Topic:
Logical link control and Media access control
(Communication via MAC address within different networks, MAC
addressing format characteristics and classification of MAC address, MAC
cloning.)
MAC Address:
The MAC (Media Access Control) Address is an
identifier that every network device uses to uniquely
identify itself on a network.
So, no 2 devices have anywhere in the world have
same MAC Address.
00-04-5A-63-A1-66
MAC address is made up of six-byte, Hexadecimal number that
can burned into every NIC by its manufacturer.
The MAC Address can contain any number, and it also can
contain alphabets from A-F
Parts
➢ 00-04-5A-63-A1-66
➢ The MAC address is broken up into two parts
➢ The first three bytes identify the manufacturer of the NIC, such as
Linksys, Netgear, TP-Link, etc.
➢ 00-04-5A-63-A1-66
➢ The last three bytes are a unique number from a manufacturer that
identifies each device on network.
Different Formats
MAC address is also referring to physical address or hardware address.
It looks different on different devices.
Windows: 00-04-5A-63-A1-66
Apple or Linux: 00:04:5A:63:A1:66
Cisco: 0004.5A63.A166
Purpose
➢ The purpose of the MAC Address is devices can communicate
with each other.
➢ Whenever a device talk to another device it’s ultimately done
using MAC Address and this is whether the devices are in close
to each other such as being on a same network or if they are
thousands of miles apart on a different network.
Different in MAC/IP Address
➢ You can change your IP address, or your internet service provider or
network administrator will change your IP address But we can’t change
MAC address Both are important:
➢ IP address tells us where the device is located.
➢ MAC addres tells us who the device is.
Classification of MAC Addresses
➢ Unicast MAC Address: A unique MAC address assigned to a single device.
➢ Multicast MAC Address: A MAC address that identifies a group of devices.
➢ Broadcast MAC Address: A special MAC address (FF:FF:FF:FF:FF:FF) that sends
data to all devices on a network.
➢ Locally Administered MAC Address: A MAC address assigned by a network
administrator, typically used for virtual machines or network devices.
➢ Universally Administered MAC Address: A MAC address assigned by the
manufacturer, typically used for physical network devices.
Example :
➢ 4A:30:10:21:1O:1A
➢ 47:20:1B:2E:08:EE
➢ FF:FF:FF:FF:FF:FF
Solution To find the type of the address,
we need to look at the second hexadecimal digit from the left. If it is even, the
address is unicast. If it is odd, the address is multicast. If all numbers are F's,
the address is broadcast.
a. This is a unicast address because A in binary is 1010 (even).
b. This is a multicast address because 7 in binary is 0111 (odd).
c. This is a broadcast address because all digits are F’s.
Communication via MAC addresses across different
networks:
Communicating via MAC addresses within and across
different networks involves understanding how MAC addresses
work .
Within the Same Network
1. MAC Address Resolution: When a device wants to
communicate with another device on the same network, it sends an
ARP (Address Resolution Protocol) request with the target device's
IP address.
2. ARP Response: The target device responds with its MAC
address, which is stored in the requesting device's ARP cache.
3. Frame Transmission: The requesting device can now send
frames directly to the target device using its MAC address.
Across Different Networks
1. Routing:
When a device wants to communicate with a device on
a different network, the data packet is sent to a router.
2. Router's MAC Address: The router's MAC address
is used as the destination MAC address for the packet.
3. Packet Forwarding: The router forwards the packet
to the next hop on the path to the destination network.
4. Destination Network: Once the packet reaches the
destination network, the process is similar to within the
same network.
Technologies That Use MAC Addresses
1. Wi-Fi: Wi-Fi networks use MAC addresses to identify
devices and manage communication.
2. Ethernet: Ethernet networks use MAC
addresses to identify devices and manage
communication.
3. Bluetooth: Bluetooth devices use MAC
addresses to identify and connect to other
devices.
Types of Addressing:
1. Unicast MAC Address: A unique MAC address
assigned to a single device.
2. Multicast MAC Address: A MAC address that
identifies a group of devices.
3. Broadcast MAC Address: A special MAC address
(FF:FF:FF:FF:FF:FF) that sends data to all devices on a
network.
Logical link control:
Logical Link Control (LLC) is a
sub layer of the Data Link Layer (DLL) in the OSI
model of computer networking. It is responsible for
providing error-free transfer of data frames between
two devices on the same network.
Key Functions of LLC:
1. Frame Synchronization: LLC ensures that
frames are transmitted and received in the
correct order.
2. Error Detection and Correction: LLC detects
errors that occur during transmission and corrects
them using error-checking mechanisms like CRC
(Cyclic Redundancy Check).
3. Flow Control: LLC regulates the amount of data
that can be sent at one time to prevent network
congestion.
4. Multiplexing: LLC allows multiple network
protocols to share the same physical link.
MAC cloning is a technique used to change the MAC address of a
network interface card or a network device.
Reasons for MAC Cloning
1. Bypassing MAC address filtering: Some networks use MAC
address filtering to control access. Cloning a MAC address can allow a
device to bypass this restriction.
2. Replacing a faulty NIC: If a NIC is faulty or damage, cloning its
MAC address to a new NIC can ensure continuity of network
connectivity.
3. create a virtual machine : when creating a virtual machine, you
may need to clone a MAC address of physical NIC to ensure that the
virtual machine can access the network.
4. Network testing and debugging: MAC cloning can be used to test
network configurations and debug network issues.
Methods for MAC Cloning
1. Using network configuration tools: Many
operating systems provide network configuration
tools that allow users to change the MAC address
of a NIC.
2. Using third-party software: There are several
third-party software tools available that can clone a MAC
address.
3. Using a MAC address changer: Some devices,
such as routers and switches, have built-in MAC address
changers.
Thank you for your attention