Ethernet fields, Computer Networking

ETHERNET FIELDS:

 In Ethernet fields the preamble and CRC is usually not given in frame. The destination address of each is the broadcast address. There is special value reserved for frame kind field.

FRAME WITHOUT TYPE FIELDS:

Some LAN methods do not add a kind field. Receiver and sender can agree on interpretation, which is as given: They agree on single message format and need only that formats these limits to one kind of data. In this way all devices on LAN have to use one format. Also they agree to encode the message format into first few bytes of the data field.

 

 

 

Posted Date: 10/27/2012 8:38:49 AM | Location : United States







Related Discussions:- Ethernet fields, Assignment Help, Ask Question on Ethernet fields, Get Answer, Expert's Help, Ethernet fields Discussions

Write discussion on Ethernet fields
Your posts are moderated
Related Questions
Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16).  The clock t

Transmission Control Protocol (TCP) TCP makes the Internet reliable. TCP solves several problems which can occur in a packet switching system. TCP provide the given facilities:

Question 1 Explain the process of Components Identification and call establishment Question 2 Discuss on Basic services in GSM Question 3 Explain the Protocols Use

The Transport layer implements reliable data transport services. The various functions of Transport Layer are listed below The transport layer is meant for transmitting the data

Client  Server Processes A network  application  consist  of pairs  of process that send message to one  another  over a network. For  example  in a web application a client

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

implementing cnet sliding window protocol with 6 nodes

Problem 1 Describe the architecture of the TCP/IP protocol suite Problem 2 Describe the principle of operation of REXEC protocol Problem 3 Describe the concept

Explain the uses of Firewall in computer For Intranet developers, restricting access of unauthorised users to the Web site has been the greatest challenge. In addition to preve

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack