What is mac address, Computer Network Security

MAC Address

The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the network adapter card and is distinct. A Media Access Control address (MAC address) is a unique identifier given to network interfaces for communications on the physical layer segment. MAC addresses are needed for numerous network technologies and most IEEE 802 network methodologies, adding Ethernet. MAC addresses are needed in the Media Access Control protocol sub-layer of the OSI architecture.

 

2408_MAC- Address.png

Posted Date: 8/20/2012 2:41:17 AM | Location : United States







Related Discussions:- What is mac address, Assignment Help, Ask Question on What is mac address, Get Answer, Expert's Help, What is mac address Discussions

Write discussion on What is mac address
Your posts are moderated
Related Questions
Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

what is computer network?

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).