by Priya Nakamura Updated Apr 23, 2026
Every time your computer sends data across a local network, it needs to know exactly which physical device to deliver that data to — and that's where the ARP protocol steps in. ARP, or Address Resolution Protocol, is the invisible bridge between the logical IP addresses you configure and the hardware MAC addresses that actually move frames across your network. Understanding how ARP works gives you a clearer picture of why devices can or cannot communicate on your local network.
In this guide you will learn exactly what ARP does, how the request-reply cycle works step by step, and how to spot and fix common ARP-related problems on your home network. Whether you are curious about why a device suddenly stops responding or you want to understand the foundation of local networking, this explanation will make it click. If you are also brushing up on networking basics, our guide on what an IP address is and our explainer on how DHCP works pair well with this topic.
The internet and your home network operate on two different addressing systems simultaneously. IP addresses (like 192.168.1.10) are logical addresses assigned by your router or manually configured. MAC addresses (like A4:C3:F0:85:22:11) are hardware identifiers burned into each network adapter at the factory. When your computer wants to send a packet to another device on the same local subnet, it knows the destination IP address — perhaps because DNS resolved a hostname, or you typed it directly — but it does not inherently know which MAC address corresponds to that IP. ARP is the protocol that answers that question.
Without ARP, your computer would have no way to address an Ethernet frame correctly. Ethernet operates at Layer 2 of the OSI model and uses MAC addresses to route frames between devices on the same physical network segment. IP operates at Layer 3 and uses IP addresses to route packets across different networks. ARP acts as the glue between these two layers, translating Layer 3 IP addresses into the Layer 2 MAC addresses that Ethernet actually uses to deliver data. This translation is required every time a device communicates with another device on the same local network for the first time.
ARP is defined in RFC 826, published in 1982, and remains foundational to IPv4 networking to this day. For IPv6 networks, a functionally equivalent mechanism called Neighbor Discovery Protocol (NDP) takes over, but the concept is nearly identical. On a typical home network with a router, several smartphones, laptops, and smart TVs, ARP requests and replies are flying back and forth constantly — most of them resolved within milliseconds and cached locally so they do not have to be repeated on every single packet.
The ARP cache (sometimes called the ARP table) is a short-term memory your operating system keeps. It stores recently resolved IP-to-MAC mappings so that your device does not have to broadcast an ARP request every time it wants to send a frame. Each entry has a time-to-live, typically between 1 and 20 minutes depending on the operating system, after which it expires and must be refreshed. You can view your ARP cache on Windows with arp -a in Command Prompt, and on macOS or Linux with arp -n in the terminal.
Follow these five steps to trace exactly what happens when your laptop tries to reach another device on your local network for the first time.
ARP is not limited to a single operation type. The table below summarizes the key ARP variants and related concepts you are likely to encounter in home and small-business networking contexts.
| ARP Type | Direction | Purpose | Common Use Case |
|---|---|---|---|
| ARP Request | Broadcast (Layer 2) | Ask who owns a given IP address | Initial resolution before first packet to a new destination |
| ARP Reply | Unicast (direct) | Return the MAC address for a queried IP | Response from the device that owns the requested IP |
| Gratuitous ARP | Broadcast (unsolicited) | Announce own IP-to-MAC mapping proactively | Device boot-up, IP conflict detection, failover notification |
| Proxy ARP | Unicast reply from router | Router answers ARP requests on behalf of remote devices | Bridging subnets without static routes on end devices |
| ARP Spoofing | Broadcast (malicious) | Poison caches with false MAC mappings | Man-in-the-middle attacks; detected by security tools |
Open a Command Prompt on Windows and type arp -a to list every IP-to-MAC mapping your PC currently knows. On macOS or Linux, use arp -n for the same result. You can then paste any unfamiliar MAC address into our MAC Address Lookup Tool to identify the device manufacturer — a quick way to spot an unknown device on your network.
ARP issues are among the most common causes of mysterious "device not reachable" problems on local networks, yet they are frequently overlooked because most troubleshooting starts at the IP layer or above. A stale or incorrect ARP cache entry can make a device appear unreachable even though it is powered on and connected. Similarly, duplicate IP addresses — two devices configured with the same IP — cause ARP conflicts that result in intermittent connectivity for both devices. Recognising these symptoms early saves a lot of frustrating diagnostic time.
ARP spoofing is a security concern worth understanding even on home networks. A malicious device (or malware on an infected machine) can send forged Gratuitous ARP broadcasts that overwrite legitimate cache entries with the attacker's MAC address, redirecting traffic intended for your router through the attacker's machine first. This is a classic man-in-the-middle technique. On a home network, enabling strong Wi-Fi security settings reduces the risk of rogue devices joining your network in the first place. Some routers also offer Dynamic ARP Inspection (DAI) in their firmware to block spoofed ARP packets.
If you suspect an ARP problem, the steps below cover the most effective fixes. For persistent issues where devices keep dropping off the network, also check your router's DHCP lease table to ensure no two devices have been assigned the same IP — see our guide on checking who is on your Wi-Fi for a practical walkthrough.
arp -d * in an elevated Command Prompt to clear all stale entries instantly.sudo arp -ad in Terminal; on Linux use sudo ip neigh flush all to purge the neighbor table.Pro Tip: If a device on your network shows the correct IP but is still unreachable, use our Ping Test Tool to verify basic connectivity, then cross-reference the device's MAC address with the MAC Lookup Tool to confirm you are looking at the right device in your ARP table.
ARP stands for Address Resolution Protocol. It is a network communication protocol used to map a known IPv4 address to an unknown MAC (hardware) address on a local network segment. Without ARP, devices on the same subnet would have no mechanism to translate logical IP addresses into the physical Layer 2 addresses required to actually deliver Ethernet frames. You can learn more about the addressing system ARP works alongside in our What Is an IP Address guide.
DNS (Domain Name System) translates human-readable hostnames like "example.com" into IP addresses, operating across the internet at Layer 3 and above. ARP operates only on a local network segment at Layer 2, translating IP addresses into MAC addresses so that Ethernet frames can be addressed correctly. They solve different problems at different layers: DNS gets you the IP, ARP gets you the MAC address needed to deliver frames to that IP on your local network.
Yes. Open Command Prompt and type arp -a to display the full ARP cache, showing every IP address your PC has recently resolved to a MAC address. The output lists the interface, the IP address, the corresponding MAC address, and whether the entry is dynamic (learned via ARP) or static (manually configured). Dynamic entries expire automatically; static entries persist until manually removed.
ARP spoofing (also called ARP poisoning) is an attack where a malicious device sends forged ARP Reply packets to overwrite legitimate IP-to-MAC mappings in other devices' caches, redirecting their traffic through the attacker's machine. It is the foundation of many man-in-the-middle attacks on local networks. The best defenses are keeping unauthorized devices off your network with strong Wi-Fi encryption and enabling Dynamic ARP Inspection on routers that support it.
A Gratuitous ARP is an unsolicited ARP announcement where a device broadcasts its own IP-to-MAC mapping without being asked. This happens at boot time so that other devices on the network can update their caches proactively, during IP address changes, and in high-availability setups where a virtual IP address fails over to a new physical interface. It is a normal and useful part of network operations, though it can also be exploited in ARP spoofing attacks.
No. IPv6 replaces ARP with Neighbor Discovery Protocol (NDP), defined in RFC 4861. NDP performs the same IP-to-MAC resolution function but uses ICMPv6 messages called Neighbor Solicitation and Neighbor Advertisement instead of the dedicated ARP packet format. NDP also adds additional features such as router discovery and stateless address autoconfiguration (SLAAC) that go well beyond what ARP provides in IPv4 networks.
For authoritative networking standards and specifications, refer to the Internet Assigned Numbers Authority (IANA) or IETF RFC documents.
![]() |
![]() |
![]() |
![]() |
About Priya Nakamura
Priya Nakamura is a telecommunications engineer and networking educator with a Master degree in Computer Networks and a background in ISP infrastructure design and management. Her experience spans both the technical architecture of broadband networks and the practical challenges home users face when configuring routers, managing wireless coverage, and understanding connectivity standards. At RouterHax, she covers WiFi standards and protocols, networking concepts, IP addressing, and network configuration guides.
Promotion for FREE Gifts. Moreover, Free Items here. Disable Ad Blocker to get them all.
Once done, hit any button as below
![]() |
![]() |
![]() |
![]() |