What You Should Know about MAC and IP Addresses

August 1, 2016 | Views: 12651

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

MAC and IP addresses are two important topics that a person involved in the Computer Networking  and Computer Security fields should know about.

These topics are discussed below.

 

1.MAC Address

A MAC address is a address that is burned into the hardware itself during the manufacturing period and it cannot be changed. MAC addresses are 48 bits. Ex: 01:23:45:67:89:ab.

Here, each byte is represented by its hexadecimal value. The first 3 bytes (in this case “01:23:45”) are known as Organizational Unique Identifier, which gives the identity of the organization that the MAC address/device belongs to. For Ex: the OUI “01:23:45” may belong to a company called X. The IEEE assigns OUI to vendors. The remaining 3 bytes will uniquely identify the device itself. No two devices will have the same MAC address. MAC addresses are also known as physical addresses/Ethernet Hardware Address (EHA)/Burned In Address (BIA).

 

2. IP Address

While MAC addresses are physical, IP addresses are logical. Devices on a different network can, and most likely will, have the same IP address. IP address are of 32 bits. Ex 192.168.5.1. There are different classes of IP’s.

Class A = 1 – 126

Class B = 128 – 191  # 127 is used as loopback address

Class C = 192 – 223

Class D = 224 – 239

Class E = 240 – 254

The IP address contains network and host bits which are separated using subnet masks. For Ex: an IP address 192.168.5.1 has subnet mask of 255.255.255.0. For basic understanding, the octet whose value is 255 can be considered as network bits. Here, 192.168.5, is the network bit, which identifies a network where as .1 is the host bit that identifies a host.

 

A Technique To Remember

Consider a school, which has many classrooms. Each classroom has many students with their own Roll numbers. OH! And, also none of the students have same name.

Each class can have Roll numbers which another class may also have.

Consider the school as internet, each classroom as a network, the roll number as an IP address and the individual student’s name as a MAC address.

Note: A MAC address is used only on a LAN and operates on layer 2 of the of  the OSI model. IP address is used for routing and operates on layer 3 of OSI model.

 

More information:

OSI: https://en.wikipedia.org/wiki/OSI_model

IP: https://tools.ietf.org/html/rfc791

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
30 Comments
  1. What is a loopback address?

    • Consider it as a special ip addressed determined for testing and other more complex stuff. That ip address is used to communicate to your network card. The full ip is 127.0.0.1.

    • If your network connection is down, trying to ping the loopback address i.e 127.0.0.1 will help you determine if the problem is in your system or not.

    • It’s basically the address of your own computer, so when you try and ping 127.0.0.1, it will turn around and ping itself, may be that’s why it is called LOOPBACK address

  2. good job sathi!!!!

  3. “A MAC address is a address that is burned into the hardware itself during the manufacturing period and it cannot be changed. MAC addresses are 48 bits. Ex: . 01:23:45:67:89:ab.”
    It has nothing to do with any specific manufacturer.

  4. i’m pretty sure Class A is 0-127, whereas 127.0.0.1 is loohttps://www.cybrary.it/0p3n/know-mac-ip-addresses/#commentspback…

  5. Earlier, MAC address can not changed.
    But now you can change MAC address.
    Please read:
    https://en.wikibooks.org/wiki/Changing_Your_MAC_Address/Linux

Page 2 of 4«1234»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel