Mac Address Routing Policy Over The Ip N
Mac Address Routing Policy Over The Ip N
Cunche and Mathieu et al.(2018-08-22) in their work IV. WHAT DOES BIT NUMBER OF MAC
emphasize and addressed that MAC stands for Media Access ADDRESS MEAN?
Control in general. It is set of numbers that identifies network
devices. This number is set by the manufacturers and is Mathy Vanhoef and Matte Célestin and Cunche Mathieu and
embedded within the hardware so it cannot be changed. For Cardoso Leonardo and Piessens Frank et al.( 2018-08-22) in
this reason it is also known as a fixed address [4]. While it was their work emphasize and address that the first six digits or 24
known as an Ethernet address, Wi-Fi and Bluetooth are among bits in a 48-bit network, is a prefix that is used to identify the
the technologies also use MAC addresses. manufacturer of the device. It is not unusual to find that
several devices created by the same manufacturer have
MAC address can be access through operating system by different prefix. This is because some of the biggest
using commands. IP addresses, MAC addresses are all unique. manufacturers utilize multiple prefixes across their products.
They all follow the same set of rules when it comes to format
[5]. The remaining 24 bits, is essentially a serial number. That
identifies the particular device. All products from the same
manufacturer that have the same prefix (or first set of 6 digits)
II. HOW MANY BITS ARE IN A MAC will have a distinct second set of numbers. Each will unique. If
ADDRESS? the prefix is different, the product identifier may be the same,
even when the products are from the same manufacturer. It
Aaron Mamiit et al (2014-06-12) in their work emphasize and may also find that the identifier is the same between two
addressed issues of MAC addresses are come up of 12-digit products from different manufacturers [8]. As already
numbers and are made up of 48 bits, or 8 bytes also. Some explained, each manufacturer has its own prefix, so this
types of hardware require a 64-bit MAC address [6]. Certain number will be vary. Every device will in some way have a
8
International Journal of Engineering Applied Sciences and Technology, 2019
Vol. 3, Issue 11, ISSN No. 2455-2143, Pages 8-11
Published Online March 2019 in IJEAST (http://www.ijeast.com)
completely unique MAC address, they were made by the same VI. 64-BIT MAC ADDRESSES
manufacturer or not.
Traditional MAC addresses are all 48 bits in length, few types
of networks require 64-bit addresses instead. TCP/IP networks
V. FORMAT OF A MAC ADDRESS based on IPv6 implement a different approach to
communicating MAC addresses compared to mainstream
MAC address is 12-digit (6 bytes or 48 bits) hexadecimal IPv4. Instead of 64-bit hardware addresses, though, IPv6
numbers. They are usually written in one of the following automatically translates 48-bit MAC address to a 64-bit
three formats: address by inserting a fixed 16-bit value FFFE in between the
vendor prefix and the device identifier [10],[11]. IPv6 calls
MM:MM:MM:SS:SS:SS these numbers "identifiers" to distinguish them from true 64-
bit hardware addresses [12]. Example, a 48-bit MAC address
MM-MM-MM-SS-SS-SS 00:25:96:12:34:56 appears on an IPv6 network as (commonly
written in either of these two forms):
00:25:96:FF:FE:12:34:56
0025:96FF:FE12:3456
A network node have multiple NIC and each NIC must has a
unique MAC address [14].
Locally Administered. Example address 06-00-00-00-00-00 connections from one piece of networking equipment to the
the first octet is 06 (hex), the binary form of which is next and so on [19].
00000110, where the second-least-significant bit is 1. So, it is
a Locally Administered Address [16].
VIII. MAC ADDRESS ROUTING PROTOC0L
X. CONCLUSION
[3] Standards.ieee.org "IEEE -SA- IEEE Registration [12] Wang Winkey "Wireless networking in Windows
Authority", Retrieved 2018-09-20. 10". Missing or empty |url= (help)
[4] IEEE-SA "Standard Group MAC Addresses: A [13] Grumbach Emmanuel "iwlwifi: mvm: support
Tutorial Guide" (PDF), Retrieved 2018-09-20. random MAC address for scanning". Linux commit
[5] IEEE-SA "Guidelines for Fiber Channel Use of the effd05ac479b, Retrieved 2018-08-22.
Organizationally Unique Identifier (OUI)" [14] Matte Célestin "Wi-Fi Tracking: Fingerprinting
(PDF),Retrieved 2018-10-11. Attacks and Counter-Measures". 2017, Retrieved
[6] Support forums.cisco.com "Overview of Layer 2 2018-08-22.
Switched Networks and Communication | Getting [15] Mathy Vanhoef and Matte Célestin and Cunche
Started with LANs | Cisco Support Community | Mathieu and Cardoso Leonardo and Piessens Frank
5896 | 68421", Retrieved 2016-05-17. "Why MAC address randomization is not enough: An
[7] James Bamford "The Most Wanted Man in the analysis of Wi-Fi network discovery mechanisms".
World" Wired. p. 4 Retrieved 2014-12-01. Retrieved 2018-08-22.
[8] Aaron Mamiit (2014-06-12) "Apple Implements [16] Célestin Matte and Cunche Mathieu and Rousseau
Random MAC Address on iOS 8. Goodbye, Franck and Vanhoef Mathy "Defeating MAC address
Marketers". Tech Times, Retrieved 2014-12-01. randomization through timing attacks ", Retrieved
[9] Matte Célestin "Wi-Fi Tracking: Fingerprinting 2018-08-22.
Attacks and Counter-Measures". 2017, Retrieved [17] Cunche, Mathieu "I know your MAC Address:
2018-08-22. Targeted tracking of individual using Wi-Fi" (PDF).
[10] Mathy Vanhoef and Matte Célestin and Cunche 2013. Retrieved 19 December 2014. 20."ifconfig (8)
Mathieu and Cardoso Leonardo and Piessens manual page", Retrieved 16 October 2016.
Frank."Why MAC address randomization is not [18] Security, Stack exchange.com "Hidden network no
enough: An analysis of Wi-Fi network discovery beacons", Retrieved 16 October 2016.
mechanisms", Retrieved 2018-08-22. [19] Configuration Guide for Cisco Secure ACS
[11] Matte Célestin and Cunche Mathieu and Rousseau 4.2.Cisco.February 2008."Agent less Host
Franck and Vanhoef Mathy "Defeating MAC address Configuration Scenario", Retrieved-2015-09
randomization through timing attacks", Retrieved
2018-08-22
11