MAC Address

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.

MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. A network node may have multiple NICs and will then have one unique MAC address per NIC.

MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names EUI-48 and EUI-64, in which EUI is an abbreviation for Extended Unique Identifier.

Read more about MAC AddressNotational Conventions, Address Details, Usage in Hosts, Usage in Switches, Bit-reversed Notation

Other articles related to "mac address, address, mac":

Content-addressable Memory - Example Applications
... a data frame from one of its ports, it updates an internal table with the frame's source MAC address and the port it was received on ... It then looks up the destination MAC address in the table to determine what port the frame needs to be forwarded to, and sends it out on that port ... The MAC address table is usually implemented with a binary CAM so the destination port can be found very quickly, reducing the switch's latency ...
Cracking Of Wireless Networks - Penetration of A Wireless Network - MAC Address Filtering and Its Attack
... MAC address filtering can be used alone as an ineffective security measure, or in combination with encryption ... The attack is determining an allowed MAC address, and then changing the MAC address of the attacker to that address ... the many programs available to change the MAC address of network adapters ...
Skyhook Wireless - Privacy and Hacking
... location of any router provided that its Mac address is known ... He/she sets the MAC address of this network to be the same as the MAC address of the target router ... Since Skyhook determines locations based on MAC addresses, it will pinpoint the user's location as being near to the target router's physical location, since that is where it believes the MAC address of the wireless ...
MAC Address - Bit-reversed Notation
... The standard notation, also called canonical format, for MAC addresses is written in transmission bit order with the least significant bit transmitted first ... most significant bit first, confusion may arise when an address in the latter scenario is represented with bits reversed from the canonical representation ... For example, an address in canonical form 12-34-56-78-9A-BC would be transmitted over the wire as bits 00111101 ... in the standard transmission order (least significant bit ...
Point-to-point Protocol Over Ethernet - PPPoE Discovery (PPPoED) - Client To Server: Initiation (PADI)
... Communication over Ethernet is only possible via MAC addresses ... As the computer does not know the MAC address of the DSL-AC, it sends out a PADI packet via an Ethernet broadcast (MAC ffffffffffff) ... This PADI packet contains the MAC address of the computer sending it ...

Famous quotes containing the word address:

    Death is hacking away at my address book and party lists.
    Mason Cooley (b. 1927)