Skip to main content

MAC address and IP address: Differences and Uses

Published on:
.
14 min read
.
For German Version
.

All network devices in computer networks connect and communicate with one another. But the topic of how one device would uniquely identify the other devices in the network is something that always crosses our minds. Only with the aid of MAC (Media Access Control) and IP addresses is this feasible. There is uncertainty between these two once more. So let's use an example to explain it to them before we define it.

Suppose someone has to deliver a package to someone else. To effectively send the courier, the sender must provide two details about the recipient. The two items are the receiver's name and address, which may include a house number, street, city, state, and pin code (to identify the right person to deliver the courier specifically). If we apply this example to networking, the MAC address will be the address of the particular node where we want to send the data, and the IP address will be the address of the network connection where several devices may be present.

A MAC address and an IP address both help identify a device specifically on the internet. The IP address is generated by the ISP (Internet Service Provider), whereas the MAC address is provided by the Network Interface Controller (NIC)manufacturer. There are significant differences between a MAC address and an IP address. The IP address of a device is crucial for determining a network's connection (using which the device is connecting to the network). On the other hand, the MAC address guarantees the computer device's precise location. It enables us to uniquely identify a certain device on the access network.

Let's learn a little bit more about them before we get into more detail about the distinction between MAC address and IP address.

MAC Address Lookup

Our MAC Address Lookup utility provides a comprehensive overview of the MAC Addresses of networking cards that have been installed on your computer or other devices.

With a single click, you will obtain all information associated with a device's media access control address, including the name of the manufacturing company and the country of origin.

You can find your MAC address vendor by using the following MAC Address tool:

What is MAC Address?

A MAC address, which is also known as a hardware or physical address, is an unique alphanumeric identifier consisting of 12 characters. MAC address is allocated to a network interface controller (NIC) and functions as a network address when communications occur within a network segment. Ethernet, Wi-Fi, and Bluetooth are just a few of the IEEE 802 networking technologies that frequently employ this application.

Since device manufacturers are the primary assignors of MAC addresses, they are frequently denoted as burned-in addresses, Ethernet hardware addresses, physical addresses, or hardware addresses. A firmware mechanism or hardware component, such as the card's read-only memory, may be utilized to store each address.

MAC addresses are used in the data link layer, sometimes referred to as Layer 2. MAC addresses are used to address and identify data packets at the data link layer, providing a distinct identity to devices inside a local area network (LAN). Every device connected to a network has a Media Access Control (MAC) address that uniquely identifies it, much like every house has a unique postal address.

What is the Format of a MAC Address?

A MAC address is a 48-bit identifier, often expressed as a sequence of 12 hexadecimal digits (0 to 9, a to f, or A to F). These numbers are commonly arranged in pairs and separated by colons or dashes. Six groups of two hexadecimal numerals, separated by hyphens, colons, or not at all, constitute MAC addresses. The MAC address 00-B0-D0-64-C1-36 is an example.

Hexadecimal 12-digit digits make up MAC addresses (48 bits in length). MAC addresses are often written using one of the following formats, according to convention:

  • MM:MM:MM:SS:SS:SS

  • MMMM-MMSS-SSSS

  • MMM.MMM.SSS.SSS

The ID number of the adapter manufacturer is found in the first 24 bits of a MAC address. An organization that sets Internet standards oversees these IDs. Every vendor must register and acquire MAC prefixes that are given by the IEEE. Vendors often have many prefix numbers linked to their goods. For the following MAC address, 00:A0:C9:15:C8:29, the initial 00A0C9 identifies Intel Corporation as the maker.

The least significant digits of a MAC address serve as a unique identifier for the particular device (S). Each device produced by the same manufacturer is assigned a distinct 24-bit number within the range of devices with the same vendor prefix. Hardware from many suppliers may have overlapping device address segments.

MAC Address structure

Figure 1. MAC Address Structure

What are MAC Address Examples for Vendors?

Examples of OUI for well-known vendors are as follows.

  • CC:46:D6 : Cisco

  • 3C:5A:B4 : Google, Inc.

  • 3C:D9:2B : Hewlett Packard

  • 00:9A:CD : HUAWEI TECHNOLOGIES CO.,LTD

Get Started with Zenarmor Today For Free

What are the Types of MAC address?

There are three types of MAC address:

  1. Unicast: Unicast MAC address represents a specific NIC or onboard NIC ports in the network. The frame is intended to be received by only one NIC if the LSB (least significant bit) of the first octet of an address is set to zero. The originating machine's MAC address is always unicast.
  2. Multicast: A group of devices (or NICs in Layer 2) is represented by a multicast MAC address. The OUI 01-00-5E (first 3-bytes or 24 bits) has been designated by the IEEE for multicast MAC addresses. The network application or device that wishes to transmit data within the group is responsible for determining the remaining 24 bits. The prefix 01-00-5E is always the beginning of a multicast MAC address.
  3. Broadcast: All devices in the network are represented by the broadcast MAC address. The broadcast MAC address has been reserve by the IEEE. It is FFFF.FFFF.FFFF. This address can be utilized as the destination MAC address by any device that wishes to transmit data to all devices on the network.

What is the Importance of MAC Address?

The MAC addresses of every device on a subnet of a network are unique. A MAC address serves as a unique identifier for various devices connected to a local network, such as computers, cellphones, game consoles, and other similar devices. When accessing the internet, networking protocols use this address at the data connection layer to guarantee that data packets are sent to the correct destination. By including the MAC address into the packet header, routers and switches can accurately direct the data without requiring any action on your part.

MAC addresses are highly helpful when identifying network difficulties like IP address issues.

MAC addresses are advantageous for network diagnostics since they are static, unlike dynamic IP addresses, which can fluctuate. Because of this, a MAC address provides a more trustworthy means for a network administrator to identify data senders and receivers on the network.

Some of the beneficial use cases of MAC addresses are as follows:

  • Only the ports that need to see the packet are forwarded by network switches, which keep a list of all the MAC addresses observed at each port.

  • MAC addresses are frequently used by wireless access points to control access. They only permit access for known devices with the right passwords (MAC addresses are unique and identify devices).

  • The MAC address is used by DHCP servers to recognize devices and assign some of them fixed IP addresses.

How to Find My MAC Address?

Every internet-connected device is given a distinctive ID called a MAC (Media Access Control) address that identifies it when it is linked to a particular network.

Finding MAC Address on Windows

To find your Windows computer's MAC address follow the steps given below.

  1. In the bottom-left corner of your computer, click the Start button.

  2. Open the command prompt either by choosing "Run" or by typing "cmd" into the search box at the bottom of the Start menu.

  3. Type ipconfig /all.

  4. The 12 digits that make up the MAC address are given as the Physical Address (00:1A:C2:7B:00:48, for example). Every network device, including wireless and Ethernet ones, has a unique MAC address.

Finding MAC Address on Apple

To find your Apple computer's MAC address, you may follow the next steps.

  1. Open System Preferences in the Apple menu.

  2. Choose Network.

  3. Click Advanced after selecting Airport for the wireless adapter MAC (the MAC address is listed as Airport ID).

  4. For the network cable adapter MAC, select Built-in Ethernet, Advanced, and Ethernet (listed as Ethernet ID).

Finding MAC Address on Linux

To find your Linux computer's MAC address you may follow the next instructions.

  1. Start typing "network" in the Activities overview window.

  2. For the panel to open, click Network.

  3. From the left pane, select the Wi-Fi or wired option for the device.

  4. The Hardware Address on the right will show the connected device's MAC address.

  5. The hardware address for the wireless device will be displayed as the MAC address when you click the button in the Details panel.

What are Security Risks with MAC Addresses?

If misused or inadequately managed, MAC addresses can introduce numerous security risks, despite their necessity for network functionality. Certain security concerns that are frequently linked to MAC addresses are as follows.

  1. MAC Address Spoofing: Attackers can readily alter (spoof) the MAC address of their device in order to impersonate another legitimate device. MAC address spoofing has the potential to enable unauthorized network access or facilitate man-in-the-middle (MITM) attacks by bypassing MAC-based access controls.

  2. Unauthorized Network Access: Networks that rely exclusively on MAC address filtering to regulate access are susceptible. Attackers have the ability to impersonate an authorized MAC address in order to obtain illicit network entry, which could result in access to sensitive resources or data.

  3. Privacy and Tracing Issues: Static MAC addresses can be used to uniquely identify devices, which allows for the tracing of device movements across the network. Significant privacy risks can be posed by the monitoring of user behavior, location, or network utilization patterns by attackers or malicious entities.

  4. Denial-of-Service (DoS) Attacks: Attackers can overwhelm a network switch's MAC address table (CAM table overflow attack), causing the switch to malfunction. Switches may broadcast transmissions to all connected devices when they are overwhelmed, which allows adversaries to intercept sensitive data or disrupt network operations.

  5. ARP Poisoning (ARP Spoofing): Attackers have the ability to send fabricated Address Resolution Protocol (ARP) messages that link their MAC address to the IP address of another host. This technique facilitates MITM attacks or data theft by enabling attackers to intercept, modify, or redirect network traffic.

  6. Wi-Fi Deauthentication Attacks: Attackers have the ability to send spoofed Wi-Fi management frames (deauthentication packets) using victim MAC addresses. Attackers consistently force legitimate devices to disconnect from the network, causing disruption and potentially leading to denial-of-service.

  7. Inadequate Performance of MAC Filtering as a Security Measure: Relying solely on MAC filtering fails to provide adequate network security. Spoofing can readily circumvent MAC filters, resulting in only superficial security.

To mitigate MAC address security risk, you should employ more robust authentication methods, such as 802.1X authentication, and limit unauthorized access by implementing network segmentation and VLANs. Other approaches to mitigate these risks are to implement Intrusion Detection and Prevention Systems (IDS/IPS) to identify deception attempts and conduct consistent network traffic monitoring to identify any atypical MAC address behavior. Lastly, you may enable the randomization of MAC addresses on client devices to improve privacy.

In conclusion, the use of MAC addresses as a sole security measure is insufficient, and their exclusive reliance can introduce substantial vulnerabilities. Layered defenses, robust authentication methods, and ongoing monitoring are all essential components of effective security.

How does MAC Address Randomization work?

MAC address randomization is a privacy utility that is extensively used in modern devices to protect user privacy by preventing device monitoring based on hardware identifiers. MAC address randomization is employed on devices to alter their Media Access Control (MAC) addresses periodically. This process makes it more difficult for networks or third parties to monitor the device's location or activity.

Some users prefer to use randomized MAC addresses on their devices due to privacy reasons. The identification and monitoring of devices across networks can be facilitated by regular MAC addresses, which poses a privacy risk. The capacity of networks or third parties to monitor user movements or behaviors is restricted by periodically randomizing the MAC address.

The following is how MAC address randomization functions. The device generates a random MAC address rather than utilizing its actual hardware MAC address. Each time they establish a connection to a new network, certain devices generate random MAC addresses. Even when connected to the same network, other individuals may intermittently modify their MAC addresses. A significant number of devices utilize a consistent random MAC address for a specific Wi-Fi network (SSID), only altering it when they connect to a different network. In order to denote that the MAC address is not globally unique (i.e., not assigned by the manufacturer), randomized MAC addresses typically set the locally administered bit. The MAC randomization feature randomizes the address by setting the locally administered bit to 1 and the unicast bit to 0. Randomization is implemented for the remaining 46 bits.

MAC randomization has been implemented in mobile devices running Android (since Android 8 and particularly Android 10), iOS (since iOS 8), and Windows 10/11. Modern operating systems typically enable this feature by default; however, users may manually disable or modify the settings as necessary.

Although MAC address randomization provides enhanced privacy, it has some limitations and challenges. Randomization is occasionally disabled by users to guarantee compatibility with particular networks or services. Firstly, certain network access controls or authentication systems that rely on fixed MAC addresses may experience issues when randomized MAC addresses are used. Moreover, the constant evolution of MAC addresses presents network administrators with difficulties in enforcing policies and managing devices.

Lastly, it has inadequate security. Randomization of the MAC address is primarily intended to improve privacy, rather than security. It does not safeguard data transmissions or prevent other forms of monitoring, such as those that rely on IP addresses or cookies.

Does VPN Hide Your MAC address?

It is commonly known that a VPN can conceal an IP address, but what about a MAC address? Can websites monitor it or is it visible on your router even while using a VPN?

Whether you use a VPN or not, websites cannot see your device's MAC address, since it is stripped from your internet traffic as soon as it leaves your router. The website cannot even determine your router's MAC address because it typically requires numerous hops through multiple devices to reach it.

Even if the MAC address is not immediately visible to websites, there are a few indirect techniques to obtain it, including IPv6 extraction and device script execution.

A router is part of a local network, and your device's MAC address is used to communicate with it. Using a VPN to conceal your IP address on the public internet would not conceal your MAC address from a router. You would be unable to access the internet if your MAC address were hidden from a router.

What is an IP address?

The term "Internet Protocol", for which the abbreviation IP stands, is a set of guidelines that control the format of data exchanged via a local or public network.

An IP address is an identification tool for network connections. A link in a network receives what is known as a "logical address" from the network. IP addresses define how internet routers behave and allow you to regulate how devices communicate over the Internet.

An internet protocol address (IP address) is a numerical representation of a network interface that serves as its sole means of identification such as 123.89.46.72.

There are four components to an IP address:

  • first octet - the IP's first digit (123)

  • second octet - the IP's second number (89)

  • third octet, or the third IP digit (46)

  • The fourth and last number of the IP is the fourth octet (72)

The Internet Protocol version 4 sample above (123.89.46.72) is the fourth version of the Internet Protocol (IPv4).

There is still another Internet protocol variant as well. The most recent Internet Protocol version is IPv6, which was released in 2007.

The two IP versions that are now in use are IPv4 and IPv6. The original IPv4 protocol is still in use today on the internet and in many corporate networks. On the other hand, the IPv4 protocol was limited to 2^32 addresses. Due to the way addresses were assigned, there would be a situation where there wouldn't be enough unique addresses for all internet-connected devices.

The most recent version is Internet Protocol version 6 (IPv6). To accommodate the demand for more Internet addresses, this new IP address version is being used. It was developed to overcome IPv4 issues. With a 128-bit address space, it supports 340 billion distinct address spaces. IPng (Internet Protocol next generation) is another name for IPv6.

What is the Importance of an IP Address?

An IP address is used to manage the connection between gadgets that send and receive data over a network. Without an IP address, it is impossible to communicate with any device connected to the internet. IP addresses allow computing devices (such PCs and tablets) to communicate with websites and streaming services, as well as information websites of the identity of the connecting user.

IP addresses are just as significant as a person's identification number or card. It guarantees protection for your advantages and fosters your innovation in the subject or fields that interest you as a user. An independent IP address is crucial for any website, whether it be a company website, a blog, or even a website that aims to educate college students by offering relevant content. One can only envision the emergence of additional channels of an ever-growing network, and to administer these networks to every last user, we all need IP addresses, as technology is altering quicker than human DNA itself.

Therefore, IP addresses are just as crucial as your house keys, without which it would be very impossible to access your network, or, to put it another way, just as crucial as a dot on a Google map that represents your property. However, keep in mind that employing it wisely will bring you great fortune and status, depending on your efforts and originality.

What are IP Address Types?

IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6) are the two main versions of IP addresses.

The initial Internet Protocol, IPv4, was implemented in the 1980s. Here�s an example of what an IPv4 address looks like: 192.168.1.1. It employs a 32-bit address scheme, which allows for a total of around 4.3 billion unique addresses. Although it has 4,294,967,296 addresses, there is still a scarcity of network addresses due to the rapid growth of virtual and network devices.

IPv6 is the recent version of the Internet Protocol address. The address capacity of IPv6 is 128-bit number. It appears to be more than adequate to accommodate trillions of internet devices that are currently in operation or will be introduced in the future, with a maximum of 3.4 x 10^38 unique IP addresses.

There are four types of IP addresses: Public, Private, Static, and Dynamic. Public and private addresses are generated based on their local network location; private IPs are used inside the network, whilst public IPs are employed outside.

  1. Private IP address: Every device connected to your Internet network has a private IP address. This encompasses computers, smartphones, tablets, and Bluetooth-enabled devices, including printers, and smart TVs. The proliferation of IoT devices is resulting in a rise in the number of private IP addresses in households. Routers need a method to distinguish these issues individually, and most entities necessitate a means of mutual recognition. Consequently, routers produce private IP addresses that serve as unique identifiers for each device, thereby segmenting the network.
  2. Public IP address: A public Internet Protocol address is an Internet Protocol address accessible over the Internet. The public Internet Protocol address, akin to a postal address for mail delivery, is a distinct worldwide Internet Protocol address allocated to computer equipment. The web server, email server, and any server device with direct connectivity to the Internet will use the public Internet Protocol address. The Internet Protocol address is globally unique and assigned exclusively to a certain device.
  3. Dynamic IP address: It signifies perpetual alteration. A dynamic IP address fluctuates periodically and is not consistently identical. If you own an active cable or DSL subscription, you may have a robust IP address. Internet Service Providers allocate dynamic IP addresses to consumers due to the high cost of static IP numbers. Your IP address is temporarily allocated from a pool of addresses rather than being a fixed permanent address. After many days, weeks, or perhaps months, that number is returned to the pool and assigned a new number. The majority of ISPs do not provide static IP addresses to local clients, and when available, they are often more costly. Dynamic IP addresses might be cumbersome, but, with appropriate software, navigation can be seamless and cost-free.
  4. Static IP address: A static IP address is not a legitimate IP address. A dynamic IP address is assigned by the Dynamic Host Configuration Protocol (DHCP) server and is subject to change. A static IP address remains constant but may be altered during routine network administration. Static IP addresses are fixed, assigned once, and stay unchanged throughout time. This category of IP facilitates the acquisition of other information on the device.

Is an IP Address Specific to a Device?

No, an IP address is not inherently associated with a single device. Rather, it is contingent upon the specific type of IP address:

A public IP address is common among devices. It is typically shared by multiple devices within the same local network when they access the internet. A public IP address is typically assigned by an Internet Service Provider (ISP) to your router or modem, which then shares this singular IP address with all devices connected to your home or office network. This address is not device-specific.

A private IP address is device-specific within a network but not universally unique. The router assigns a unique private IP address to each device connected to a local network, such as a domestic Wi-Fi network. This address is exclusive to that network. Private IP addresses are repurposed in various local networks. For instance, numerous residences employ private IP addresses such as 192.168.1.x.

Dynamic IP address is temporarily assigned by the ISP or router and may change periodically. However,a static IP is constantly assigned to a device or network.

Consequently, an IP address is not inherently specific to a single device on a global scale unless it is explicitly designated as a static IP address.

Tools for IP Address Discovery

This tool helps you discover your public IP address.

Your Public IP Address is:

Country Flag

Country:

Country Code:

Region:

Region Name:

City:

Zip:

Lat:

Long:

Timezone:

ISP:

AS:

Org. Name:

Do Firewalls Hide IP addresses?

It's possible that you're behind a NAT firewall if you utilize a wireless router to connect to the internet. A NAT firewall enables several devices on the same network to share the same public IP address while maintaining separate private IP addresses. NAT transfers requests and data from the private IP addresses of individual devices to their online destination using the router's public IP address. These conserve address space (the number of accessible IP addresses) and eliminate unwanted contact with possibly harmful computers on the internet.

Your public IP address is not concealed by a NAT firewall, but your private IP address is. All devices connected to a router with NAT enabled will share the same public IP address. The NAT firewall will block all internet communications that are not in response to a request issued from a private IP address. Because they lack a private IP address to which they can be sent, all other requests and data packets are deleted.

How does Your IP Address Affect Privacy?

Your IP address has a substantial impact on your privacy by disclosing your location, facilitating activity monitoring, and potentially exposing you to security risks. Your online privacy is considerably influenced by your IP address in the following ways.

  • Online Activity Tracking: With your IP address, websites and Internet Service Providers (ISPs) can monitor your browsing activities, potentially generating comprehensive profiles of your interests and behaviors. In order to serve targeted advertisements and construct user profiles, advertisers collect IP addresses
  • Location Tracking: Your approximate geographic location (city, state, or region) can be determined by your IP address. This information is utilized by online services, advertisers, and websites to monitor your location and present targeted content or advertisements.
  • Correlation of Identity: If your online activities are associated with identifiable accounts or profiles, your IP address can be used in conjunction with other data to personally identify you.
  • Cyberattacks: Malicious actors may attempt cyberattacks, such as distributed denial of service (DDoS) attacks, or use your IP address to investigate your network for vulnerabilities if they obtain them.
  • Geoblocking: Access to specific content or services is contingent upon your IP address, as certain websites restrict access based on geographic location.
  • Legal and Surveillance Concerns: Authorities have the ability to request IP records from ISPs or websites in order to monitor your online activities. Your IP address may be employed as evidence in legal proceedings to establish a connection between you and online activities.

These risks can be mitigated by taking proactive measures, such as utilizing privacy-enhancing products and services. You may utilize a Virtual Private Network (VPN). This service encrypts your internet traffic and conceals your true IP address, thereby reducing the ability to monitor your location or activities. Another solution is to utilize proxy servers. Proxies disguise your IP address by serving as intermediaries between your device and the internet. Lastly, some people use the Tor network for their privacy. By routing your traffic through multiple servers, the Tor network obscures your IP address, thereby providing anonymity.

What are the Differences Between MAC Address and IP Address?

The function that MAC addresses and IP addresses both perform is to designate a specific device within a network. The MAC address designates the physical location of a device within a local network, whereas the IP address signifies the device's global or internet-accessible identity. The manufacturer of the NIC card provides the MAC Address, whereas the Internet Service Provider supplies the IP Address.

The primary distinction between MAC and IP addresses is that MAC addresses are used to verify the computer's physical address. It uniquely identifies the network's devices. While IP addresses are used to uniquely identify a device's network connection, they do not indicate whether a device is connected to a network.

Let's examine the distinction between MAC and IP addresses:

  • MAC addresses are used to identify a node's unique address, whereas IP addresses are primarily used to identify a node's connectivity to a network.

  • The MAC address is a hardware-based, burnt-in, or physical address, whereas the IP address is a software-based or logical address.

  • The network administrator, DHCP (Dynamic Host Configuration Protocol), or the ISP supplies the IP address (Internet Service Provider). The MAC address, on the other hand, is given by the device's manufacturer and is integrated into the NIC (Network Interface Card).

  • IPv4 addresses are 32 bits long, and IPv6 addresses are 128 bits long. The MAC address, on the other hand, is a 48-bit address. Additionally, the MAC address is expressed in the hexadecimal format with dots(.) or hyphens(-) or colons(:) in between, whereas the IP address is represented in the binary format with only dots(.) in between.

  • When addressing a connection, IP addresses use a variety of network classes, including A, B, C, D, and E. On the other hand, no such network classes are employed when addressing a particular device's MAC address.

  • The technique of subnetting involves splitting a large network into two or smaller networks. The MAC address does not use subnetting, but the IP address does.

  • An IP address changes anytime a device connects to a different network, making it a flexible address. The MAC addresses, on the other hand, are rigid and never change for a device.

  • The MAC address can be used for broadcasting, but the IP address can be used for multicasting or broadcasting.

  • The network layer of the OSI or TCP/IP paradigm is where the IP address or logical addressing is implemented. On the other hand, the OSI or TCP/IP reference model's Data-Link layer is where the MAC address, also known as physical addressing, is implemented.

The differences between MAC Address and IP Address are summarized in the following table:

MAC AddressIP Address
Media Access Control Address is abbreviated as MAC AddressThe abbreviation IP refers to the Internet Protocol Address
MAC Address is a hexadecimal address consisting of six bytesThe IP address consists of sixteen bytes (IPv6) or four bytes (IPv4)
A device with a MAC address is capable of retrieval via the ARP protocolThe RARP protocol enables a device with an IP address to retrieve information
A MAC address is oriented toward hardwareIP address is oriented toward software
The MAC Address verifies the computer's physical addressThe IP address of a computer represents its logical location
The Manufacturer of the NIC Card supplies the MAC AddressA provider of Internet service supplies the IP address
The MAC address facilitates device identificationThe IP address serves to identify the device's network connection
MAC Address functions at the stratum of the data transmissionThe IP address is a network layer protocol
The spreading of MAC addresses is prohibitedAn IP address may be shared by multiple client devices
Broadcasting can be accomplished using MAC addressesThe IP address is capable of supporting both multicasting and broadcasting
MAC addresses assist in resolving IP address concernsMAC address problems can never be resolved with IP addresses
A computer's MAC address is immutable with respect to time and environmentThe IP address is subject to change based on the time and environment
The address is composed of six groups of two hexadecimal numerals, each of which is separated by a colon or hyphen (-). It is a 48-bit value. As an example: The sequence 00:FF:FF:AB:BB:AA or 00-FF-FF-AB-BB-AAIPv6 employs 128-bit addresses denoted in hexadecimal notation, while IPv4 employs 32-bit addresses encoded in dotted notation.As an example: IPv4: 192.168.1.1 IPv6: FFFF:F200:3204:0B00
The utilization of classes is absent in MAC addressingIP addressing in IPv4 is based on the classes A, B, C, D, and E
MAC addresses are not readily discoverable by unauthorized partiesIP addresses are susceptible to discovery by a third party
For data forwarding during communication, the switch requires the MAC addressFor data forwarding during communication, a router requires an IP address

Table 1. MAC Address vs IP Address

Here is a video on MAC Address vs IP Address.

Listen to this Article