What is mac address, Computer Network Security

MAC Address

The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the network adapter card and is distinct. A Media Access Control address (MAC address) is a unique identifier given to network interfaces for communications on the physical layer segment. MAC addresses are needed for numerous network technologies and most IEEE 802 network methodologies, adding Ethernet. MAC addresses are needed in the Media Access Control protocol sub-layer of the OSI architecture.

 

2408_MAC- Address.png

Posted Date: 8/20/2012 2:41:17 AM | Location : United States







Related Discussions:- What is mac address, Assignment Help, Ask Question on What is mac address, Get Answer, Expert's Help, What is mac address Discussions

Write discussion on What is mac address
Your posts are moderated
Related Questions
FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

WIRELESS SECURITY TOOLS An organization which spends its time securing wired network and leaves wireless networks to operate in any manner is opening itself up for security brea

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

how to encryt the data in plaintext cipher