Explore BrainMass

This posting addresses IP addresses and the Data Link Layer.

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

1.) How do IP addresses differ from MAC addresses? What is the format of an IP address?

2.) The Data-Link layer of the OSI networking model contains two sub-layers: the Media Access Control sub-layer and the Logical Link Control (LLC) sub-layer. What are the four functions of the Logical Link Control sub-layer, and what are three types of services it provides?

© BrainMass Inc. brainmass.com October 25, 2018, 6:32 am ad1c9bdddf

Solution Preview

1.) An IP address identifies a specific computer or device on an IP network. Each computer and device has a different IP address. No two are identical to each other. It can be compared to a phone number. Each computer uses their IP address on the IP network to talk to other devices (i.e. computers) on the same network. A MAC address, in contrast, is a serial number that is used for certain devices including mainly Ethernet cards. The MAC address is composed of a series of numbers that identifies the brand of the device and the remaining numbers in the MAC address identify the specific device and are similar to a model number that is unique for each device. A MAC address can be compared to a vehicle identification number on a car. Part of the number indicates the type of car and model, and the remaining part ...

Solution Summary

The solution provides a detailed discussion of the difference between an IP and MAC address, and includes the format of an IP address. This solution also discusses the four functions of the Logical Link Control sub-layer and the three types of services it provides.

References are also provided for all topics discussed in the posting.

See Also This Related BrainMass Solution

Filtering data that travels along a network

What are the most effective ways to filter data that travels along a network (wired or wireless). IE. By MAC or IP, what are some others ways to secure data on a wired or wireless network.

View Full Posting Details