Explain the structure of a typical ethernet frame, Computer Networking

Assignment Help:

Question:

(a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respectively known as CSMA/CD (Ethernet) and Token Ring.

i. Describe 3 differences between Token Ring and CSMA/CD technologies.

ii. Explain the structure of a typical Ethernet II frame.

(b) Asynchronous Transfer Mode (ATM) is a high-speed network technology. ATM has a physical layer, an ATM layer and an ATM Adaptation Layer (AAL). Four protocols at the AAL layer allow for the creation of a variety of service classes.

i. What are the factors that determine the service classes and what is the purpose of such a distinction?

ii. Give briefly the structure of an ATM NNI cell.

(c) Nowadays many companies are shifting towards the IEEE 802.11x standard for extending their network.

i. Outline two popular flavours of this wireless standard. Elaborate on the operating frequency, range and speed of each flavour.

ii. What are the two modes of operation of this standard and explain the difference between the two.

iii. Mention one security issue with this wireless technology and explain how this issue can be addressed.


Related Discussions:- Explain the structure of a typical ethernet frame

What is usage of sequence number in reliable transmission, What is usage of...

What is usage of Sequence Number in Reliable Transmission? The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to t

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

Determine the window positions for succession of events, Two neighbouring n...

Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is r

Categories to access the intranet, Categories to access the Intranet P...

Categories to access the Intranet Persons who can find access to the Intranet can be put into three categories. 1.  Those who can enter the site 2.  Those who can access

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Dotted decimal notation, Dotted decimal representation is a syntactic form ...

Dotted decimal representation is a syntactic form the IP software uses to express 32-bit binary numbers when communicating with humans. Dotted decimal presents every octet in decim

Advantages of ospf - network layer and routing , Advantages of OSPF OSP...

Advantages of OSPF OSPF an is having different  advantages. These are as follows. OSPF  is an open standard supported by many  vendors. OSPF converges quickly. OSPF au

Tools that an attacker can use to crack wep, Question: Consider that yo...

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

Multi tasking environment, Multi Tasking Environment Multi tasking exp...

Multi Tasking Environment Multi tasking exploits parallelism by: 1)  Concurrently using the multiple functional units 2)  Pipelining functional units are pipe line toget

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd