Coconote
AI notes
AI voice & video notes
Try for free
🔗
Overview of MAC Addresses in Networking
Apr 23, 2025
📄
View transcript
🤓
Take quiz
Lecture Notes: Understanding MAC Addresses in Networking
What is a MAC Address?
MAC
stands for
Media Access Control
.
It's the hardware address of the Ethernet adapter in a device.
Unique Identifier
: Each MAC address is unique to ensure that information is sent specifically to the intended device.
Format of a MAC Address
Length
: 48 bits or 6 bytes long.
Display Format
: Typically shown in hexadecimal (e.g.,
8C:2D:AA:4B:98:A7
).
Delimiters
: Bytes separated by colons, periods, or other delimiters.
Structure of a MAC Address
First 3 Bytes (OUI)
: Organizationally Unique Identifier, indicating the manufacturer of the network adapter.
Last 3 Bytes
: Network Interface Controller specific value, similar to a serial number.
Storage
: Stored in the ROM of the network adapter, often referred to as the "burned-in address."
Role of MAC Addresses in Networking
Ethernet Switching
: Utilizes MAC addresses to forward information to the correct device.
MAC Address Table
: Switches keep a temporary table of MAC addresses and their associated interfaces.
Learning and Aging Process
Learning
: Switches learn MAC addresses from inbound traffic and store them in a table.
Example: If a new MAC address is detected, it is added to the MAC address table.
Aging
: MAC addresses have a limited storage time (e.g., 5 minutes) and need to be re-learned if not used.
Scenario Example
Sam's Device
: Sends data with source MAC
1:111111111
.
SGC Server
: Destination MAC
1:55555555
.
Switch Behavior
: Updates MAC address table with new source and destination MAC addresses.
Challenges with MAC Address Tables
Limited Capacity
: Only a certain number of MAC addresses can be stored.
MAC Flooding Attack
:
Attackers can fill the MAC address table with false entries.
Causes the switch to behave like a hub, broadcasting all incoming frames to all interfaces.
Countermeasures
Port Security Configurations
: Used in modern switches to limit flooding capabilities and enhance security.
📄
Full transcript