MAC

In technology terms, MAC or Mac can refer to one of three common definitions:

(1) An acronym for Media Access Control, MAC is a network sublayer that controls transmission hardware. The MAC sublayer works with the Logical Link Control (LLC) sublayer to create the Data Link Layer (also called Layer 2) of the Open Systems Interconnection (OSI) model. This layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel. In this context, MAC may also refer to the frame structure that houses MAC addresses, which are used to identify each node of a network.

(2) Mac refers to the brand name and registered trademark for a line of laptop and desktop computers from Apple, Inc. The Mac was initially launched in 1984 as the Macintosh, the first personal computer to have a graphical user interface (GUI), 3.5″ floppy disk drive, and consistent operating system. Since then, the family of Mac computers has been expanded to include the MacBook Air, MacBook Pro, iMac, iMac Pro, Mac Mini, and Mac Pro.

(3) MAC is also an acronym for Mandatory Access Control, a type of access control that gives an administrator complete authority over usage and access policies for other users. MAC is the opposite of Discretionary Access Control (DAC), which gives complete control to the individual user.

 

 

 

 

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...