ARTÍCULO
TITULO

MAC Address

Monika Asija    

Resumen

Media Access Control (Mac) Address is 48-bit address which is permanently assigned to a network interface card (NIC) or wireless cards. This address is assigned by the manufacturer itself. Every host on a network has a mac address which helps those devices to communicate with other devices at layer-2 (Datalink Layer) of OSI- Model on the other hand IP address is a network address which allows a device to communicate with others on layer-3 of OSI- Model (Network Layer) on a network. A Mac Address is also named as physical address of an Interface.Mac Address Spoofing is an activity which is performed to change the Mac Address of a machine. It may be done by authorised or unauthorised persons to access the network or resources. These kind of activities are performed by hackers also who changes the mac address of their pc/ laptop so that their machine can be treated as the authorised machine in that network.(Cardenas, 2003)(MAC address spoofing, 2012)

 Artículos similares

       
 
Jean-François Determe, Sophia Azzagnuni, François Horlin and Philippe De Doncker    
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area. In this paper, we discuss a crowd counting system involving WiFi sensors detecting PRs over the air, then extractin... ver más
Revista: Algorithms

 
Liu Songzuo, Basit Iqbal, Imran Ullah Khan, Niaz Ahmed, Gang Qiao and Feng Zhou    
Underwater wireless communication has gained a great deal of attention in the last couple of decades because of its applications in the military, industrial, and monitoring sectors. Despite the extreme physical and MAC layer difficulties, acoustics are u... ver más

 
Gerald J. Kauffman    
The Delaware River has made a marked recovery in the half-century since the adoption of the Delaware River Basin Commission (DRBC) Compact in 1961 and passage of the Federal Clean Water Act amendments during the 1970s. During the 1960s, the DRBC set a 3.... ver más
Revista: Water

 
Takahiro Tsubota, Toshio Yoshii     Pág. 251 - 256
Traffic monitoring using Bluetooth MAC addresses has been intensively studied for a decade. Nevertheless, estimation of Origin-Destination volume is still challenging, because of the unstable nature of the detection. With the aim to reveal the factors af... ver más

 
Jamal Nasirudin,ary Setyadi    
Every college in general have limitations in data processing students' academic information system with the amount of human resources are limited data processing serve much the student data . Some of these limitations is a data processing course registra... ver más