87 relations: Address Resolution Protocol, Apple Inc., Asynchronous transfer mode, Bit numbering, Bluetooth, Bonjour Sleep Proxy, Bridging (networking), Broadcast address, Cisco Systems, Collision domain, Data link layer, DECnet, Edward Snowden, Ethernet, Ethernet over coax, Fiber Distributed Data Interface, Fibre Channel, Firmware, Flooding (computer networking), Frame (networking), G.hn, Hexadecimal, Hot Standby Router Protocol, IEEE 1394, IEEE 802, IEEE 802.11, IEEE 802.15, IEEE 802.3, IEEE 802.6, Ifconfig, Institute of Electrical and Electronics Engineers, Internet Protocol, Internet protocol suite, IOS, IP address, Ipconfig, Iproute2, IPv4, IPv6, ITU-T, LAN switching, Link layer, Local area network, MAC Address Anonymization, MAC filtering, MAC spoofing, Medium access control, Multicast, Multicast address, Multilayer switch, ..., National Security Agency, Neighbor Discovery Protocol, NetBSD, Network address, Network cloaking, Network interface controller, Network management, Network switch, Network virtualization, Networking hardware, Node (networking), NSAP address, Octet (computing), Operating system, Organizationally unique identifier, OSI model, Physical address, Power-line communication, Promiscuous mode, Read-only memory, Router (computing), Serial Attached SCSI, Token bus network, Token ring, Unicast, Unicast flood, Unique identifier, Unix, Virtual Router Redundancy Protocol, Wi-Fi, Wireless access point, Wireshark, World Wide Name, Xerox Network Systems, Zigbee, 48-bit, 6LoWPAN. Expand index (37 more) » « Shrink index
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given network layer address, typically an IPv4 address.
Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.
Asynchronous transfer mode (ATM) is, according to the ATM Forum, "a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals".
In computing, bit numbering (or sometimes bit endianness) is the convention used to identify the bit positions in a binary number or a container for such a value.
Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).
Apple's Bonjour Sleep Proxy service is an open source component of zero configuration networking, designed to assist in reducing power consumption of networked electronic devices.
A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.
A broadcast address is a network address at which all devices connected to a multiple-access communications network are enabled to receive datagrams.
Cisco Systems, Inc. is an American multinational technology conglomerate headquartered in San Jose, California, in the center of Silicon Valley, that develops, manufactures and sells networking hardware, telecommunications equipment and other high-technology services and products.
A collision domain is a network segment connected by a shared medium or through repeaters where data packets may collide with one another while being sent.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking.
DECnet is a suite of network protocols created by Digital Equipment Corporation.
Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government who copied and leaked classified information from the National Security Agency (NSA) in 2013 without authorization.
Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
Ethernet over Coax (EoC) is a family of technologies that supports the transmission of Ethernet frames over coaxial cable.
Fiber Distributed Data Interface (FDDI) is a standard for data transmission in a local area network.
Fibre Channel, or FC, is a high-speed network technology (commonly running at 1, 2, 4, 8, 16, 32, and 128 gigabit per second rates) providing in-order, lossless delivery of raw block data, primarily used to connect computer data storage to servers.
In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.
Flooding is a simple computer network routing algorithm in which every incoming packet is sent through every outgoing link except the one it arrived on.
A frame is a digital data transmission unit in computer networking and telecommunication.
G.hn is a specification for home networking with data rates up to 2 Gbit/s and operation over four types of legacy wires: telephone wiring, coaxial cables, power lines and plastic optical fiber.
In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.
In computer networking, the Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway.
IEEE 1394 is an interface standard for a serial bus for high-speed communications and isochronous real-time data transfer.
IEEE 802 is a family of IEEE standards dealing with local area networks and metropolitan area networks.
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.
IEEE 802.15 is a working group of the Institute of Electrical and Electronics Engineers (IEEE) IEEE 802 standards committee which specifies wireless personal area network (WPAN) standards.
IEEE 802.3 is a working group and a collection of Institute of Electrical and Electronics Engineers (IEEE) standards produced by the working group defining the physical layer and data link layer's media access control (MAC) of wired Ethernet.
IEEE 802.6 is a standard governed by the ANSI for Metropolitan Area Networks (MAN).
ifconfig is a system administration utility in Unix-like operating systems for network interface configuration.
The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware.
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
In computing, ipconfig ('''i'''nternet '''p'''rotocol configuration) in Microsoft Windows is a console application that displays all current TCP/IP network configuration values and can modify Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
iproute2 is a collection of userspace utilities for controlling and monitoring various aspects of networking in the Linux kernel, including routing, network interfaces, tunnels, traffic control, and network-related device drivers.
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP).
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.
The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU); it coordinates standards for telecommunications.
LAN switching is a form of packet switching used in local area networks (LAN).
In computer networking, the link layer is the lowest layer in the Internet Protocol Suite, the networking architecture of the Internet.
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
MAC Address anonymization is the idea of performing a one way function on a MAC address so that the result may be used in tracking systems for reporting and the general public, while making it nearly impossible to obtain the original MAC Address from the result.
In computer networking, Media Access Control MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.
In IEEE 802 LAN/MAN standards, the medium access control (MAC) sublayer (also known as the media access control sublayer) and the logical link control (LLC) sublayer together make up the data link layer.
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously.
A multicast address is a logical identifier for a group of hosts in a computer network that are available to process datagrams or frames intended to be multicast for a designated network service.
A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.
The Neighbor Discovery Protocol (NDP, ND) is a protocol in the Internet protocol suite used with Internet Protocol Version 6 (IPv6).
NetBSD is a free and open source Unix-like operating system that descends from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.
A network address is an identifier for a node or host on a telecommunications network.
Network cloaking is an attempt to provide wireless security by hiding the network name (service set identifier) from being broadcast publicly.
A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware component that connects a computer to a computer network.
Network management is the process of administering and managing computer networks.
A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
In computing, network virtualization or network virtualisation is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network.
Networking hardware, also known as network equipment or computer networking devices, are physical devices which are required for communication and interaction between devices on a computer network.
In telecommunications networks, a node (Latin nodus, ‘knot’) is either a redistribution point or a communication endpoint.
A Network Service Access Point address (NSAP address), defined in ISO/IEC 8348, is an identifying label for a Service Access Point (SAP) used in OSI networking.
The octet is a unit of digital information in computing and telecommunications that consists of eight bits.
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
An organizationally unique identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
In computing, a physical address (also real address, or binary address), is a memory address that is represented in the form of a binary number on the address bus circuitry in order to enable the data bus to access a particular storage cell of main memory, or a register of memory mapped I/O device.
Power-line communication (PLC) carries data on a conductor that is also used simultaneously for AC electric power transmission or electric power distribution to consumers.
In computer networking, promiscuous mode is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is specifically programmed to receive.
Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices.
A router is a networking device that forwards data packets between computer networks.
In computing, Serial Attached SCSI (SAS) is a point-to-point serial protocol that moves data to and from computer-storage devices such as hard drives and tape drives.
Token bus is a network implementing the token ring protocol over a virtual ring on a coaxial cable.
MAU b) Using several MAUs connected to each other Token ring network IBM hermaphroditic connector with locking clip Token Ring local area network (LAN) technology is a communications protocol for local area networks.
200px In computer networking, unicast refers to a one-to-one transmission from one point in the network to another point; that is, one sender and one receiver, each identified by a network address.
In computer networking, a unicast flood is the potentially unintentional behavior of a switch treating a unicast packet as a broadcast packet; a packet destined for one host is flooded or transmitted out of all the ports of a switch.
With reference to a given (possibly implicit) set of objects, a unique identifier (UID) is any identifier which is guaranteed to be unique among all identifiers used for those objects and for a specific purpose.
Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts.
Wi-Fi or WiFi is technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.
20018 In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to connect to a wired network.
Wireshark is a free and open source packet analyzer.
A World Wide Name (WWN) or World Wide Identifier (WWID) is a unique identifier used in storage technologies including Fibre Channel, Advanced Technology Attachment (ATA) or Serial Attached SCSI (SAS).
Xerox Network Systems (XNS) is a computer networking protocol suite developed by Xerox within the Xerox Network Systems Architecture.
Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios, such as for home automation, medical device data collection, and other low-power low-bandwidth needs, designed for small scale projects which need wireless connection.
In computer architecture, 48-bit integers can represent 281,474,976,710,656 (248 or 2.814749767×1014) discrete values.
6LoWPAN is an acronym of IPv6 over Low-Power Wireless Personal Area Networks.
Burned-In Address, Burned-in address, Burned-in addresses, EUI-48, EUI-64, EUI64, Ethernet Hardware Address, Ethernet address, Extended Unique Identifier, Hardware Address, Hardware address, Hw address, Locally Administered Address, Locally administered address, MAC Address, MAC addresses, MAC-48, MAC-address, Mac Address, Mac address, Media Access Control address, Media access control address, Univerally Administered Address.