Solved

CCNA Exam: MAC address #2

Posted on 2009-03-30
3
1,775 Views
Last Modified: 2012-05-06
Hi,
1) This is related to MAC address at CCNA Exam
2) In one of the prep test:
The question: How is an EUI-64 format interface ID created from a 48-bit MAC address?
The answer: By inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address
3) I have 5 of the following questions accordingly:
4) First question: What is EUI-64 format interface ID?
5) 2nd Question: What is 48-bit MAC Address?
6) 3rd question: Waht is 0xFFFE?
7) 4th question: What is "the upper three bytes of the MAC address?" (please provide example)
8) 5th question: What is "the lower three bytes of the MAC address?" (please provide example)
9) Thank you

tjie
0
Comment
Question by:tjie
  • 2
3 Comments
 
LVL 7

Assisted Solution

by:egyptco
egyptco earned 125 total points
ID: 24024179
1) you can find all your answers in wikipedia: http://en.wikipedia.org/wiki/MAC_address
0
 
LVL 3

Accepted Solution

by:
csaint00 earned 375 total points
ID: 24024254
ok, here's a standard MAC address, 08:00:0F:63:22:AC. This is written in hexadecimal format to make it easier to read and each pair of numbers represents a byte (4 bits per hex number, 8 bits per byte). If you're having problems with hex wikipedia has a pretty good article for them at http://en.wikipedia.org/wiki/Hexadecimal . Ok, knowing this answers most of the questions such as what is 0xFFFE which his hex for 65534, but you don't need to know that. Think of it as filler for the extra space created by expanding the MAC address. 48 bits is easy, there are 12 hex digits in the MAC address times 4 bits = 48. Again 2 hex digits = 1 byte so upper 3 of example would be 08:00:0F and lower 3 would be 63:22:AC. As for EUI-64 think of it as a 64-bit MAC address, if you want to know details check http://en.wikipedia.org/wiki/EUI-64
0
 
LVL 3

Assisted Solution

by:csaint00
csaint00 earned 375 total points
ID: 24024269
oh and the resultant MC address would be 08:00:0F:FF:FE:63:22:AC
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now