Computer Networks
LECTURE # 9
MAC ADDRESSING
Introduction to MAC Addressing�
Media Access Control (MAC) addressing is a fundamental concept in network communications, particularly in local area networks (LANs). A MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment.
Objectives of the Lecture
What is a MAC Address?
A MAC address (Media Access Control address) is a hardware address that uniquely identifies a device on a network. Unlike IP addresses, which can change depending on the network, MAC addresses are fixed and assigned to a network interface card (NIC) by the manufacturer.
Key Features of a MAC Address�
Structure of a MAC Address�
A MAC address consists of 48 bits (or 6 bytes), commonly formatted in several ways:
Example Formats:
1. Hexadecimal or Colon-Separated : `00:1A:2B:3C:4D:5E`
3. Dot-separated: `001A.2B3C.4D5E`
Breakdown of a MAC Address
Purpose of MAC Addresses�
1. Uniqueness: Identifies devices on a network uniquely, preventing data collisions and ensuring correct data delivery.
2. Data Link Layer Communication: Facilitates communication between devices within the same local network by providing a way to address frames.
3. Network Management: Allows network administrators to manage devices, troubleshoot connectivity issues, and implement network policies.
MAC Addressing in Networking Protocols
1. Ethernet
2. Wi-Fi (Wireless LAN)
MAC addressing plays an essential role in wireless networks. Each device connects to access points using its MAC address. Wireless protocols, such as IEEE 802.11, leverage MAC addresses for the following:
3. ARP (Address Resolution Protocol)
When a device wants to communicate with another device using IP addresses, it needs to know the MAC address corresponding to the IP. ARP performs this function:
Importance of MAC Addresses in Network Security�
MAC addresses can be crucial in constructing network security policies. Some common applications include:
1. MAC Filtering
Network devices, especially Wi-Fi access points, can enforce security by allowing or denying access based on MAC addresses. This practice involves:
2. Intrusion Detection and Prevention
Since MAC addresses are fixed identifiers, anomaly detection systems can monitor traffic for unusual patterns, based on known MAC addresses.
3. Tracking and Management
Organizations can track devices connected to their networks and maintain records based on MAC addresses for auditing and compliance purposes.
Limitations of MAC Addresses
While MAC addresses have their advantages, they also present some limitations:
Thank You