MAC address – Wikipedia, the free encyclopedia
This article is about the network addressing term. For the series of personal computers by Apple Inc., see Macintosh. For other similar terms, see Mac.
A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. Logically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are stored in its hardware, such as the card's read-only memory or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. This can be contrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address.
A network node may have multiple NICs and each NIC must have a unique MAC address.
MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names EUI-48[1] and EUI-64,[2] in which EUI is an abbreviation for Extended Unique Identifier.
The standard (IEEE 802) format for printing MAC-48 addresses in human-friendly form is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:), in transmission order (e.g. 01-23-45-67-89-ab or 01:23:45:67:89:ab ). This form is also commonly used for EUI-64. Another convention used by networking equipment uses three groups of four hexadecimal digits separated by dots (.) (e.g. 0123.4567.89ab ), again in transmission order.[3]
The original IEEE 802 MAC address comes from the original Xerox Ethernet addressing scheme.[4] This 48-bit address space contains potentially 248 or 281,474,976,710,656 possible MAC addresses.
All three numbering systems use the same format and differ only in the length of the identifier. Addresses can either be universally administered addresses or locally administered addresses. A universally administered address is uniquely assigned to a device by its manufacturer. The first three octets (in transmission order) identify the organization that issued the identifier and are known as the Organizationally Unique Identifier (OUI).[5] The following three (MAC-48 and EUI-48) or five (EUI-64) octets are assigned by that organization in nearly any manner they please, subject to the constraint of uniqueness. The IEEE has a target lifetime of 100 years for applications using MAC-48 space, but encourages adoption of EUI-64s instead.[5] A locally administered address is assigned to a device by a network administrator, overriding the burned-in address. Locally administered addresses do not contain OUIs.
Universally administered and locally administered addresses are distinguished by setting the second-least-significant bit of the most significant byte of the address. This bit is also referred to as the U/L bit, short for Universal/Local, which identifies how the address is administered. If the bit is 0, the address is universally administered. If it is 1, the address is locally administered. In the example address 06-00-00-00-00-00 the most significant byte is 06 (hex), the binary form of which is 00000110, where the second-least-significant bit is 1. Therefore, it is a locally administered address.[6] Consequently, this bit is 0 in all OUIs.
If the least significant bit of the most significant octet of an address is set to 0 (zero), the frame is meant to reach only one receiving NIC.[7] This type of transmission is called unicast. A unicast frame is transmitted to all nodes within the collision domain, which typically ends at the nearest network switch or router. A switch will forward a unicast frame through all of its ports (except for the port that originated the frame) if the switch has no knowledge of which port leads to that MAC address, or just to the proper port if it does have knowledge.[8][not in citation given] Only the node with the matching hardware MAC address will accept the frame; network frames with non-matching MAC-addresses are ignored, unless the device is in promiscuous mode.
If the least significant bit of the most significant address octet is set to 1, the frame will still be sent only once; however, NICs will choose to accept it based on criteria other than the matching of a MAC address: for example, based on a configurable list of accepted multicast MAC addresses. This is called multicast addressing.
The following technologies use the MAC-48 identifier format:
Every device that connects to an IEEE 802 network (such as Ethernet and WiFi) has a MAC-48 address.[9] Common consumer devices to use MAC-48 include every PC, smartphone or tablet computer.
The distinction between EUI-48 and MAC-48 identifiers is purely nominal: MAC-48 is used for network hardware; EUI-48 is used to identify other devices and software. (Thus, by definition, an EUI-48 is not in fact a "MAC address", although it is syntactically indistinguishable from one and assigned from the same numbering space.)
The IEEE now considers the label MAC-48 to be an obsolete term, previously used to refer to a specific type of EUI-48 identifier used to address hardware interfaces within existing 802-based networking applications, and thus not to be used in the future. Instead, the proprietary term EUI-48 should be used for this purpose.
EUI-64 identifiers are used in:
The IEEE has built in several special address types to allow more than one network interface card to be addressed at one time:
These are all examples of group addresses, as opposed to individual addresses; the least significant bit of the first octet of a MAC address distinguishes individual addresses from group addresses. That bit is set to 0 in individual addresses and set to 1 in group addresses. Group addresses, like individual addresses, can be universally administered or locally administered.
In addition, the EUI-64 numbering system encompasses both MAC-48 and EUI-48 identifiers by a simple translation mechanism.[10] To convert a MAC-48 into an EUI-64, copy the OUI, append the two octets FF-FF and then copy the organization-specified extension identifier. To convert an EUI-48 into an EUI-64, the same process is used, but the sequence inserted is FF-FE. In both cases, the process can be trivially reversed when necessary. Organizations issuing EUI-64s are cautioned against issuing identifiers that could be confused with these forms. The IEEE policy is to discourage new uses of 48-bit identifiers in favor of the EUI-64 system. IPv6 one of the most prominent standards that uses a Modified EUI-64 treats MAC-48 as EUI-48 instead (as it is chosen from the same address pool) and toggles the U/L bit (as this makes it easier to type locally assigned IPv6 addresses based on the Modified EUI-64). This results in extending MAC addresses (such as IEEE 802 MAC address) to Modified EUI-64 using only FF-FE (and never FF-FF) and with the U/L bit inverted.[11]
An Individual Address Block is a 24-bit OUI managed by the IEEE Registration Authority, followed by 12 IEEE-provided bits (identifying the organization), and 12 bits for the owner to assign to individual devices. An IAB is ideal for organizations requiring fewer than 4097 unique 48-bit numbers (EUI-48).[12]
Although intended to be a permanent and globally unique identification, it is possible to change the MAC address on most modern hardware. Changing MAC addresses is necessary in network virtualization. It can also be used in the process of exploiting security vulnerabilities. This is called MAC spoofing.
A host cannot determine from the MAC address of another host whether that host is on the same link (network segment) as the sending host, or on a network segment bridged to that network segment.
In IP networks, the MAC address of an interface can be queried given the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4 (IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. In this way, ARP or NDP is used to translate IP addresses (OSI layer 3) into Ethernet MAC addresses (OSI layer 2). On broadcast networks, such as Ethernet, the MAC address uniquely identifies each node on that segment and allows frames to be marked for specific hosts. It thus forms the basis of most of the link layer (OSI Layer 2) networking upon which upper layer protocols rely to produce complex, functioning networks.
According to Edward Snowden, the National Security Agency has a system that tracks the movements of everyone in a city by monitoring the MAC addresses of their electronic devices.[13] As a result of users being trackable by their devices' MAC addresses, Apple Inc. has started using random MAC addresses in their iOS line of devices while scanning for networks.[14] If random MAC addresses are not used, researchers have confirmed that it is possible to link a real identity to a particular wireless MAC address.[15]
Layer 2 switches use MAC addresses to restrict packet transmission to the intended recipient. However, the effect is not immediate.
The standard notation, also called canonical format, for MAC addresses is written in transmission bit order with the least significant bit transmitted first, as seen in the output of the iproute2/ifconfig/ipconfig command, for example.
However, since IEEE 802.3 (Ethernet) and IEEE 802.4 (Token Bus) send the bytes (octets) over the wire, left-to-right, with least significant bit in each byte first, while IEEE 802.5 (Token Ring) and IEEE 802.6 send the bytes over the wire with the most significant bit first, confusion may arise when an address in the latter scenario is represented with bits reversed from the canonical representation. For example, an address in canonical form 12-34-56-78-9A-BC would be transmitted over the wire as bits 01001000 00101100 01101010 00011110 01011001 00111101 in the standard transmission order (least significant bit first). But for Token Ring networks, it would be transmitted as bits 00010010 00110100 01010110 01111000 10011010 10111100 in most-significant-bit first order. The latter might be incorrectly displayed as 48-2C-6A-1E-59-3D. This is referred to as bit-reversed order, non-canonical form, MSB format, IBM format, or Token Ring format, as explained in RFC 2469. Canonical form is generally preferred, and used by all modern implementations.
When the first switches supporting both Token Ring and Ethernet came out, some did not distinguish between canonical form and non-canonical form and so did not reverse MAC address bits as required. This led to cases of duplicate MAC addresses in the field.[citation needed]
Continue reading here:
MAC address - Wikipedia, the free encyclopedia
- USAID spent millions of dollars to promote media control through Internews which is linked to India based Factshala - Organiser - February 16th, 2025 [February 16th, 2025]
- Inaccurate reporting on foot and mouth disease controls - Defra in the media - February 16th, 2025 [February 16th, 2025]
- Russian forces take control of two settlements in eastern Ukraine, Media - APA - February 16th, 2025 [February 16th, 2025]
- TikTok's woes in the United States highlight the 'Godfather' battle to control social media - ABC News - February 5th, 2025 [February 5th, 2025]
- Jesse Watters: Air traffic control was "unable to meet their own DEI quotas, and thats what is leading to staffing shortages" - Media... - February 5th, 2025 [February 5th, 2025]
- Hive to launch Beeblade Nexus media control engine - Installation and AV Technology Europe - January 27th, 2025 [January 27th, 2025]
- Pakistan introduces law allowing government to block platforms, imprison users for spreading 'disinformat - The Times of India - January 27th, 2025 [January 27th, 2025]
- This little media control button is the gadget I can't live without - MSN - January 22nd, 2025 [January 22nd, 2025]
- Effective role of media is a must for tobacco control, experts say - bdnews24.com - January 22nd, 2025 [January 22nd, 2025]
- Effective media role vital for tobacco control: Experts - United News of Bangladesh - UNB - January 22nd, 2025 [January 22nd, 2025]
- How Government & Legacy Media CONTROL What We Think - iHeartRadio - January 9th, 2025 [January 9th, 2025]
- SNL kinda banned this 1998 'Schoolhouse Rock' parody warning about corporate media control - Upworthy - December 30th, 2024 [December 30th, 2024]
- Palestinian Authority: Jews Lied About Oct. 7 Because They Control the Media - Algemeiner - December 30th, 2024 [December 30th, 2024]
- NDCs control of major media houses gave them edge in 2024 polls Bawumia - Adomonline - December 22nd, 2024 [December 22nd, 2024]
- Hallmark Insights to Tackle the Debate on Social Media Management and Control in Organizations - PC Tech Magazine - December 14th, 2024 [December 14th, 2024]
- Rupert Murdochs bid to change familys trust over Fox News media empire control is rejected - Washington Times - December 10th, 2024 [December 10th, 2024]
- Rupert Murdoch loses battle to control succession to his media empire - The Guardian - December 10th, 2024 [December 10th, 2024]
- Journalist Abducted in Guinea Amid Military's Increasing Control Over Media - Oneindia - December 5th, 2024 [December 5th, 2024]
- Aleppo and Idlib Under Opposition Control, With Eyes on Hama - The Media Line - December 5th, 2024 [December 5th, 2024]
- Remilekun Dosumu takes the helm as Head of Media Buying & Control at PHD Nigeria - Marketing Edge - December 5th, 2024 [December 5th, 2024]
- Media reports US Republicans regaining control of House of Representatives - MENAFN.COM - November 14th, 2024 [November 14th, 2024]
- Social media misinformation is scaring women about birth control - STAT - November 5th, 2024 [November 5th, 2024]
- The (Lack Of) Science Behind Social Media Claims Of Weather Control - Forbes - October 14th, 2024 [October 14th, 2024]
- No, the government is not controlling the weather. "It's so stupid, it's got to stop," Biden says - CBS News - October 14th, 2024 [October 14th, 2024]
- Column: Media tries to control the narrative | Aiken Standard - The Post and Courier - October 12th, 2024 [October 12th, 2024]
- DoubleVerify To Introduce Pre-Screen Content Control On Meta, Strengthening Brand Safety, Suitability, Media Performance - Business - October 12th, 2024 [October 12th, 2024]
- Android Auto 13.0: Paving the way for enhanced media control - MSN - October 11th, 2024 [October 11th, 2024]
- Unveiling Android Auto 13.0: Paving the way for seamless media control - MSN - October 11th, 2024 [October 11th, 2024]
- How Trump consolidated control over his party and right-wing media in a cloud of confusion - CNN - October 4th, 2024 [October 4th, 2024]
- Israel aims to control the social media sphere by any means necessary, even through abduction - Middle East Monitor - October 3rd, 2024 [October 3rd, 2024]
- Media Throw Everything But the Facts Against Harriss Price Control Proposal - FAIR - September 28th, 2024 [September 28th, 2024]
- Control of Murdoch media empire at stake as hearing to proceed with mogul and children - ABC News - September 19th, 2024 [September 19th, 2024]
- Closed-door hearing in Nevada could decide control of the Murdoch media empire - PBS NewsHour - September 19th, 2024 [September 19th, 2024]
- A Second Trump Admin Means Giving Social Media Control Of The Presidency - Daily Kos - September 19th, 2024 [September 19th, 2024]
- Control of Murdoch media empire at stake as hearing to proceed with mogul and children - Beaumont Enterprise - September 19th, 2024 [September 19th, 2024]
- Control of the Murdoch media empire could be at stake - 9News - September 19th, 2024 [September 19th, 2024]
- TeleFico: How the Prime Minister Wants to Control the Media in Slovakia - The Journal - September 19th, 2024 [September 19th, 2024]
- The Growing Threat of Big Pharma, Big Tech, and Media Control Over America: A Warning Echoed from Eisenhower to Zuckerberg - MSN - September 6th, 2024 [September 6th, 2024]
- Pest Control Advisors Need to be on Social Media - AGInfo Ag Information Network - August 22nd, 2024 [August 22nd, 2024]
- Should parents control their teenagers' use of social media? - The National - August 22nd, 2024 [August 22nd, 2024]
- Parliamentary committee holds hearing on alleged gov't control of media - MSN - August 22nd, 2024 [August 22nd, 2024]
- NBC News host presses Gov. Whitmer on Harris' price control plan: Is it 'any more than a gimmick?' - Fox News - August 22nd, 2024 [August 22nd, 2024]
- "The situation is under control", as reported by the Russian media about the Ukrainian incursion - Vijesti.me - August 22nd, 2024 [August 22nd, 2024]
- The 6 Companies That Control The Media - MSN - August 16th, 2024 [August 16th, 2024]
- Hate speech and misinformation on social media are out of control heres what we should do about it - TNW - August 11th, 2024 [August 11th, 2024]
- Rupert Murdoch Wants Lachlan To Inherit Control Of Media Empire, Sparking Legal Battle With Other Children Report - Deadline - July 28th, 2024 [July 28th, 2024]
- Media has normalised Trump's bullying it's time to take control - Independent Australia - July 28th, 2024 [July 28th, 2024]
- Russian authorities to set control on social media accounts with over 1,000 followers - NEWS.am - July 15th, 2024 [July 15th, 2024]
- Lawrence O'Donnell Torches Media Over 'Out Of Control' White House Briefing - HuffPost - July 14th, 2024 [July 14th, 2024]
- Facebook and Instagram Update Ban List to Include Posts on Zionists Who Control the World - The Jewish Press - JewishPress.com - July 10th, 2024 [July 10th, 2024]
- HIV/AIDS in News: Time to Bridge the Gap between Media, HIV +ve Patient and State AIDS Control Society - Tripuratimes - July 10th, 2024 [July 10th, 2024]
- Social media is talking to teens about birth control, but do they know what they're talking about? - The Philadelphia Inquirer - June 30th, 2024 [June 30th, 2024]
- Smart Monkeys | partners with Hive Media Control - blooloop - June 16th, 2024 [June 16th, 2024]
- Slovakia's Fico plots to dismantle the free press - POLITICO Europe - May 15th, 2024 [May 15th, 2024]
- Liberia: Lack of Mass Media Control Denting Public Confidence in the Justice System - AllAfrica - Top Africa News - May 15th, 2024 [May 15th, 2024]
- Why Don't Media Care About The Man Who Killed Four Cops? - The Federalist - May 3rd, 2024 [May 3rd, 2024]
- Pedro Snchez threatens curbs on media amid corruption claims against wife - The Times - May 3rd, 2024 [May 3rd, 2024]
- This secret Android 15 feature could finally give you more media control with a Wear OS smartwatch - TechRadar - May 1st, 2024 [May 1st, 2024]
- New features in Microsoft Edge want to make you use the taskbar media controls more often - XDA Developers - May 1st, 2024 [May 1st, 2024]
- OPINION: Soviet-style control of art and media is not so foreign as you might think - Alaska Watchman - April 24th, 2024 [April 24th, 2024]
- The media is controlled and I'm out of control: Artist who smashed guitar at Coachella pulls out after backlash - Guitar World - April 24th, 2024 [April 24th, 2024]
- Social media will tell you birth control causes mental health issues, weight gain and infertility here are the facts - The Conversation - April 13th, 2024 [April 13th, 2024]
- Sports gambling has gotten out of control - The Philadelphia Inquirer - March 26th, 2024 [March 26th, 2024]
- On the Cover: Andrew Huberman's Mechanisms of Control - New York Magazine - March 26th, 2024 [March 26th, 2024]
- Montgomery County breaks ground on library, animal control facility - Main Street Media of Tennessee - March 26th, 2024 [March 26th, 2024]
- St John's College Cambridge now has control over the SJV choir's social media - The Tab - March 26th, 2024 [March 26th, 2024]
- "Media credibility lies solely within its own control, by being objective, not getting involved in politics": VP Dhankar - SahilOnline - March 26th, 2024 [March 26th, 2024]
- Prince William Learned a Hard Lesson About Social Media Controlling the Royal Family Rumors - SheKnows - March 22nd, 2024 [March 22nd, 2024]
- This proposed bill would give Tennessee parents control over their child's social media accounts - News Channel 5 Nashville - January 31st, 2024 [January 31st, 2024]
- Why Is Shari Redstone, Ruler of a Vast Media Kingdom, Weighing a Sale? - The New York Times - December 25th, 2023 [December 25th, 2023]
- Poland's President Duda Vetoes 2024 Bill Over Media Control - BNN Breaking - December 25th, 2023 [December 25th, 2023]
- Israeli media failed to manipulate truth this time, says media union head | News - Yeni afak English - December 17th, 2023 [December 17th, 2023]
- Public Employees: "They Control Everything We Say on Social Media" - Confidencial - December 12th, 2023 [December 12th, 2023]
- The Vicious Cycle of Rumor in China - China Media Project - December 12th, 2023 [December 12th, 2023]
- Godrej announces launch of advanced pest control in India - FoodBev.com - November 3rd, 2023 [November 3rd, 2023]
- Xbox is about to get better apps and web games - The Verge - November 3rd, 2023 [November 3rd, 2023]
- Eve Pappas Honored as Decorated Business Women in New Jersey - PCT Online - November 3rd, 2023 [November 3rd, 2023]
- CDC's National Institute for Occupational Safety and Health ... - CDC - November 3rd, 2023 [November 3rd, 2023]
- 23-052 USACE to rehabilitate and improve Russel Creek Canal - nww.usace.army.mil - November 3rd, 2023 [November 3rd, 2023]
- Control RH to Improve Product Quality - Quality Assurance & Food Safety - November 3rd, 2023 [November 3rd, 2023]