Fact-checked by Grok 2 weeks ago

MAC address

A MAC address, formally known as a Media Access Control address, is a unique 48-bit identifier permanently assigned to a (NIC) for communications within a physical at the OSI model's (Layer 2). This hardware-based address enables devices to recognize and exchange frames on local networks such as Ethernet or , distinguishing individual interfaces without relying on higher-layer protocols like addresses, which handle across networks. The standard format divides the 48 bits into two 24-bit halves: the first half comprises the (OUI), a code allocated by the IEEE to manufacturers for identifying the vendor of the , while the second half is a unique assigned by that manufacturer to the specific device. Typically represented in hexadecimal notation as six pairs of characters separated by colons or hyphens (e.g., 00:1A:2B:3C:4D:5E), MAC addresses are embedded in during manufacturing and are intended to be globally unique, though software can spoof them for certain applications. Unlike dynamic addresses, MAC addresses provide a stable, low-level foundation for protocols that manage contention and delivery in shared environments, underpinning technologies from wired LANs to standards like IEEE 802.11. While extensions exist for larger address spaces (e.g., EUI-64 for ), the 48-bit MAC-48 remains the dominant format, with IEEE overseeing assignments to prevent collisions and support scalability in expanding device ecosystems.

History

Origins and Early Development

The concept of the MAC address emerged from the early design of Ethernet, a technology developed at Xerox's Palo Alto Research Center (PARC) to interconnect computers using for high-speed data sharing. On May 22, 1973, engineer authored an internal memo outlining the potential for such a network, drawing inspiration from the system and emphasizing collision avoidance in shared media access. Collaborating with David Boggs, Metcalfe implemented the first experimental Ethernet system, which successfully transmitted packets between two computers on November 11, 1973, operating at 2.94 Mbps over 1 km of cable. Central to this prototype was a 48-bit hardware addressing scheme for uniquely identifying network interfaces, or "stations," on the bus , enabling frame delivery and supporting the with (CSMA/CD) protocol to manage contention. The choice of 48 bits provided scalability for millions of devices, with the structure allocating the first 24 bits for vendor-specific identifiers and the remainder for unique serial numbers, a division that facilitated global uniqueness without centralized coordination at the time. Early tests connected personal computers, demonstrating reliable packet transmission amid collisions, though initial speeds were limited by the prototype's custom interface boards. Further refinement occurred through iterative prototyping at PARC throughout the 1970s, incorporating error detection via cyclic redundancy checks and evolving the addressing to handle multicast and broadcast frames for efficient group communication. In 1979, Xerox formed the DIX alliance with Digital Equipment Corporation (DEC) and Intel to commercialize the technology, culminating in the Ethernet Specification Version 1.0 released in September 1980, which standardized the 48-bit "physical station address" at 10 Mbps over thick coaxial cable. This version retained the core addressing mechanism from PARC's work, emphasizing burned-in, non-routable identifiers tied to the physical layer for low-level medium access control.

IEEE Standardization

The IEEE 802 Local and Metropolitan Area Networks Standards Committee was formed in February 1980 to develop interoperable standards for and physical layers in LANs and MANs, including the addressing mechanisms that became known as MAC addresses. This effort built upon the 48-bit physical address format from the earlier DIX Ethernet specification (1980) by , , and , adapting it for the MAC sublayer of the reference model. The committee's work emphasized ensuring address uniqueness to support collision-free communication in shared media environments. IEEE Std 802.3, the first standard incorporating the 48-bit address for Ethernet, was approved on June 8, 1983, by the committee. This standard specified 48-bit destination and source addresses within Ethernet frames, transmitted least significant bit first (little-endian octet order), with the first 24 bits reserved for manufacturer-assigned identifiers to guarantee global uniqueness. Subsequent standards, such as IEEE Std 802.11 for wireless LANs (initially published in 1997), extended the same 48-bit MAC format across diverse physical layers while maintaining compatibility. To administer assignments, the IEEE Registration Authority was established as part of the 802 standardization process, allocating 24-bit Organizationally Unique Identifiers (OUIs) to vendors for the first half of MAC addresses. This mechanism, operational from the early 1980s, prevents duplication by requiring vendors to register and incorporate OUIs into devices, with the remaining 24 bits vendor-specific. The IEEE later formalized the 48-bit structure as Extended Unique Identifier-48 (EUI-48) in standards like IEEE Std 802-2001, distinguishing universally administered (globally unique) from locally administered addresses via the second least significant bit of the first octet.

Evolution and Modern Extensions

Following the establishment of 48-bit MAC addresses (EUI-48) in early standards during the 1980s, subsequent developments addressed the need for longer identifiers in emerging protocols. The EUI-64 format emerged in the as an extension mechanism, concatenating a 24-bit (OUI) with a 40-bit extension or deriving it by inserting the fixed value 0xFFFE between the first three and last three octets of an EUI-48 while flipping the second-least significant bit of the first octet to indicate local scope. This format supported applications such as stateless address autoconfiguration (SLAAC), where the interface identifier portion of the could be generated from the MAC address. However, direct mapping from EUI-48 to EUI-64 has been deprecated since the mid-2010s in favor of distinct EUI-64 assignments by the to avoid unintended address generation and ensure proper uniqueness. In response to growing device densities and the limitations of universal address spaces in local networks, IEEE Std 802c, approved on August 25, 2017, amended the Overview and to define structured local MAC address pools. This standard designates ranges within the locally administered address space (second bit set to 1) for protocols using Company IDs (CIDs) assigned by the IEEE , enabling multiple independent administrations to manage unique local identifiers without collision risks across bridged domains. It specifies formats for administratively assigned individual (AAI) and group addresses, ensuring compatibility with existing IEEE 802 media while supporting scalability in environments like large-scale deployments. Privacy considerations have driven further extensions since the 2010s, as fixed MAC addresses enable persistent device tracking across networks via probe requests and association frames. To mitigate this, initiated the Randomized and Changing MAC Addresses (RCMAC) in 2016, leading to amendments that standardize temporary randomized addresses for unauthenticated scanning and probing, distinct from the stable interface MAC. Operating systems implemented these practices earlier; for instance, Apple introduced randomized MACs for scans in (released September 17, 2014) and (released September 20, 2016) when not associated with a network. Similar randomization, often rotating per session or network, became default in from version 10 (released September 3, 2019), reducing traceability while preserving network functionality through persistent identifiers for active connections. These changes prioritize causal unlinkability in transient interactions over static binding, though they complicate legacy reliant on fixed MACs.

Technical Structure

Format and Composition

A MAC address, designated as an EUI-48 or MAC-48 identifier in IEEE standards, comprises 48 bits organized into six octets. It is conventionally represented in format using 12 characters, divided into six pairs separated by colons or hyphens, such as 00:1A:2B:3C:4D:5E. This notation facilitates readability, with each pair corresponding to one octet. The structure allocates the first three octets (24 bits) to the (OUI), a code assigned by the IEEE to manufacturers for uniquely identifying their devices. The remaining three octets form the manufacturer-assigned portion, ensuring uniqueness within the vendor's product line. Within the first octet, specific bits define address properties: the least significant bit (bit 0, or I/G bit) distinguishes addresses (0) from group or addresses (1), while the second-least significant bit (bit 1, or U/L bit) indicates universally administered addresses (0, globally unique via IEEE) versus locally administered addresses (1, set by network administrators). These flags enable protocols to handle addressing modes appropriately in networks. Variations in representation exist, including dashed separators or no delimiters (e.g., 001A2B3C4D5E), but the IEEE recommends forms for , such as lowercase with colons in certain contexts like YANG data models. The bit ordering follows the standard octet transmission sequence in Ethernet frames, with the first octet sent first.

Organizationally Unique Identifier (OUI)

The is a 24-bit value assigned by the IEEE to uniquely identify an organization, such as a manufacturer or vendor of networking equipment. In the context of 48-bit addresses like MAC-48 or EUI-48, the OUI occupies the initial three octets, forming the prefix that distinguishes the assigning organization from others worldwide. The remaining 24 bits serve as an extension identifier, which the OUI assignee must allocate uniquely to individual devices or interfaces to ensure global address uniqueness. Assignment of an OUI occurs as part of a MAC Address Block Large (MA-L) registration, where organizations apply through the IEEE Registration Authority's online portal. The process requires payment of a one-time of US $3,480 for public listings, plus potential additional costs such as a US $200 fee, with applications typically processed within seven business days. Confidentiality for the assignment incurs an annual renewal of US $4,020. Once assigned, the OUI cannot be altered or reassigned by the holder, and extensions must conform to IEEE rules to avoid duplication, such as reserving specific bit patterns for group addresses or local use. This identifier underpins the hierarchical structure of MAC addresses in networks, enabling vendors to produce billions of unique device identifiers (2^24 per OUI) without overlap. Public OUI listings are maintained by the IEEE for lookup and verification, aiding in device identification and forensic analysis in networking. Extensions of the OUI concept, such as OUI-36 for smaller blocks, allow finer-grained assignments but retain the core 24-bit organizational prefix for compatibility.

Address Bits and Flags

A standard MAC address, also known as a MAC-48 or EUI-48 identifier, comprises 48 bits divided into six octets, with the first octet containing two key flag bits that define the address's scope and type. The least significant bit (bit 0) of this octet is the Individual/Group (I/G) bit: it is set to 0 for addresses targeting a single interface and to 1 for group addresses, which include addresses delivered to multiple interfaces or the (all bits set to 1) delivered to all interfaces on the local segment. The second least significant bit (bit 1) is the Universal/Local (U/L) bit, which distinguishes between globally administered addresses and locally administered ones: a value of 0 indicates a universal address assigned by the IEEE through its Registration Authority, ensuring uniqueness across manufacturers, while a 1 denotes a local address configured by network administrators, which may override the manufacturer-assigned identifier but risks collisions if not managed carefully within the local scope. For universal addresses (U/L=0), the upper 24 bits (including bits 2 through 7 of the first octet) form the Organizationally Unique Identifier (OUI), allocated to vendors by the IEEE, with the remaining 24 bits vendor-specific; setting the U/L bit to 1 allows reuse of the OUI space locally without global uniqueness guarantees. These flags enable efficient frame processing in networks: receiving interfaces can quickly filter frames based on the I/G bit before deeper inspection, and the U/L bit supports flexible address management in scenarios like or privacy-enhanced , where devices periodically change local MAC addresses to mitigate tracking. The combination of these bits reserves specific address spaces—for instance, universal unicast addresses occupy the quadrant where both bits are 0—while prohibiting certain patterns, such as universal group addresses with I/G=1 and U/L=0 in standard assignments to avoid conflicts with protocols.

Variations in Length and Form

The primary lengths for Extended Unique Identifiers (EUIs) used as MAC addresses are 48 bits for EUI-48 (also known as MAC-48) and 64 bits for EUI-64, as specified by the IEEE for unique network interface identification across its 802 standards family. EUI-48 consists of 6 octets (48 bits total), typically represented in hexadecimal as six pairs of digits separated by colons (e.g., 00:1A:2B:3C:4D:5E), providing a total of approximately 2^48 unique identifiers, with the first 24 bits allocated as the (OUI) and the remaining 24 bits for manufacturer-specific extensions. EUI-64 extends to 8 octets (64 bits), represented similarly in hexadecimal but with eight pairs (e.g., 02-1A-2B-FF-FE-3C-4D-5E), designed to support larger-scale networks and protocols requiring more identifiers, such as certain IEEE 802 wireless and personal area network standards beyond traditional Ethernet. This format often incorporates a 24-bit OUI followed by a 40-bit extension or, in derivation from EUI-48, inserts the fixed sequence FF:FE between the OUI-derived and device-specific portions while flipping the universal/local bit for compatibility with IPv6 interface identifiers per RFC 4291. IEEE recommends EUI-64 for new designs needing globally unique addresses to future-proof against exhaustion of the 48-bit space, though EUI-48 remains dominant in wired Ethernet (IEEE 802.3) deployments. Less common forms include EUI-60 (60 bits), allocated for specific high-capacity applications, but these are not widely adopted as standard MAC addresses in most networking protocols. Variations in form also encompass bit-level flags: the second-least significant bit of the first octet indicates (0, IEEE-assigned) versus local (1, administrator-assigned) , while the least significant bit distinguishes individual addresses (0) from group/ addresses (1), applicable to both lengths for ensuring uniqueness and scope in layer-2 communications. Transmission may use non-canonical bit ordering in some media (e.g., ), but canonical order (least significant bit first within each octet) is standard for representation and assignment.

Assignment and Administration

Global Assignment by IEEE

The IEEE Standards Association's administers the global assignment of MAC addresses, ensuring their uniqueness across worldwide networks through the allocation of address blocks to manufacturers and organizations. These assignments follow standards, where the first 24 bits of a 48-bit MAC address form the (OUI), uniquely identifying the assignee, while the remaining 24 bits are controlled by the assignee for device-specific identification. The process requires applicants to submit detailed applications specifying intended use, after which the Authority reviews and assigns identifiers from available pools, prohibiting applicant-specified values to maintain impartiality. Assignments are categorized by size to accommodate varying needs: MA-L for large blocks providing a full OUI with up to 2^24 individual EUI-48 addresses; MA-M for medium blocks offering subsets of addresses; and MA-S utilizing a 36-bit OUI-36 for smaller allocations, all usable as MAC, , or Ethernet addresses. Globally unique addresses are distinguished by the universal/local (U/L) bit set to 0 in the second least significant bit of the first octet, contrasting with locally administered addresses (U/L=1) managed independently. The public registry at the IEEE site lists assigned OUIs, enabling verification of vendor ownership and preventing duplication. This centralized mechanism, rooted in IEEE 802's framework since its inception in the early 1980s, mitigates address exhaustion by enforcing structured allocation and reserving ranges for special uses, such as (I/G bit=1). Assignees must adhere to guidelines on address usage, including extensions for group addresses, to preserve the integrity of the global namespace. Updates to assignment information require formal requests, ensuring ongoing accuracy in the registry.

Local and Group Address Management

Locally administered MAC addresses are distinguished from universally administered ones by the universal/local (U/L) bit, the second-least-significant bit in the first octet, which is set to 1 to indicate local assignment rather than global uniqueness enforced by the IEEE. These addresses are configured by network administrators or device software to override manufacturer-assigned (burned-in) addresses, commonly for virtual machines, containerized environments, or bridging multiple interfaces while maintaining local network compatibility. Unlike globally unique addresses, local ones require no registration with the and are intended for scope-limited uniqueness within a single administrative domain, such as a segment, to avoid address collisions in that context. Management of locally administered addresses emphasizes administrative responsibility for ensuring uniqueness and avoiding interference with global assignments, as duplication within a broadcast domain can lead to frame delivery failures or loops. The IEEE Std 802c-2017 amendment introduces the Structured Local Address Plan (SLAP), an optional framework partitioning the local address space into quadrants based on the initial octets (e.g., starting with 02-80-... for CID-based local or x2-xx-xx for semantically opaque local), enabling multiple local administrators to coexist without overlap by adhering to defined ranges and protocols for assignment. Protocols like DHCPv6 extensions in RFC 8948 support SLAP by allowing clients or relays to request preferred quadrants, facilitating automated or semi-automated local assignment while preserving collision avoidance. Administrators must verify configurations, such as through tools overriding NIC settings, and monitor for conflicts, particularly in environments with dynamic virtualization where multiple virtual interfaces share a host. Group MAC addresses, identified by the individual/group (I/G) bit—the least-significant bit in the first octet set to 1—designate multicast or broadcast frames for delivery to multiple recipients rather than a single unicast endpoint. Broadcast addresses, fixed as all-1s (FF:FF:FF:FF:FF:FF), flood frames to all stations in the broadcast domain, while multicast addresses (e.g., 01-00-5E-... for IPv4 mapping) target protocol-defined groups, with the IEEE reserving ranges like 01-80-C2-00-00-0x for spanning tree and other control protocols. Management involves protocol-specific allocation: for IP multicast, the lower 23 bits of the MAC derive from the IP address's lower 23 bits after mapping (dropping the first 4 bits of the IP), supporting up to 32 IP groups per MAC to conserve address space. In practice, group address management relies on network devices like switches implementing or MLD for to prune unnecessary floods, reducing bandwidth waste, while local administrators configure filters or VLANs to scope multicast domains and prevent leakage across segments. The IEEE maintains reserved group ranges to avoid conflicts with or local spaces, ensuring protocols like Ethernet bridging treat them distinctly for forwarding decisions. Both local and group addresses underscore the layered administration in networks, where global uniqueness yields to flexible, context-aware assignment under local control, provided implementers follow bit conventions and scope rules to maintain reliable Layer 2 operations.

Reserved Ranges and Special Cases

The first octet of a MAC address contains two significant bits: the individual/group (I/G) bit, which is the least significant bit (0 for /individual addresses, 1 for group//broadcast addresses), and the universal/local (U/L) bit, the second least significant bit (0 for universally administered addresses assigned by the IEEE , 1 for locally administered addresses managed by local network administrators without global uniqueness guarantees). These bits enable differentiation between address types, with universally administered addresses ensuring no duplication across manufacturers and locally administered ones allowing flexibility for virtual machines, temporary assignments, or testing while risking local collisions if not coordinated. The all-ones address (FF-FF-FF-FF-FF-FF) serves as the , a group address to which all devices on a respond, commonly used for protocols like requests. The all-zeros address (00-00-00-00-00-00) is generally reserved and invalid for transmission as a destination in Ethernet , though it may appear as a source in specific contexts like unspecified interfaces or simulations, but it does not correspond to a valid identifier. IEEE reserves specific multicast ranges within the group for standards-defined protocols, particularly the block 01-80-C2-00-00-00 to 01-80-C2-00-00-0F, which bridges do not forward to prevent unnecessary propagation of control traffic. Within this, addresses like 01-80-C2-00-00-00 designate the Bridge Group for and management protocols, while 01-80-C2-00-00-01 to 01-80-C2-00-00-04 handle control and slow protocols. Additional standard group addresses from 01-80-C2-00-00-10 onward support functions like provider bridge operations (e.g., 01-80-C2-00-00-08) and multiple registration (01-80-C2-00-00-0D), assigned permanently to standards or affiliates like ISO/IEC for . These reservations prioritize scarce resources for essential Layer 2 control, ensuring bridges filter them appropriately to maintain network efficiency.
AddressAssignee/StandardPurpose
01-80-C2-00-00-00/X/AE/AXBridge Group address (not forwarded by bridges)
01-80-C2-00-00-01MAC-specific control protocols
01-80-C2-00-00-02/AXSlow Protocols Multicast
01-80-C2-00-00-08Provider Bridge group
09-00-2B-00-00-04ISO 9542All End System Network Entities
Protocol-specific mappings constitute further special cases: IPv4 multicast addresses (224.0.0.0/4) map to the IEEE-assigned range 01-00-5E-00-00-00 to 01-00-5E-7F-FF-FF, where the OUI 01-00-5E is dedicated to IANA, and the remaining 23 bits derive from the IP address's low-order bits, accepting a 1:32 collision ratio due to bit truncation. multicast, particularly link-local (ff02::/16) and solicited-node addresses, uses the locally administered range 33-33-00-00-00-00 to 33-33-FF-FF-FF-FF, with the last 32 bits mirroring the address's final 32 bits for efficient neighbor discovery without global assignment. These mappings, while not universally administered OUIs, are standardized to avoid conflicts in mixed environments, though local administrators must avoid overlapping with custom group addresses.

IEEE 802c Local Usage Guidelines

IEEE Std 802c-2017, published on August 25, 2017, establishes guidelines for the usage of locally administered 48-bit addresses to enable structured assignment and coexistence of multiple address assignment protocols within local networks. These addresses, identified by setting the universal/local (U/L) bit to 1 in the first octet (resulting in second digits of 2, 6, A, or E), form the locally administered space, which constitutes half of the total 48-bit address pool. The standard introduces the Structured Local Address Plan (), an optional framework that subdivides this space into four quadrants based on two specific bits (Y and Z), facilitating disjoint address pools to prevent collisions among protocols from different administrations, such as standards, IETF protocols, or local network managers. SLAP designates the quadrants by the value of the second digit of the MAC address, ensuring that protocols can select ranges aligned with their assignment authority while maintaining global compatibility.
QuadrantSecond Hex DigitBinary (Y Z)Identifier TypeUsage DescriptionAvailable Bits for Identifier
002 (0010)00AAI (Administratively Assigned Identifier)Arbitrary assignment by local network administrators; protocols must ensure uniqueness within the scope.44 bits (~1.8 × 10¹³ addresses)
106 (0110)10ReservedIntended for future administrative use similar to AAI, but with potential reservations for specific protocols; currently available for local assignment with caution to avoid conflicts.44 bits
01A (1010)01 (Extended Local Identifier)Assigned using a 24-bit Company ID (CID) from the , providing ~16.8 million addresses per CID for protocols requiring structured local uniqueness.24 bits (CID) + 20 bits (extension)
11E (1110)11SAI (Standard Assigned Identifier)Reserved exclusively for protocols defined in standards, enabling large-scale assignments (up to 44 bits) without external coordination.44 bits (~1.8 × 10¹³ addresses)
Key guidelines emphasize ensuring address uniqueness within the operational domain: address assignment protocols must allocate from disjoint subspaces when multiple schemes coexist on the same , such as avoiding overlap between AAI and ranges. For , organizations obtain CIDs from the IEEE , analogous to OUIs for global addresses, to support vendor-specific local protocols. usage is restricted to IEEE 802-defined mechanisms, with ongoing work like IEEE P802.1CQ specifying protocols for assignment. Administrations employing AAI or the quadrant bear responsibility for collision avoidance, often through local scoping or techniques compliant with the standard. These provisions accommodate legacy uses (e.g., IETF or protocols) while promoting scalable, conflict-free local addressing in diverse network environments.

Applications in Networking

Role in Layer 2 Communications

Media Access Control (MAC) addresses function at the (Layer 2) of the , serving as hardware identifiers for network interfaces to enable direct communication between devices on the same local . In this layer, divided into the MAC sublayer for and addressing, and the Logical Link Control (LLC) sublayer for flow and error management, MAC addresses facilitate frame-level addressing without reliance on higher-layer protocols like IP. They are 48 bits long in standard Ethernet implementations, with the first 24 bits typically allocated as the (OUI) by the IEEE, ensuring global uniqueness for individual addresses while supporting local or group variants. In Ethernet frame transmission, the source MAC address identifies the sending device, while the destination MAC address specifies the recipient, allowing Layer 2 devices such as switches to process and forward frames based solely on local topology. Switches maintain a dynamic MAC address table (also known as a forwarding database), learned by inspecting the source MAC address of incoming frames and associating it with the ingress port; upon receiving a frame, the switch examines the destination MAC to determine the egress port, forwarding unicast frames only to that port or flooding to all ports in the same VLAN if the destination is unknown or a broadcast/multicast address. This mechanism reduces unnecessary traffic compared to hubs, which broadcast all frames, by enabling selective forwarding that confines communication to the local broadcast domain. MAC addresses delimit the scope of Layer 2 communications to physical or virtual LANs, preventing frames from traversing routers, which operate at Layer 3 using addresses; inter-network traffic requires address resolution protocols like to map to for the final hop delivery. Special addresses, such as the FF:FF:FF:FF:FF:FF, propagate frames to all devices on the segment for or announcements, while addresses (with the least significant bit of the first octet set to 1) target groups for efficient distribution in protocols like . This addressing scheme underpins standards like Ethernet, ensuring collision-free or managed access in shared media environments via with (CSMA/CD) in half-duplex modes.

Integration with Protocols like ARP

The (ARP), standardized in 826 in November 1982, relies on MAC addresses to resolve v4 addresses to corresponding hardware addresses within a , enabling Ethernet frames carrying IP packets to reach their local destinations. ARP operates by encapsulating its messages in Ethernet frames, where the source MAC address identifies the querying device and the destination MAC address is set to the broadcast value 01:00:5e:00:00:00 for the link-layer header in requests, ensuring all devices on the segment receive the query. This broadcast mechanism, integral to ARP's design, leverages the universal/local bit in the MAC address (the second-least significant bit of the first octet) to distinguish individual addresses from group communications, though ARP requests specifically use the reserved broadcast form ff:ff:ff:ff:ff:ff in the payload fields for target hardware addresses during initial resolution. Within the ARP packet structure, fixed fields explicitly include 6-byte addresses for both sender and target, with the sender's populated in requests to allow responders to reply directly via Ethernet framing using that as the destination. In an ARP reply, the queried device's address fills the sender address field, completing the and populating local ARP caches (typically holding up to 256-1024 entries depending on ) to avoid repeated broadcasts for subsequent communications. This tight coupling ensures causal linkage between layer-3 and layer-2 frame delivery, as unresolved MACs prevent frame transmission; empirical network traces confirm ARP failures manifest as packet drops, with broadcast storms possible if caches lack entries or duplicates arise from misconfigurations. Similar integration occurs in related protocols, such as the Inverse ARP (InARP) extension defined in 2390 for non-broadcast media like , where DLCI identifiers map to MAC-equivalent addresses, or in RFC 1027, which allows routers to respond on behalf of remote hosts using their own MAC in replies to mask subnet boundaries. For IPv6, the (NDP) in RFC 4861 mirrors by using solicited-node MAC addresses derived from IPv6 targets (e.g., 33:33:xx:xx:xx:xx prefix) for neighbor solicitation messages, embedding link-layer addresses in options to achieve stateless autoconfiguration and duplicate address detection without relying on broadcast. These protocols underscore MAC addresses' foundational role in address resolution, with deviations (e.g., in virtualized environments per RFC 9161) requiring explicit mediation to preserve across bridged domains.

Usage in Wired and Wireless Standards

In IEEE 802.3 Ethernet standards, which define wired operations across speeds from 1 Mb/s to 400 Gb/s, MAC addresses serve as the primary identifiers at the media access control (MAC) sublayer of the . Each Ethernet frame includes a 48-bit destination MAC address followed by a 48-bit source MAC address, enabling devices to determine frame delivery within the local network segment. These addresses support communication to specific devices, multicast to groups via addresses with the least significant bit of the first octet set to 1, and broadcast to all devices using the all-ones address (FF:FF:FF:FF:FF:FF). The frame format relies on these MAC addresses for with (CSMA/CD) in half-duplex modes or full-duplex operations without contention, ensuring reliable frame transmission over twisted-pair, fiber, or coaxial media. Universally administered MAC addresses, assigned via the IEEE Registration Authority, predominate, though locally administered addresses can be configured for specific network needs. In wireless standards, MAC addresses perform analogous roles but accommodate and ad-hoc topologies, with frames supporting up to four 48-bit address fields to handle scenarios involving access points (s) and . The basic service set identifier (BSSID) is typically the AP's MAC address, uniquely identifying the wireless cell, while probe requests and association frames use source and destination MACs for discovery and connection establishment. Unlike Ethernet's two-address frames, 802.11 data frames in mode designate fields for receiver (next-hop ), transmitter (forwarding AP), destination (end recipient), and source (originator), facilitating meshed or relayed transmissions. The 802.11 MAC sublayer employs these addresses within carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms, including request-to-send/clear-to-send (RTS/CTS) handshakes that incorporate MACs to mitigate hidden node problems. Multicast and broadcast frames, identified by group addresses, enable efficient distribution to multiple stations, with the standard mandating support for globally unique 48-bit addresses alongside protocol extensions for power management and quality of service. Both wired and wireless standards under IEEE 802 leverage MAC addresses for layer-2 switching and bridging, with Ethernet bridges forwarding based on learned MAC tables and Wi-Fi APs performing similar functions in extended service sets.

Security and Privacy Considerations

Device Tracking and Identification Risks

MAC addresses serve as persistent, unique hardware identifiers for network interfaces, enabling the tracking and identification of devices across when exposed in unencrypted frames like Wi-Fi probe requests and beacons. These frames, broadcast to discover available , reveal the MAC address to any passive listener within radio range, allowing correlation of a single device's movements over time and space without user consent or authentication. This capability has been exploited in various applications, including retail analytics where vendors deploy Wi-Fi sniffers to log MAC addresses for customer behaviors, such as dwell times and visit frequencies, as documented in industry practices since at least 2013. In surveillance contexts, static addresses facilitate tracking; for example, a demonstration showed how Wi-Fi-based MAC monitoring could compute point-to-point travel times and infer user trajectories in environments, extending beyond vehicular traffic to pedestrian device carriers. and private entities have leveraged this for broader monitoring, with passive MAC collection at public hotspots enabling device fingerprinting that links hardware to specific users when combined with contextual data like location timestamps or repeated associations. The (OUI) portion of the MAC address further aids identification by revealing the manufacturer, narrowing device types (e.g., Apple vs. ecosystems) and potentially tying observations to vendor-specific behaviors. These risks are amplified in dense environments like cities or events, where widespread access point deployment creates comprehensive coverage; studies from onward confirm that non-randomized MACs allow long-term profiling, with probe requests alone sufficient for 80-90% accuracy in re-identifying devices across sessions in controlled tests. Incidents, such as Apple's 2023 revelation of devices inadvertently transmitting true MAC addresses alongside randomized ones in certain scenarios, underscore implementation flaws that expose users to unintended tracking by network operators or eavesdroppers. Without countermeasures, this exposes individuals to unauthorized , commercial exploitation, and potential linkage to personal identities via cross-referenced sources, as evidenced by academic analyses of analytics distortions from unmitigated MAC persistence.

Spoofing Vulnerabilities and Mitigation

MAC address spoofing involves an attacker altering the MAC address transmitted by their to impersonate a legitimate , exploiting the lack of inherent in Layer 2 Ethernet frames. This arises because MAC addresses are not cryptographically protected; operating systems and drivers permit software overrides of the hardware-burned address, enabling tools like on or registry edits on Windows to facilitate changes without hardware modification. In Ethernet networks, switches forward frames based solely on learned MAC addresses in their () tables, allowing a spoofed address to redirect traffic intended for the original , as demonstrated in attacks where duplicate MACs cause frame misdirection. The primary risks include bypassing access control lists (ACLs) that filter by MAC, enabling unauthorized network entry in environments relying on static MAC whitelisting, such as campus or enterprise LANs. Spoofing facilitates poisoning, where gratuitous ARP replies with the spoofed MAC associate an attacker's interface with a victim's , enabling man-in-the-middle (MITM) interception of traffic; this has been a vector in documented Layer 2 attacks since at least the early . In wireless networks, unencrypted management frames exacerbate spoofing, permitting identity forgery for deauthentication attacks or , with (RSSI) variations often detectable but not always enforced. Such exploits can lead to , denial-of-service via CAM table exhaustion (if combined with flooding), or evasion of intrusion detection systems tuned to known MACs. Mitigation strategies focus on network-level validation rather than endpoint enforcement, as client-side prevention (e.g., driver-level disabling) is unreliable against rootkits or physical access. Cisco Catalyst switches implement port security to restrict ports to one or a few learned MAC addresses, using "sticky" learning to bind dynamically observed addresses and shut down violating ports; violation modes include protect (silent drop) or restrict (alert and drop), effective against single-spoof attempts but vulnerable to multi-MAC flooding if limits are high. Dynamic ARP Inspection (DAI) cross-checks ARP packets against a DHCP snooping database of IP-MAC-port bindings, discarding mismatches to block spoofed ARP replies, with rate limiting to prevent exhaustion attacks; deployed since IOS versions around 2005, it requires enabling DHCP snooping upstream. Additional layered defenses include IP Source Guard, which filters inbound traffic by validated IP-MAC bindings from , and port-based authentication, which ties access to credentials rather than MAC alone, using EAP methods for mutual verification. In wireless contexts, RSSI fingerprinting detects spoofing by correlating signal patterns inconsistent with the claimed device's location, as validated in studies showing over 90% accuracy in controlled environments, though environmental noise reduces efficacy. Network monitoring tools can flag rapid MAC changes or duplicates via or SNMP traps, but comprehensive prevention demands segmenting untrusted ports and avoiding sole reliance on MAC for , as no single IEEE standard mandates spoofing resistance due to the address's design for local, non-routable identification. These measures, while reducing , introduce overhead like increased CPU load on switches during inspection, necessitating careful configuration in high-traffic deployments.

MAC Randomization Implementations

MAC randomization implementations primarily occur at the operating system level for client devices, generating temporary addresses derived from randomized values within the locally administered MAC address space (second least significant bit of the first octet set to 1) to obscure the device's permanent hardware identifier during network discovery, association, and data exchange phases. These implementations typically maintain a consistent randomized MAC per network profile to ensure connectivity stability, while regenerating the address periodically (e.g., every 24 hours or upon disconnection/reassociation) or for entirely new networks to mitigate tracking risks. Apple's introduced MAC randomization in version 8.0 (September 2014) initially for probe requests in the unassociated state, but expanded it to the association phase and made it the default for new Wi-Fi networks in (September 2020), , and subsequent releases including and later. In these systems, each SSID receives a unique randomized MAC, preserved across sessions for the same network but regenerated for untrusted or public ones, with further enhancements in 16.1 (October 2022) extending randomization to additional frame types on supported chips. Users or administrators can disable it via settings or MDM policies for managed devices, though it remains only for privacy-focused defaults. Google's implemented MAC randomization as an optional developer feature in (August 2018), becoming enabled by default for new Wi-Fi networks in (September 2019) and standardizing per-network persistence with re-randomization triggers such as every 24 hours, device reboot, or network profile reset. The Open Source Project specifies that randomized addresses are generated using a of network parameters (e.g., SSID and BSSID) combined with a , ensuring uniqueness and avoiding collisions while supporting enterprise features like certificate-based . Device manufacturers may vary exact behaviors, but core randomization applies to both probe and frames, with options to revert to hardware MAC for specific networks via advanced settings. Microsoft Windows supports random hardware addresses starting in Windows 10 (version 1803, April 2018), configurable per Wi-Fi network or globally under Settings > Network & Internet > Wi-Fi > Manage known networks > Properties > Privacy, where enabling it substitutes the device's MAC with a randomized one for outbound frames. This feature randomizes during connection to new networks and can be toggled to refresh the address, aiding privacy on public Wi-Fi but potentially complicating network management tools reliant on static identifiers. IEEE 802.11 standards do not mandate randomization but acknowledge its prevalence through study groups since 2014, with IETF documents like RFC 9724 (March 2025) cataloging interoperability impacts and recommending network adaptations such as probing for stable identifiers in enterprise environments. Implementations across these platforms prioritize locally administered addresses to comply with OUI allocation rules while avoiding interference with globally unique ranges.

Criticisms and Trade-offs of Randomization

MAC address randomization, while intended to enhance by obscuring persistent device identifiers, has been criticized for its incomplete protection against tracking. Studies demonstrate that attackers can still correlate randomized MAC addresses with other probe request attributes, such as sequence numbers, information elements, or timing patterns, enabling device fingerprinting across networks. For instance, research from 2016 showed that management retain sufficient stable data to defeat randomization in practice, undermining its core goal. Subsequent analyses in 2019 confirmed persistent vulnerabilities, including the "No-at-All" attack exploiting unrandomized elements in . A primary trade-off involves network usability and reliability, as randomization disrupts systems dependent on static MAC addresses for and policy enforcement. In environments, mobile device management tools fail to consistently identify or provision devices, leading to recognition errors and communication breakdowns during address changes. Home networks face similar issues, where features like , whitelisting, or allocation break, requiring manual reconfiguration or disabling randomization per network. Frequent regenerations—often per connection or daily—can trigger repeated attempts, increasing , failed logins, and service interruptions, particularly in captive portals or Wi-Fi. Randomization also complicates network diagnostics, analytics, and optimization. Service providers report challenges in device identification for troubleshooting or QoS enforcement, resulting in fragmented usage data and suboptimal performance allocation. While collision risks from randomized addresses remain low in typical deployments (e.g., probability below 0.1% in networks under 1,000 devices), they introduce minor overhead in dense environments. Overall, these drawbacks pit privacy gains against operational stability, prompting recommendations for selective disabling in trusted networks or hybrid approaches combining randomization with higher-layer mitigations.

Notational and Implementation Conventions

Standard Hexadecimal Representations

The standard representation of a 48-bit MAC address (also known as MAC-48 or EUI-48) consists of twelve digits, divided into six pairs of two digits each, where each pair corresponds to one octet in order. This format displays the octets from left to right without reversing the bits within each octet, reflecting the sequence as stored in or transmitted (with the least significant bit of each octet sent first on the wire, but hex conversion preserving standard binary ordering). digits range from 0-9 and A-F (case-insensitive, though uppercase is conventional in most documentation). In documentation, hyphens (-) serve as the separator for this canonical hexadecimal notation, yielding formats like AC-DE-48-00-00-02. This distinguishes it from bit-reversed variants, ensuring clarity in technical specifications. For instance, the assigns Organizationally Unique Identifiers (OUIs) in this hyphenated , with the first three octets typically representing the OUI followed by three octets for the device-specific portion. Although IEEE reserves colons (:) for bit-reversed representations (e.g., reversing bits per octet before hex conversion), colons are commonly adopted in practice for addresses across networking tools, operating systems, and IETF documents, such as ac:de:48:00:00:02. This widespread use stems from readability preferences in software like or outputs, despite deviating from strict IEEE separator conventions for reversal indication. Both separators maintain the same underlying 48-bit value, serving solely for human parsing; unambiguous parsing requires context or validation against known OUIs.

Bit-Reversed and Other Notations

The bit-reversed notation, also known as non-canonical or Token Ring format, represents each octet of a MAC address by reversing the order of its eight bits before converting the result to hexadecimal digits. For example, the octet 0x1A (binary 00011010) becomes 0x58 (binary 01011000) after bit reversal, transforming a standard MAC address like 1A:2B:3C:4D:5E:6F into 58:D4:3C:B2:7A:F6. This format arose due to differences in bit transmission order: Ethernet sends bits least-significant-bit (LSB) first within each octet, while Token Ring networks transmit most-significant-bit (MSB) first, necessitating bit reversal for consistent display or compatibility in mixed environments. It is now rarely used outside legacy systems, as IEEE 802 standards favor the canonical format aligned with Ethernet's transmission order. In the canonical (standard) notation, MAC addresses are displayed as six pairs of hexadecimal digits separated by colons (e.g., aa:bb:cc:dd:ee:ff) or hyphens (e.g., aa-bb-cc-dd-ee-ff), reflecting the octet values in the order of transmission bytes, with hex digits typically in lowercase or uppercase indifferently. Alternative separators include periods in Cisco IOS displays, grouping every four bits (e.g., aabb.ccdd.eeff) for readability in command-line interfaces, though this is non-standard for general use. Unseparated hexadecimal strings (e.g., aabbccddeeff) or decimal representations are occasionally employed in programming or databases but lack standardization and can lead to parsing errors. The IEEE recommends colon-separated canonical form to avoid ambiguity, particularly when distinguishing bit order in protocols like IEEE 802.

Practical Implementations Across Devices

In network interface controllers (NICs) for personal computers and servers, MAC addresses are embedded in hardware during manufacturing, typically stored in ROM or EEPROM on Ethernet controllers compliant with IEEE 802.3 standards, enabling source and destination addressing in Ethernet frames for local area network communication. Manufacturers obtain blocks of addresses from the IEEE Registration Authority, where the first 24 bits form the Organizationally Unique Identifier (OUI), and the remaining 24 bits are uniquely assigned by the vendor to each NIC. Wireless devices, including adapters in laptops and integrated modules in smartphones, implement MAC addresses similarly in their chipsets for protocol operations, such as association requests and frame acknowledgments; for instance, baseband processors in devices like or chips use the hardware MAC as the foundation for link-layer identification. In smartphones, operating systems like derive per-network randomized MAC addresses from this base hardware identifier to mitigate tracking, but the underlying silicon-level implementation remains fixed and manufacturer-assigned.
Routers and switches allocate unique MAC addresses to each physical or virtual interface from vendor-assigned blocks, facilitating layer-2 forwarding and resolution; devices, for example, derive interface MACs sequentially from a base address burned into the system, with one address per Ethernet port plus additional for management functions. This ensures distinct identification in bridged or switched domains, as required by bridging standards.
In devices, MAC addresses are integrated into chips for wireless connectivity, such as in Espressif modules where the 48-bit address is fused into the memory during fabrication, allowing retrieval via APIs for or provisioning while supporting local modifications for testing. These implementations prioritize low-power operation, with the MAC enabling direct device-to-device or access point communication in standards like for certain sensor networks. Across all device types, the second least significant bit of the first octet distinguishes universally administered (factory-set) from locally administered addresses, allowing network operators to override defaults for redundancy or .

References

  1. [1]
    Media Access Control (MAC): What Is a MAC Address? - 7SIGNAL
    A MAC (Media Access Control) address is a unique 48-bit identifier assigned to a network interface controller (NIC) for communication on a physical network.
  2. [2]
    Understanding MAC Address Format Explained - SynchroNet
    May 10, 2025 · A MAC address (Media Access Control address) is a unique 48-bit identifier assigned to network interfaces for communication on a network.What Is a MAC Address? · The Fundamentals of mac... · How Many Bits in a MAC...
  3. [3]
    MAC address vs IP address: What's the difference?
    May 13, 2021 · A Media Access Control address (MAC address) is a hardware identifier that uniquely identifies each device on a network. Primarily, the ...<|separator|>
  4. [4]
    What is MAC Address? - GeeksforGeeks
    Sep 30, 2024 · A MAC address, which stands for Media Access Control Address, is a physical address that works at the Data Link Layer.Format of MAC Address · Types of MAC Address · How do I find the MAC Address?
  5. [5]
    Registration Authority - IEEE Standards Association
    An MA-S assignment includes an OUI-36 and small blocks of EUI-48 and EUI-64 values which can be used as MAC Addresses, Bluetooth Device Addresses, Ethernet ...Standards Group MAC Address · MAC Addresses · Assignment Information... · MA-L
  6. [6]
    Guidelines for Use of Extended Unique Identifier (EUI ... - IEEE
    Apr 1, 2022 · The assignee of an OUI or OUI-36 is exclusively authorized to assign group MAC addresses, with I/G=1, by extending a modified version of the ...
  7. [7]
    Standard Group MAC Addresses: A Tutorial Guide
    This tutorial material contains a description of the MAC addressing conventions, the criteria that will be used when consideration for an assignment is made.
  8. [8]
    [PDF] mac-address format - IEEE 802
    The mac-address type represents an IEEE. 802 MAC address. The canonical representation uses lowercase characters. In the value set and its semantics, this type ...
  9. [9]
    MAC - Media Access Control - GeeksforGeeks
    Sep 24, 2025 · Media Access Control (MAC) is a networking concept at the Data Link Layer (Layer 2) that governs how devices share a communication channel.History Of Mac · Characteristics Of Mac · Functions Of The Mac Layer
  10. [10]
    MA-M - IEEE Standards Association
    MA-M is a 28-bit identifier that can be used to create various extended identifiers. It is most often used to create IEEE 802-defined MAC addresses.
  11. [11]
    Milestones:Ethernet Local Area Network (LAN), 1973-1985 – ETHW
    May 17, 2024 · Ethernet wired LAN was invented at Xerox Palo Alto Research Center (PARC) in 1973, inspired by the ALOHAnet packet radio network and the ARPANET.
  12. [12]
    The Ethernet Story
    Mar 13, 2004 · When did it begin? • May 22 1973 - Metcalfe wrote a memo at Xerox Parc on ethernet's potential. • However, Metcalfe claims ethernet was actually.
  13. [13]
    Living legends: Ethernet inventor Bob Metcalfe - Network World
    May 9, 2011 · Bob Metcalfe invented Ethernet in 1973 while at Xerox PARC, and the company patented it in 1975. Metcalfe and others then finalized an open ...Missing: date | Show results with:date
  14. [14]
    Does a MAC Address Mean Apple Invented It? - Global Knowledge
    While Apple has created many fine things, they were yet to be created themselves when Xerox PARC scientists created Media Access Control addresses.Missing: origins | Show results with:origins
  15. [15]
    Ethernet History – MAC Addresses in SunOS - a.k.a. Pugs
    Feb 12, 2020 · 2/ The DEC, Intel Xerox Ethernet spec was published in 1980 after many years of Ethernet development at Xerox PARC led by @BobMetcalfe , Dave ...
  16. [16]
    Ethernet Address - an overview | ScienceDirect Topics
    Ethernet MAC Addresses. The original Xerox Ethernet addressing scheme was adopted by IEEE in the form of IEEE 802 MAC addresses and has subsequently become ...
  17. [17]
    Mac Address - an overview | ScienceDirect Topics
    Ethernet MAC Addresses The original Xerox Ethernet addressing scheme was adopted by IEEE in the form of IEEE 802 MAC addresses and has subsequently become ...
  18. [18]
    IEEE 802 - IEEE SA
    1980. The IEEE Computer Society creates the IEEE 802 LAN/MAN Standards Committee (LMSC) Committee meeting takes place; members begin discussing standardization ...
  19. [19]
    Ethernet Through the Years: Celebrating the Technology's 50th Year ...
    MAC ADDRESS. Featured Links. IEEE ... In June 1983, Ethernet was adopted as an IEEE standard by the IEEE 802 Local Area Network Standards Committee.<|separator|>
  20. [20]
    MA-L - IEEE Standards Association
    The OUI defined in IEEE 802®-2001 can be used to generate 48-bit Universal LAN MAC addresses to uniquely identify Local and Municipal Area Networks stations, ...
  21. [21]
    IEEE Registration Authority FAQs - IEEE SA
    A 48-bit universally unique MAC address is formally referred to as an EUI-48. A 64-bit universally unique MAC address is formally referred to as an EUI-64.
  22. [22]
    RFC 7043 - Resource Records for EUI-48 and EUI-64 Addresses in ...
    This document describes two new DNS resource record types, EUI48 and EUI64, for encoding Ethernet addresses in the DNS.<|separator|>
  23. [23]
    [PDF] Bridging Frames with 64-bit addresses - IEEE 802
    Jan 19, 2022 · ▫ Mapping an EUI-48 to an EUI-64 is deprecated. The mapping is described here for historical reasons. ▫ More importantly: the restriction on EUI ...Missing: transition | Show results with:transition
  24. [24]
    IEEE 802c-2017
    Aug 25, 2017 · This structure designates a range of local MAC addresses for protocols using a Company ID (CID) assigned by the IEEE Registration Authority.
  25. [25]
    802c-2017 - IEEE Standard for Local and Metropolitan Area ...
    Aug 25, 2017 · This structure will designate a range of local MAC addresses for protocols using a Company ID (CID) assigned by the IEEE Registration Authority.Missing: guidelines | Show results with:guidelines
  26. [26]
    [PDF] IEEE Std 802c: What's New and Useful in the Overview and ...
    Sep 7, 2017 · An address assignment protocol assigning local MAC addresses to devices on a LAN should ensure uniqueness of those addresses. • When multiple ...
  27. [27]
    Randomized and Changing MAC Address - IETF Datatracker
    Oct 23, 2023 · [RFC8948] proposes extensions to DHCPv6 protocols ... W. R., "IEEE 802.11 Randomized And Changing MAC Addresses Study Group PAR on privacy ...
  28. [28]
    Privacy features when connecting to wireless networks
    Dec 19, 2024 · Apple platforms use a randomized Media Access Control address (MAC address) when performing Wi-Fi scans when not associated with a Wi-Fi network.
  29. [29]
    Randomized MAC Addresses: Guide for IT Admins - Addigy
    Jul 10, 2025 · The purpose of MAC randomization is to protect user privacy by preventing third parties from tracking devices across different Wi-Fi networks.
  30. [30]
    [PDF] A Study of MAC Address Randomization in Mobile Devices and ...
    Abstract: Media Access Control (MAC) address ran- domization is a privacy technique whereby mobile de- vices rotate through random hardware addresses in or-.
  31. [31]
    IEEE RA Guidelines for Use of EUI, OUI, and CID
    Aug 3, 2017 · For example, an EUI- 48 is commonly used as the address of a hardware interface according to IEEE Std 802, historically using the name “MAC-48” ...
  32. [32]
    Randomized and Changing MAC Address - IETF
    Oct 23, 2023 · Randomized and Changing MAC Address · 1. Introduction · 2. Terminology · 3. Background · 4. Recent RCM activities at the IEEE 802 · 5. Recent MAC ...
  33. [33]
    RFC 7042 - for IEEE 802 Parameters - IETF Datatracker
    48-Bit MAC Identifiers, OUIs, and Other Prefixes 48-bit MAC "addresses" are the most commonly used Ethernet interface identifiers. Those that are globally ...
  34. [34]
    Randomized and Changing Media Access Control (MAC) Addresses
    Jun 3, 2025 · ... bits of the first octet are reserved for specific purposes. In particular, the first bit is used to identify the destination address as an ...
  35. [35]
    RFC 8948 - Structured Local Address Plan (SLAP) Quadrant ...
    This document proposes extensions to DHCPv6 protocols to enable a DHCPv6 client or a DHCPv6 relay to indicate a preferred SLAP quadrant to the server.
  36. [36]
    What are EUI-48 and EUI-64? - Network Engineering Stack Exchange
    Oct 21, 2015 · EUI-48 is the link-layer address of ethernet devices (used almost nowhere else) EUI-64 is the link-layer address used pretty much everywhere else.
  37. [37]
    Use of EUI-64 for New Designs - IEEE802.org
    Jan 15, 2000 · The IEEE defined 48-bit extended unique identifier (EUI-48) is a concatenation of the 24-bit company_id value by the IEEE Registration Authority ...
  38. [38]
    MAC Addresses - IEEE Standards Association
    An MA-L assignment includes an OUI and large blocks of EUI-48 and EUI-64 values which can be used as MAC Addresses, Bluetooth Device Addresses, Ethernet ...Missing: process | Show results with:process
  39. [39]
    IEEE Registration Authority Standard Group MAC Address Application
    An assignment is sent within seven (7) business days of approval. IEEE does not honor requests for applicant-specified identifiers. Please make sure that all ...
  40. [40]
    The Public Listing For IEEE Standards Registration Authority
    If you have an existing account, please log on to the Registration Authority system to check the status of a pending order, view your order history, and place a ...
  41. [41]
    Assignment Information Change Form - IEEE Standards Association
    Complete this form if there have been one or more changes to the contact information since the assignment was issued to your company.Missing: process | Show results with:process<|control11|><|separator|>
  42. [42]
    Locally vs Universally Administered MAC Addresses
    May 9, 2025 · A UAA is the default MAC address assigned to a device's NIC by a vendor. LAAs, on the other hand, are generated artificially and used for running VMs.
  43. [43]
    Local MAC Addresses in the Overview and Architecture based on ...
    Nov 6, 2017 · IEEE Std 802c was approved by the IEEE-SA Standards. Board on 15 June 2017, amending the IEEE 802 Overview and Architecture to specify Local ...
  44. [44]
    [PDF] P802c/D0.1 Local MAC Address Usage - IEEE 802
    Jan 20, 2016 · SuggestedRemedy. Ensure that there is a space available for address assignment by local administrator that is separate from the proposed AAI ...
  45. [45]
    Locally Administered Address - 29.2.1 - ID:705831 | Intel® Ethernet ...
    The Locally Administered Address overrides the initial MAC address with a user- assigned MAC address. To enter a new network address, type a 12-digit ...
  46. [46]
    Overview of Multicast MAC Addresses - Huawei Technical Support
    Mar 5, 2024 · As defined in the IEEE 802.3 standard, the least significant bit in the most significant octet of a MAC address is the multicast bit. The value ...
  47. [47]
    Standards Group MAC Public Listing - IEEE SA
    Locally Administered Group MAC Addresses Used by IEEE Std 802.5. Note: Potential users of the addresses identified in this table are warned that, since these ...
  48. [48]
    Multicast IP Address to MAC address mapping - NetworkLessons.com
    Multicast IP address have 28 unique bits. Multicast MAC addresses only offer 23 bits so we have to do some mapping between L3 and L2 multicast.
  49. [49]
    Multicast Address Allocation | mrn-cciew
    Dec 25, 2012 · This means that each IEEE IP multicast MAC address can represent 32 IP multicast addresses as shown in below figure. Multicast-Address-7.
  50. [50]
    [PDF] Proposal for IEEE 802.1CQ (Self-Assignment part)
    The LAAP Self-Assignment procedure must meet the following requirements: • Assigning addresses that are locally unique. • Providing for duplicate detection. • ...
  51. [51]
    IEEE/ISO/IEC 8802-A:2015/Amd 2-2019
    Mar 8, 2019 · An optional local medium access control (MAC) address space structure, known as the Structured Local Address Plan (SLAP), is provided in this amendment.
  52. [52]
    MAC address of all zeros - Notes - NetworkLessons.com
    A MAC address of all zeros is a special case MAC address. It is used to refer to the localhost and corresponds with the 127.0.0.1 localhost IPv4 address.
  53. [53]
    IANA OUI Ethernet Numbers
    Jul 22, 2025 · These values are prefixed with 00-00-5E to form unicast MAC addresses, with 01-00-5E to form multicast MAC addresses, with 02-00-5E to form ...
  54. [54]
    Understanding Layer 2: The Data Link Layer of the OSI Model
    Aug 4, 2025 · MAC addresses provide unique identification for network interfaces at the Data Link Layer. These 48-bit addresses are burned into network ...How It Works · Physical Addressing (mac... · Media Access Control (mac)
  55. [55]
    [PDF] 4. Media Access Control - IEEE 802
    The MAC sublayer defines a medium-independent facility, built on the medium-dependent physical facility provided by the Physical Layer, and under the ...
  56. [56]
    802.3-2022 - IEEE Standard for Ethernet
    Jul 29, 2022 · Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information ...
  57. [57]
    The MAC Address Table (7.3) > Ethernet Switching | Cisco Press
    Jul 15, 2020 · The switch forwards frames by searching for a match between the destination MAC address in a frame and an entry in the MAC address table.<|control11|><|separator|>
  58. [58]
    Network Switching Operation - Cisco Community
    Switches use MAC address in a frame to make forwarding decisions. Switches forward frames and do not frame rewrite MAC addressing. Switches and access points ...
  59. [59]
    How Switches Work | Learn with Global Knowledge
    The switch intentionally filters out ports 2 and 3, only forwarding the data to the destination MAC address identified in the frame header. These four ...
  60. [60]
    IP Addressing: ARP Configuration Guide, Cisco IOS Release 15S
    Sep 4, 2014 · The Address Resolution Protocol (ARP) was developed to enable communications on an internetwork and is defined by RFC 826. Layer 3 devices need ...Missing: integration | Show results with:integration<|separator|>
  61. [61]
    IEEE 802.3-2022 - IEEE SA
    Jul 29, 2022 · Ethernet local area network operation is specified for selected speeds of operation from 1 Mb/s to 400 Gb/s using a common media access control (MAC) ...
  62. [62]
    Ethernet Version 2 Versus IEEE 802.3 Ethernet - IBM
    Feb 27, 2023 · In 1980-81, the first Ethernet standard was developed by Digital (DEC-Digital Equipment Corporation), Intel, and Xerox, and combined the first ...
  63. [63]
    Ethernet MAC Standards Explained | ScoreDetect Blog
    Rating 5.0 · Review by ImriJun 4, 2024 · Ethernet was first developed by Robert Metcalfe and David Boggs at Xerox PARC in the 1970s. ... How is an Ethernet MAC address structured? An ...Missing: origins | Show results with:origins
  64. [64]
    802.11 Frame Addressing | NetworkAcademy.IO
    802.3 Ethernet frames have only two address fields: Source MAC and Destination MAC. 802.11 Wireless frames have four address fields that are used differently ...
  65. [65]
    [802.11] Wi-Fi Basic concepts - NXP Community
    Oct 6, 2020 · Basic Service Set Identifier (BSSID): All basic service sets can be identified by a 48-bit (6-octet) MAC address known as the Basic Service Set ...
  66. [66]
    [PDF] IEEE 802.11 Wireless LAN Standard : MAC
    MAC address used by the wireless interface in the access point. ▫ The all -1s BSSID is the broadcast BSSID. ▫ Used to locate network by sending a probe frame ...
  67. [67]
    802.11 MAC Layer - Some Proposed Characteristics - IEEE 802
    Addressing. The 802.11 MAC layer should use standard 802 addressing conventions, supporting globally unique 48 bit addresses, multicast and broadcast. Since ...
  68. [68]
    [PDF] I know your MAC Address: Targeted tracking of individual using Wi-Fi
    For example, RF-tracking is used in traffic monitoring application, for which it provides traffic information such as point-to-point travel time and traffic ...
  69. [69]
    Tracking People by their MAC Addresses - Schneier on Security -
    Sep 6, 2021 · Tracking People by their MAC Addresses. Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections.
  70. [70]
    De-Randomization of MAC Addresses Using Fingerprints and RSSI ...
    Jun 6, 2024 · Abstract: Media Access Control (MAC) address randomization causes significant distortion and data loss in Wi-Fi analytics systems, ...
  71. [71]
    Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of ...
    May 25, 2017 · We present two novel noncooperative MAC layer fingerprinting and tracking techniques for Wi-Fi (802.11) enabled mobile devices.<|separator|>
  72. [72]
    Privacy breach: Apple devices were sending the real MAC of the ...
    Nov 22, 2023 · Hiding the actual MAC address of a device, endows users with added privacy because it prevents an attacker connected to such networks from ...
  73. [73]
    MAC Address Randomization: How User Privacy Impacts Wi-Fi And ...
    Although MAC address randomization is evidently a major step toward user privacy, it can have a wide range of repercussions impacting the Wi-Fi network and ...
  74. [74]
    Layer 2 Security Features on Cisco Catalyst Layer 3 Fixed ...
    Jan 17, 2007 · Media Access Control (MAC) spoofing attacks involve the use of a known MAC address of another host to attempt to make the target switch forward ...
  75. [75]
    MAC Spoofing Attacks Explained: A Technical Overview - SecureW2
    MAC address spoofing is a potential vulnerability that can be leveraged by threat actors to compromise the network and obtain unauthorized access.How Does a MAC Spoofing... · Techniques Used in MAC...
  76. [76]
    [PDF] Preventing ARP Spoofing and Flood Attack - Cisco
    An ARP spoofing attack can affect hosts, switches, and routers connected to your network by sending false information to the ARP caches of the devices ...
  77. [77]
    Detecting 802.11 MAC Layer Spoofing Using Received Signal ...
    MAC addresses can be easily spoofed in 802.11 wireless LANs. An adversary can exploit this vulnerability to launch a large number of attacks.
  78. [78]
    Implement MAC randomization | Android Open Source Project
    MAC randomization prevents listeners from using MAC addresses to build a history of device activity, thus increasing user privacy.
  79. [79]
    Randomized and Changing MAC Address State of Affairs - IETF
    Jul 15, 2024 · 7. OS current practices ; MAC address randomization is enabled by default for all the new Wi-Fi networks. But if the device previously connected ...
  80. [80]
    MAC randomization behavior | Android Open Source Project
    The MAC randomization feature lets devices use a randomized MAC address when connecting to a Wi-Fi network. For implementation instructions, see Implement MAC ...
  81. [81]
    Meraki and MAC Address Randomization
    Jun 24, 2025 · iOS 14 introduced the MAC randomization feature which means that for each SSID, devices running iOS 14 will present a distinct randomized MAC ...
  82. [82]
    [PDF] A Study of MAC Address Randomization In Mobile Devices And ...
    MAC address randomization saw its first major deploy- ment in Apple's iOS version 8.0, released in September of. 2014. Other manufacturers followed suit but at ...
  83. [83]
    Privacy features when connecting to wireless networks
    Dec 19, 2024 · This randomization was introduced in iOS 16.1, iPadOS 16.1, macOS 13.1, tvOS 16.1, watchOS 9.1, and visionOS 1.0, and is supported on the ...
  84. [84]
    Disabling Wi-Fi MAC address randomization on iPhone or iPad
    Jul 10, 2025 · This article explains how administrators can remotely turn off the Wi-Fi MAC address randomization (enforce static MAC address) for iOS devices.
  85. [85]
    Android 12+ MAC Randomization - a different MAC address every ...
    Jan 25, 2024 · “The Wi-Fi module re-randomizes the MAC address in the following situations: The current randomized MAC for the network profile was generated ...Missing: features | Show results with:features
  86. [86]
    How to Disable MAC Randomization on Android Devices - Esper.io
    Oct 28, 2024 · MAC randomization is a privacy feature used in wireless networking to prevent devices from being tracked by their MAC address.
  87. [87]
    Mac Randomization in Windows - Forensic 4:cast
    Feb 2, 2022 · MAC randomization changes your MAC address to disrupt snoopers. It can be enabled system-wide or for specific networks, and can be changed ...
  88. [88]
    How to Use Random Hardware Addresses - Windows Forum
    Jan 29, 2025 · Your device could essentially leave breadcrumbs of its browsing habits every time it connects to public Wi-Fi, exposing you to privacy risks.
  89. [89]
    Beyond the obvious, what does the 'randomize hardware address ...
    Jul 14, 2022 · Randomizing the hardware address changes the MAC address, which can refresh the network stack and may trigger captive portal logins as a new ...<|separator|>
  90. [90]
    RFC 9724 - State of Affairs for Randomized and Changing Media ...
    Mar 17, 2025 · There have been several initiatives within the IETF and the IEEE 802 standards committees to address some of the privacy issues involved.
  91. [91]
    [PDF] Why MAC Address Randomization is not Enough: An Analysis of Wi ...
    This shows that using random MAC addresses, on its own, does not guarantee privacy. First, we show that information elements in probe requests can be used to ...
  92. [92]
    (PDF) Five Years Later: How Effective Is the MAC Randomization in ...
    Aug 7, 2025 · Therefore, the MAC address contained in the probe request frame can be exploited to track users without their knowledge and consent. To counter ...
  93. [93]
    Overcoming the effects of MAC address randomization on enterprises
    Apr 27, 2022 · When MAC address randomization is on, these MDMs fail to communicate with the devices. It may fail to recognize the devices and show that the ...<|separator|>
  94. [94]
    MAC Randomization in Public and Enterprise Networks - Purple.ai
    Aug 30, 2024 · Randomization can lead to failed authentication attempts, repeat logins, and service disruptions. This can also pose security issues as ...
  95. [95]
    The True Impact of MAC Randomization on Network Service Operators
    Oct 14, 2020 · The True Impact of MAC Randomization on Network Service Operators · No Real Way to Identify Devices · Harder to Provide Good Home Network Speeds.
  96. [96]
    Randomized MAC Address Conflict Analysis and Implications
    May 24, 2021 · The results suggest that MAC address randomization is unlikely to become an issue for smaller, simpler networks. While MAC address randomization ...
  97. [97]
    Wi-Fi MAC Randomization - Privacy and Collateral Damage
    Jul 25, 2016 · iOS and Android have supported MAC randomization, which is a way to dynamically change the MAC address used for over-the-air communications.
  98. [98]
    Notational conventions | FAQ - MAC Address Vendor Lookup
    The standard (IEEE 802) format for printing MAC-48 addresses in a human-friendly form is six groups of two hexadecimal digits, separated by colons (:) or ...
  99. [99]
    Bit ordering in MAC addresses - IBM
    List the MAC address, 1A 2B 3C 4D 5E 6F. Swap the digit order, A1 B2 C3 D4 E5 F6. Convert each digit, 58 D4 3C B2 7A F6 (the bit-reversed form of the original ...Missing: notation | Show results with:notation
  100. [100]
    MAC address (media access control) - IONOS
    Feb 22, 2023 · The MAC address (short for media access control address) is the worldwide unique hardware address of a single network adapter.
  101. [101]
    MAC Address Converter - Vultr.com
    Notation conventions for MAC addresses vary, most of which are covered within this tool. The most common notations are hexadecimal notation and bit-reversed ...
  102. [102]
    What is a MAC Address? Not a Cheesy Subject! - PathSolutions
    Apr 11, 2025 · Some other, less common notations may write the same MAC address as: 01:23:45:67:89:ab, 01-23-45-67-89-AB, or 0123.4567.89ab. Like phone ...
  103. [103]
    finding the right mac address for - IEEE Standards Association
    In MAC addresses, the OUI is combined with a 24-bit number (assigned by the owner, or assignee, of the OUI) to form the address.
  104. [104]
    Network Tables: MAC, Routing, ARP - Cisco Community
    Nov 15, 2020 · The MAC (physical) address is 48 bits of hexadecimal numbering on an Ethernet interface. The first 24 bits is a manufacturer OUI and the last 24 ...
  105. [105]
    MAC Address Issues in IEEE 802.1
    How many MAC Addresses will you use in 2025? • With Ethernet in automotive it could be near 100 or more depending upon how many ECU's need MAC Addresses.
  106. [106]
    Practical aspects of solving the incompatibility of 64-bit MAC ...
    Jul 18, 2024 · Routers must have a MAC address and IP address in each network interface it connects to. • Routers maintain a Routing Table. • Mapping of IP ...