Sticky Banner Visual Mobile 3

Don't miss the Spring Deal: Save up to 78% before April 21.

Don't miss the Spring Deal: Save up to 78% before April 21. Claim now!

Claim Now!
Sticky Banner Visual Mobile 3

Spring deal: Save up to 78% — Offer ends in

Spring Deal: Save up to 78%

Claim Now!

Expressvpn Glossary

Media Access Control (MAC)

Media Access Control (MAC)

What is Media Access Control?

Media Access Control (MAC) is a sublayer of the data link layer (Layer 2) in the OSI networking model. It defines how devices access a shared network medium and identify network interfaces on a local network using MAC addresses.

How does Media Access Control work?

The MAC layer handles several key functions when data is ready to be sent across a local network:

  1. Encapsulates data into a frame: Takes data from the upper layer and packages it into a structured unit called a frame.
  2. Adds source and destination MAC addresses: Includes the sender’s and receiver’s hardware addresses so devices on the local network can identify each other.
  3. Adds error-detection information: Appends a Frame Check Sequence (FCS) that allows the receiving device to detect whether the frame was corrupted during transmission.
  4. Controls when transmission occurs: Follows defined access rules that determine how devices access a shared network medium to prevent interference when multiple devices share it.A list of functions performed at the MAC sublayer.

Why is Media Access Control important?

Media Access Control is essential for stable and efficient local networking: it’s what enables multiple devices to share the same network without interfering with one another.

On a local network, many devices may use the same physical medium, such as an Ethernet cable or a wireless signal. Without defined rules for access, transmissions could overlap, leading to data corruption and unreliable communication. The MAC sublayer establishes those rules, ensuring orderly and efficient use of the network medium.

MAC is also essential for device identification. Using unique MAC addresses allows frames to be delivered to the correct destination within a local network. In addition, MAC supports data integrity by including error-detection mechanisms that help devices identify corrupted frames.

Where is it used?

Media Access Control is used in most local and short-range networking technologies:

  • Ethernet local area networks (LANs)
  • Wi-Fi networks and wireless access points
  • Bluetooth and other short-range links
  • Enterprise network access control (NAC) systems
  • IoT networks and home routers

Risks and privacy concerns

Although MAC is essential for local networking, it has certain security and privacy limitations.

  • MAC spoofing and filtering limitations: MAC addresses can be changed through software, allowing a device to impersonate another. Because of this, network security measures based solely on MAC address filtering can be easily bypassed.
  • Device tracking on local networks: Since a MAC address uniquely identifies a network interface, it can potentially be used to monitor or track devices on shared networks, such as public Wi-Fi. Modern operating systems reduce this risk by using MAC address randomization.
  • Rogue access points: Malicious wireless networks may collect MAC addresses from nearby or connected devices for profiling or monitoring purposes.

Further reading

FAQ

What’s the difference between a MAC address and an IP address?

A Media Access Control (MAC) address is a hardware identifier assigned to a network interface and used for communication within a local network (Layer 2). An IP address is a logical address assigned by a network and used to route traffic between networks (Layer 3).

Can a VPN hide my MAC address?

No, a virtual private network (VPN) encrypts your internet traffic and hides your public IP address from websites and external servers.

Is MAC address filtering a good security measure?

While it allows a network to permit or block devices based on their Media Access Control (MAC) address, those addresses can be spoofed. For stronger protection, MAC filtering should be combined with proper authentication and encryption.

What is MAC randomization, and why use it?

Media Access Control (MAC) randomization is a privacy feature that periodically changes a device’s MAC address on wireless networks to reduce tracking.

Can someone spoof my MAC address?

Yes, a Media Access Control (MAC) address can be changed through software, allowing a device to impersonate another on the same local network.
Get Started