what is mac address
A media access control (MAC) address is a binary number that uniquely identifies a computer's network adapter. These numbers (sometimes called "hardware addresses" or "physical addresses") are embedded into the network hardware during the manufacturing process, or stored in firmware, and are designed not to be modified.
Some people also refer to them as "Ethernet addresses," but many types of networks use MAC addressing, including Ethernet, Wi-Fi, and Bluetooth.
Format of MAC address
The traditional MAC address is a 12-bit (6 bytes or 48 bits) hexadecimal number. By convention, they are usually written in one of the following three formats:
MM:MM:MM:SS:SS:SS MM-MM-MM-SS-SS-SS MMM.MMM.SSS.SSS
The leftmost 6 bits (24 bits) are called the "prefix" associated with the adapter manufacturer. Each provider registers and receives a MAC prefix assigned by the IEEE. Suppliers often have many prefix numbers associated with their different products. For example, the prefixes 00:13:10, 00:25:9C and 68:7F:74 (plus many others) all belong to Linksys (Cisco Systems).
The rightmost digit of the MAC address represents the identification number of the specific device. Across all devices manufactured with the same vendor prefix, each device has its own unique 24-digit number. Note that hardware from different vendors may happen to share the same device portion of this address.
64-bit MAC address
Although the traditional MAC address length is 48 bits, a few types of networks require 64-bit addresses. For example, ZigBee wireless home automation and other similar networks based on IEEE 802.15.4 require a 64-bit MAC address to be configured on their hardware devices.
Compared with mainstream IPv4, IPv6-based TCP/IP networks also implement different methods of communicating with MAC addresses. However, instead of using a 64-bit hardware address, IPv6 automatically converts a 48-bit MAC address into a 64-bit address by inserting a fixed (hard-coded) 16-bit value FFFE between the vendor prefix and the device identifier. IPv6 calls these numbers "identifiers" to distinguish them from true 64-bit hardware addresses.
For example, the 48-bit MAC address 00:25:96:12:34:56 appears on an IPv6 network (usually written in one of these two forms):
00:25:96:FF:FE:12:34:56 0025:96FF:FE12:3456
MAC vs. IP Address Relationship
TCP/IP networks use MAC addresses and IP addresses, but for separate purposes. The MAC address remains fixed to the device's hardware, while the IP address of the same device can change based on its TCP/IP network configuration. Media Access Control operates at Layer 2 of the OSI model, while Internet Protocol operates at Layer 3. This allows MAC addressing to support other types of networks besides TCP/IP.
IP networks use the Address Resolution Protocol (ARP) to manage the translation between IP and MAC addresses. The Dynamic Host Configuration Protocol (DHCP) relies on ARP to manage the unique assignment of IP addresses to devices.
MAC Address Cloning
Some internet service providers link each of their residential customer accounts to the MAC address of the home network router (or another gateway device). The address seen by the provider does not change until the customer changes their gateway, for example by installing a new router. When a residential gateway changes, ISPs will now see a different MAC address reported and prevent that network from coming online.
A process called "cloning" solves this problem by enabling the router (gateway) to continue reporting the old MAC address to the provider, even if its own hardware address is different. Administrators can configure their router (assuming it supports this feature, as much as possible) to use the clone option and enter the MAC address of the old gateway in the configuration screen. When cloning is not available, customers must contact the service provider to register their new gateway device.
The above is the detailed content of what is mac address. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

This article reviews Windows-based server management tools. It compares free (PowerShell, Windows Admin Center) and commercial options (SCCM, Azure Arc), highlighting their functionality, cost, and complexity. The choice depends on needs, budget, a

This article guides users on opening files downloaded from Tencent Cloud. It addresses common issues like corrupted downloads, incompatible file formats, and software conflicts, offering troubleshooting steps and suggesting contacting Tencent Cloud

This guide details using Tencent Cloud Lightweight Application Servers (LAS). It covers account setup, instance creation (specifying region, configuration, image, security, and storage), and application deployment. Key features include cost-effecti

Deleting unregistered Tencent Cloud mobile accounts is impossible without verification. The article explains why account deletion requires verification and details how uninstalling the associated app is the most effective workaround to sever the app

This article addresses common Windows installation and boot errors. It details troubleshooting steps for issues like corrupted media, hardware problems, driver conflicts, partitioning errors, BIOS settings, and software conflicts. Solutions include

This article reviews free and paid Windows server administration tools. It compares built-in options like Server Manager & PowerShell with commercial solutions such as SolarWinds and Microsoft System Center, emphasizing the trade-offs between co

This article details the key responsibilities and essential skills of a Windows systems administrator. It covers system installation/configuration, monitoring/troubleshooting, security management, backup/recovery, patch management, automation, and u
