Telecommunications and old-school postal systems use a hierarchy of identifying characteristics (number, exchange, zip or area code, state or country code, etc.) to break the process of transmitting messages into manageable steps, each of which may be handled by mechanisms appropriate to a given stage (mailbox, local sorting office, etc.).
In computer networking, the Media Access Control (MAC) address is every bit as important as an IP address. Learn in this article how MAC addresses work and how to find the MAC addresses being used by a computer. What Is a MAC Address? The MAC address is a unique value associated with a network adapter.
- Strictly speaking, the setting to 'Use computer MAC address' is there to allow the use of a router when your ISP tracks the MAC address of the connected device(s), which was one of the tricks ISPs used to control access before broadband access became common. You're quite right, it doesn't fix anything.
- Jun 10, 2020 The Media Access Control (MAC) address is a binary number used to identify computer network adapters. These numbers (sometimes called hardware addresses or physical addresses) are embedded into the network hardware during the manufacturing process, or stored in firmware, and designed to not be modified.
- See full list on whatismyipaddress.com.
- Typically, the problem of duplicate MAC addresses arises because people choose not to use the vendor-assigned hardware address, but instead use a self-assigned address (also called a locally administered address). This is a technique used by hackers to circumvent MAC-based security restrictions. This is more common when using main frame systems.
The same holds true for network and internet communications, where part of the hierarchy of identifying traits is provided by MAC, or Media Access Control.
MAC Address – Unique Identifiers
In a LAN (Local Area Network) or other type of network such as the internet, a Media Access Control or MAC address serves as a unique identifier for each piece of hardware. The MAC protocol provides a channel of access and an addressing mechanism, so that each available node on the network may communicate with other nodes which are available – either on the same network, or on others.
MAC addresses are sometimes known as physical addresses or hardware addresses, and are set by hardware manufacturers to uniquely identify their devices. A traditional MAC address is a twelve-digit hexadecimal number, 48 bits or six bytes long, written in one of the following manners:
The string of “M”s on the left (six digits, or 24 bits) is called a prefix, and is associated with the device manufacturer. The IEEE standards authority issues a given set of MAC prefixes to each vendor that registers with it. These may be assigned to the various products making up their range of hardware.
The “S” digits on the right give the identification number associated with a specific device. Each piece of hardware manufactured by a given vendor (and operating under a given MAC prefix) has its own unique 24-bit number. But as different vendors are issued with different MAC prefixes, it’s possible for devices originating from different manufactures to use the same sequence of “S” digits in their MAC address, without confusing the system.
Some wireless home automation networks defined by IEEE 802.15.4 require hardware devices to be configured with MAC addresses of 64 bits, rather than 48.
The MAC Layer
In telecommunication protocols, MAC addresses are used by the Media Access Control sub-layer of the Data Link Control (DLC) layer, which is the protocol layer of a program that handles the flow of data moving in and out over physical links in the network. Each type of physical device has a different MAC sub-layer.
Media Access Control is itself a sub-layer of the Data Link Layer (DLL) defined within the seven-layer OSI (Open Systems Interconnection) network reference model. MAC assumes responsibility for transmitting data packets to and from a network interface card, or to and from other remotely shared channels.
Origins in Ethernet
Media Access Control has its roots in network computing under the Ethernet protocol, where it provides the data link layer for LAN systems. MAC encapsulates payload data by adding Protocol Control Information (PCI) as a 14-byte header before the information, and adding a checksum for integrity checking.
Before data transmission, there’s a short idle time of 9.6 microseconds (µS) to allow for the receiver circuitry in each node to settle after completion of the previous transmission frame. A special pattern (binary 11) is used to mark the last two bits of the preamble. Once this is received, the Ethernet receive interface begins gathering the bits into bytes for processing by the MAC layer.
The MAC Header
The MAC header consists of three parts:
- A six-byte destination address, specifying a single recipient node (unicast mode), several nodes (multicast), or the set of all recipient nodes (broadcast mode).
- A six-byte source address, set to the sender’s unique node address.
- A two-byte type field, providing a Service Access Point (SAP) which identifies the type of protocol being carried.
The Checksum (CRC)
Sometimes referred to as a as a Frame Check Sequence, the Cyclic Redundancy Check or CRC is a 32-bit checksum calculated to provide error detection in the case of Ethernet transmission collisions or line errors which could corrupt the MAC frame. Any frame returning an invalid CRC is rejected by the MAC frame, without processing.
The Inter-Frame Gap
The Inter-Frame Gap or IFG is the period of 9.6 microseconds (at 10 Mbps) that a transmitter must wait between sending frames, to allow for signal propagation at the receiver end. This is the same period as the preamble at the start of a transmission.
Carrier Sense Multiple Access (CSMA) with Collision Detection (CD) protocol regulates access to shared Ethernet media.
Any received frame having less than 64 bytes is known as a runt – and is considered illegitimate. Runt frames typically arise from data collision, and are discarded by the receiver.
A received frame which is larger than the maximum designated size is referred to as a giant. These may stem from failures or imperfections in the network’s physical layer, and are also discarded.
Some Gigabit Ethernet NICs (Network Interface Cards) support frames in excess of the 1500 bytes specified by the IEEE standard. This mode of transmission requires both ends of the communication link to support these jumbo frames.
The Issue with Frames
As mentioned earlier, the maximum size of a data packet which may be carried in a MAC frame using Ethernet is 1500 bytes. This limit is known as the MTU, under Internet Protocol or IP.
Ethernet also requires a minimum frame size of 46 bytes for every MAC frame. If the network layer wishes to transmit less than this, the MAC protocol adds a set of null padding characters (zero bytes, or 0x00) to make up the difference.
Address Resolution Protocol (ARP)
The Address Resolution Protocol or ARP is used to establish the MAC source address of remote computers whenever IP is used over an Ethernet LAN. In turn, IP networks use ARP to manage the conversion between IP and MAC addresses. And the unique assignment of IP addresses to various devices is managed by the Dynamic Host Configuration Protocol (DHCP), in conjunction with ARP.
MAC On TCP/IP
TCP/IP networks use both IP and MAC addresses. A MAC address will remain fixed to a hardware device, but the IP address may alter dynamically in accordance with its TCP/IP network configuration.
In the OSI model, Internet Protocol operates at Layer 3, while the MAC protocol works at Layer 2. Media Access Control is able to support other networks besides TCP/IP, for this reason.
Cloning of MAC Addresses
Some ISPs (Internet Service Providers) map each of their residential customer accounts to the MAC address of their home network router or gateway device. If the customer installs a new router, the address seen by the provider will change – with the ISP seeing a different MAC address. This can lead to blocking or revocation of the account.
This situation can be avoided through a process called “cloning” whereby a router or gateway may be configured to continue reporting the same MAC address to the provider, even if the new hardware has a different identifier. Otherwise, customers need to contact their ISP to register the new device.
To communicate with a Wi-Fi network, a device must identify itself to the network using a unique network address called a media access control (MAC) address. If the device always uses the same Wi-Fi MAC address across all networks, network operators and other network observers can more easily relate that address to the device's network activity and location over time. This allows a kind of user tracking or profiling, and it applies to all devices on all Wi-Fi networks.
To reduce this privacy risk, iOS 14, iPadOS 14, and watchOS 7 use a different MAC address for each Wi-Fi network. This unique, static MAC address is your device's private Wi-Fi address for that network only.
Join Wi-Fi networks with a private address
Using a private Wi-Fi address doesn't affect how you join or use most Wi-Fi networks. Connect to Wi-Fi as you normally do.
What Is Mac Address Used For
- If your Wi-Fi router is configured to notify you whenever a new device joins the network, you will be notified when your device first joins with a private address.
- If a network can't use a private address to provide parental controls or identify your device as authorized to join, you can stop using a private address with that network.
- Rarely, a network might allow you to join with a private address, but won't allow internet access. If that happens, you can stop using a private address with that network.
Turn private address off or on for a network
You can stop or resume using a private address with any network. For better privacy, leave the setting on for all networks that support it.
iPhone, iPad, or iPod touch
- Open the Settings app, then tap Wi-Fi.
- Tap the information button next to a network.
- Tap Private Address. If your device joined the network without using a private address, a privacy warning explains why.
Mac Address Used For Ipv4 Multicast
- Open the Settings app, then tap Wi-Fi.
- Tap the name of the network you joined. If you haven't joined the network yet, swipe left on its name and tap more .
- Tap Private Address.
- If you erase all content and settings from your device, or you use the Reset Network Settings feature, your device will use a different private Wi-Fi address the next time it connects to the Wi-Fi network.