MAC address – Wikipedia, the free encyclopedia
This article is about the network addressing term. For the series of personal computers by Apple Inc., see Macintosh. For other similar terms, see Mac.
A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. Logically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are stored in its hardware, such as the card's read-only memory or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. This can be contrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address.
A network node may have multiple NICs and each NIC must have a unique MAC address.
MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names EUI-48[1] and EUI-64,[2] in which EUI is an abbreviation for Extended Unique Identifier.
The standard (IEEE 802) format for printing MAC-48 addresses in human-friendly form is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:), in transmission order (e.g. 01-23-45-67-89-ab or 01:23:45:67:89:ab ). This form is also commonly used for EUI-64. Another convention used by networking equipment uses three groups of four hexadecimal digits separated by dots (.) (e.g. 0123.4567.89ab ), again in transmission order.[3]
The original IEEE 802 MAC address comes from the original Xerox Ethernet addressing scheme.[4] This 48-bit address space contains potentially 248 or 281,474,976,710,656 possible MAC addresses.
All three numbering systems use the same format and differ only in the length of the identifier. Addresses can either be universally administered addresses or locally administered addresses. A universally administered address is uniquely assigned to a device by its manufacturer. The first three octets (in transmission order) identify the organization that issued the identifier and are known as the Organizationally Unique Identifier (OUI).[5] The following three (MAC-48 and EUI-48) or five (EUI-64) octets are assigned by that organization in nearly any manner they please, subject to the constraint of uniqueness. The IEEE has a target lifetime of 100 years for applications using MAC-48 space, but encourages adoption of EUI-64s instead.[5] A locally administered address is assigned to a device by a network administrator, overriding the burned-in address. Locally administered addresses do not contain OUIs.
Universally administered and locally administered addresses are distinguished by setting the second-least-significant bit of the most significant byte of the address. This bit is also referred to as the U/L bit, short for Universal/Local, which identifies how the address is administered. If the bit is 0, the address is universally administered. If it is 1, the address is locally administered. In the example address 06-00-00-00-00-00 the most significant byte is 06 (hex), the binary form of which is 00000110, where the second-least-significant bit is 1. Therefore, it is a locally administered address.[6] Consequently, this bit is 0 in all OUIs.
If the least significant bit of the most significant octet of an address is set to 0 (zero), the frame is meant to reach only one receiving NIC.[7] This type of transmission is called unicast. A unicast frame is transmitted to all nodes within the collision domain, which typically ends at the nearest network switch or router. A switch will forward a unicast frame through all of its ports (except for the port that originated the frame) if the switch has no knowledge of which port leads to that MAC address, or just to the proper port if it does have knowledge.[8][not in citation given] Only the node with the matching hardware MAC address will accept the frame; network frames with non-matching MAC-addresses are ignored, unless the device is in promiscuous mode.
If the least significant bit of the most significant address octet is set to 1, the frame will still be sent only once; however, NICs will choose to accept it based on criteria other than the matching of a MAC address: for example, based on a configurable list of accepted multicast MAC addresses. This is called multicast addressing.
The following technologies use the MAC-48 identifier format:
Every device that connects to an IEEE 802 network (such as Ethernet and WiFi) has a MAC-48 address.[9] Common consumer devices to use MAC-48 include every PC, smartphone or tablet computer.
The distinction between EUI-48 and MAC-48 identifiers is purely nominal: MAC-48 is used for network hardware; EUI-48 is used to identify other devices and software. (Thus, by definition, an EUI-48 is not in fact a "MAC address", although it is syntactically indistinguishable from one and assigned from the same numbering space.)
The IEEE now considers the label MAC-48 to be an obsolete term, previously used to refer to a specific type of EUI-48 identifier used to address hardware interfaces within existing 802-based networking applications, and thus not to be used in the future. Instead, the proprietary term EUI-48 should be used for this purpose.
EUI-64 identifiers are used in:
The IEEE has built in several special address types to allow more than one network interface card to be addressed at one time:
These are all examples of group addresses, as opposed to individual addresses; the least significant bit of the first octet of a MAC address distinguishes individual addresses from group addresses. That bit is set to 0 in individual addresses and set to 1 in group addresses. Group addresses, like individual addresses, can be universally administered or locally administered.
In addition, the EUI-64 numbering system encompasses both MAC-48 and EUI-48 identifiers by a simple translation mechanism.[10] To convert a MAC-48 into an EUI-64, copy the OUI, append the two octets FF-FF and then copy the organization-specified extension identifier. To convert an EUI-48 into an EUI-64, the same process is used, but the sequence inserted is FF-FE. In both cases, the process can be trivially reversed when necessary. Organizations issuing EUI-64s are cautioned against issuing identifiers that could be confused with these forms. The IEEE policy is to discourage new uses of 48-bit identifiers in favor of the EUI-64 system. IPv6 one of the most prominent standards that uses a Modified EUI-64 treats MAC-48 as EUI-48 instead (as it is chosen from the same address pool) and toggles the U/L bit (as this makes it easier to type locally assigned IPv6 addresses based on the Modified EUI-64). This results in extending MAC addresses (such as IEEE 802 MAC address) to Modified EUI-64 using only FF-FE (and never FF-FF) and with the U/L bit inverted.[11]
An Individual Address Block is a 24-bit OUI managed by the IEEE Registration Authority, followed by 12 IEEE-provided bits (identifying the organization), and 12 bits for the owner to assign to individual devices. An IAB is ideal for organizations requiring fewer than 4097 unique 48-bit numbers (EUI-48).[12]
Although intended to be a permanent and globally unique identification, it is possible to change the MAC address on most modern hardware. Changing MAC addresses is necessary in network virtualization. It can also be used in the process of exploiting security vulnerabilities. This is called MAC spoofing.
A host cannot determine from the MAC address of another host whether that host is on the same link (network segment) as the sending host, or on a network segment bridged to that network segment.
In IP networks, the MAC address of an interface can be queried given the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4 (IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. In this way, ARP or NDP is used to translate IP addresses (OSI layer 3) into Ethernet MAC addresses (OSI layer 2). On broadcast networks, such as Ethernet, the MAC address uniquely identifies each node on that segment and allows frames to be marked for specific hosts. It thus forms the basis of most of the link layer (OSI Layer 2) networking upon which upper layer protocols rely to produce complex, functioning networks.
According to Edward Snowden, the National Security Agency has a system that tracks the movements of everyone in a city by monitoring the MAC addresses of their electronic devices.[13] As a result of users being trackable by their devices' MAC addresses, Apple Inc. has started using random MAC addresses in their iOS line of devices while scanning for networks.[14] If random MAC addresses are not used, researchers have confirmed that it is possible to link a real identity to a particular wireless MAC address.[15]
Layer 2 switches use MAC addresses to restrict packet transmission to the intended recipient. However, the effect is not immediate.
The standard notation, also called canonical format, for MAC addresses is written in transmission bit order with the least significant bit transmitted first, as seen in the output of the iproute2/ifconfig/ipconfig command, for example.
However, since IEEE 802.3 (Ethernet) and IEEE 802.4 (Token Bus) send the bytes (octets) over the wire, left-to-right, with least significant bit in each byte first, while IEEE 802.5 (Token Ring) and IEEE 802.6 send the bytes over the wire with the most significant bit first, confusion may arise when an address in the latter scenario is represented with bits reversed from the canonical representation. For example, an address in canonical form 12-34-56-78-9A-BC would be transmitted over the wire as bits 01001000 00101100 01101010 00011110 01011001 00111101 in the standard transmission order (least significant bit first). But for Token Ring networks, it would be transmitted as bits 00010010 00110100 01010110 01111000 10011010 10111100 in most-significant-bit first order. The latter might be incorrectly displayed as 48-2C-6A-1E-59-3D. This is referred to as bit-reversed order, non-canonical form, MSB format, IBM format, or Token Ring format, as explained in RFC 2469. Canonical form is generally preferred, and used by all modern implementations.
When the first switches supporting both Token Ring and Ethernet came out, some did not distinguish between canonical form and non-canonical form and so did not reverse MAC address bits as required. This led to cases of duplicate MAC addresses in the field.[citation needed]
Continue reading here:
MAC address - Wikipedia, the free encyclopedia
- The Rich Control the Media: Whining Is Not a Strategy - cepr.net - December 22nd, 2025 [December 22nd, 2025]
- The UK needs some media free of US control: Comcasts move for ITV starts to focus minds - The Guardian - December 16th, 2025 [December 16th, 2025]
- Scotland Office in 'Pravda-style bid to control media' with order to journalists - TheNational.scot - December 12th, 2025 [December 12th, 2025]
- Is there an alternative to Big Techs control of the social media space? - LSE Review of Books - The London School of Economics and Political Science - December 12th, 2025 [December 12th, 2025]
- Media-Ownership Reforms Are Key to Limiting Network Control - TVTechnology - December 10th, 2025 [December 10th, 2025]
- As local media scrutiny withers, message control flourishes - bayobserver.ca - December 4th, 2025 [December 4th, 2025]
- Russia Boosts Propaganda Spending and Media Control in Occupied Regions 2026 - - December 2nd, 2025 [December 2nd, 2025]
- Creative Media Specializes in Lighting Control Installation in Alpharetta and Brookhaven, Georgia - Markets Financial Content - December 2nd, 2025 [December 2nd, 2025]
- Media: US plan suggests Russia will pay rent for control of Donbas - Apa.az - November 20th, 2025 [November 20th, 2025]
- Means of True Information Being Blocked: Sibal on 100th Episode of 'Dil Se' - The Quint - November 16th, 2025 [November 16th, 2025]
- Israel Approves First Reading of Death Penalty and Media Control Bills - ynews.digital - November 16th, 2025 [November 16th, 2025]
- Media Spinning Out of Control Again on Off-Year Elections - AMAC - November 16th, 2025 [November 16th, 2025]
- Netanyahu's Government Moves to Stifle Journalism and Take Control of the Israeli Media - Haaretz - November 7th, 2025 [November 7th, 2025]
- Media bill wont give government direct editorial control, but risks putting press in biased, moneyed hands - The Times of Israel - November 5th, 2025 [November 5th, 2025]
- Likud ministers contentious media regulation bill passes first reading in Knesset - The Times of Israel - November 5th, 2025 [November 5th, 2025]
- From CBS to TikTok, US media are falling to Trumps allies. This is how democracy crumbles | Owen Jones - The Guardian - October 31st, 2025 [October 31st, 2025]
- Denmark reportedly withdraws Chat Control proposal following controversy - therecord.media - October 31st, 2025 [October 31st, 2025]
- Opinion | Crypto and Trump Corrupted America - The New York Times - October 26th, 2025 [October 26th, 2025]
- After internal struggle, Colorados Libertarians look to pivot. It could impact Congress. - The Denver Post - October 26th, 2025 [October 26th, 2025]
- Argentina goes to polls amid economic crisis and Trump interference - The Guardian - October 26th, 2025 [October 26th, 2025]
- Five things to know about Argentina's pivotal midterm election - Purdue Exponent - October 26th, 2025 [October 26th, 2025]
- Milei promised to drain Argentinas swamp. Now hes sinki... - The Observer - October 26th, 2025 [October 26th, 2025]
- After Tunisian shipwreck kills 40, archbishop urges world to tackle migration crisis - Catholic News Agency - October 26th, 2025 [October 26th, 2025]
- Migrant prison farce proves the system is out of control - The Telegraph - October 26th, 2025 [October 26th, 2025]
- Labour blasted as 'too weak' to deport small boat migrants while pressure mounts on Keir Starmer to adopt Rwanda-style plan - GB News - October 26th, 2025 [October 26th, 2025]
- France backing away from pledge to intercept migrant boats, sources tell BBC - BBC - October 26th, 2025 [October 26th, 2025]
- Migrants abandon children on Spanish holidays so they can claim asylum - The Telegraph - October 26th, 2025 [October 26th, 2025]
- Ireland is making a dangerous mistake on immigration - The Telegraph - October 26th, 2025 [October 26th, 2025]
- Migrant sent back to France in one in, one out deal returns to UK - The Independent - October 26th, 2025 [October 26th, 2025]
- Syrian migrant with 'deep voice and receding grey hair' is ruled to be a child - GB News - October 26th, 2025 [October 26th, 2025]
- Stop lecturing migrant hotel protesters, Dublin is more proof of this total betrayal - Adam Brooks - GB News - October 26th, 2025 [October 26th, 2025]
- 'It's a FARCE!' Tom Harwood up in arms while Labour 'takes the mickey' with 'one in, one out' scheme - GB News - October 26th, 2025 [October 26th, 2025]
- Secret report reveals Home Office culture of defeatism on migration - The Telegraph - October 26th, 2025 [October 26th, 2025]
- Lammy: Catching migrant shows one in, one out is working - The Telegraph - October 26th, 2025 [October 26th, 2025]
- Migrant guilty of murdering woman with screwdriver - The Telegraph - October 26th, 2025 [October 26th, 2025]
- If UK controlled its own borders, killer illegal migrant would never have been here - Rakib Ehsan - GB News - October 26th, 2025 [October 26th, 2025]
- Mark White's Migration Monitor: The small boats farce continues - and the next act looks even darker - GB News - October 26th, 2025 [October 26th, 2025]
- Epping migrant STILL on the loose as David Lammy admits Ethiopian sex offender is 'at large in London' - GB News - October 26th, 2025 [October 26th, 2025]
- Cal State Invited Tech Companies to Remake Learning With A.I. - The New York Times - October 26th, 2025 [October 26th, 2025]
- Artificial intelligence (AI) - The Guardian - October 26th, 2025 [October 26th, 2025]
- Banking and Finance Symposium to Address AI, Technology Issues - University of Mississippi | Ole Miss - October 26th, 2025 [October 26th, 2025]
- AI Is Even Putting Animal Actors Out of Work - Futurism - October 26th, 2025 [October 26th, 2025]
- Impacts of artificial intelligence (AI) in teaching and learning of built environment students in a developing country - Taylor & Francis Online - October 26th, 2025 [October 26th, 2025]
- 3 Top Artificial Intelligence (AI) Stocks Ready for a Bull Run - The Motley Fool - October 26th, 2025 [October 26th, 2025]
- Israel playing catch-up in AI after two years of war - JNS.org - October 26th, 2025 [October 26th, 2025]
- Why Analysts See Alibabas Growth Story Changing With Cloud and AI Driving New Optimism - Yahoo Finance - October 26th, 2025 [October 26th, 2025]
- The AI Bubble Is Poised to Burst, Yet the Next One Is in the Works - 36Kr - October 26th, 2025 [October 26th, 2025]
- Beyond Chips: AI Infrastructure Spending Is Projected to Hit $490 Billion -- Who Benefits Most? - Yahoo Finance - October 26th, 2025 [October 26th, 2025]
- Jordan to lead MSUs AI efforts in new role, Willard named interim VP for research, economic development - Mississippi State University - October 26th, 2025 [October 26th, 2025]
- Artificial Intelligence and Medical Translation: An Editorial on the Ethical Considerations for Emerging Technologies in Dermatology - Cureus - October 26th, 2025 [October 26th, 2025]
- Scientists spent years teaching a robot to play sports. It's still terrible - BBC Science Focus Magazine - October 26th, 2025 [October 26th, 2025]
- There is no life: Kupiansks slow demise reflects the fate of cities on Ukraines frontline - The Guardian - October 26th, 2025 [October 26th, 2025]
- Ukraines Coalition of the Willing Has the Wind at Its Back - The New York Times - October 26th, 2025 [October 26th, 2025]
- Russia arrests Ukrainian biologist for backing curbs on Antarctic krill fishing - The Guardian - October 26th, 2025 [October 26th, 2025]
- Six metres below ground: inside the secret hospital treating Ukrainian soldiers injured by Russian drones - The Guardian - October 26th, 2025 [October 26th, 2025]
- Jet-powered bombs and planes-turned-missiles: Ukrainian and Russian militaries improvise and adapt in a battle of wits - CNN - October 26th, 2025 [October 26th, 2025]
- 3 Years Ago It Was a Casting Agency. Now It Has $1 Billion in Drone Contracts. - The New York Times - October 26th, 2025 [October 26th, 2025]
- Russia targets Kyiv with drones, killing 3 and wounding 29 - ABC News - Breaking News, Latest News and Videos - October 26th, 2025 [October 26th, 2025]
- More than Tomahawks: what Ukraines soldiers say they actually need - The Kyiv Independent - October 26th, 2025 [October 26th, 2025]
- Ukraines ingenuity alone will not be enough to win the war - The Independent - October 26th, 2025 [October 26th, 2025]
- After War Turned Their Fields Into Frontlines, Ukraines Farmers Return to Reclaim Them - UNITED24 Media - October 26th, 2025 [October 26th, 2025]
- Turkey urges US to act after accusing Israel of breaching Gaza ceasefire - Sky News - October 26th, 2025 [October 26th, 2025]
- President Erdoan visits Oman, his last stopover in the Gulf | Daily Sabah - Daily Sabah - October 26th, 2025 [October 26th, 2025]
- Erdoan to meet with DEM Party delegation on terror-free process | Daily Sabah - Daily Sabah - October 26th, 2025 [October 26th, 2025]
- Erdoan renews call for UN reform over Gaza in 80th anniversary message | Daily Sabah - Daily Sabah - October 26th, 2025 [October 26th, 2025]
- Foreign media: Russia reiterated its stance on full control of Donbas to the US last weekend - Bitget - October 23rd, 2025 [October 23rd, 2025]
- Health Ministry and PAHO Host Media Session on Upcoming National Tobacco Control Bill - Love FM Belize - October 19th, 2025 [October 19th, 2025]
- Ask Lucas: My teens social media obsession is out of control - Cleveland.com - October 17th, 2025 [October 17th, 2025]
- Molding the Message - China Media Project - October 17th, 2025 [October 17th, 2025]
- From clicks to curation: How publishers can reclaim control of the media ecosystem - Digiday - October 15th, 2025 [October 15th, 2025]
- Orbans Propaganda State in Hungary Is Starting to Show Cracks - The New York Times - October 15th, 2025 [October 15th, 2025]
- How Chioma Ikeh is helping small businesses take back control of their social media - Businessday NG - October 13th, 2025 [October 13th, 2025]
- Germany will not support 'Chat Control' message scanning in the EU - The Record from Recorded Future News - October 11th, 2025 [October 11th, 2025]
- Media: IDF will control 53% of Gaza in the first phase of the agreement - Baku.ws - October 11th, 2025 [October 11th, 2025]
- Rob Reiner Says U.S. Will Become an Autocracy if Trump Is Allowed to Control the Media and Commandeer the Election: We Have a Year to Stop Him -... - October 7th, 2025 [October 7th, 2025]
- Rob Reiner Warns Trump Wants "Control Of Media" To Steal 2026 Election - Deadline - October 7th, 2025 [October 7th, 2025]
- Move over Murdochs, the Ellisons are the new family dynasty shaking up US media - BBC - September 30th, 2025 [September 30th, 2025]
- How Trumps TikTok Deal Could Change the Future of US Media - TODAY.com - September 30th, 2025 [September 30th, 2025]
- Meghan Markles Media Battles: Control, Conflicts, and the Struggle for Credibility - vocal.media - September 28th, 2025 [September 28th, 2025]
- Trump announces deal to put TikTok under control of US investors - ABC News - Breaking News, Latest News and Videos - September 28th, 2025 [September 28th, 2025]