StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Why MAC Address Is Unique - Assignment Example

Cite this document
Summary
The paper "Why MAC Address Is Unique?" discusses a protocol used to give the link layer of the data in the Ethernet Local Area Network while the WiFi MAC layer is a protocol that allows the sender to avoid collisions of data and transmit small requests to send packets by using CSMA. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful

Extract of sample "Why MAC Address Is Unique"

Medium Access Control (MAC) is a protocol used to give the link layer of the data in the Ethernet Local Area Network while the WiFi MAC layer is a protocol that allows the sender to avoid collisions of data and transmit small request to send packets by using CSMA. The WiFI MAC layer also allows the sender to send the data frames and other transmissions to different stations. Before transmissions begin the idle time gives a chance for the receiver electronics in each of the nodes to relax after finishing with the previous frames. A node begins its transmission by sending 1’s and 2’s followed by the start of Frame Delimiter. Why MAC address is unique It is unique in the sense that it must be known by the ISP if one is using the Ethernet. The TCP/IP is encapsulated within the protocol that contains the MAC address. When the ISPs hardware has finished using the Ethernet protocol, it will strip it out. The MAC address identify a network device incase a modem is used or ISP. It is also unique since if one had two Network Interface Cards in the same network with that of the MAC address, one will have problems of the server. MAC is unique not in one field but globally since its three first octets identify the manufacturer in whom each has their own code while the last three is the number given by manufacturer. Switching is a process which is in charge of moving data using internetworking channels. It defines the data storage, the type of information, and the destination in which the data is to be and the time it takes the data to and from the routers while Routing is a process that tries to choose an output and the packets that follows basing on its destination address using different protocols. The routing process consults its routing table which is build using the following sources of information: 1. The network segments in which the router is connected. 2. The static routes that is available in the router configuration. 3. The routing rules and regulations that are followed. 4. The available default routes. Hub is a joining point for all devices used in networking. It is used to join parts of a Local Area Network. Switch is a machine that changes data and distributes the shared information between the parts of the LAN. It functions at the data link layer and the network layer of the OSI Reference Model thus support any packet protocol. Hub is a central meeting point for all the machines used in the network. In a hub, the frame is moved along to every one of its ports and this moving ensures that it reach to the destination that was meant to. A switch is a machine that changes data and distributes the shared information between the parts of the LAN. It also keeps the records of the MAC addresses of all the machines connected to it in which using this information, it can determine which system is using the port. Therefore when it comes in contact with the frame, it knows exactly which port to address it to without taking more network response times. A router is a machine moves the data packets along the networks. It is connected to two networks that is the LANs and WANs or a LAN and its ISPs network. They are connected where more than one network meets headers are used and tables to identify the path in which they can use in moving the packets. They also use the protocols in communicating with others and configuring the route in which they can use best any of the two hosts. The router leads the packets to other networks to their intended position since it contains both the data and the destination address. They all have a WAN port that joins to a cable modem for broadband internet service and the combined switch which allows the users to make a LAN which makes all the PCs on the LAN to connect to the internet and windows file and printer sharing services. Therefore we can say a hub combines an Ethernet network segment while a switch connects more than one Ethernet segments more efficiently and a router can do all those functions including the routing of the TCP/IP packets between more LANs and WANs. Time-to-time (TTL) For example packets may not have been released to their destination on time therefore it should be deleted after some time. The TTL specifies time taken in seconds that when exhausted, it would make the packet be deleted. It calculates each hop travel time using the time between sending packet and receiving the ICMP message which was deleted. It determines the time the datagram is given to “live” on the network. TTLs have protocols which determines the higher-layer protocol either a transport layer protocol or encapsulated network layer protocol that is carried in the datagram. It also divides the header bytes into words then adds them altogether using the checksum header. Used by the utilities like the ping and the traceroute in attempting to reach a given host computer. It shows the range in a packet that may be forwarded using the multicast IP protocol. Purpose OSI layered networking model The OSI layer is responsible for communications between network nodes that era adjacent to each other. It gives the framework for designing network systems and giving explanations on how they work. It makes it easier for the networks to be analyzed, built, designed and arranged since they use the models by enabling them be used as modules rather than complex monoliths. They use models which gives the explanation of the interaction of networks on many levels. The layers of the OSI networking model Layer 7: Application Layer The application layer is used to give a description of the interface. Operates protocols like DNS, TELNET, FINGER and FTP it also operates network devices such as Gateway network device. Layer 6: Presentation Layer. This layer is responsible for the conversion, encryption and decryption of the protocols and data compression. It also presents the data in a similar format and masks the difference of data style between two dissimilar systems. It uses network devices like the Gateway Redirector. Layer 5: Session Layer It also manages data transfer by whom, at what time and for how long. It also reports and logs the upper layer errors. It uses the protocols like the NetBIOS, Mail Slots and RPC and uses the network devices such as the Gateway. Layer 4: Transport Layer It gives the error checking therefore there are no errors occurring during data transfers across the network. It also ensures that the data is transmitted successfully and transmitted back if there is no error free data that was transferred. This layer uses protocols such as NETBIOS, ATP, NWLINK and TCP and the Network Devices such as the Brouter, Gateway and Cable tester Layer 3: Network Later This layer converts the logical address into the physical address. It routes the packets regarding to their unique addresses. It uses the protocols such as the IP, OSI, IPX and the ICMP. This layer also uses Network devices such as the Router, Frame Relay devices and the ATM. Layer 2: Data Link Layer Gives the steps for operating the communication channels and frames packets. It detects and corrects the packets transmitting errors. It uses protocols such as the Logical Link Control like the error correction and flow control and manages link control. Layer 1: Physical Layer It also determines the number of bits transmitted per second. It uses the protocols such as ISDN, IEEE 802.2 and Network Devices such as the Hubs, Repeaters and Amplifier. Network Neutrality This is a principle that ensures that there is open and free internet. Arguments for network neutrality Control of data The network neutrality ensures that there is control of data by allowing the broadband carriers to take control of what people see and do on the internet. Rights of the digital and its freedom Network neutrality ensures that the Internet remains a free and open technology used as communication medium. Competition and motivation Without network neutrality, the internet will undergo a change from the market since the internet has always been driven by innovation since the network owners are able to block competitors Web sites and services or even refuse to pay them. Arguments against network neutrality Innovation and investment Bandwidth availability Net neutrality would hinder the broadband networks from being built and thus will limit the available bandwidth and therefore endangering the innovation since the network’s nowadays are not remotely made to handle the Exabyte. Counterweight to server-side non-neutrality Big companies are advantaged compared to small competitors by replicating servers and buying high-bandwidth services in which should the prices drop to a lower level of access, this will make internet usage more neutral regarding to the needs of those individuals requesting tiers of the service. Network Convergence This describes the change from a separate circuit-switched voice network and a packet-switched data networks into one packet-switched network supporting both voice and data protocols. The problems associated with the network convergence are as follows: Manageability - Less devices, fewer vendors, less disparate technology simplifies management. Smaller business has less infrastructure needs. Convergence helps achieve that goal. In most cases, not really. To support the networks of the future, these bonds must be broken and even Cisco recognizes this, though it is yet unclear if they will truly make this transition "to software" successfully In circuit-switching, the system specifies the route to follow basing on the resource-optimizing algorithm and transmission of data according to their paths. Used by the traditional PSTN phone system. While in packet-switching, the packets are send to the position intended to irrespective of each other. There is no specific path to follow used by the VoIP. Transport Layer Ports These layers reside between Application Layer and the Network Layer. The port Numbers determines the application from which the data was received or positioned to. It also provides reliable communication and flow control. Transport Layer protocol that provides reliable delivery is the Transmission Control protocol. Transport Layer protocol that provides unreliable delivery User Datagram Protocol (UDP). An application that requires reliable delivery the packets while that which requires unreliable delivery is datagram. Features of the TCP Connection opening: on osending host, a process delivers a request to deliver data to the desti Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(365691 CCNA Example Exam Questions Example | Topics and Well Written Essays - 1744 words, n.d.)
365691 CCNA Example Exam Questions Example | Topics and Well Written Essays - 1744 words. https://studentshare.org/logic-programming/2044896-365691-ccna-example-exam-questions
(365691 CCNA Example Exam Questions Example | Topics and Well Written Essays - 1744 Words)
365691 CCNA Example Exam Questions Example | Topics and Well Written Essays - 1744 Words. https://studentshare.org/logic-programming/2044896-365691-ccna-example-exam-questions.
“365691 CCNA Example Exam Questions Example | Topics and Well Written Essays - 1744 Words”. https://studentshare.org/logic-programming/2044896-365691-ccna-example-exam-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Why MAC Address Is Unique

Computer Communications & Networks

Network devices understand in the medium of numeric and hexadecimal values such as the subnet and mac address.... The syntax of the command will be 'ping (space) (destination address)', executes via command prompt.... This report "Computer Communications & Networks" discusses mechanisms of an IP-based network for accessing the X stream server from home....
8 Pages (2000 words) Report

Computer Communications & Networks

Next we have discussed the ARP command along with the discussion of a mac address packet.... The syntax will be ping (space) (destination address), moreover, in order to review hops and delays in accessing the X stream server, the ‘tracert' command can be executed from the command prompt.... The syntax for this command will be tracert (space) (destination address).... destination address, source address, preamble, type, CRC and data....
6 Pages (1500 words) Lab Report

Future of Comuper Networking

Each one will require its own unique address.... Although the current version of IP has worked well for many years, exponential growth of the Internet means that the 32-bit address space will be exhausted within 20 years.... The IETF has designed a new version of IP that uses 128 bits to represent each address.... The new address space is so large that it will not be exhausted for many decades to come.... ike IPv4, IPv6 defines an address for each network connection....
3 Pages (750 words) Essay

Can Two Network Interfaces Have the Same IP Address

Consequently, the software for the printer thinks that each of the users printing a document has Beatrice's mac address.... Without NAT, IP addresses on the general/public Internet are unique; otherwise routing would not make sense.... From the paper "Can Two Network Interfaces Have the Same IP address" it is clear that the modification that is needed for the random port scan involves carrying out a sequence of port scans that generates an unsystematic permutation of the numbers ranging from 1 to 65535....
2 Pages (500 words) Assignment

Technology Infrastructure

mac address is the address referring a 32 bits unique identifier code that is burned on the Network Interface Cards (NIC) at the time of manufacturing (Fuller & Ouellet, 2002, p.... mac address is also terms as a hardware address or physical address. ... n a TCP/IP network an IP address is a 32 bit logical identifier for the Technology Infrastructure of the of Technology Infrastructure Media Access Card (MAC) Address: mac address is the address referring a 32 bits unique identifier code that is burned on the Network Interface Cards (NIC) at the time of manufacturing (Fuller & Ouellet, 2002, p....
2 Pages (500 words) Essay

Small Group Communication: iMacChat

The first step was to provide information relating to why I wanted to join the group.... The author of the "Small Group Communication: iMacChat" paper focuses on the online group, iMacChat.... After a discussion of the group itself, some theoretical concepts relating to small group interaction and the online environment are defined and applied....
13 Pages (3250 words) Case Study

Apple Inc as 21st Century Business Structure

value depends upon a unique personalized experience of consumers, and R=G, i.... The author of this paper "Apple Inc as 21st Century Business Structure" provides the Form 10K filed by Apple Inc with SEC in October 2008 which states that the Company is committed to bringing the best personal computing, mobile communication, and portable digital music and video experience to consumers....
11 Pages (2750 words) Research Paper

Cybercrime - Importance of the MAC Address and IP Address during a Digital Evidence Examination

AC addressA mac address is defined as the distinctive numerical sequence that acts as an identifier for a device (such as a computer or a smartphone) within a network (Editors of the American Heritage Dictionaries 2006, p.... The mac address is stored or built in the network interface card by the manufacturer of the card and is used in distinctively identifying each code in a network (EC-Council 2017, p.... The paper 'Cybercrime - Importance of the mac address and IP Address during a Digital Evidence Examination' is a worthy variant of the essay on information technology....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us