Home > Computer > Computer Networking #6 -Questions and Answers

Computer Networking #6 -Questions and Answers

Computer Networking #6

Computer Networking #6 -Questions and Answers

Today Question => What is a MAC Address?

MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer.

MAC layer represents layer 2 of the TCP/IP (adopted from OSI Reference Model), where IP represents layer 3. MAC address can be thought of as supporting hardware implementation whereas IP address supports software implementation. MAC addresses are permanently burned into hardware by hardware manufacturer, but IP addresses are assigned to the network devices by a network administrator. DHCP relies on MAC address to assign IP addresses to network devices.



Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers

What Is A MAC Address Used For?


One of the applications of MAC addresses is in the filtering process on wireless networks. In order to prevent strangers from accessing a network, the router is set to accept only specific MAC addresses. In this manner, if the IP address changes, as for example in the case of dynamic IP addresses, the MAC address can still identify the device.

Filtering can be used to track network users, and to limit their access. It can also have other uses, such as identifying when a stolen device connects to the network. For these reasons, many companies and institutions require the MAC addresses of their members’ devices. Therefore, it is important for device owners not to reveal their MAC addresses to anyone, except to authorized personnel.

MAC addresses can also be used in data recovery to connect to a wireless device. Disk Drill is an app, developed by Cleverfiles, which helps in data recovery. It searches for lost files by scanning in two possible modes, namely Quick and Deep Scan. Quick Scan uses the metadata still available in the file system. Deep Scan drills deeper into the binary level. The results are presented with the help of a filter.

Disk Drill is available for Windows and Mac computers, and can be download for free.


Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers

Important Questions of Computer Networking – CCNA are Listed Bellow (Part-6)

1- What is NETBIOS and NETBEUI?

Answer:
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.

NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.

2- What is RAID?

Answer: A method for providing fault tolerance by using multiple hard disk drives.

3- What is passive topology?

Answer: When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way. Example for passive topology – linear bus.

4- What is Brouter?

Answer: Hybrid devices that combine the features of both bridges and routers.



Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers

5- What is cladding?

Answer: A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

6- What is point-to-point protocol

Answer: A communications protocol used to connect computers to remote networking services including Internet service providers.

7- How Gateway is different from Routers?

Answer: A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats

8- What is attenuation?

Answer: The degeneration of a signal over distance on a network cable is called attenuation.

9- What is MAC address?

Answer: The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.




Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers

10- Difference between bit rate and baud rate.

Answer:
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.

baud rate = bit rate / N

where N is no-of-bits represented by each signal shift.


Related Link ,Visit once

SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<

Summary
Article Name=>
Computer Networking #6
Description=>
IMP QUE- What is MAC Address- Detail Explanation
Author=>
Publisher Name=>
www.gkaim.com
Admin
Welcome Sir, .. Myself Vikas Chaudhary , i was interested in general knowledge since childhood , so i thought why not to share my knowledge with you, that's why i created this educational blog. Here you find world wide general knowledge of all Latest technology , Science & History Que , and Mysterious fact of the world. Here you also find knowledge about cyber security. Thanks for visit.. keep supporting....keep Loving
https://www.gkaim.com

2 thoughts on “Computer Networking #6 -Questions and Answers

Leave a Reply

Your email address will not be published.

%d bloggers like this:
\