Home>Article> Will the mac address change?

Will the mac address change?

青灯夜游
青灯夜游 Original
2023-02-20 13:49:32 15592browse

The mac address will not change. The mac address, also called physical address and hardware address, is an address used to confirm the location of network equipment. It is written inside the hardware when it is produced by the network equipment manufacturer. The MAC address is used to uniquely identify a network card in the network. If a device has one or more network cards, each network card needs and will have a unique MAC address.

Will the mac address change?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

The mac address will not change.

MAC address (English: Media Access Control Address), literally translated as media access control address, also known as LAN Address, MAC address, Ethernet Address Or physical address (Physical Address), which is an address used to confirm the location of a network device. In the OSI model, the third network layer is responsible for IP addresses, and the second data link layer is responsible for MAC addresses. The MAC address is used to uniquely identify a network card in the network. If a device has one or more network cards, each network card needs and will have a unique MAC address.

The MAC address is also called the physical address and hardware address. It is burned into the EPROM (a flash memory chip that can usually be erased by a program) on the network interface card when it is produced by the network equipment manufacturer.

The structure of mac address

Each device in the network has a unique network identifier. This address is called a MAC address or network card address, and is produced by the network equipment manufacturer. is written inside the hardware.

IP addresses and MAC addresses are both represented in binary in the computer. The IP address is 32 bits, while the MAC address is 48 bits. Usually expressed as 12 hexadecimal numbers, each two hexadecimal numbers are separated by colons, such as 08:00:20:0A:8C:6D is a MAC address. Specifically as shown in the figure below

Will the mac address change?

The first 3 bytes represent OUI (Organizationally Unique Identifier), which is a code assigned by the IEEE registration management agency to different manufacturers to distinguish different manufacturers. . The last 3 bytes are allocated by the manufacturer.

The lower second bit (LSb) of the highest byte (MSB) of the MAC address indicates whether the MAC address is global or local, that is, the U/L (Universal/Local) bit. If it is 0, it means yes global address. All OUI bits are 0.

The lower first bit (LSb) of the highest byte (MSB) of the MAC address indicates whether the MAC address is unicast or multicast. 0 means unicast.

Function

IP address is based on logic, is more flexible, is not limited by hardware, and is easy to remember. The MAC address is consistent with the hardware to a certain extent, is based on physics, and can identify specific network nodes. Both addresses have their own advantages, and different addresses are used depending on different conditions.

Most of the ways to access the Internet are to organize hosts together through a LAN, and then connect them to the Internet through devices such as switches or routers. This raises the question of how to distinguish specific users and prevent IP addresses from being stolen. Since the IP address is only a logical identifier and can be modified by anyone, it cannot be used to specifically identify a user. The MAC address is not the case. It is fixed in the network card. Theoretically, unless the hardware, namely the network card, is stolen, it generally cannot be impersonated. Based on this characteristic of the MAC address, the LAN adopts the method of using the MAC address to identify specific users.

In the specific communication process, the MAC address and IP address are matched one-to-one through the exchange table inside the switch. When there is a data packet sent to a host in the local LAN, the switch first receives the data packet, then maps the IP address in the data packet to a MAC address according to the corresponding relationship in the switching table, and then forwards the data packet to the corresponding The MAC address of the host goes up. In this way, even if a host steals this IP address, it cannot receive the data packet because it does not have a corresponding MAC address. The sending process is similar to the receiving process.

So, whether it is a local area network or a wide area network, when computers communicate with each other, the final performance is that the data packet starts from an initial node on some form of link and is passed from one node to another. A node is finally transmitted to the destination node. The transmission of data packets between these nodes is completed by ARP (Address Resolution Protocol) which is responsible for mapping IP addresses to MAC addresses.

ID card is used to prove a person’s identity. The ID card is not very useful on weekdays, but at certain critical moments, an ID card is necessary to explain everything about a person. Then, the binding of IP address and MAC address is like the relationship between a person and his ID card in daily life. Because the IP address can be arbitrary, but the MAC address is the only one that shows the identity of the IP address. For example, to prevent IP addresses from being stolen, usually switch port binding (the port's MAC table uses static entries) can prevent theft of modified MAC addresses when each switch port is connected to only one host. The layer device can also provide binding of switch ports, IP addresses, and MAC addresses.

For more related knowledge, please visit theFAQcolumn!

The above is the detailed content of Will the mac address change?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn