Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Every time data moves across a local network, it travels inside an Ethernet frame: a carefully structured container that ensures bits arrive at the right destination, in the right order, and without corruption. Understanding frame structure isn't just about memorizing field sizes; it's about grasping the fundamental challenges of network communication: synchronization, addressing, protocol multiplexing, error detection, and traffic management. These concepts appear throughout networking, from link-layer protocols to higher-level troubleshooting scenarios.
You're being tested on your ability to explain why each field exists and how the frame structure solves real engineering problems. When you see a question about frame formats, don't just recall that the FCS is 4 bytes. Know that it enables error detection through CRC, and understand when that check happens in the receiving process. Master the reasoning behind the structure, and the details will stick.
Before any meaningful data can be exchanged, the sender and receiver must agree on timing. These fields solve the fundamental problem of clock synchronization between independent devices and mark where frames begin and end.
Compare: Preamble vs. Interframe Gap. Both involve "dead time" on the wire, but the preamble precedes a frame to enable synchronization, while the interframe gap follows a frame to allow processing. Exam questions may ask which field ensures timing versus which ensures processing time.
Ethernet operates on shared or switched media where multiple devices coexist. These address fields solve the problem of identifying who sent a frame and who should receive it.
Compare: Destination vs. Source MAC Address. Both are 6 bytes and use the same format, but the destination can be unicast, multicast, or broadcast while the source is always unicast. If asked how switches learn topology, the answer centers on source MAC addresses.
Once a frame reaches the right device, the receiving stack must know what to do with the contents. The EtherType field and payload work together to multiplex multiple protocols over a single link layer.
This 2-byte field has a dual interpretation depending on its value:
The gap between 1500 and 1536 is intentional and avoids ambiguity between the two interpretations.
Common EtherType values worth memorizing:
This field enables protocol demultiplexing: the NIC and OS know whether to pass the payload to the IP stack, the ARP handler, or another protocol module.
Compare: EtherType vs. IP Protocol field. EtherType identifies the Layer 3 protocol (IPv4, IPv6, ARP), while the IP header's protocol field identifies the Layer 4 protocol (TCP = 6, UDP = 17, ICMP = 1). Know which layer each field operates at.
Networks are inherently unreliable: bits flip, signals degrade, and interference corrupts data. The FCS field provides a mathematical check that detects transmission errors.
Compare: FCS (Layer 2) vs. IP Checksum (Layer 3) vs. TCP Checksum (Layer 4). Each provides error detection at a different layer with different coverage. FCS protects the entire frame including headers; the IP checksum covers only the IP header; the TCP checksum covers the TCP header plus data (and a pseudo-header). This layered error detection is a key concept because each layer can independently catch corruption relevant to its scope.
Ethernet defines strict size limits that balance collision detection requirements with transmission efficiency.
Modern networks need logical separation without physical rewiring. VLAN tagging adds virtual network boundaries within the frame structure itself.
A 4-byte tag is inserted between the source MAC address and the EtherType/Length field. It contains:
The 12-bit VLAN ID supports up to 4094 usable VLANs (IDs 1 through 4094; 0 and 4095 are reserved). The tag increases the maximum frame size to 1522 bytes without reducing the available payload.
Compare: Tagged vs. Untagged frames. Access ports strip VLAN tags before delivering frames to end hosts, while trunk ports preserve tags for switch-to-switch communication. Understanding where tags are present and where they're removed is crucial for VLAN troubleshooting.
| Concept | Key Fields |
|---|---|
| Clock synchronization | Preamble, SFD |
| Frame boundaries | SFD, Interframe Gap |
| Device identification | Destination MAC, Source MAC |
| Protocol multiplexing | EtherType/Length field |
| Error detection | Frame Check Sequence (CRC-32) |
| Size constraints | Minimum (64B), Maximum (1518B/1522B) |
| Traffic segmentation | VLAN tagging (802.1Q) |
| Switch learning | Source MAC Address |
Which two fields work together to establish timing before frame data arrives, and what specific bit pattern signals the transition between them?
A switch receives a frame and needs to update its MAC address table. Which field does it examine, and why can't it use the other address field for this purpose?
Compare the FCS field with TCP's checksum. What does each protect, and what happens when each detects an error?
Why does Ethernet enforce a minimum frame size of 64 bytes? How does this relate to collision detection in CSMA/CD networks?
An Ethernet frame arrives with an EtherType value of 0x0806. What protocol is encapsulated, and how would the receiving host handle this differently than a frame with EtherType 0x0800?