IT283M2_Lower_Layer_Protocols IT283M2 Lower Layer Protocols Competency Assessment Purdue University Global The lower layers of the OSI model consist of the physical layer, the data link layer, and the network
...
IT283M2_Lower_Layer_Protocols IT283M2 Lower Layer Protocols Competency Assessment Purdue University Global The lower layers of the OSI model consist of the physical layer, the data link layer, and the network layer. They are commonly referred to as the heartbeat of a network and utilize routing and switching protocols to move data across the network. Whether that network be IPv4 or IPv6 these layers functions do not change. Every network interface needs a way to identify itself and MAC or Media Access Control addresses are the answer to that. These addresses are unique to the network interface card they operate on and are burned in at the time the hardware is manufactured. Beyond the hardware, protocols are utilized to keep the way data is translated and transferred uniform across every capable network. These protocols each have their own specific set of tasks and some like ICMP can even troubleshoot IP issues that may arise. MAC addresses are unique to the organization that produces the specific piece of hardware that is attempting to connect and communicate with a network. There are a total of 48its in each address and each address can be split into two identifying parts. The first three octets label the manufacturer information while the last three octets denote the network interface controller. Each NIC has its own specific MAC address allowing multiple NICs of the same manufacturer to operate on the same network. The most commonly used local area technologies like Ethernet use MAC addre. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Show More]