LLMpediaThe first transparent, open encyclopedia generated by LLMs

MAC address

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: EtherNet/IP Hop 5
Expansion Funnel Raw 76 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted76
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
MAC address
NameMedia Access Control address
AbbreviationMAC
TypeIdentifier
Developed1980s
Used forNetwork interface identification

MAC address A MAC address is a hardware identifier assigned to network interfaces for communications on a physical network segment. It is used by technologies such as Ethernet, Wi‑Fi, Token Ring and Bluetooth for frame delivery and device identification within local networks. Standards bodies like the Institute of Electrical and Electronics Engineers, the Internet Engineering Task Force and the International Organization for Standardization define formats and allocation policies that manufacturers and network operators follow.

Overview

A MAC address is a layer‑2 identifier used in IEEE 802 networks including Ethernet, Wi‑Fi, Bluetooth and Token Ring to enable frame forwarding and device recognition. Hardware vendors such as Intel, Cisco Systems, Broadcom and Qualcomm typically program addresses during manufacturing according to allocation lists maintained by the Institute of Electrical and Electronics Engineers and registries operated by the IEEE Registration Authority. Protocol suites such as Internet Protocol, Address Resolution Protocol, ARP and Neighbor Discovery Protocol interact with MAC addresses to deliver packets within local segments, while higher‑level suites like Transmission Control Protocol and User Datagram Protocol rely on these lower layers for end‑to‑end communication. Regulatory and standards frameworks from organizations including the International Organization for Standardization and the International Electrotechnical Commission influence the long‑term evolution of addressing schemes.

Format and Addressing

MAC addresses are typically represented as six octets (48 bits) written in hexadecimal with separators; extended formats include 64‑bit (EUI‑64) identifiers standardized by the IEEE Standards Association. The address space is partitioned with an Organizationally Unique Identifier assigned to vendors and manufacturers such as Apple Inc., Samsung, HP Inc. and Dell Technologies, while the remaining bits serve as a device identifier. Address fields include flags such as the universally/local administered bit and the multicast/unicast bit defined in IEEE 802 specifications; these bits affect behaviour in link‑layer switching elements from vendors like Juniper Networks and Arista Networks. Allocation rules and representations vary across protocols and implementations in systems by Microsoft, Google, Apple Inc. and open‑source projects like Linux.

Allocation and Assignment

The IEEE Registration Authority assigns blocks of addresses to manufacturers and organizations including large producers like Hewlett-Packard, Sony, LG Electronics and module suppliers serving Qualcomm and Broadcom. Manufacturers program addresses at production, and virtualized environments provided by VMware, Docker, Kubernetes and Hyper‑V may assign software‑level addresses or remap hardware identifiers. Enterprises and service providers such as AT&T, Verizon Communications, Deutsche Telekom and Vodafone operate infrastructure where MAC addresses are used for access control and device tracking; policies are frequently reflected in firmware from companies like Realtek and Marvell Technology Group. Research projects at institutions like Massachusetts Institute of Technology, Stanford University and ETH Zurich have examined allocation fairness, exhaustion risks and techniques like address aggregation.

Operation and Use in Networking

Switches, hubs and bridges from vendors such as Cisco Systems, Arista Networks and Huawei use MAC addresses to build forwarding tables and perform frame switching on LANs deployed in campuses, data centers and carrier networks. Protocols like Spanning Tree Protocol, Link Layer Discovery Protocol and Virtual LAN tagging rely on MAC semantics to maintain topology information across equipment from Dell Technologies and Extreme Networks. Wireless access points and controllers from Ubiquiti Networks, Ruckus Wireless and Cisco Meraki map radio client MACs to authentication systems such as RADIUS, 802.1X and captive portal solutions used by organizations including IKEA and Starbucks. In routing contexts, devices translating between IEEE 802 and Internet Protocol spaces use mechanisms like ARP caches on hosts running Linux, Microsoft Windows or FreeBSD.

Security and Privacy Considerations

Because MAC addresses are persistent hardware identifiers, they have been used in tracking and profiling in public spaces, prompting mitigation measures in mobile platforms from Apple Inc., Google and Microsoft that implement randomized addressing and privacy features. Network security appliances and systems from Palo Alto Networks, Fortinet and Checkpoint Software Technologies use MAC filtering, port security and anomaly detection, but attackers employing techniques described in research from Carnegie Mellon University and University of Cambridge can spoof or change addresses to bypass controls. Regulations and standards from agencies like the European Commission and the Federal Communications Commission intersect with privacy engineering choices made by manufacturers and service providers, while academic work at University of California, Berkeley and Princeton University explores deanonymization risks and defenses.

Variants and Special-purpose MACs

Extended formats such as EUI‑64 and EUI‑48 are used in technologies specified by the IEEE Standards Association and adopted in protocols like IPv6 stateless address autoconfiguration; vendors including Cisco Systems and Juniper Networks implement these in routers and switches. Reserved ranges exist for multicast, broadcast and locally administered addresses used in virtualization platforms from VMware and container systems by Docker; test and documentation examples are defined by standards committees. Specialized identifiers appear in industrial ecosystems served by Siemens, Schneider Electric and Rockwell Automation where deterministic addressing supports protocols like PROFINET and EtherCAT deployed in manufacturing, energy and transportation projects by organizations such as Siemens Mobility and Alstom.

Category:Computer networking