Two systems on the same network may have nics with the same mac address.

Two systems on the same network may have nics with the same mac address.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

@Dillie-O's answer is the correct generic answer, that is, if all the machines involved have no idea about the duplicate MAC addresses. However, the case you asked about is an exception. If another machine which has the duplicate MAC address knows that it has a duplicate address and crafts packets properly, they can basically use the MAC address carefully and stay under the radar. The other machine typically drops the packets the "shadow" machine (one that has picked the duplicate MAC address) is communicating with since it has no prior knowledge about it. Note that in all this, the MAC and TCP/IP stack of the shadow machine are not behaving as usual and are aware of the fact that they are shadowing someone else. Also, the shadow cannot really do exactly what the victim does without being undetected. Note that since WEP maintains the broadcast nature of the LAN - i.e. everyone can potentially see other hosts packets. In a switched environment, the behavior depends on how the switch responds to seeing same MACs at two ports.

To give you a more concrete example, let's have a look at DHCP. If the victim is already active, the shadow will not need a new IP address and will use the IP address assigned to the victim, so no "registering with the router" is needed.

Two systems on the same network may have NICs with the same MAC address.

Get answer to your question and much more

In a wired network, a charge on a wire represents a zero while no charge represents a one.

Get answer to your question and much more

A NIC reads the data portion of a frame to determine the address of the receiving system.

Get answer to your question and much more

The FCS uses a type of binary math called a cyclic redundancy check (CRC) that the receiving NIC uses toverify that the data arrived intact.

Get answer to your question and much more

When a NIC sends a frame that contains the broadcast address, every NIC on the network processes thatframe.

Get answer to your question and much more

No two systems on the same network can share the same IP address.

Get answer to your question and much more

Routers use logical addresses to forward data.

Get answer to your question and much more

The TCP/IP model consists of six layers.

Get answer to your question and much more

Cabling, physical addresses, NICs, and switches are included in the Link layer of the TCP/IP model.

Get answer to your question and much more

The Network Interface layer of the TCP/IP model maps to the Network layer of the OSI model.

Get answer to your question and much more

The Transport layer of the TCP/IP model uses both connection-oriented and connectionless protocols.

Get answer to your question and much more

TCP is a connection-oriented protocol.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Two systems on the same network may have NICs with the same MAC address

In a wired network, a charge on a wire represents a zero while no charge represents a one

A NIC reads the data portion of a frame to determine the address of the receiving system

The FCS uses a type of binary math called a cyclic redundancy check (CRC) that the receiving NIC uses to verify that the data arrived intact.

When a frame arrives at the switch, the switch makes an exact copy of the frame and sends it to every other system on the network

When a NIC sends a frame that contains the broadcast address, every NIC on the network processes that frame

No two systems on the same network can share the same IP address

Routers use logical addresses to forward data

The TCP/IP model consists of six layers

Cabling, physical addresses, NICs, and switches are included in the Link layer of the TCP/IP model

The Network Interface layer of the TCP/IP model maps to the Network layer of the OSI model

The Transport layer of the TCP/IP model uses both connection-oriented and connectionless protocols

TCP is a connection-oriented protocol.

The Link layer of the TCP/IP model combines features of the top three layers of the OSI model

How many layers does the OSI model contain

Which layer of the OSI model defines a method of moving radio waves

How long is a MAC address

12 hexadecimal characters

Which two parts are included in a MAC address

1. The Organizationally Unique Identifier and the device ID of the NIC

A MAC address is also known as a(n) __________ address

An oscilloscope is a powerful tool that enables a technician to see __________.

All NICs on the same network must use the same __________, or they will not be able to communicate with other NICs

Where does the CRC originate in a network frame

the sending NIC attaches it

Which layer of the OSI model adds source and destination MAC addresses to frames

Frames in most wired networks hold at most __________.

How are incoming frames handled by a switch

The frames are sent only to the interface associated with the destination MAC address (if the MAC is recorded in its memory).

How does the receiving station on a network use the CRC to verify that it received accurate data

It uses the same divisor as the sending station to find the same remainder.

Which of the following is a broadcast MAC address

Which statement best describes Logical Link Control (LLC)

It is a sublayer of the Data Link Layer

Which layer of the OSI model is the only layer divided into two sublayers

Which layer of the OSI model assembles the data it receives into pieces called packets

What device splits a large network into subnets

What unique numeric identifier is assigned to each device on the network by the IP protocol in the OSI model's Network layer

Routers function at which layer of the OSI model

Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system

Which OSI model layer initializes requests for packets that were not received in good order

Which layer of the OSI model manages the opening and closing of the connection between applications

Which statement best describes an Application Programming Interface

It provides programmers with a standard way to extend an application's capabilities.

Routers function at which layer of the TCP/IP model

Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model

Which layer of the TCP/IP model performs IP addressing functions?

Which layer of the TCP/IP model uses a connection-oriented protocol?

Which layer of the TCP/IP model is mapped to the top three layers of the OSI model?

For a network technician, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to __________.

The organization responsible for developing the OSI model of networking is the ____________________.

UTP cabling usually contains __________ pairs of wires that can transmit and receive data

The unique identifier burned into a ROM chip in the NIC is known as the ____________________ address

A MAC address is usually written in ____________________ notation

If you have a Windows system, type ____________________ from the command prompt to display the MAC address for your computer.

The current term for the MAC address numbering name space, as defined by the IEEE, is ____________________.

A(n) ____________________ is a tool that enables a technician to see electrical pulses.

A container created at the OSI Data Link layer for carrying discrete chunks of data across a network is called a(n) ____________________.

Computer data is ____________________, which means it is made up of streams of ones and zeroes.

By using the ____________________ MAC address, a NIC can send a frame that every other NIC on the network will process

A sublayer of the OSI seven-layer model, the ____________________ describes the function of a NIC that talks to the network operating system, handles multiple network protocols and provides flow control

Switches handle traffic using ____________________ addresses, so they operate at Layer 2

Any device that deals with a MAC address is part of the OSI model's ____________________ layer

Although one may argue that the NIC operates at more than one layer of the OSI model, the generally accepted answer is that this device belongs at the ____________________ layer because it assigns the MAC address

Named after two protocols, ____________________ is really a protocol suite designed to work together.

The decimal value for each 8-bit portion of an IP address can range from ____________________ to ____________________.

In a TCP/IP network, each system has two unique identifiers: the ____________________ address (physical address) and the ____________________ address (logical address). (Both should be represented in capital letters.)

When handed to the NIC, each IP packet is enclosed in a ____________________ arranged at the LLC sublayer

In a TCP/IP network, an IP ____________________ includes the destination IP address, the source IP address, and the data

The OSI model's ____________________ layer uses sequencing numbers determine the total number of segments and how to put them back together

If you want to see how many sessions are running on a TCP/IP network, you should use the ____________________ program from the command prompt

The OSI model's Session layer initiates sessions, accepts incoming sessions, and ______________ and _____________ existing sessions

The OSI model's Presentation layer translates data from lower layers into a format usable by the ____________________ layer, and vice versa

Layer 6 of the OSI model is called the ____________________ layer

All operating systems have ____________________ that programmers can use to make their programs network aware

The TCP/IP model is a(n) ____________________ (number) layer model

A(n) ____________________ is a number between 1-65,536 and it is a logical value assigned to specific applications or services

The ____________________ layer of the TCP/IP model uses segments and datagrams as its Protocol Data Units

Layer 6 of the OSI model is included in the ____________________ layer of the TCP/IP model.

What is 255.255.255.0 in binary

11111111.11111111.11111111.00000000

What is the binary number 10101010 in decimal