1. Network management: The network administrator will manage the devices in the network through SN and MAC addresses, and hide the true identity of the devices by modifying the addresses to prevent them from being tracked or managed.
2. Security considerations: When a device is attacked by a hacker, the hacker will track the location and activity of the device through the SN and MAC addresses. By modifying the address, the security of the device can be increased and it can be prevented from being followed by hackers.