SlideShare a Scribd company logo
MAC Addressing, ARP & Packet
Forwarding
(Network Essentials Course - Day 4)
Introduction to MAC Addressing
• MAC Address stands for Media Access Control
Address
• A unique
identifier
assigned to network interfaces for
communication within a network
• Consists of 48 bits, typically represented in hexadecimal
format (e.g., 00:1A:2B:3C:4D:5E)
Structure of a MAC Address
MAC addresses are divided into two parts:
• OUI (Organizationally Unique Identifier) First 24 bits
assigned by IEEE to a manufacturer
• NIC Specific (Device Identifier) Last 24 bits unique to the
device
Types of MAC Addresses
• Unicast MAC Address: Directs data to a specific device
• Multicast MAC Address: Directs data to multiple devices in a
group
• Broadcast MAC Address: Sends data to all devices in the network
(FF:FF:FF:FF:FF:FF)
What is ARP (Address Resolution Protocol)?
• ARP is used to map an IP address to a MAC address
• - You know their name (IP address), but you don't know their exact house
address (MAC address).- ARP comes into play and says, "Hey, I know the
name, let me find the house address for you."
• Essential for communication within LANs
• Works within Layer 2 (Data Link) and Layer 3 (Network) of the OSI model
How ARP Works?
• Device sends an ARP Request ("Who has this IP?")
• The device with the matching IP responds with an ARP
Reply ("I have this IP, here is my MAC")
• The sender updates its ARP table and starts
communication
ARP Spoofing (Security Concern)
• A technique where an attacker sends fake ARP replies to
mislead a device
• Can be used to intercept, modify, or stop network traffic
• Prevention methods: Static ARP entries, ARP Inspection,
Network Segmentation
Packet Forwarding Basics
• Packet forwarding is how data moves from one network to another
• Uses MAC addresses for communication inside a network (Layer 2)
• Uses IP addresses for communication between networks (Layer 3)
Practical Example – Viewing ARP Table
• On Windows: Open Command Prompt and type: arp –a
• On Linux/Mac: Open Terminal and type: arp -n
• Shows IP-to-MAC mappings in your local network
Packet Tracer Lab - ARP and Packet
Forwarding
• Setup a simple LAN with PCs and a switch
• Use Packet Tracer to send pings and analyze ARP
requests/replies
• Capture packets to observe MAC and IP address changes
Summary
• MAC addresses are unique hardware identifiers
• ARP resolves IP addresses to MAC addresses
• Packet forwarding ensures data reaches the correct destination
• ARP spoofing is a security risk; preventive measures are
necessary
Q&A
• Open floor for questions and
clarifications
Ad

More Related Content

Similar to presentation of first program exist.pptx (20)

Introduction to Interconnection-Devices.pptx
Introduction to Interconnection-Devices.pptxIntroduction to Interconnection-Devices.pptx
Introduction to Interconnection-Devices.pptx
amarmyothu2024
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
Shyama Bhuvanendran
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
Waqas Ahmed Nawaz
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
NguyenLe340487
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
Sĩ Anh Nguyễn
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 
Network Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptxNetwork Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptx
cossykin19
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
IP adress and routing(networking)
IP adress and routing(networking)IP adress and routing(networking)
IP adress and routing(networking)
welcometofacebook
 
Switches, Routers and different routing protocols
Switches, Routers and different routing protocolsSwitches, Routers and different routing protocols
Switches, Routers and different routing protocols
HarishKrishnanP
 
packet sniffing with Wireshark and its implementation.pptx
packet sniffing with Wireshark and its implementation.pptxpacket sniffing with Wireshark and its implementation.pptx
packet sniffing with Wireshark and its implementation.pptx
RohitAhuja58
 
ARP.ppt
ARP.pptARP.ppt
ARP.ppt
Jayaprasanna4
 
MAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptxMAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptx
RohitKumarShah6
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
nautami
 
Computer networks module 2 data link layer
Computer networks module 2 data link layerComputer networks module 2 data link layer
Computer networks module 2 data link layer
Manjunath852579
 
Week16 lec1
Week16 lec1Week16 lec1
Week16 lec1
syedhaiderraza
 
Network Intrusion Ditection System
Network Intrusion Ditection SystemNetwork Intrusion Ditection System
Network Intrusion Ditection System
Hitesh Mohapatra
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
DESTROYER39
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
prachi67
 
Finals Transfer Control Protocol/IP.pptx
Finals Transfer Control Protocol/IP.pptxFinals Transfer Control Protocol/IP.pptx
Finals Transfer Control Protocol/IP.pptx
qadrihassan339
 
Introduction to Interconnection-Devices.pptx
Introduction to Interconnection-Devices.pptxIntroduction to Interconnection-Devices.pptx
Introduction to Interconnection-Devices.pptx
amarmyothu2024
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
Waqas Ahmed Nawaz
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
Sĩ Anh Nguyễn
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 
Network Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptxNetwork Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptx
cossykin19
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
IP adress and routing(networking)
IP adress and routing(networking)IP adress and routing(networking)
IP adress and routing(networking)
welcometofacebook
 
Switches, Routers and different routing protocols
Switches, Routers and different routing protocolsSwitches, Routers and different routing protocols
Switches, Routers and different routing protocols
HarishKrishnanP
 
packet sniffing with Wireshark and its implementation.pptx
packet sniffing with Wireshark and its implementation.pptxpacket sniffing with Wireshark and its implementation.pptx
packet sniffing with Wireshark and its implementation.pptx
RohitAhuja58
 
MAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptxMAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptx
RohitKumarShah6
 
Computer networks module 2 data link layer
Computer networks module 2 data link layerComputer networks module 2 data link layer
Computer networks module 2 data link layer
Manjunath852579
 
Network Intrusion Ditection System
Network Intrusion Ditection SystemNetwork Intrusion Ditection System
Network Intrusion Ditection System
Hitesh Mohapatra
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
DESTROYER39
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
prachi67
 
Finals Transfer Control Protocol/IP.pptx
Finals Transfer Control Protocol/IP.pptxFinals Transfer Control Protocol/IP.pptx
Finals Transfer Control Protocol/IP.pptx
qadrihassan339
 

Recently uploaded (20)

Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
Abodahab
 
Conic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptxConic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptx
taiwanesechetan
 
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjksPpt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
panchariyasahil
 
Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...
Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...
Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...
James Francis Paradigm Asset Management
 
Introcomputerscienceand datascience.pptx
Introcomputerscienceand datascience.pptxIntrocomputerscienceand datascience.pptx
Introcomputerscienceand datascience.pptx
abdulrehmanbscsf22
 
KNN_Logistic_Regression_Presentation_Styled.pptx
KNN_Logistic_Regression_Presentation_Styled.pptxKNN_Logistic_Regression_Presentation_Styled.pptx
KNN_Logistic_Regression_Presentation_Styled.pptx
sonujha1980712
 
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your CompetitorsAI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
Contify
 
Data Analytics Overview and its applications
Data Analytics Overview and its applicationsData Analytics Overview and its applications
Data Analytics Overview and its applications
JanmejayaMishra7
 
i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...
i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...
i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...
ggg032019
 
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbbEDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
JessaMaeEvangelista2
 
computer organization and assembly language.docx
computer organization and assembly language.docxcomputer organization and assembly language.docx
computer organization and assembly language.docx
alisoftwareengineer1
 
Data Science Courses in India iim skills
Data Science Courses in India iim skillsData Science Courses in India iim skills
Data Science Courses in India iim skills
dharnathakur29
 
Developing Security Orchestration, Automation, and Response Applications
Developing Security Orchestration, Automation, and Response ApplicationsDeveloping Security Orchestration, Automation, and Response Applications
Developing Security Orchestration, Automation, and Response Applications
VICTOR MAESTRE RAMIREZ
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
03 Daniel 2-notes.ppt seminario escatologia
03 Daniel 2-notes.ppt seminario escatologia03 Daniel 2-notes.ppt seminario escatologia
03 Daniel 2-notes.ppt seminario escatologia
Alexander Romero Arosquipa
 
Chromatography_Detailed_Information.docx
Chromatography_Detailed_Information.docxChromatography_Detailed_Information.docx
Chromatography_Detailed_Information.docx
NohaSalah45
 
Induction Program of MTAB online session
Induction Program of MTAB online sessionInduction Program of MTAB online session
Induction Program of MTAB online session
LOHITH886892
 
Stack_and_Queue_Presentation_Final (1).pptx
Stack_and_Queue_Presentation_Final (1).pptxStack_and_Queue_Presentation_Final (1).pptx
Stack_and_Queue_Presentation_Final (1).pptx
binduraniha86
 
04302025_CCC TUG_DataVista: The Design Story
04302025_CCC TUG_DataVista: The Design Story04302025_CCC TUG_DataVista: The Design Story
04302025_CCC TUG_DataVista: The Design Story
ccctableauusergroup
 
PRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptx
PRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptxPRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptx
PRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptx
JayeshTaneja4
 
Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
Abodahab
 
Conic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptxConic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptx
taiwanesechetan
 
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjksPpt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
panchariyasahil
 
Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...
Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...
Safety Innovation in Mt. Vernon A Westchester County Model for New Rochelle a...
James Francis Paradigm Asset Management
 
Introcomputerscienceand datascience.pptx
Introcomputerscienceand datascience.pptxIntrocomputerscienceand datascience.pptx
Introcomputerscienceand datascience.pptx
abdulrehmanbscsf22
 
KNN_Logistic_Regression_Presentation_Styled.pptx
KNN_Logistic_Regression_Presentation_Styled.pptxKNN_Logistic_Regression_Presentation_Styled.pptx
KNN_Logistic_Regression_Presentation_Styled.pptx
sonujha1980712
 
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your CompetitorsAI Competitor Analysis: How to Monitor and Outperform Your Competitors
AI Competitor Analysis: How to Monitor and Outperform Your Competitors
Contify
 
Data Analytics Overview and its applications
Data Analytics Overview and its applicationsData Analytics Overview and its applications
Data Analytics Overview and its applications
JanmejayaMishra7
 
i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...
i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...
i_o updated.pptx 6=₹cnjxifj,lsbd ধ and vjcjcdbgjfu n smn u cut the lb, it ও o...
ggg032019
 
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbbEDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
JessaMaeEvangelista2
 
computer organization and assembly language.docx
computer organization and assembly language.docxcomputer organization and assembly language.docx
computer organization and assembly language.docx
alisoftwareengineer1
 
Data Science Courses in India iim skills
Data Science Courses in India iim skillsData Science Courses in India iim skills
Data Science Courses in India iim skills
dharnathakur29
 
Developing Security Orchestration, Automation, and Response Applications
Developing Security Orchestration, Automation, and Response ApplicationsDeveloping Security Orchestration, Automation, and Response Applications
Developing Security Orchestration, Automation, and Response Applications
VICTOR MAESTRE RAMIREZ
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
Chromatography_Detailed_Information.docx
Chromatography_Detailed_Information.docxChromatography_Detailed_Information.docx
Chromatography_Detailed_Information.docx
NohaSalah45
 
Induction Program of MTAB online session
Induction Program of MTAB online sessionInduction Program of MTAB online session
Induction Program of MTAB online session
LOHITH886892
 
Stack_and_Queue_Presentation_Final (1).pptx
Stack_and_Queue_Presentation_Final (1).pptxStack_and_Queue_Presentation_Final (1).pptx
Stack_and_Queue_Presentation_Final (1).pptx
binduraniha86
 
04302025_CCC TUG_DataVista: The Design Story
04302025_CCC TUG_DataVista: The Design Story04302025_CCC TUG_DataVista: The Design Story
04302025_CCC TUG_DataVista: The Design Story
ccctableauusergroup
 
PRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptx
PRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptxPRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptx
PRE-NATAL GRnnnmnnnnmmOWTH seminar[1].pptx
JayeshTaneja4
 
Ad

presentation of first program exist.pptx

  • 1. MAC Addressing, ARP & Packet Forwarding (Network Essentials Course - Day 4)
  • 2. Introduction to MAC Addressing • MAC Address stands for Media Access Control Address • A unique identifier assigned to network interfaces for communication within a network • Consists of 48 bits, typically represented in hexadecimal format (e.g., 00:1A:2B:3C:4D:5E)
  • 3. Structure of a MAC Address MAC addresses are divided into two parts: • OUI (Organizationally Unique Identifier) First 24 bits assigned by IEEE to a manufacturer • NIC Specific (Device Identifier) Last 24 bits unique to the device
  • 4. Types of MAC Addresses • Unicast MAC Address: Directs data to a specific device • Multicast MAC Address: Directs data to multiple devices in a group • Broadcast MAC Address: Sends data to all devices in the network (FF:FF:FF:FF:FF:FF)
  • 5. What is ARP (Address Resolution Protocol)? • ARP is used to map an IP address to a MAC address • - You know their name (IP address), but you don't know their exact house address (MAC address).- ARP comes into play and says, "Hey, I know the name, let me find the house address for you." • Essential for communication within LANs • Works within Layer 2 (Data Link) and Layer 3 (Network) of the OSI model
  • 6. How ARP Works? • Device sends an ARP Request ("Who has this IP?") • The device with the matching IP responds with an ARP Reply ("I have this IP, here is my MAC") • The sender updates its ARP table and starts communication
  • 7. ARP Spoofing (Security Concern) • A technique where an attacker sends fake ARP replies to mislead a device • Can be used to intercept, modify, or stop network traffic • Prevention methods: Static ARP entries, ARP Inspection, Network Segmentation
  • 8. Packet Forwarding Basics • Packet forwarding is how data moves from one network to another • Uses MAC addresses for communication inside a network (Layer 2) • Uses IP addresses for communication between networks (Layer 3)
  • 9. Practical Example – Viewing ARP Table • On Windows: Open Command Prompt and type: arp –a • On Linux/Mac: Open Terminal and type: arp -n • Shows IP-to-MAC mappings in your local network
  • 10. Packet Tracer Lab - ARP and Packet Forwarding • Setup a simple LAN with PCs and a switch • Use Packet Tracer to send pings and analyze ARP requests/replies • Capture packets to observe MAC and IP address changes
  • 11. Summary • MAC addresses are unique hardware identifiers • ARP resolves IP addresses to MAC addresses • Packet forwarding ensures data reaches the correct destination • ARP spoofing is a security risk; preventive measures are necessary
  • 12. Q&A • Open floor for questions and clarifications