0% found this document useful (0 votes)
19 views3 pages

CN 7

Uploaded by

aizarasool0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views3 pages

CN 7

Uploaded by

aizarasool0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: Aiza Rasool

Roll no: 2225165083


Dept.: BS SOFTWARE
ENGINEERING
Submitted To: Miss Areej

Assignment

Configure a network with Ethernet and demonstrate MAC addressing.


Following are the steps to configure a simple Ethernet network and demonstrate MAC
addressing:

Step 1: Setting up an Ethernet Network

An Ethernet network consists of computers (or devices) connected via Ethernet cables to a
switch or a router. Each device in the network needs a Network Interface Card (NIC), which
has a unique MAC (Media Access Control) address.

Basic Configuration Components:

 Devices (PCs, Laptops, etc.): All devices must have a NIC.


 Switch or Router: A switch/router is used to interconnect the devices.
 Ethernet Cables: Connect devices to the switch/router using Ethernet cables (CAT5, CAT6,
etc.).

Step 2: Understanding MAC Addresses

A MAC address is a 48-bit (6-byte) hardware address that uniquely identifies a device on a
network. It is usually represented in hexadecimal,

for example: 00:1A:2B:3C:4D:5E

The MAC address is used for communication within a network segment (Layer 2 of the OSI
model). Each device listens to all network traffic but only processes frames addressed to its
own MAC address.

Step 3: Configure Network


Example: using two computers connected via a switch

1. Connect the Computers to the Switch:


o Use Ethernet cables to connect each computer to the switch.

2. Configure IP Addresses (Optional):


o On each computer, configure static IP addresses for communication. For instance:
 Computer 1: IP address 192.168.1.2, subnet mask 255.255.255.0
 Computer 2: IP address 192.168.1.3, subnet mask 255.255.255.0
o If connected to a router with DHCP enabled, this step can be skipped as IP addresses
will be automatically assigned.

3. Verify MAC Addresses:


o Each NIC has a MAC address. You can check the MAC address on each system:
 Windows: Open Command Prompt and type ipconfig /all. Look for the
"Physical Address" field.
 Linux/MacOS: Open Terminal and type ifconfig or ip a. Look for "HWaddr"
or "ether" field.
Step 4: Demonstrating MAC Addressing
Scenario: Computer 1 sends data to Computer 2

1. Data Encapsulation:
o Computer 1 creates a data packet with the destination IP address 192.168.1.3
(Computer 2).
o The Ethernet layer adds a frame header with Computer 1's MAC address as the
source and Computer 2's MAC address as the destination.

2. Sending the Frame:


o The frame is sent from Computer 1's NIC to the switch. The switch examines the
frame's destination MAC address.
o The switch looks up its MAC address table to find which port is associated with the
destination MAC address.

3. Forwarding the Frame:


o If the switch finds Computer 2's MAC address in its table, it forwards the frame to the
corresponding port.
o Computer 2 receives the frame, recognizes its MAC address, and processes the data.

Practical Example:

 Computer 1 has MAC address 00:11:22:33:44:55


 Computer 2 has MAC address 66:77:88:99:AA:BB

Computer 1 sends a message to Computer 2. The Ethernet frame will look like this:

Destination MAC: 66:77:88:99:AA:BB


Source MAC: 00:11:22:33:44:55
Payload: [Data]

The switch uses MAC addresses to ensure the message reaches the correct device.This setup
can be tested in a lab environment using physical devices or simulated in virtual
environments like Cisco Packet Tracer or GNS3.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy