Explain the structure of a typical ethernet frame, Computer Networking

Assignment Help:

Question:

(a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respectively known as CSMA/CD (Ethernet) and Token Ring.

i. Describe 3 differences between Token Ring and CSMA/CD technologies.

ii. Explain the structure of a typical Ethernet II frame.

(b) Asynchronous Transfer Mode (ATM) is a high-speed network technology. ATM has a physical layer, an ATM layer and an ATM Adaptation Layer (AAL). Four protocols at the AAL layer allow for the creation of a variety of service classes.

i. What are the factors that determine the service classes and what is the purpose of such a distinction?

ii. Give briefly the structure of an ATM NNI cell.

(c) Nowadays many companies are shifting towards the IEEE 802.11x standard for extending their network.

i. Outline two popular flavours of this wireless standard. Elaborate on the operating frequency, range and speed of each flavour.

ii. What are the two modes of operation of this standard and explain the difference between the two.

iii. Mention one security issue with this wireless technology and explain how this issue can be addressed.


Related Discussions:- Explain the structure of a typical ethernet frame

Routing protocol used in design a banking network, You have been asked to d...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Torus, Torus The mesh network with enclose around connections is called...

Torus The mesh network with enclose around connections is called Tours Network.

Error detection and correction, Error detection and correction The digi...

Error detection and correction The digital traffic stream of second generation systems also lends itself to the use of error detection and correction methods. The result can be

System deadlock in shared programme structures, System Deadlock A dead...

System Deadlock A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation. The fol

What is nic - networking, NICs Network interface cards, commonly referr...

NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network. The NIC gives a physical connection among the networking medium and the comput

Discuss your strategy to test wlpc system, Wireless Phone Company (WLPC) is...

Wireless Phone Company (WLPC) is a provider of wireless phone service in the US with 100,000 customers serving mostly small markets. WLPC has just purchased additional airwaves in

What are the local network security issues, Q. What are the Local Network S...

Q. What are the Local Network Security Issues? Local Network Security Issues Password Protection - Encrypted username & password Group/Owner ID's - File Permissi

Discuss on basic services in gsm, Question 1 Explain the process of Compon...

Question 1 Explain the process of Components Identification and call establishment Question 2 Discuss on Basic services in GSM Question 3 Explain the Protocols Use

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

Which layer defines bit synchronization, Physical layers defines with synch...

Physical layers defines with synchronizing the 1s and 0s on the wire.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd