Packets and frames, Computer Network Security

PACKETS:

Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.

 FRAME:

A hardware frame or frame shows a packet of a specific format on a specific Hardware method.

 FRAME FORMAT:

We require to describe a standard format for data to show the beginning and end of the frame. Tail and header are used to frame the data as given in the figure below.

2366_Frame Format.png

We see that in the diagram eot and soh are used to show the start of header and end of tail.

Posted Date: 7/30/2012 5:25:15 AM | Location : United States







Related Discussions:- Packets and frames, Assignment Help, Ask Question on Packets and frames, Get Answer, Expert's Help, Packets and frames Discussions

Write discussion on Packets and frames
Your posts are moderated
Related Questions
Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The