Access-Layer
Access-Layer
Access-Layer
Module 7
MAC
•Dell: 00-14-22
•Nortel: 00-04-DC
•Cisco: 00-40-96
•Belkin: 00-30-BD
Start Frame Delimiter (SFD) (1 byte): A specific pattern (usually 10101011) that indicates the end of
the preamble and the start of the actual frame data.
Destination MAC Address (6 bytes): The unique hardware address of the device intended to receive
the frame. This ensures that the frame reaches the correct destination.
Source MAC Address (6 bytes): The unique hardware address of the device sending the frame. This
allows the recipient to know where the frame came from.
EtherType/Length (2 bytes): This field indicates the type of protocol encapsulated in the payload
(EtherType) or the length of the payload in bytes. Common EtherTypes include 0x0800 for IPv4,
0x0806 for ARP, etc.
Payload/Data (46 to 1500 bytes): The actual data being transmitted. The minimum size for the
payload is 46 bytes, and if the data is smaller, padding is added. The maximum frame size for
Ethernet is 1500 bytes, not including headers and trailers.
Frame Check Sequence (FCS) (4 bytes): A cyclic redundancy check (CRC) value used for error
checking.
20XX It allows the receiving
Pitch Deck device to verify the
6 integrity of the frame. If the FCS doesn’t
match, the frame is discarded.
20XX Pitch Deck 7
ENCAPSULATIO
N
•Generally, Encapsulation is a process by which a lower-layer protocol
receives data from a higher-layer protocol and then places the data
into the data portion of its frame. Thus, encapsulation is the process
of enclosing one type of packet using another type of packet.
•Encapsulation in networking is the process of wrapping data with
protocol information at each layer of the OSI model. As data is passed
down the layers, each layer adds its own header (and sometimes a
footer) to the data, forming a packet, segment, or frame. This allows
protocols at different layers to communicate effectively, ensuring the
data is properly addressed, sequenced, and managed throughout the
network. Ultimately, it enables complex networking functions to
operate seamlessly.
20XX Pitch Deck 8
3|9:2|5:4|5:D|A
8|4|2|1
00111001:00100101:010001
01:11011010
20XX Pitch Deck 9
20XX Pitch Deck 10
College of Computer Studies
Eastern Samar State University
Brgy. Maypangdan,
Borongan City E. Samar
We would like to invite you this 4:00 PM on the 8th day of October 2024 at the Canuctan Hall for the acceptance of the award
and a cash prize worth 50,000 pesos, we hope you could grace as with your presence.
Sincerely,
Alice Guo
For instance, imagine your mac address or IP address as the PIN code of
the nearest Post Office and your house address as a Port. Whenever any
parcel is sent to you it gets received by the nearest post office and then it
is identified by your address where to deliver that parcel. Similarly in a
computer data is first received using their IP or MAC address then it is
delivered to the application whose port number is with the data packets.
128|64|32|16|8|4|2|1
CIDR:/24