What You Should Know about MAC and IP Addresses

August 1, 2016 | Views: 12749

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

MAC and IP addresses are two important topics that a person involved in the Computer Networking  and Computer Security fields should know about.

These topics are discussed below.

 

1.MAC Address

A MAC address is a address that is burned into the hardware itself during the manufacturing period and it cannot be changed. MAC addresses are 48 bits. Ex: 01:23:45:67:89:ab.

Here, each byte is represented by its hexadecimal value. The first 3 bytes (in this case “01:23:45”) are known as Organizational Unique Identifier, which gives the identity of the organization that the MAC address/device belongs to. For Ex: the OUI “01:23:45” may belong to a company called X. The IEEE assigns OUI to vendors. The remaining 3 bytes will uniquely identify the device itself. No two devices will have the same MAC address. MAC addresses are also known as physical addresses/Ethernet Hardware Address (EHA)/Burned In Address (BIA).

 

2. IP Address

While MAC addresses are physical, IP addresses are logical. Devices on a different network can, and most likely will, have the same IP address. IP address are of 32 bits. Ex 192.168.5.1. There are different classes of IP’s.

Class A = 1 – 126

Class B = 128 – 191  # 127 is used as loopback address

Class C = 192 – 223

Class D = 224 – 239

Class E = 240 – 254

The IP address contains network and host bits which are separated using subnet masks. For Ex: an IP address 192.168.5.1 has subnet mask of 255.255.255.0. For basic understanding, the octet whose value is 255 can be considered as network bits. Here, 192.168.5, is the network bit, which identifies a network where as .1 is the host bit that identifies a host.

 

A Technique To Remember

Consider a school, which has many classrooms. Each classroom has many students with their own Roll numbers. OH! And, also none of the students have same name.

Each class can have Roll numbers which another class may also have.

Consider the school as internet, each classroom as a network, the roll number as an IP address and the individual student’s name as a MAC address.

Note: A MAC address is used only on a LAN and operates on layer 2 of the of  the OSI model. IP address is used for routing and operates on layer 3 of OSI model.

 

More information:

OSI: https://en.wikipedia.org/wiki/OSI_model

IP: https://tools.ietf.org/html/rfc791

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
30 Comments
  1. can the owner use this MAC address to locate his lost laptop?

  2. if I have a laptop where do I find my MAC address, and someone use this mac address to locate his lost pc?

  3. local host i.e. you machine will always have the IP address of 127.0.0.1, meaning that 127.0.0.1 will always point to the same machine itself. so yeah.
    Think of 127.0.0.1 as the word ‘me’ in real life. No matter who uses it, it will always point to the same person using it.
    For ex: A person name is Jack. Then when jack himself would ask your question it would be:
    “Is me and jack same ? “. And yes they are same thing
    .

  4. local host i.e. you machine will always have the IP address of 127.0.0.1, meaning that 127.0.0.1 will always point to the same machine itself. so yeah.
    Think of 127.0.0.1 as the word ‘me’ in real life. No matter who uses it, it will always point to the same person using it.
    For ex: A person name is Jack. Then when jack himself would ask your question it would be:
    “Is me and jack same ? “. And yes they are same.

  5. I am not sure but just want to know, are loopback address and localhost same?

Page 3 of 4«1234»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 211 / December 14, 2019
How do I Get MTA Certified?
Views: 820 / December 12, 2019
How much does your PAM software really cost?
Views: 1272 / December 10, 2019
How Do I Get into Android Development?
Views: 1650 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel