User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
C-10
Network, Routing, Firewall, and Cabling Basics
202-10060-01, September 2004
MAC Addresses and ARP
An IP address alone cannot be used to deliver data from one LAN device to another. To send data
between LAN devices, you must convert the IP address of the destination device to its media
access control address (MAC address). Each device on an Ethernet network has a unique MAC
address, which is a 48-bit number assigned to each device by the manufacturer. The technique that
associates the IP address with a MAC address is known as address resolution. Internet Protocol
uses the ARP to resolve MAC addresses.
If a device sends data to another station on the network and the destination MAC address is not yet
recorded, ARP is used. An ARP request is broadcast onto the network. All stations on the network
receive and read the request. The destination IP address for the chosen station is included as part of
the message so that only the station with this IP address responds to the ARP request. All other
stations discard the request.
The station with the correct IP address responds with its own MAC address directly to the sending
device. The receiving station provides the transmitting station with the required destination MAC
address. The IP address data and MAC address data for each station are held in an ARP table. The
next time data is sent, the address can be obtained from the address information in the table.
For more information about address assignment, refer to the IETF documents RFC 1597,
Address
Allocation for Private Internets,
and RFC 1466,
Guidelines for Management of IP Address Space
.
Internet Security and Firewalls
When your LAN connects to the Internet through a router, an opportunity is created for outsiders
to access or disrupt your network. A NAT router provides some protection because by the very
nature of the process, the network behind the router is shielded from access by outsiders on the
Internet. However, there are methods by which a determined hacker can possibly obtain
information about your network or at the least can disrupt your Internet access. A greater degree of
protection is provided by a firewall router.
Содержание WG602 V3
Страница 6: ...202 10060 01 September 2004 6...
Страница 11: ...Contents vii 202 10060 01 September 2004 L D 6 M D 6 N D 7 P D 8 Q D 9 R D 9 S D 9 T D 10 U D 10 W D 10 Index...
Страница 12: ...202 10060 01 September 2004 viii Contents...
Страница 16: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 1 4 About This Manual 202 10060 01 September 2004...
Страница 23: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point Introduction 2 7 202 10060 01 September 2004...
Страница 58: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 6 4 Troubleshooting 202 10060 01 September 2004...
Страница 60: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point A 2 Specifications 202 10060 01 September 2004...
Страница 118: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 12 Glossary 202 10060 01 September 2004...