What is mac address, Computer Network Security

MAC Address

The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the network adapter card and is distinct. A Media Access Control address (MAC address) is a unique identifier given to network interfaces for communications on the physical layer segment. MAC addresses are needed for numerous network technologies and most IEEE 802 network methodologies, adding Ethernet. MAC addresses are needed in the Media Access Control protocol sub-layer of the OSI architecture.


2408_MAC- Address.png

Posted Date: 8/20/2012 2:41:17 AM | Location : United States

Related Discussions:- What is mac address, Assignment Help, Ask Question on What is mac address, Get Answer, Expert's Help, What is mac address Discussions

Write discussion on What is mac address
Your posts are moderated
Related Questions
what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

how to link html with a data base

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

implementing password policy in organisation

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

which is best algorithm

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio