What is mac address, Computer Network Security

MAC Address

The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the network adapter card and is distinct. A Media Access Control address (MAC address) is a unique identifier given to network interfaces for communications on the physical layer segment. MAC addresses are needed for numerous network technologies and most IEEE 802 network methodologies, adding Ethernet. MAC addresses are needed in the Media Access Control protocol sub-layer of the OSI architecture.

 

2408_MAC- Address.png

Posted Date: 8/20/2012 2:41:17 AM | Location : United States







Related Discussions:- What is mac address, Assignment Help, Ask Question on What is mac address, Get Answer, Expert's Help, What is mac address Discussions

Write discussion on What is mac address
Your posts are moderated
Related Questions
Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer