Table of Contents=> Go Directly
Computer Networking #6 -Questions and Answers
Today’s Question => What is a MAC Address?
MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer.
MAC layer represents layer 2 of the TCP/IP (adopted from OSI Reference Model), where IP represents layer 3. MAC address can be thought of as supporting hardware implementation whereas IP address supports software implementation. MAC addresses are permanently burned into hardware by hardware manufacturer, but IP addresses are assigned to the network devices by a network administrator. DHCP relies on MAC address to assign IP addresses to network devices.
Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers
What Is A MAC Address Used For?
One of the applications of MAC addresses is in the filtering process on wireless networks. In order to prevent strangers from accessing a network, the router is set to accept only specific MAC addresses. In this manner, if the IP address changes, as for example in the case of dynamic IP addresses, the MAC address can still identify the device.
Filtering can be used to track network users, and to limit their access. It can also have other uses, such as identifying when a stolen device connects to the network. For these reasons, many companies and institutions require the MAC addresses of their members’ devices. Therefore, it is important for device owners not to reveal their MAC addresses to anyone, except to authorized personnel.
MAC addresses can also be used in data recovery to connect to a wireless device. Disk Drill is an app, developed by Cleverfiles, which helps in data recovery. It searches for lost files by scanning in two possible modes, namely Quick and Deep Scan. Quick Scan uses the metadata still available in the file system. Deep Scan drills deeper into the binary level. The results are presented with the help of a filter.
Disk Drill is available for Windows and Mac computers, and can be download for free.
Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers
Important Questions of Computer Networking – CCNA are Listed below (Part-6)
1- What is NETBIOS and NETBEUI?
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.
2- What is RAID?
3- What is passive topology?
4- What is Brouter?
Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers
5- What is cladding?
6- What is point-to-point protocol
7- How Gateway is different from Routers?
8- What is attenuation?
9- What is MAC address?
Related Link
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers
10- Difference between bit rate and baud rate.
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.
baud rate = bit rate / Nwhere N is no-of-bits represented by each signal shift.
Related Link,Visit once
SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
You must log in to post a comment.