=143256"}],"version-history":[{"count":0,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts\/143256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media\/141057"}],"wp:attachment":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media?parent=143256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/categories?post=143256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/tags?post=143256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}