By continuing you agree to eChinacities's Privacy Policy .
Sign up with Google Sign up with FacebookQ: What is the use of binding the MAC address of a coputer
to the individual IPs at the unis in China. Is it to make sure the students dont purchase more than one computer or is there some hidden agenda in play?
Detailed answer will be much more appreciated. This thing has been bugging me for quite a while now. And the fact that the network amministrators were not able to give me a straight up answer.....
From a computer technie :
MAC address, also known as physical address, hardware address or the link address, the network equipment manufacturers when written in the hardware inside. IP address and MAC address in the computer are in binary notation, IP addresses are 32 bits, while the MAC address is 48 bits. MAC address to 48 bits (6 bytes), usually expressed as 16 hexadecimal number 12, each of 16 hexadecimal numbers between 2 separated by a colon, such as: 08:00:20:0 A: 8C: 6D is a MAC address, which the first six decimal 08:00:20 16 manufacturers on behalf of the number of network hardware, which consists of IEEE (Institute of Electrical and Electronics Engineers) distribution, then three 16 decimal 0A: 8C: 6D represents the manufacturers of products manufactured by a network (such as network card) serial number. As long as you do not change their own MAC address, then your MAC address is unique in the world. Into the "MS-DOS mode" or "Command Prompt" in the command prompt, enter the command: ARP-s 10.88.56.72 00-10-5C-AD-72-E3, to the MAC address and IP address tied together. This will not appear on the unauthorized use of IP addresses is not the normal use of the network situation, you can effectively ensure network security and user community applications. NOTE: ARP command only useful for LAN Internet proxy server, and is a static IP address for, if we adopt the Modem dial-up or dynamic IP address to work. However, simply bind IP and MAC address is not completely solve the problem of IP theft. As a network provider, they have a responsibility to solve these problems for users of the post, only to the user, rather than to solve the security problem to the user. Should not allow the user to take some unnecessary loss of theft. As a network provider, the most common and most effective solution is in the IP, MAC, based on binding, and then bound into the port, the IP-MAC-PORT bind the three together, the port (PORT) refers to is the switch port. This requires time to make port in the wiring time management. The user should be in the wiring junction box and wall switch ports-one correspondence, and do the registration work, and then came back and the user MAC address to the box corresponding to the switch port, which can then bind together and IP, to IP -MAC-PORT the three binding. Thus, even if the thieves have the IP address corresponding to the MAC, but it also has a wall of the port can not, therefore, isolated from the physical channel thieves.
subhash.sah:
but why would they have to worry about the theft of te ip address when they require an id and password to access the internet in the first place.