Explain the structure of a typical ethernet frame, Computer Networking

Assignment Help:

Question:

(a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respectively known as CSMA/CD (Ethernet) and Token Ring.

i. Describe 3 differences between Token Ring and CSMA/CD technologies.

ii. Explain the structure of a typical Ethernet II frame.

(b) Asynchronous Transfer Mode (ATM) is a high-speed network technology. ATM has a physical layer, an ATM layer and an ATM Adaptation Layer (AAL). Four protocols at the AAL layer allow for the creation of a variety of service classes.

i. What are the factors that determine the service classes and what is the purpose of such a distinction?

ii. Give briefly the structure of an ATM NNI cell.

(c) Nowadays many companies are shifting towards the IEEE 802.11x standard for extending their network.

i. Outline two popular flavours of this wireless standard. Elaborate on the operating frequency, range and speed of each flavour.

ii. What are the two modes of operation of this standard and explain the difference between the two.

iii. Mention one security issue with this wireless technology and explain how this issue can be addressed.


Related Discussions:- Explain the structure of a typical ethernet frame

Design the user interface for mode switching, Design the user interface for...

Design the user interface for mode switching and data entry any way that you like. For example, to switch an application from transmit mode to receive mode, you can give it special

Packet takes through an internetwork, What utility can you use to see the p...

What utility can you use to see the path a packet takes through an internetwork? Ans) Trace - Uses Time-To-Live (TTL) values to make messages from each router used along the pat

What is the mesh network, A network in which there is multiple network link...

A network in which there is multiple network links among computers to provide multiple paths for data to travel.

Division of the address space, The IP class procedure does not split the 32...

The IP class procedure does not split the 32-bit address space into same size class and the classes do not have the same value of networks. A prefix of n bits gives 2n unique ne

Building a defense in networking, Q. Building a Defense in networking? ...

Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

Illustrate TCP – bytes and segments, Q. Illustrate TCP – bytes and segments...

Q. Illustrate TCP – bytes and segments? TCP - bytes & segments TCP at the sending site collects bytes into a packet called a segment TCP adds a header to each se

Flash updates, IGRP uses flash updates, poison reverse updates, hold down t...

IGRP uses flash updates, poison reverse updates, hold down times, and divide horizon. How often does it broadcast its routing table updates? Ans) 90 seconds

Verify passwords - ccna, Verify Passwords Step 1 : Telnet to the route...

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd