Packets and frames, Computer Network Security


Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.


A hardware frame or frame shows a packet of a specific format on a specific Hardware method.


We require to describe a standard format for data to show the beginning and end of the frame. Tail and header are used to frame the data as given in the figure below.

2366_Frame Format.png

We see that in the diagram eot and soh are used to show the start of header and end of tail.

Posted Date: 7/30/2012 5:25:15 AM | Location : United States

Related Discussions:- Packets and frames, Assignment Help, Ask Question on Packets and frames, Get Answer, Expert's Help, Packets and frames Discussions

Write discussion on Packets and frames
Your posts are moderated
Related Questions
Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi