Questions tagged [mac]
Not to be confused with mac-address tag, Media Access Control is a sublayer of the OSI data link layer that provides addressing and channel access control mechanisms. It resides between the LLC sublayer and the physical layer.
95 questions
4
votes
3
answers
541
views
Originating MAC: could it be saved in data pack?
The MAC of an originating host gets stripped from a data package sent and replaced by the MAC of the routing device at each hop. Returning packs do the same. Is all that correct?
My real question is, ...
1
vote
1
answer
126
views
Will Ethernet standards ever be updated to not require MAC src/dest to be included in every frame since the switch can keep track of it? [closed]
I've been reading about VLANs recently and how switches have the ability to modify ethernet frames by inserting/removing VLAN tags. This got me thinking, would we ever update the Ethernet standard ...
0
votes
1
answer
614
views
why does "show arp" on my Juniper EX3400 return empty?
JunOS version is 20.2R3.9.
For instance:
root@CLEANROOM-IDF-D8> show arp interface ge-0/0/4.0
{master:0}
root@CLEANROOM-IDF-D8>
...what gives? There is a device on that port and it's working, ...
2
votes
2
answers
102
views
Does Internet access using computers, PCs always require the support of a MAC protocol?
In my opinion, if the link is point-to-point then MAC protocol should not be required. But I am still confused because the question contains 'Internet access'.
1
vote
1
answer
138
views
Can MAC fragmentation improve throughput fairness in 802.11?
If I fragment data on the MAC layer, can I improve the throughput fairness in 802.11?
Initially, I thought so, because if a client always sends very long frames and another client always sends short ...
1
vote
2
answers
312
views
Is there any protocol between MAC layer and PHY layer?
If I read the IEEE 802.3 spec. correctly, there has no protocol between the MAC layer and PHY layer. There's only a few signals such as signaling whether PHY is ready for transmission and whether MAC ...
1
vote
2
answers
820
views
Why is EUI-48 to EUI-64 conversion deprecated, and yet it's used in IPv6?
The IEEE Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID) [PDF] have a section titled, "Mapping an EUI-48 to an EUI-64". ...
0
votes
2
answers
239
views
100Mbps embedded device on a GbE network.. can I use MII?
Newcomer to Networking. I would like to connect an embedded device to an existing Fibre Gigabit LAN. The device would source and sink very little data so I am considering my choices.
A ...
0
votes
1
answer
564
views
Why does the Throughput of Non-persistent CSMA increase with attempts made to send packets
Its intuitive for Aloha and p-persistent CSMA that the more we try to send during a packet time the more the collisions we get; however, I have been unable to justify why non-persistent CSMA is ...
1
vote
2
answers
1k
views
What is the loopback Ethertype?
IANA's list of IEEE 802 Ethertypes includes an entry for Loopback (0x9000). However, I cannot find any specification detailing exactly how this is implemented. Do frames sent with Ethertype 0x9000 ...
2
votes
1
answer
475
views
ARP and MAC address table
i know that this might be a little academic, but i was wondering.
let's assume we have an empty ARP table, and empty MAC Table.
let's assume PC A want to send a packet to PC B.
is the broadcast frame ...
0
votes
2
answers
232
views
Where is priority for a particular frame set?
The Medium Access Control sublayer appends 3 bits for the priority of the frame. The possible choices for the priority are
Traffic Type
Priority
Background
0 (lowest)
Best effort
1 (default)
Excellent ...
0
votes
1
answer
254
views
Mechanism/purpose of the NAV and its relation to the exposed node problem in 802.11
802.11 uses csma/ca as the mac protocol.
Every station senses the medium, if something is being sent, then they will set their NAV to the duration ID from the packet being sent weather RTS, CTS, DATA, ...
0
votes
1
answer
121
views
What are the IP/MAC addresses of requests between 2 different subnets? [closed]
Assume that networks 172.15.10.0/24 and 172.15.11.0/24 are connected through a router with interfaces 172.15.10.254 (MAC3) and 172.15.11.253 (MAC4).
If host A sends a packet through its network ...
1
vote
1
answer
773
views
How FDB (Filtering Database) is filled out
I would like to understand what is used as a VLAN column in the FDB. For ACCESS port it is PVID if frame untagged or frame VID if frame is tagged, for TRUNK it is allowed VLANs?
We can represent the ...