I'd like to offer a minor correction:
The data from above gets "chunkified" into segments at layer four of the OSI (Transport) the segments get further "chunkified" (if necessary) and are put into PACKETS at layer three (Network), the packets are stuffed into FRAMES at layer two (Data-Link), the frames are broken down into whatever protocol-data-unit (PDU) is defined at layer one (Physical) ... usually bits (electrical or optical).
The addressing pf the packet at layer three is the IP address (or IPX, AppleTalk, XNS, DecNet ...)
The address at layer two is the MAC address (most frequently Ethernet these days, could be Token Ring, ArcNet, a DLCI on Frame-Relay ...)
Layer Two / Frames / MAC address (aka "Physical address" or "Burned-In Address" - BIA)
Layer three / Packets / IP address (aka "logical address")
The MAC is the most visible address on the segment, to see the IP address, you need to break into the frame and examine the packet. Frames never leave the local segment (they don't pass through routers). The MAC is visible to an analyzer because it is the only address available to get the payload (an IP packet) to the next hop towards the destination.
If you capture traffic on a segment, wireless or otherwise, the MAC will describe who sent it (on that segment) and who is supposed to receive it (on that segment).
With rare exception, a MAC can be manually entered as the local address (aka "Locally Administered Address" - LAA) in the "Advanced" section of the driver paramaters. As long as you follow the rules for a MAC definition, you can put any address in as an LAA (like in the Novell days: 0000deadbeef, 0000babeface, 0000feedface, etc).
Once you have captured some traffic (netstumbler, airsnort, etc), you can lift one of the MACS and install it as an LAA and get past the filter. MAC filtering is basically useless as security against anyone but the most lazy or ignorant (especially in fixed installations - like point-to-point bridging).
Pretty much the same for non-broadcast SSID - useless when someone is actively capturing your wireless traffic; the SSID is part of every transmission and quite visible.
WPA is the only secure method for keeping people from breaking into your wireless network ... and if using WPA-PSK, if the PSK is just a word, then it's not very secure either. It is still prone to dictionary or bruteforce attacks. The PSK should be a mix of letters and numbers, upper case and lower case, and of a length as long as you can tolerate / remember (up to 63(?) characters).
So it's not "Mac Address Broadcasted in TCP/IP Packets" it's "IP Addresses are included inside MAC Frames"
FWIW
Scott