Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Theoretically, one identifies the hardware uniquely, and the other doesn't. So, the one that works before network set up has been completed doesn't need all of networking to be working in order to be there and is what you need while setting up the rest of networking.
Now, when you consider networking that passes through routers, etc, etc, the hardware ident doesn't pass, so the way networking is constructed today does need the two. You could, perhaps, argue that if, thirty years ago, when the networking infrastructure was being architected, it could have been constructed rather differently, using only the hardware address, but it wasn't. Today, there is too much to change.
Oh, and by the way, almost every firewall in the world would fail, and would become an absolute pain to maintain. And, the kind of networking that everyone takes for granted with wireless hotspots, would be another total pain (I can think of use cases in which iptables would become unworkable, but you could argue that we'd have something rather different from iptables, because today's iptables would be unworkable, but maybe something more like ebtables would do it).
You could, perhaps, argue that if, thirty years ago, when the networking infrastructure was being architected, it could have been constructed rather differently, using only the hardware address, but it wasn't. Today, there is too much to change.
As mentioned by kirukan, it's a matter of layer too. There is/was DECnet, LAT, AppleTalk,... running on the same ethernet hardware - they all don't use a TCP/IP address.
This misunderstanding keeps cropping up. MAC addresses are only relevant to Ethernet and Token-Ring type networks. An IP packet must traverse many types of network - Ethernet, ATM, Frame Relay, PPP, ISDN, etc and MAC addresses mean nothing to these technologies. A MAC address serves to get the IP packet from your PC to your router over your ethernet network, but then it is de-encapsulated from its Ethernet frame and encapsulated into a container suitable for the next link in the chain, probably PPP. IP must have its own independant means of addressing endpoints regardless of the physical network type they are connected to. Hence why it is considered to be a higher "layer" than any of these other protocols.
i.e. How could host hostA communicate with hostB when hostB has no concept of a MAC address?
Answer - they both have IP addresses that are independant of their Layer2 addressing
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.