Loading content...
In Ethernet networks, every transmitted frame must specify its intended recipient through the destination MAC address. But not all communication is point-to-point. Network protocols frequently need to reach multiple devices simultaneously—whether discovering services, announcing presence, or distributing real-time data.
Ethernet supports three fundamental addressing modes, each serving distinct communication patterns:
Understanding these modes is essential because they behave fundamentally differently at the switch level, have distinct performance implications, and require different handling in protocol design.
By the end of this page, you will understand how unicast, broadcast, and multicast addresses are structured; how switches handle each type differently; the performance implications of each mode; and best practices for protocol designers choosing between these communication patterns.
Unicast is the most common addressing mode in Ethernet networks. A unicast frame targets exactly one network interface—identified by its unique MAC address—and is delivered only to that specific device.
Characteristics of unicast addressing:
| Property | Unicast | Example |
|---|---|---|
| I/G Bit (Bit 0) | 0 | Binary: xxxxxxx0 |
| First Hex Digit | Even (0,2,4,6,8,A,C,E) | 00:1A:2B:..., 02:00:00:... |
| Recipients | Exactly 1 | Single NIC |
| Switch Behavior | Forward to learned port or flood | Efficient, targeted delivery |
Switch handling of unicast frames:
When a switch receives a unicast frame, it follows a precise algorithm:
Unknown unicast flooding:
When a switch doesn't know where a destination MAC is located (the MAC isn't in its forwarding table), it must flood the frame to all ports. This is a fallback mechanism that ensures delivery even when the table is incomplete. However, excessive unknown unicast flooding indicates:
Once a switch has learned a MAC address location, unicast traffic flows directly to the destination port without consuming bandwidth on other switch ports. This is the key efficiency advantage of switched Ethernet over the older hub-based shared medium design where all traffic reached all ports.
Common unicast communication patterns:
Broadcast addressing targets all devices on a LAN segment simultaneously. The broadcast address is a special, well-known value that all Ethernet interfaces are programmed to receive and process.
The Ethernet broadcast address:
FF:FF:FF:FF:FF:FF — All 48 bits set to 1. Every Ethernet interface on the network segment accepts frames with this destination address.
Characteristics of broadcast addressing:
FF:FF:FF:FF:FF:FFSwitch handling of broadcast frames:
Broadcast handling is unconditional:
This unconditional flooding is why broadcast traffic is a significant concern for network performance and scalability.
The broadcast domain:
A broadcast domain is the set of all devices that receive each other's broadcast frames. In a flat (non-VLAN) switched network, all devices on all switch ports form a single broadcast domain. Key points:
Broadcast domain size implications:
| Domain Size | Typical Broadcasts/Second | Host Impact | Recommendation |
|---|---|---|---|
| Small (< 50 hosts) | < 10 | Negligible | Fine for most uses |
| Medium (50-250 hosts) | 10-100 | Low | Monitor periodically |
| Large (250-1000 hosts) | 100-500 | Moderate | Consider VLAN segmentation |
| Very Large (> 1000 hosts) | 500 | High | VLAN segmentation mandatory |
A broadcast storm occurs when loops in the network cause broadcast frames to circulate endlessly, multiplying with each cycle. Without Spanning Tree Protocol (STP), a single broadcast frame in a looped topology can bring an entire network to its knees within seconds, as CPU and bandwidth are consumed processing exponentially growing broadcast traffic.
Multicast is a middle ground between unicast (one recipient) and broadcast (all recipients). It enables communication with a specific group of interested devices without burdening the entire network.
Characteristics of multicast addressing:
| Property | Multicast | Example |
|---|---|---|
| I/G Bit (Bit 0) | 1 | Binary: xxxxxxx1 |
| First Hex Digit | Odd (1,3,5,7,9,B,D,F) | 01:00:5E:..., 33:33:... |
| Recipients | Subscribed group members | 0 to many NICs |
| Switch Behavior | Flood (default) or selective (with IGMP snooping) | Depends on configuration |
Reserved multicast ranges:
IPv4 Multicast: Addresses in the range 01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF are reserved for IPv4 multicast. Key relationships:
Example mapping:
IPv4 Multicast: 224.1.2.3
Binary (lower 23 bits): 0.0000001.00000010.00000011
MAC Address: 01:00:5E:01:02:03
IPv6 Multicast: Addresses starting with 33:33: are reserved for IPv6 multicast:
33:33:XX:XX:XX:XX where the last 4 bytes come from the IPv6 multicast addressff02::1 (all nodes) maps to 33:33:00:00:00:01Without IGMP snooping, switches treat multicast frames like broadcasts—flooding them everywhere. IGMP snooping examines IGMP group membership messages to learn which ports have interested receivers, then forwards multicast traffic only to those ports. This dramatically reduces unnecessary multicast flooding.
Understanding when to use each addressing mode is crucial for protocol design and network planning. Each mode has fundamentally different characteristics:
| Characteristic | Unicast | Broadcast | Multicast |
|---|---|---|---|
| Target Audience | Single device | All devices | Selected group |
| I/G Bit | 0 | 1 (all bits 1) | 1 |
| Address Example | 00:1A:2B:3C:4D:5E | FF:FF:FF:FF:FF:FF | 01:00:5E:00:01:02 |
| Switch Forwarding | To learned port only | All ports (flood) | All ports or selective |
| Bandwidth Efficiency | High (minimal waste) | Low (everywhere) | Medium to High |
| Receiver CPU Load | Only intended recipient | Every device on segment | Subscribers + others (without snooping) |
| Scalability | Excellent | Poor for large networks | Good with snooping |
| Group Membership | N/A | Implicit (everyone) | Explicit (IGMP/MLD) |
| Routing Scope | End-to-end routable | Local segment only | Routable with PIM, etc. |
Network Interface Cards perform address filtering in hardware to protect the CPU from processing every frame on the network. Understanding this filtering is essential for network analysis and troubleshooting.
Standard NIC filtering behavior:
A NIC in its default operational mode accepts frames matching these criteria:
FF:FF:FF:FF:FF:FF)Frames not matching these criteria are silently discarded by the NIC hardware without consuming CPU cycles.
| Mode | Description | Use Case | Security Implications |
|---|---|---|---|
| Normal (Default) | Accept own MAC, broadcast, registered multicast only | Standard operation | Cannot see others' traffic |
| Promiscuous | Accept ALL frames regardless of destination | Network analyzers, packet capture | Can see all traffic on segment |
| All-Multicast | Accept all multicast addresses | Multicast routing, snooping | Sees all multicast traffic |
Promiscuous mode deep dive:
Promiscuous mode instructs the NIC to pass ALL received frames to the operating system, not just those addressed to the NIC. This is essential for:
Important limitation: On modern switched networks, promiscuous mode only sees traffic that reaches your switch port. This includes:
To see other hosts' unicast traffic, you need to configure port mirroring (SPAN) on the switch, or use a network tap.
12345678910111213141516
# Enable promiscuous mode on Linuxsudo ip link set eth0 promisc on # Verify promiscuous mode is activeip link show eth0# Look for "PROMISC" flag in output # Disable promiscuous modesudo ip link set eth0 promisc off # Alternative using ifconfig (legacy)sudo ifconfig eth0 promisc # Enablesudo ifconfig eth0 -promisc # Disable # System log entries when promiscuous mode changesdmesg | grep -i promiscPromiscuous mode is NOT a magic solution for network monitoring. On a properly functioning switch, you won't see other hosts' unicast traffic even in promiscuous mode. The switch filters at the hardware level before frames ever reach your port. Use SPAN/mirror ports or network taps for legitimate network monitoring.
The size and structure of broadcast domains significantly impact network performance, scalability, and security. Thoughtful broadcast domain design is a key skill for network architects.
The broadcast domain problem:
Every device in a broadcast domain:
As broadcast domains grow, these costs accumulate, eventually degrading performance.
| Factor | Small Domain (< 50) | Large Domain (> 500) |
|---|---|---|
| Broadcast overhead | < 1% of bandwidth | 5-20%+ of bandwidth |
| Host CPU impact | Negligible | Measurable |
| Storm blast radius | Limited | Catastrophic |
| Troubleshooting | Easy | Complex |
| Security exposure | Limited | High (more visible to attackers) |
Segmentation strategies:
1. VLANs (Virtual LANs)
The primary tool for broadcast domain segmentation. VLANs create logically separate networks on shared physical infrastructure:
2. Physical Segmentation
Using separate switches or router-separated networks:
3. Subnet-based Segmentation
Aligning Layer 2 (broadcast domain) with Layer 3 (subnet) boundaries:
While VLANs provide traffic separation, they are NOT a security boundary by themselves. VLAN hopping attacks can cross VLAN boundaries if switches are misconfigured. For true security isolation, use routers/firewalls with access control lists between VLANs.
When designing network protocols or applications, the choice of addressing mode has significant implications. Understanding these tradeoffs leads to more efficient, scalable protocol designs.
Decision framework:
| Scenario | Recommended Mode | Rationale |
|---|---|---|
| Request-response between known peers | Unicast | Efficient, targeted delivery |
| Initial discovery (unknown target) | Broadcast | Must reach unknown destination |
| Same data to multiple interested receivers | Multicast | Efficient group delivery |
| Real-time streaming to many clients | Multicast | Single transmission serves all |
| Emergency notification | Broadcast or Multicast | Must reach everyone quickly |
| Bulk data transfer | Unicast | Flow control per-recipient |
Case study: ARP — Broadcast for Discovery, Unicast for Response
The Address Resolution Protocol (ARP) elegantly combines both modes:
ARP Request (Broadcast): 'Who has 192.168.1.1? Tell 192.168.1.50'
FF:FF:FF:FF:FF:FFARP Reply (Unicast): '192.168.1.1 is at 00:1A:2B:3C:4D:5E'
This pattern—broadcast for discovery, unicast for response—is common in well-designed protocols.
Case study: DHCP — Broadcast When Necessary
DHCP demonstrates judicious broadcast use:
Once the client has a valid IP address, subsequent lease renewals can use unicast.
Use the most specific addressing mode possible. Prefer unicast when targets are known. Use broadcast only for initial discovery or when truly everyone must receive. Use multicast when multiple known recipients need the same data simultaneously.
This page has explored the three fundamental addressing modes in Ethernet networks. Let's consolidate the essential points:
Looking ahead:
With addressing modes understood, the next page examines MAC address assignment—how addresses are allocated at the hardware and software levels, the role of IEEE registration, and modern practices like MAC address randomization for privacy.
You now understand how unicast, broadcast, and multicast addressing work at the Ethernet layer, how switches handle each type, the performance implications of broadcast traffic, and design considerations for protocols and network architectures.