StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The MAC Address Space - Essay Example

Cite this document
Summary
The paper "The MAC Address Space" highlights that the MAC address will be 248 MAC addresses. As far as IPv4 is concerned, it will be 32 bits and can be written in this scientific notation. 2IPv4 addresses. For IPv6, 128 bits are allocated and can be written as 2…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
The MAC Address Space
Read Text Preview

Extract of sample "The MAC Address Space"

Multipath propagation is when packet loss occurs due to electromagnetic waves reflecting off of ground objects and causes the packets to alter paths of different lengths between sender and receiver.

Interference from other sources happens when there is interference from radio sources such as microwave or infrared rays transmitting in the same frequency band. Wireless phones and wireless LANs can sometimes interfere with each other.

Path loss is decreasing signal strength due to passing through matter like walls—the distance between the sender and receiver factors into decreased signal strength as well.

4, Describe the role of the beacon frames in 802.11
APS transmits beacon frames. An AP‟s beacon frames will be transmitted over one
of the 11 channels. The beacon frames permit nearby wireless stations to discover
and identify the AP.

5, What is the difference between a permanent address and a care-of address? Who
assigns a care-of address?
A permanent address for a mobile node is its IP address when it is in its home network. A care-of-address is the one it gets when it is visiting a foreign network. The COA is assigned by the foreign agent (which can be the edge router in the foreign network or the mobile node itself).

6, What is the difference between end-to-end delay and packet jitter? What are the causes
of packet jitter?

End-to-end delay is the time it takes a packet to travel across the network from source to destination. Delay jitter is the fluctuation of an end-to-end delay from the package to the next box.

7, What are the differences between message confidentiality and message integrity? Can
you have one without the other? Justify your answer.

Confidentiality is an element that involves the original plaintext message that cannot be determined
by an attacker who intercepts the ciphertext encryption of the original plaintext message.
In essence, message integrity means that the receiver can detect whether the message sent was configured during the transmission. The two are thus different concepts,
and one can have one without the other. However, an encrypted message that is altered in transmission may still be confidential as the attacker cannot determine the original plaintext but will
not have message integrity if the error is undetected. In this regard, a message that is altered
in transit (and detected) could have been sent in plaintext and thus would not be confidential.

8, What is an important difference between a symmetric key system and a public key
system?

In symmetric key systems, the keys of the receiver and sender are identical and are kept secret. However, in public key systems, a pair of keys is used, which are shared. One of the keys is known to both receiver and sender, or in another word, to the whole world, while the other key is known only by the sender. That’s the major difference between the two systems.

9, Define the following terms: managing entity, managed device, management agent,
MIB, network management protocol.

Managing entity: control the collection, processing, analysis, and display of
network management information, and is used by the network
manager to control the devices in the network.
Managed device: a piece of network equipment that is under the control of
the managing entity.
Management agent: a software process running on a managed device that
communicated with the managing entity and takes action on the
the managed device under the control of the managing entity.
MIB: pieces of information associated with all of the managed objects in a
device.
Network management protocol: this protocol runs between the managing entity of the
management agents on the managed devices, allowing the agents to
alert the managing entity to potential problems, and allow the managing entity to send commands to the management agents.

10, True or False, explain why?

an Ethernet and 802.11 use the same frame structure.

False, they have a different frame structure. Ethernet uses ATM whereas 802.11 uses frame relay.

b, The addresses in an Ethernet frame header are IP addresses.

False, the Ethernet frame address has MAC addresses that are utilized. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment #4 Essay Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Assignment #4 Essay Example | Topics and Well Written Essays - 500 words - 2. Retrieved from https://studentshare.org/information-technology/1624519-assignment-4
(Assignment #4 Essay Example | Topics and Well Written Essays - 500 Words - 2)
Assignment #4 Essay Example | Topics and Well Written Essays - 500 Words - 2. https://studentshare.org/information-technology/1624519-assignment-4.
“Assignment #4 Essay Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/information-technology/1624519-assignment-4.
  • Cited: 0 times

CHECK THESE SAMPLES OF The MAC Address Space

SECURITY ISSUES IN RED HAT ENTERPRISE LINUX

Companies such as Red Hat are releasing new technologies and tools to address the needs of system administrators responsible for managing the security of large numbers of geographically dispersed systems.... According to the research findings to supply a complete server the company need to introduce in the practical use more security principles and configurations, such as: security policy for the Web service, Mail, FTP, Samba, NFS, DHCP, Squid, SSH, VPN....
68 Pages (17000 words) Dissertation

Computer Communications & Networks

Network devices understand in the medium of numeric and hexadecimal values such as the subnet and mac address.... The syntax of the command will be 'ping (space) (destination address)', executes via command prompt.... This report "Computer Communications & Networks" discusses mechanisms of an IP-based network for accessing the X stream server from home....
8 Pages (2000 words) Report

Computer Communications & Networks

Next we have discussed the ARP command along with the discussion of a mac address packet.... The syntax will be ping (space) (destination address), moreover, in order to review hops and delays in accessing the X stream server, the ‘tracert' command can be executed from the command prompt.... The syntax for this command will be tracert (space) (destination address).... The next discussion was about CSMA/CD, as the request needs space to fulfill the execution....
6 Pages (1500 words) Lab Report

Comparison between Windows 7 and Mac OS X

the mac remains vulnerable although its usability and multimedia support are much better.... On the other hand, the mac has the advantage of access to Apple's Mac App Store, it has a built-in browser that is better than Internet Explorer, it already has multi-touch support, suffers from much less malware than Windows, it has several features not present in Windows and it has better refinement overall (Reisinger).... In terms of usability, the mac is renowned for being generally easier to use from being more intuitive and built on the principle of minimalism....
5 Pages (1250 words) Essay

Computer Networking and Management

This document demonstrates the understanding of some major aspects of computer networking, over three distinct sections.... .... ... ... An Engineering college intranet is considered, with the following geographical and user population: сollege consist of four departments, each is housed in a separate building....
18 Pages (4500 words) Case Study

Two main operating systems: Windows 7 and OS x 10.6

, like previous versions of mac OS X, is as intuitive, beautiful, and seamless and as aesthetically pleasing an operating system can be.... In the paper 'Two main operating systems: Windows 7 and OS x 10.... ' the author contrasts and compares new technologies that benefit from the multi-core CPUs processing where they transfer graphics and animation processing to peripheral devices such as graphics cards....
9 Pages (2250 words) Essay

Small Group Communication: iMacChat

The author of the "Small Group Communication: iMacChat" paper focuses on the online group, iMacChat.... After a discussion of the group itself, some theoretical concepts relating to small group interaction and the online environment are defined and applied.... ... ... ... All regular contributors are allowed to answer any given question, which provides a wider perspective on the questions involved....
13 Pages (3250 words) Case Study

Mac and Windows Security System

Thus, Mac and Windows differ in their systems of process management, management of files in the systems and also memory management, with windows allowing for memory sharing between processes, resuming to the open files after a power outage or forced reboot, some aspects that are missing in the mac system, which makes Windows more vulnerable to security breach and attacks.... Overall, due to the application of the executable codes for read-only memory in the mac system, which hinders sharing of memory address spaces between scheduled tasks, Mac systems is able to avert security breaches and attacks more easily....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us