What is MAC Address? 48 bits vs 64 bits ? mac address vs ip address

What is MAC Address :

The Media Access Control address is a binary number used to uniquely identification of the computer or other devices in the Network. It work on Data Link Layer of OSI model. Every communications devices like router server and switch has the MAC address sometime it called physical address.



48 Bits long MAC Address :

48 Bit MAC addresses are 12-digit (6 bytes or 48 bits) hexadecimal numbers.Pasted are the 48 bit MAC address and in the below example First 6 bytes are know as organizationally unique identifier (OUI) and the last 6 bytes are know as Network Interface Controller(NIC).
JJJ.JJJJ.KKK.LLL
UU-II-OO-PP-EE-DD
VV:GG:JJ:WW:MM:SS


64 bit MAC Address

Based on IEEE 802.15.4 we used the 64 bits MAC address instead of 48 bits. Pasted are the 64 bit MAC address and in the below example First 6 bytes are know as organizationally unique identifier (OUI) and next 4 bit are know as know Extended unique identified (EUI)  the last 6 bytes are know as Network Interface Controller(NIC).
VV:A2:JJ:MM:SS:23:45:65


MAC vs. IP Address Relationship:

TCP/IP networks use both MAC addresses and IP addresses but for separate purposes. A MAC address remains fixed to the device's hardware while the IP address for that same device can be changed depending on its TCP/IP network configuration.Media Access Control operates at Layer 2 of the OSI model while Internet Protocol operates at Layer 3. This allows MAC addressing to support other kinds of networks besides TCP/IP.


How to Repair a Corrupted memory card Hard disk Pen drive or Removal Devices


Sometime your pen drive and other storage devices get shortcuts might be you are not able to see your data in storage devices or your data make get shortcuts. There is some technique you can make it virus free or repair it for the same please find the pasted steps.

Step 1: First of all please show all the hidden file and folder for the same Go to my computer then click on Organize then click on Folder and search options and then select view and click on show hidden folder.


Step 2:  In the first step please select the drive or storage devices which got the shortcuts or corrupted and go to the property and then select the tool and then check error check and check both options and click on ok.




Now you can check and get all shortcuts removed if still storage is not virus free then go to step 3.


Step 3: Go to run and type CMD. there will be open a pop up and type the diskpart and click on enter here you will go to diskpart and then type a command list Disk and In the disk list please select the corrupted desk by command select disk 1 and click on enter.


Step 4: Then type the command clean and type the enter


Step 5: After that type command Create partitions primary  and click on enter
Now you will get partitions and remove the pen drive and again plugin and then format it will repaired.






What is DHCP? How does DHCP Work? DHCP full configuration?

Suppose that you are working in a small organisations and you have to configure ip address on all system or node manually. It is not easy so DHCP is a protocol that are used for dynamically assign the IP(Internet Protocol) address to the system or nodes so that they can use communicate using ip address. it is 32 bit long. DHCP can be implemented on small local networks as well as large enterprise networks.
There are two version of DHCP for use internet protocol version 4(IPv4) and internet protocol version 6(IPv6).
 How Does DHCP Work?
The Dynamic Host Configuration Protocol (DHCP) client TCP/IP software is not configured with a static IP Address and it is configured to obtain an IP Address dynamically from a Dynamic Host Configuration Protocol (DHCP) Server. When a DHCP client device boots up, it not capable send and receive network traffic, because TCP/IP is not configured. But it can participate in Broadcast traffic. DHCP Clients and DHCP Servers uses broadcast messages to communicate with each other. The scope of a broadcast message is only within the local Broadcast domain. Broadcast massage will never cross the router to reach another network.
Two important IPv4 addresses used in DHCPv4 messages are 0.0.0.0 and 255.255.255.255. IPv4 address 0.0.0.0 is used by an IPv4 device, when it has not yet been assigned an IPv4 address. When a DHCP client boots up, it doesnt have a valid IPv4 Address.

Configuration of DHCP on Cisco Router?

You can do DHCP configuration on cisco router firewall and server. pasted configuration is on cisco router.

R1# configure terminal     for configuration mode 

R1(config)# ip dhcp pool Lohan      Have to create a pool hare the pool naem is lohan       
R1(dhcp-config)# network 192.168.1.0 255.255.255.0      Set the network ip and same subnet mask

R1(dhcp-config)# default-router 192.168.1.1      Gateway for all system or nodes

R1(dhcp-config)# dns-server 192.168.1.5  255.255.255.0     dns server ip

R1(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.5    Reserved IP address The system won’t get the ip address from the reserved ip range
R1(config)# ip dhcp excluded-address 192.168.1.10   reserved ip address.




What is FTP? How does it Work? Requirements of using FTP? with configurations

      

what is FTP :- What if you want to copy files from one computer to another that is halfway around the world?  You would probably use your Internet connection.  However, for security reasons, it is very uncommon to share folders over the Internet.  File transfers over the Internet use special techniques, of which one of the oldest and most widely-used is FTP.  FTP, short for "File Transfer Protocol," can transfer files between any computers that have an Internet connection, and also works between computers using totally different operating systems.


How does File Transfer Protocol Work: - When files are transferred through FTP, one of two actions is happening – uploading or downloading. Uploading involves transferring files from a personal computer to a server. Downloading involves transferring a file from a server to a personal computer. FTP uses TCP/IP (Transmission Control Protocol/Internet Protocol) to transfer your files. TCP/IP is basically the language that the Internet uses to carry out commands.
If you are going to use File Transfer Protocol in order to download files, you should keep security concerns in mind. Files downloaded from the Internet may have viruses that can harm your computer.
One way to use FTP is to go through an FTP client. FTP clients may make it safer for your computer to download/upload files and help you avoid malware and viruses. Some FTP clients are pricey, while some are completely free. Using an FTP client is not a necessary step for transferring folders, but it may make uploading and downloading files easier to do.