Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


why we need MAC address in data link layer?

Answers were Sorted based on User's Feedback



why we need MAC address in data link layer? ..

Answer / bhavin jani

MAC (Media Access Control), It is Unique Physical Address
of any Network device, it’s L2 Base address, because of
it’s Unique & all network device are programmed on based of
their L2 Mac base algorithms,
It’s faster than the L3, L2 Have Unique Hardware Identity
that is call MAC, because always hardware base is faster
than Software Base L3, so L2 Can Make Fast Communication
then L3

Is This Answer Correct ?    12 Yes 3 No

why we need MAC address in data link layer? ..

Answer / kapilasdhir

Bcoz data link layer bind mac address with frame for
recognize to which device that frame handed over

Is This Answer Correct ?    6 Yes 4 No

Post New Answer

More Networking AllOther Interview Questions

which layer of osi model ensures reliable trasnmission of data

6 Answers  


In which of the 7 layers of OSI will a service handling conversion of characters is from EBCDIC to ASCII be normally implemented ?

0 Answers  


What is the basic requirement of a real-time network ?

7 Answers   Honeywell,


How to find Who is accesing my network or my folder through network?netstat will shows connections.

1 Answers   Wipro,


The physical layer service is a non-confirmed service. Assume that some bits of data are lost during transmission over physical media, which layer will detect the loss and take some remedial measures. Explain any one method clearly depicting how this operation is performed.

0 Answers  


How would you capture network traffic?

2 Answers  


Explain Traffic shaping using token bucket algorithm

0 Answers  


What is Semaphore? What is deadlock?

2 Answers   TCS,


Explain different kinds of Switching techniques.

0 Answers  


what is active directory?

12 Answers   i policy,


What is the difference between LUN and RAID?

1 Answers   Wipro,


what is modem and what use of in networking ?

6 Answers   CMS, Satyam, TCS,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)