Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronic Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

Register Log in

Doubt in Network Addressing

Status
Not open for further replies.

Alexium

Full Member level 2
Joined
Jan 6, 2011
Messages
148
Helped
39
Reputation
78
Reaction score
39
Trophy points
1,308
Location
Ukraine
Activity points
2,163
Logical A. is an abstraction layer over physical. Network equipment uses hardware A., it's different fro different net technologies (like MAC addressing in Ethernet). Logical A. (like IP addresses) allows an abstraction from the addressing implementation of the specific network.

---------- Post added at 10:00 ---------- Previous post was at 09:58 ----------

What's your doubt, specifically?
 

saif haider

Full Member level 1
Joined
Mar 28, 2007
Messages
97
Helped
11
Reputation
22
Reaction score
10
Trophy points
1,288
Location
Pakistan
Activity points
1,917
physical addressing it individual MAC address of the port where u connect to network however logical address is IP address that is assigned to you by the network. it is just like two strangers are meeting and third person is introduce them to each other. MAC address is permanent address it is assigned to that specific port by the company which made it. However IP address could be changed by DNS or manual configuration.
 

angu

Member level 3
Joined
Nov 5, 2007
Messages
62
Helped
7
Reputation
14
Reaction score
2
Trophy points
1,288
Activity points
1,688
Physical address/MAC Addr/Hardware addr - actual address of a device set in its hardware, so it can be recognized as unique.
MAC addresses are 12-digit hexadecimal numbers (48 bits in length).

MAC addr works @ Dala link layer


Logical addr (IP address)- address assigned by your ISP. It ay be 32 bit long (for IPV4 network) or 128 bit for (IPv6) .The operating system maintains a logical to physical address map table.

Logical addr works @ IP layer (network layer)
 

JohnRocks

Member level 1
Joined
Oct 16, 2010
Messages
32
Helped
3
Reputation
6
Reaction score
3
Trophy points
1,288
Activity points
1,444
In my opinion physical address is macs address which inbuilt and logical address is the ip which is given manually.
 

ninju

Full Member level 3
Joined
May 14, 2011
Messages
189
Helped
49
Reputation
98
Reaction score
48
Trophy points
1,308
Activity points
2,398
i read something about mac spoofing. Someone please elaborate on how its done. Thanks.
 

ckshivaram

Advanced Member level 5
Joined
Apr 21, 2008
Messages
5,070
Helped
2,146
Reputation
4,298
Reaction score
2,087
Trophy points
1,393
Location
villingen (Germany) / Bangalore
Activity points
30,097
MAC address filtering for wireless networking isn’t real “security”. Anyone who pays any attention to current trends in wireless security at all should know that MAC filtering is less effective than WEP — and that WEP can be cracked almost instantly these days with commonly available tools.

This doesn’t mean MAC filtering is useless. Its resource consumption is almost unmeasurable, and even if it doesn’t keep out any reasonably knowledgeable security crackers willing to spend a few moments gaining access, it does keep out a lot of automated opportunistic attacks that are aiming solely for the absolute lowest-hanging fruit on the security tree. Since that lowest-hanging fruit consists of the majority of wireless access points, MAC filtering can be of value as a way of turning away the majority of opportunistic attackers.

Don’t rely on MAC filtering alone, however. Please, just don’t. It’s a bad idea. People seem to think “Oh, well, sure a determined attacker can get past it, but not anyone else.” It doesn’t take much determination at all to spoof a MAC address. In fact, I’ll tell you how:

“Listen” in on network traffic. Pick out the MAC address. This can be done with a plethora of freely available security tools, including Nmap.
Change your MAC address.
You can spoof a MAC address when using Nmap with nothing more than a –spoof-mac command line option for Nmap itself to hide the true source of Nmap probes. If you give it a MAC address argument of “0″, it will even generate a random MAC address for you.

---------- Post added at 11:39 ---------- Previous post was at 11:32 ----------

MAC Address Spoofing
Mac Address Spoofing [Tutorial]
 
  • Like
Reactions: ninju

    ninju

    points: 2
    Helpful Answer Positive Rating
Status
Not open for further replies.
Toggle Sidebar

Part and Inventory Search

Welcome to EDABoard.com

Sponsor

Top