Continue to Site

Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

Doubt in Network Addressing

Status
Not open for further replies.
Logical A. is an abstraction layer over physical. Network equipment uses hardware A., it's different fro different net technologies (like MAC addressing in Ethernet). Logical A. (like IP addresses) allows an abstraction from the addressing implementation of the specific network.

---------- Post added at 10:00 ---------- Previous post was at 09:58 ----------

What's your doubt, specifically?
 

physical addressing it individual MAC address of the port where u connect to network however logical address is IP address that is assigned to you by the network. it is just like two strangers are meeting and third person is introduce them to each other. MAC address is permanent address it is assigned to that specific port by the company which made it. However IP address could be changed by DNS or manual configuration.
 

Physical address/MAC Addr/Hardware addr - actual address of a device set in its hardware, so it can be recognized as unique.
MAC addresses are 12-digit hexadecimal numbers (48 bits in length).

MAC addr works @ Dala link layer


Logical addr (IP address)- address assigned by your ISP. It ay be 32 bit long (for IPV4 network) or 128 bit for (IPv6) .The operating system maintains a logical to physical address map table.

Logical addr works @ IP layer (network layer)
 

In my opinion physical address is macs address which inbuilt and logical address is the ip which is given manually.
 

i read something about mac spoofing. Someone please elaborate on how its done. Thanks.
 

MAC address filtering for wireless networking isn’t real “security”. Anyone who pays any attention to current trends in wireless security at all should know that MAC filtering is less effective than WEP — and that WEP can be cracked almost instantly these days with commonly available tools.

This doesn’t mean MAC filtering is useless. Its resource consumption is almost unmeasurable, and even if it doesn’t keep out any reasonably knowledgeable security crackers willing to spend a few moments gaining access, it does keep out a lot of automated opportunistic attacks that are aiming solely for the absolute lowest-hanging fruit on the security tree. Since that lowest-hanging fruit consists of the majority of wireless access points, MAC filtering can be of value as a way of turning away the majority of opportunistic attackers.

Don’t rely on MAC filtering alone, however. Please, just don’t. It’s a bad idea. People seem to think “Oh, well, sure a determined attacker can get past it, but not anyone else.” It doesn’t take much determination at all to spoof a MAC address. In fact, I’ll tell you how:

“Listen” in on network traffic. Pick out the MAC address. This can be done with a plethora of freely available security tools, including Nmap.
Change your MAC address.
You can spoof a MAC address when using Nmap with nothing more than a –spoof-mac command line option for Nmap itself to hide the true source of Nmap probes. If you give it a MAC address argument of “0″, it will even generate a random MAC address for you.

---------- Post added at 11:39 ---------- Previous post was at 11:32 ----------

**broken link removed**
Mac Address Spoofing [Tutorial]
 
  • Like
Reactions: ninju

    ninju

    Points: 2
    Helpful Answer Positive Rating
Status
Not open for further replies.

Similar threads

Part and Inventory Search

Welcome to EDABoard.com

Sponsor

Back
Top