Headers and frame format, Computer Networking

HEADERS AND FRAME FORMAT:

 LAN technology standards describe frame format for every technology. All contemporary standards use the following basic format.

a) Frame header b) payload

 Frame header has other identifying information and address. Information typically in fields has fixed location and size. The data area may differ in size.

The Ethernet frame format is given in the figure.

516_HEADERS AND FRAME FORMAT.png

Figure: the Ethernet frame format

The different kinds of ether frame format and their purposes is illustrate below:

FIELD                                                PURPOSE

Preamble                                       Receiver synchronization

Destination Address                         shows intended receiver device

Source Address                                Hardware address of sender device

Frame Type                                     kind of data carried in frame

Data                                               Frame payload

CRC                                               32-bit CRC code

Posted Date: 10/27/2012 8:37:42 AM | Location : United States







Related Discussions:- Headers and frame format, Assignment Help, Ask Question on Headers and frame format, Get Answer, Expert's Help, Headers and frame format Discussions

Write discussion on Headers and frame format
Your posts are moderated
Related Questions
HEADERS AND FRAME FORMAT:  LAN technology standards describe frame format for every technology. All contemporary standards use the following basic format. a) Frame header b

ACK Received If an ACK is received by the  sender. The  SR sender marks  that packet  as having  been received by the receiver.

Explain about the Middleware support All the connectivity interface related tools come under the category of middleware. Middleware provides the link for data exchange between

Explain the transport layer in detail Transport Layer: Transport layer ensures and controls the end-to-end integrity of data message propagated via the network  amid two devic

Controlling and monitoring access to the Intranet Digital certificates provide excellent means of controlling and monitoring access to the Intranets. The certificate itself act

What is Beaconing? The process that permits a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not rece

Document the Switch Configuration When you have done your troubleshooting, capture the output of the show run command and save it to a text document for each switch.

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack

Define  the concept of one way redistribution and mutual

In this project, you will implement a Transport Layer protocol to transmit data with Reliable Data Transfer from a client to a server in the presence of channel errors and loss. Th