Preview

Nt1310 Unit 5 Paper

Satisfactory Essays
Open Document
Open Document
323 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 5 Paper
Unit 4 Research Project: MAC Sublayer
The Media Access Control (MAC) is one of the sublayers contained in the Data Link Layer (DLL) of the Open Systems Interconnection (OSI) model. The MAC layer provides addressing and channel access control mechanisms, and works to transmit data from one Network Interface Card (NIC) to another across a connected network.
Carrier Sensed Multiple Access with Collision Detection (CSMA/CD) is the process used by non-switched Ethernet to detect a clear channel between devices helping to decrease the chance of data “colliding” during transmission. Utilizing MAC protocol, a devise will “listen” for other traffic between connected devises. If no traffic is detected, the device will pause (an added security against devices sending at the same time) and then send the data in the form of MAC protocol frames.
…show more content…
The PCI header includes the 6 byte destination address, 6 byte source address, and the 2 byte type field (the type field defines the protocol being used). The checksum consists of a 4 byte Cyclic Redundancy Check (CRC) used to error check the data for any dropped bits.
Any connected devise that reads the data transmitted will check the destination address; if the address does not belong to the devise, it will not read the rest of the frame. Once the intended recipient reads the frame, it will send a response to the source address; data received intact - continue, or data corrupt -

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What is the molecular geometry of the red carbon atom in the following compound,f[HCequiv {color{red}C }-CH_{3}f]…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    64. Yes p, because the elements are the same and they have the same number of…

    • 373 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 368 Words
    • 2 Pages

    The stakeholder involved in this decision is Anne Distagne, the CEO of Linkage Construction, Inc. She was the individual involved in the decision-making process. of falsifying information to not display the significant increase in profit.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Each and every packet has a VCI (virtual circuit identifier) in the data transfer phase, the VCI is used by the frame across the two switches and is a small number containing a switch scope only.…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Paper

    • 567 Words
    • 3 Pages

    Emails provide stability to the organizations. Emails are the backbone that forms the base for the organization structure. Organization has different department for a different purpose. In order to communicate with the environment. Organizations use MS Outlook for maintaining a healthy communication environment in different departments. Every user mailbox data is stored in on exchange server in the form of edb files. In the presence of certain conditions EDB files of MS Outlook get corrupt and are not accessible.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2640 Final Review

    • 1061 Words
    • 5 Pages

    2. When a switch receives an Ethernet frame to a destination MAC address which is not in the devices MAC address table the switch applies the following logic: ____________________.…

    • 1061 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 381 Words
    • 2 Pages

    1. Create an insert function that will take nodes and add them up in the binary tree.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 712 Words
    • 3 Pages

    When looking at security of your network first you must determine what laws and regulations you must abide by. Being a police department do you have information stored in your database that would be considered ePHI from when a inmate was treated then you may fall under HIPAA. Do you take credit card for payment of violations? If so you may be required to protect data under SOX or PCI. You must know what data you have and how you must protect it. Are you required to report to the public or the court if your data is breeched? If so at what level or detail?…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Information is passed from one computer to another in either clock-wise direction or counter clock-wise direction and after receiving the information, the receiver must send the “acknowledgement” message (ACK message) back to the sender to complete the transmission.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ethernet Mac Address

    • 1195 Words
    • 5 Pages

    | What are the Ethernet Layer 2 functions that overcome the limitations of Ethernet Layer 1?…

    • 1195 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Information Theory

    • 2168 Words
    • 9 Pages

    Fig. 8 Three types of redundancy checks are common in data communications: parity check, cyclic…

    • 2168 Words
    • 9 Pages
    Good Essays