What is mac address, Computer Network Security

MAC Address

The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the network adapter card and is distinct. A Media Access Control address (MAC address) is a unique identifier given to network interfaces for communications on the physical layer segment. MAC addresses are needed for numerous network technologies and most IEEE 802 network methodologies, adding Ethernet. MAC addresses are needed in the Media Access Control protocol sub-layer of the OSI architecture.

 

2408_MAC- Address.png

Posted Date: 8/20/2012 2:41:17 AM | Location : United States







Related Discussions:- What is mac address, Assignment Help, Ask Question on What is mac address, Get Answer, Expert's Help, What is mac address Discussions

Write discussion on What is mac address
Your posts are moderated
Related Questions
Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store

Ask question #Minimum 100 words are there non parasitic viruses

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef