BRIDGE
A switch builds a MAC address table, which contains the MAC addresses of devices connected to its ports along with the corresponding port numbers. When a switch receives a data frame, it reads the source MAC address and updates its table if the address is not already present. To send data to a specific device, the switch looks up the destination MAC address in its table and forwards the frame out of the appropriate port associated with that address. If the destination address is not found, the switch broadcasts the frame to all ports except the one it received it on.
You seem to be referring to a NIC (Network interface card).
A device identifier usually refers to a MAC address.
It duplicates the frame to all Ethernet ports, except the port it came from. A switch's MAC table is built not from destination addresses it receives, but by the source MAC addresses. So the frame is broadcast throughout the broadcast domain, until the end device with a matching MAC address responds to the broadcast, thus giving the switch a new source address to add to its MAC table.
Yes you can track any device by using what is called a a MAC address. Every device on this planet has a mac address that can be tracked.
You can't. The MAC address is a permanant part of the device.
address resolution protocol is used when the switch used to build the dynamic mac address table.
Although some would suggest that a switch could segment a network (and it does use the MAC address for switching) more properly a bridge would be the answer if you are speaking of segmenting a network.
MAC addresses and IP addresses are two different representations of how to send data to a device by network protocol. A MAC address is the unique identity of a device, used in a network to distinguish one device from another. An IP address is a unique address that shows how traffic should be routed to reach the device.
A switch would record multiple entries for a single switch port in its MAC address table if it does not contain the Mac address of a particular destination in the address table. It will broadcast to all ports besides the port where entry comes from.
Source MAC address and source port
The destination MAC is before the source one for easier scanning, mostly because it is the destination device that is important as that is the device we are trying to reach.