Format of hardware address, Computer Networking

FORMAT OF HARDWARE ADDRESS:

 

 It have of a numeric value and its size is chosen for specific network technology. The length of the message format is one to six bytes.

ASSINGING HARDWARE ADDRESS:

The hardware address have to be unique on a LAN. How can those addresses be given and who is responsible for uniqueness? The answer to these questions relays on the particular LAN technology being used.

 There are three type of categories of address forms:

  • Static
  • Configurable
  • Dynamic


 

Posted Date: 10/27/2012 8:30:09 AM | Location : United States







Related Discussions:- Format of hardware address, Assignment Help, Ask Question on Format of hardware address, Get Answer, Expert's Help, Format of hardware address Discussions

Write discussion on Format of hardware address
Your posts are moderated
Related Questions
What are the features of star and ring topology The three networks have following features: star: best case is = 2, average case is = 2, worst case is = 2 ring: best case

Directly linked network have the lowest administrative distance of 0. They are considered the most reliable.

Hardware requirement for an intranet To setup a WAN, one would need to have some type of communication between different sites. National ISDN, Very Small Aperture Terminal (VSA

Q. What is Manchester? - Utilizes an inversion at the middle of each bit interval for both synchronization and bit representation - Negative-to-positive represents binary 1


Name the physical interfaces that PPP can be configured on a Cisco router:  Ans) A. Asynchronous serial  B. HSSI  C. ISDN  D. Synchronous serial  These four of th

Process Management int pvm_mytid( void ) Returns the tid of the calling process.  tid values less than zero indicate an fault. int pvm_exit( void ) T

What is primary and secondary ring One of the two FDDI rings is known as the primary ring; the other is called the secondary ring. The primary ring is utilized for data tra


Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En