Packets and frames, Computer Network Security

PACKETS:

Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.

 FRAME:

A hardware frame or frame shows a packet of a specific format on a specific Hardware method.

 FRAME FORMAT:

We require to describe a standard format for data to show the beginning and end of the frame. Tail and header are used to frame the data as given in the figure below.

2366_Frame Format.png

We see that in the diagram eot and soh are used to show the start of header and end of tail.

Posted Date: 7/30/2012 5:25:15 AM | Location : United States







Related Discussions:- Packets and frames, Assignment Help, Ask Question on Packets and frames, Get Answer, Expert's Help, Packets and frames Discussions

Write discussion on Packets and frames
Your posts are moderated
Related Questions
Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Ask question #Minimum 100 words are there non parasitic viruses

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment.  Note:  before commencing research on the topic, y

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a