Question

On which layer(s) we can find frames? What are the frame transmission methods?  (List) What is the...

On which layer(s) we can find frames?

What are the frame transmission methods?  (List)

What is the function of SYN, STX, and ETX characters?

What is the IEEE standard number for Ethernet?

Homework Answers

Answer #1

ANSWERS -

1) Data link layer which is layer 2 of OSI model we can find frames, it is the protocol data unit.

2) The different frame transmission methods are -

  • Fixed size framing - frame size is fixed, frame length are delimiters
  • Variable size framing - Size of frame varies

3) Functions of -

  • SYN - Synchronous idle function is to provide signal from which synchronous correction to data terminal.
  • STX - Start of text control character defines the start of text block.
  • ETX - End of text character function is to inform the destination/receiving device that the end of stream has been reached in data link layer.

4) Ethernet is the technology to connect devices in LAN and WAN. The IEEE standard for Ethernet is IEEE 802.3.

=================================END================================

Please comment if u need any other info and DO LEAVE A LIKE, it would mean a lot. Thanks :)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What are some advantages and disadvantages of selecting a page frame size of 1 MB? List...
What are some advantages and disadvantages of selecting a page frame size of 1 MB? List at least one (1) advantage and disadvantage. What are some advantages and disadvantages of selecting a page frame size of 100 bytes? List at least one (1) advantage and disadvantage. Answer the following questions about a program containing 512 bytes and an operating system using a page frame size of 200 bytes. How many page frames are necessary to store the entire program in...
This must be answered not advance methods, focusing on String method. We are working on Ch...
This must be answered not advance methods, focusing on String method. We are working on Ch 9 in Think Java 1st Ed.I need the program to be bare bones and the coding need to be done the long way with no advanced code. in this lab you will have two methods with headings: - public static int countNumberSigns(String tweetText) - public static int countHashtags(String tweetText) 'String tweetText' means the method is expectiong a string value as an input to it....
Part 1 Directions: List the number of sales (Y) at the stated price point (x). Find...
Part 1 Directions: List the number of sales (Y) at the stated price point (x). Find a demand function D(x) which outputs Y when you input x. This function should be decreasing (negative derivative). Y= 1000 X= $20 For D(x) I got D(x) = 20100-5x. If you find a is a better Y and X please use it, this is just what I chose to use. (Professors notes: A quick way to make a demand function for your product: 1....
Combinatorial Math: Find the number of nonnegative integer solutions to the equation a+b+c=249. We are given:...
Combinatorial Math: Find the number of nonnegative integer solutions to the equation a+b+c=249. We are given: 10 ≤ a ≤ 30  (you can use an ellipsis between values in this factor instead of listing them all) b is even and b > 50 c ≥ 144 a) Set up the generating function. Do not multiply it out. Do not use a, b or c in the function. Use x as the variable. The first factor should relate to a, the second...
What steps would we take to find: Let S z = az+b/( cz+d) and T z...
What steps would we take to find: Let S z = az+b/( cz+d) and T z = αz+β/(γz+δ) , show that S = T iff there is a non zero complex number λ such that α = λa, β = λb, γ = λc, δ = λd.
Develop a C++ PROGRAM which will find a hidden sentence in a list of random words...
Develop a C++ PROGRAM which will find a hidden sentence in a list of random words using map function Open this text file named shuffled_words.txt in your program If it matters, you may presume there are an even number of words in the file Place the contents of the file into an appropriate data structure in the following manner: Grab a pair of strings from the file (unless end of file is reached) Each string is separated by a space...
*Answer all questions using R-Script* Question 1 Using the built in CO2 data frame, which contains...
*Answer all questions using R-Script* Question 1 Using the built in CO2 data frame, which contains data from an experiment on the cold tolerance of Echinochloa crus-galli; find the following. a) Assign the uptake column in the dataframe to an object called "x" b) Calculate the range of x c) Calculate the 28th percentile of x d) Calculate the sample median of x e) Calculate the sample mean of x and assign it to an object called "xbar" f) Calculate...
We can use the Cournot model to derive an equilibrium industry structure. For this purpose, we...
We can use the Cournot model to derive an equilibrium industry structure. For this purpose, we will define an equilibrium as that structure in which no firm has an incentive to leave or enter the industry. If a firm leaves the industry, it enters an alternative competitive market in which case it earns zero (economic) profit. If an additional firm enters the industry when there are already n firms in it, the new firm’s profit is determined by the Cournot...
List as many internal control weaknesses as you can find, and suggest a solution to every...
List as many internal control weaknesses as you can find, and suggest a solution to every weakness that you find. Revenue cycle, Accounts Receivable Clerk: Q1 I have some questions about the accounts receivable function. How do you go about invoicing customers? A1 When the accounts receivable clerks receive their copy of the bill of lading they begin the process of invoicing. Once it is prepared, a copy is sent to the customer together with a remittance advice to be...
Use python language please #One of the early common methods for encrypting text was the #Playfair...
Use python language please #One of the early common methods for encrypting text was the #Playfair cipher. You can read more about the Playfair cipher #here: https://en.wikipedia.org/wiki/Playfair_cipher # #The Playfair cipher starts with a 5x5 matrix of letters, #such as this one: # # D A V I O # Y N E R B # C F G H K # L M P Q S # T U W X Z # #To fit the 26-letter alphabet into...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT