Which statement is correct about Ethernet switch frame‑forwarding decisions?
It sounds like a quiz you’d see on a networking certification exam, but in the real world the answer decides whether your office LAN crawls or zips along. Let’s cut through the jargon and get to the heart of how a switch decides where to send a frame That's the part that actually makes a difference..
What Is Ethernet Switch Frame Forwarding?
At its core, an Ethernet switch is a traffic cop for data packets—well, frames—inside a LAN. When a device (your laptop, a printer, a server) shoves a frame onto the wire, the switch looks at the frame’s destination MAC address and decides which port should get the copy Small thing, real impact..
Think of it like a post office sorting letters by the address on the envelope. The switch doesn’t care what the payload says; it only cares about the destination MAC, the source MAC, and a few optional tags (VLAN ID, priority bits). Day to day, if the switch already knows which port leads to that MAC, it sends the frame out that one port. If not, it floods the frame out every port except the one it came in on.
That’s the basic idea, but the “which statement is correct?” part often trips people up because there are several nuances: learning, aging, broadcast handling, and the occasional “unknown unicast” case Still holds up..
Why It Matters
You might wonder why you should care about a single line of text on a test. In practice, the forwarding behavior determines:
- Performance – Unnecessary flooding wastes bandwidth and can choke a crowded network.
- Security – Mis‑forwarded frames can expose sensitive traffic to the wrong devices.
- Reliability – Incorrect aging or learning can cause loops or black holes, where frames disappear.
A mis‑configured switch that, say, treats every unknown frame as a broadcast will flood the network like a sprinkler on full blast. In a data‑center with 10 GbE links, that’s a recipe for packet loss. So knowing the exact rule that governs forwarding decisions helps you design, troubleshoot, and secure any Ethernet environment Simple, but easy to overlook..
How It Works
Below is the step‑by‑step decision tree a modern Ethernet switch follows. Most switches—whether a cheap 5‑port desktop model or a high‑end modular chassis—use the same logic, just at different speeds.
1. Frame Arrival and Header Inspection
- Read the preamble – sync bytes, not relevant for forwarding.
- Grab the destination MAC – 48‑bit address that tells the switch where the frame wants to go.
- Grab the source MAC – used for learning (more on that in a second).
- Check VLAN tag (if any) – determines which virtual LAN the frame belongs to.
2. MAC‑Address Table Lookup
The switch maintains a CAM table (Content‑Addressable Memory) that maps MAC addresses to physical ports. The lookup goes like this:
| Condition | Action |
|---|---|
| Destination MAC found in table and belongs to the same VLAN | Forward out the associated port only. Plus, |
| Destination MAC found but belongs to a different VLAN | Drop the frame (VLAN isolation). |
Destination MAC is a broadcast (FF:FF:FF:FF:FF:FF) |
Flood out all ports in that VLAN except the ingress port. |
| Destination MAC is a multicast (first octet LSB = 1) | Flood to all ports that have subscribed to that multicast group (IGMP snooping may limit the flood). |
| Destination MAC not in table (unknown unicast) | Flood out all ports in the VLAN except the ingress port. |
That table captures the core truth: If the MAC is known and in the same VLAN, the switch forwards only to the learned port. Anything else triggers a flood (broadcast, unknown unicast, or multicast without group membership).
3. Learning the Source MAC
Every time a frame arrives, the switch does a quick “hey, that MAC lives on this port” update:
- Check the source MAC against the CAM table.
- If entry exists and points to a different port, overwrite it (this handles device moves).
- If entry doesn’t exist, add a new row:
MAC → ingress port. - Set an aging timer (default 300 seconds on many switches). If no frames from that MAC arrive before the timer expires, the entry is removed.
Learning is continuous; the switch never stops updating its table as long as traffic flows Worth knowing..
4. Aging and Flushing
Aging prevents stale entries from lingering forever. When the timer hits zero, the entry is purged, and the next frame destined for that MAC will be treated as unknown (flooded). Some switches let you tweak the aging time per VLAN—useful for environments with lots of mobile devices.
5. Special Cases
| Scenario | What the Switch Does |
|---|---|
| Loop detection (STP) | If spanning‑tree blocks a port, frames never leave that port, even if the MAC table says they should. Still, |
| Port security | If a port is limited to a set of MACs, frames from unknown source MACs may be dropped, and learning can be disabled. |
| Link aggregation (LACP) | The switch treats the aggregated bundle as a single logical port for forwarding decisions. |
| MAC address limit | When the CAM table is full, some switches start dropping new entries or flood all frames—a sign you need a bigger switch. |
Common Mistakes / What Most People Get Wrong
“A switch always forwards a frame to the port with the matching MAC address.”
That’s only true if the MAC is already in the table and the frame is in the same VLAN. New devices, moved laptops, or mis‑tagged VLANs will cause the switch to flood instead of forward.
“Unknown unicast frames are dropped.”
Nope. An unknown unicast is treated the same as a broadcast: flood to all ports in the VLAN (except the source). Dropping unknown unicast would break basic plug‑and‑play networking.
“Learning happens only once, when the switch boots.”
Learning is dynamic. Every frame that arrives updates the CAM table. If you unplug a device and plug it into a different port, the switch learns the new location on the fly.
“MAC address aging is optional.”
Most switches enable aging by default. Turning it off can cause stale entries to linger, leading to black‑hole traffic when devices move.
“Multicast always floods.”
Only if the switch doesn’t have IGMP snooping or static multicast group entries. Modern switches will limit multicast flooding to ports that have explicitly joined the group That's the part that actually makes a difference. Practical, not theoretical..
Practical Tips – What Actually Works
- Check the CAM table – On Cisco,
show mac address-table. On Juniper,show ethernet-switching table. Spot stale entries or unexpected MAC moves. - Enable VLAN‑specific aging if you have a lot of mobile devices. Shorter timers keep the table fresh.
- Use port security on edge ports: limit the number of MACs per port and lock them down after the first learning event. This stops rogue devices from hijacking the network.
- Turn on IGMP snooping for multicast‑heavy applications (video streaming, VoIP). It dramatically cuts unnecessary flooding.
- Monitor for CAM overflow – A sudden spike in “MAC address limit exceeded” logs means you need a bigger switch or to clean up rogue devices.
- Validate spanning‑tree – Ensure STP is active and ports are in the correct state; a blocked port will break forwarding even if the MAC table is perfect.
- Keep firmware updated – Bugs in older switch OS versions sometimes mishandle learning or aging, leading to weird forwarding loops.
FAQ
Q: What happens if two devices share the same MAC address?
A: The switch will constantly flip the CAM entry between the two ports as frames arrive, causing intermittent connectivity. The solution is to re‑address one of the devices—duplicate MACs are a configuration error.
Q: Can a switch forward a frame to multiple ports for a known unicast destination?
A: Only in special cases like port mirroring or multicast replication. Under normal operation, a known unicast goes out a single port Easy to understand, harder to ignore..
Q: How does a switch treat a frame with a destination MAC of 00:00:00:00:00:00?
A: That address is reserved and never appears on the wire. If it does, most switches treat it as an unknown unicast and flood it.
Q: Does the switch consider the source MAC when forwarding?
A: No, the source MAC is only used for learning and security checks. Forwarding decisions are based solely on the destination MAC (and VLAN) Turns out it matters..
Q: Are there any circumstances where a switch will drop a broadcast frame?
A: Yes—if broadcast storm control is enabled and the broadcast rate exceeds the configured threshold, the switch can start dropping excess broadcasts.
So, which statement is correct about Ethernet switch frame‑forwarding decisions? The accurate one is:
If the destination MAC address is known and belongs to the same VLAN, the switch forwards the frame out the single port associated with that MAC; otherwise it floods the frame to all ports in the VLAN (except the ingress port).
That single sentence captures the entire decision tree, and it’s the rule you’ll see echoed in every networking textbook, certification exam, and real‑world troubleshooting session. Keep it in mind next time you stare at a blinking port LED and wonder why traffic isn’t flowing. The answer is almost always “the switch didn’t know where to send it, so it flooded everything.
Understanding that nuance turns a black box into a predictable, tunable piece of equipment—and that’s worth more than a handful of multiple‑choice questions. Happy switching!