Media Access Control - MAC Addresses

Introduction

Media Access Control (MAC) addresses are talked about in various sections on the site, such as the OSI-Layer 2, Multicast, Broadcast and Unicast. We are going to analyse them in depth here so we can get a firm understanding of them since they are part of the fundamentals of networking.

MAC addresses are physical addresses, unlike IP addresses which are logical addresses. Logical addresses require you to load special drivers and protocols in order to be able to configure your network card/computer with an IP Address, whereas a MAC address doesn't require any drivers whatsoever. The reason for this is that the MAC address is actually "burnt-in" into your network card's memory chipset.

The Reason for MAC

Each computer on a network needs to be identified in some way. If you're thinking of IP addresses, then you're correct to some extent, because an IP address does identify one unique machine on a network, but that is not enough. Got you mixed up?

Check the diagram and explanation below to see why :

You see, the IP address of a machine exists on the 3rd Layer of the OSI model and, when a packet reaches the computer, it will travel from Layer 1 upwards, so we need to be able to identify the computer before Layer 3.

This is where the MAC address - Layer 2 comes into the picture. All machines on a network will listen for packets that have their MAC address in the destination field of the packet (they also listen for broadcasts and other stuff, but that's analysed in other sections). The Physical Layer understands the electrical signals on the network and creates the frame which gets passed to the Datalink layer. If the packet is destined for the computer then the MAC address in the destination field of the packet will match, so it will accept it and pass it onto the Layer above (3) which, in turn, will check the network address of the packet (IP Address), to make sure it matches with the network address to which the computer has been configured.

Looking at a MAC

Let's now have a look at a MAC address and see what it looks like! I have taken my workstations MAC address as an example:

When looking at a MAC address, you will always see it in HEX format. It is very rare that a MAC address is represented in Binary format because it is simply tooooo long as we will see futher on.

When a vendor, e.g Intel, creates network cards, they don't just give them any MAC address they like, this would create a big confusion in identifying who created this network card and could possibly result in clashing with another MAC address from another vendor e.g D-link, who happened to choose the same MAC address for one of their network cards !

To make sure problems like this are not experienced, the IEEE group split the MAC address in half, and used the first half to identify the vendor, and the second half is for the vendor to allocate as serial numbers:

The Vendor code is specified by RFC - 1700. You might find a particular vendor having more than just one code; this is because of the wide range of products they might have. They just apply for more, as they need !

Keep in mind that even tho the MAC address is "burnt-in" to the network card's memory, some vendors will allow you to download special programs to change the second half of the MAC address on the card. This is because the vendors actually reuse the same MAC addresses for their network cards because they create so many that they run out of numbers ! But at the same time, the chances of you buying two network cards which have the same MAC address are so small that it's almost impossible !

Let's start talking bits and bytes!

Now that we know what a MAC address looks like, we need to start analysing it. A MAC address of any network card is always the same length, that is, 6 Bytes long or 48 Bits long. If you're scratching your head wondering where these figures came from, then just have a look at the picture below which makes it a bit easier to understand:

So that completes the discussion regarding MAC Addresses! I hope you have understood it all because it's very important so you can expand your knowledge and truly understand what happens in a network !

 Back

Top

Next-Broadcast (B)

 
  Networking Menu  
    Firewall    
    Networking    
    Cabling    
    Protocols    
    Routing     
    Routers    
    Ethernet      
    Fast Ethernet    
 
   Introduction   
   Introduction   
   Introduction   
   Firewall Topologies   
   Firewall Topologies   
   Firewall Topologies   
   The DMZ Zone   
   The DMZ Zone   
   The DMZ Zone   
   DoS & DDoS Attacts   
   DoS & DDoS Attacts   
   DoS & DDoS Attacts   
   Locking Win9x
   Locking Win9x
   Locking Win9x
   Network Add Translation   
   Network Add Translation   
   Network Add Translation   
 
   Introduction   
   Introduction   
   Introduction   
   The NAT Concept   
   The NAT Concept   
   The NAT Concept   
   The NAT Table   
   The NAT Table   
   The NAT Table   
   Static NAT (Part 1)
   Static NAT (Part 1)
   Static NAT (Part 1)
   Static NAT (Part 2)
   Static NAT (Part 2)
   Static NAT (Part 2)
   Dynamic NAT (Part1)
   Dynamic NAT (Part1)
   Dynamic NAT (Part1)
   Dynamic NAT (Part2)
   Dynamic NAT (Part2)
   Dynamic NAT (Part2)
   Overload NAT/PAT (part1)
   Overload NAT/PAT (part1)
   Overload NAT/PAT (part1)
   Overload NAT/PAT (part2)   
   Overload NAT/PAT (part2)   
   Overload NAT/PAT (part2)   
 
   General   
   General   
   General   
   Data Transmission   
   Data Transmission   
   Data Transmission   
   IP Subnetting   
   IP Subnetting   
   IP Subnetting   
   Supernetting   
   Supernetting   
   Supernetting   
 
   Introduction   
   Introduction   
   Introduction   
   Topologies   
   Topologies   
   Topologies   
 
   Introduction   
   Introduction   
   Introduction   
   Mac Addresses   
   Mac Addresses   
   Mac Addresses   
   Broadcast B   
   Broadcast B   
   Broadcast B   
   Multicast   
   Multicast   
   Multicast   
   Multicast IP List  
   Multicast IP List  
   Multicast IP List  
   Unicast V   
   Unicast V   
   Unicast V   
   Controlling Multicast & Broadcast   
   Controlling Multicast & Broadcast   
   Controlling Multicast & Broadcast   
 
   Introduction   
   Introduction   
   Introduction   
   Basic Concept   
   Basic Concept   
   Basic Concept   
   Subnet Mask Effect   
   Subnet Mask Effect   
   Subnet Mask Effect   
   Subnet Mask Bit   
   Subnet Mask Bit   
   Subnet Mask Bit   
   Subnet Routing & Communications   
   Subnet Routing & Communications   
   Subnet Routing & Communications   
   Subnetting Guidlines   
   Subnetting Guidlines   
   Subnetting Guidlines   
 
   Introduction   
   Introduction   
   Introduction   
   In Depth Analysis   
   In Depth Analysis   
   In Depth Analysis   
   Supernetting Chart   
   Supernetting Chart   
   Supernetting Chart   
   Securing Your Home Network   
   Securing Your Home Network   
   Securing Your Home Network   
 
   Introduction   
   Introduction   
   Introduction   
   UTP CAT 1/2/3/4/5/6 Cable   
   UTP CAT 1/2/3/4/5/6 Cable   
   UTP CAT 1/2/3/4/5/6 Cable   
   UTP Straight Through Cable   
   UTP Straight Through Cable   
   UTP Straight Through Cable   
   UTP X-over Cable   
   UTP X-over Cable   
   UTP X-over Cable   
   Fiber Optic Cable   
   Fiber Optic Cable   
   Fiber Optic Cable   
   10Base T/2/F/5/35   
   10Base T/2/F/5/35   
   10Base T/2/F/5/35   
   100Base T/TX/T4/FX   
   100Base T/TX/T4/FX   
   100Base T/TX/T4/FX   
   Direct Cable Connection (DCC)   
   Direct Cable Connection (DCC)   
   Direct Cable Connection (DCC)   
 
   Introduction   
   Introduction   
   Introduction   
   Serial DCC    
   Serial DCC    
   Serial DCC    
   Parallel DCC   
   Parallel DCC   
   Parallel DCC   
   USB DCC   
   USB DCC   
   USB DCC   
   Important Notes For DCC    
   Important Notes For DCC    
   Important Notes For DCC    
 
   Introduction   
   Introduction   
   Introduction   
   TCP   
   TCP   
   TCP   
   In Depth TCP Analysis   
   In Depth TCP Analysis   
   In Depth TCP Analysis   
   DNS   
   DNS   
   DNS   
   DNS Server Setup (Unix-BIND)   
   DNS Server Setup (Unix-BIND)   
   DNS Server Setup (Unix-BIND)   
   ICMP   
   ICMP   
   ICMP   
   Internet Protocol (IP)   
   Internet Protocol (IP)   
   Internet Protocol (IP)   
   The OSI Model   
   The OSI Model   
   The OSI Model   
 
   Introduction    
   Introduction    
   Introduction    
   A Transport Protocol   
   A Transport Protocol   
   A Transport Protocol   
   Quick Overview    
   Quick Overview    
   Quick Overview    
   TCP Header / Segment   
   TCP Header / Segment   
   TCP Header / Segment   
 
   Introduction    
   Introduction    
   Introduction    
   Source & Destination Port    
   Source & Destination Port    
   Source & Destination Port    
   Sequence & Ack. Numbers   
   Sequence & Ack. Numbers   
   Sequence & Ack. Numbers   
   Header Length    
   Header Length    
   Header Length    
   TCP Flag Options   
   TCP Flag Options   
   TCP Flag Options   
   Window, Checksum, Urgent Flags   
   Window, Checksum, Urgent Flags   
   Window, Checksum, Urgent Flags   
   TCP Options   
   TCP Options   
   TCP Options   
   Data    
   Data    
   Data    
   UDP    
   UDP    
   UDP    
   FTP   
   FTP   
   FTP   
   TFTP   
   TFTP   
   TFTP   
 
   Introduction   
   Introduction   
   Introduction   
   The DNS Protocol   
   The DNS Protocol   
   The DNS Protocol   
   The DNS Resolution Process   
   The DNS Resolution Process   
   The DNS Resolution Process   
   DNS Query Messages   
   DNS Query Messages   
   DNS Query Messages   
   DNS Response Messages   
   DNS Response Messages   
   DNS Response Messages   
 
   Introduction   
   Introduction   
   Introduction   
   The db.domain file   
   The db.domain file   
   The db.domain file   
   The db.addr file   
   The db.addr file   
   The db.addr file   
   Other Common Files   
   Other Common Files   
   Other Common Files   
   Slave DNS Server   
   Slave DNS Server   
   Slave DNS Server   
   DNS Caching   
   DNS Caching   
   DNS Caching   
 
   Introduction    
   Introduction    
   Introduction    
   ICMP Echo/Echo Reply (ping)    
   ICMP Echo/Echo Reply (ping)    
   ICMP Echo/Echo Reply (ping)    
   ICMP Destination Unreachable    
   ICMP Destination Unreachable    
   ICMP Destination Unreachable    
   ICMP Source Quench    
   ICMP Source Quench    
   ICMP Source Quench    
   ICMP Redirect   
   ICMP Redirect   
   ICMP Redirect   
   ICMP Time Exceeded   
   ICMP Time Exceeded   
   ICMP Time Exceeded   
 
   Introduction   
   Introduction   
   Introduction   
   Binary & IP   
   Binary & IP   
   Binary & IP   
   The IP Header   
   The IP Header   
   The IP Header   
   IP Classes   
   IP Classes   
   IP Classes   
 
   Introduction   
   Introduction   
   Introduction   
   Layer 1   
   Layer 1   
   Layer 1   
   Layer 2   
   Layer 2   
   Layer 2   
   Layer 3   
   Layer 3   
   Layer 3   
   Layer 4   
   Layer 4   
   Layer 4   
   Layer 5   
   Layer 5   
   Layer 5   
   Layer 6   
   Layer 6   
   Layer 6   
   Layer 7   
   Layer 7   
   Layer 7   
   Layer Encapsulation & Decapsulation    
   Layer Encapsulation & Decapsulation    
   Layer Encapsulation & Decapsulation    
 
   Introduction   
   Introduction   
   Introduction   
   Routed Protocols   
   Routed Protocols   
   Routed Protocols   
   IP Routing   
   IP Routing   
   IP Routing   
   Routing Protocols   
   Routing Protocols   
   Routing Protocols   
 
   Introduction   
   Introduction   
   Introduction   
   Distance Vector Routing Protocols   
   Distance Vector Routing Protocols   
   Distance Vector Routing Protocols   
   Link State Routing Protocols   
   Link State Routing Protocols   
   Link State Routing Protocols   
   Hybrid Routing Protocols   
   Hybrid Routing Protocols   
   Hybrid Routing Protocols   
   OSPF Routing Protocol   
   OSPF Routing Protocol   
   OSPF Routing Protocol   
   RIP Routing Protocol   
   RIP Routing Protocol   
   RIP Routing Protocol   
   IGRP Routing Protocol   
   IGRP Routing Protocol   
   IGRP Routing Protocol   
   EIGRP Routing Protocol   
   EIGRP Routing Protocol   
   EIGRP Routing Protocol   
   Connectivity Devices   
   Connectivity Devices   
   Connectivity Devices   
 
   Hubs & Repeaters   
   Hubs & Repeaters   
   Hubs & Repeaters   
   Switches & Bridges   
   Switches & Bridges   
   Switches & Bridges   
 
   Introduction   
   Introduction   
   Introduction   
   Cisco Basics   
   Cisco Basics   
   Cisco Basics   
   Cisco Modes   
   Cisco Modes   
   Cisco Modes   
 
   Introduction   
   Introduction   
   Introduction   
   User Exec Mode    
   User Exec Mode    
   User Exec Mode    
   User Privileged Mode   
   User Privileged Mode   
   User Privileged Mode   
 
   Introduction   
   Introduction   
   Introduction   
   Frame Formats   
   Frame Formats   
   Frame Formats   
   Collisions   
   Collisions   
   Collisions   
 
   Introduction   
   Introduction   
   Introduction   
   Ethernet 802.3    
   Ethernet 802.3    
   Ethernet 802.3    
   Ethernet II   
   Ethernet II   
   Ethernet II   
   Ethernet 802.3 SNAP   
   Ethernet 802.3 SNAP   
   Ethernet 802.3 SNAP   
   Ethernet 802.3 Raw (Novell)   
   Ethernet 802.3 Raw (Novell)   
   Ethernet 802.3 Raw (Novell)   
   Media Access   
   Media Access   
   Media Access   
 
   Introduction    
   Introduction    
   Introduction    
   Early Collisions    
   Early Collisions    
   Early Collisions    
   Late Collisions    
   Late Collisions    
   Late Collisions    
   Propagation Delay    
   Propagation Delay    
   Propagation Delay    
   Frame Corruption   
   Frame Corruption   
   Frame Corruption   
   Interframe Gap    
   Interframe Gap    
   Interframe Gap    
   Signal Encoding    
   Signal Encoding    
   Signal Encoding    
 
   Introduction    
   Introduction    
   Introduction    
   10/100 Mbits   
   10/100 Mbits   
   10/100 Mbits   
   Integration   
   Integration   
   Integration   
   Migration   
   Migration   
   Migration   
   The Fast Ethernet Model   
   The Fast Ethernet Model   
   The Fast Ethernet Model   
   Troubleshooting    
   Troubleshooting    
   Troubleshooting