Headers and frame format, Computer Networking

HEADERS AND FRAME FORMAT:

 LAN technology standards describe frame format for every technology. All contemporary standards use the following basic format.

a) Frame header b) payload

 Frame header has other identifying information and address. Information typically in fields has fixed location and size. The data area may differ in size.

The Ethernet frame format is given in the figure.

516_HEADERS AND FRAME FORMAT.png

Figure: the Ethernet frame format

The different kinds of ether frame format and their purposes is illustrate below:

FIELD                                                PURPOSE

Preamble                                       Receiver synchronization

Destination Address                         shows intended receiver device

Source Address                                Hardware address of sender device

Frame Type                                     kind of data carried in frame

Data                                               Frame payload

CRC                                               32-bit CRC code

Posted Date: 10/27/2012 8:37:42 AM | Location : United States







Related Discussions:- Headers and frame format, Assignment Help, Ask Question on Headers and frame format, Get Answer, Expert's Help, Headers and frame format Discussions

Write discussion on Headers and frame format
Your posts are moderated
Related Questions
explain the appropriateness of economic and behavioral feasibility

Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

Q. Explain about Nonboundary-Level Masking? Nonboundary-Level Masking Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet addres

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

What are short, long and medium-term scheduling? Long term scheduler verifies which programs are admitted to the system for processing. It controls the degree of multiprogrammi

What are the Communication tools ? Voice mail ? Email ? Fax ? Video conferencing applications


Extranets can also be utilized to link an intranet to the Internet in order that remote offsite access can be built into a company's intranet through an authorized individual. It c

Token Bus Sublayer Protocol Send for some time then pass token If no data after that pass token right away Traffic classes 0, 2, 4 and 6 (highest) Internal s