Skip to content
NET101 Week 02 Beginner

The Universal Translators

OSI and TCP/IP Models, Encapsulation, PDUs, and Layered Troubleshooting

Track your progress through this week's content

Opening Framing: Why Engineers Need Shared Models

Modern networking is impossible to manage if every device, protocol, and vendor is treated as an isolated fact. Engineers need a common language that explains where decisions happen, what each protocol contributes, and why a failure in one part of the stack produces a predictable symptom somewhere else.

The OSI model and the TCP/IP suite provide that language. They are not decorative diagrams. They are working abstractions that help engineers map traffic, explain protocol behavior, and troubleshoot methodically. A network student who cannot move between layers is not ready for routing, switching, wireless, security, or cloud networking.

This week is about building that fluency. You will learn how the same communication event can be described as application data, a segment, a packet, a frame, and a bitstream depending on which layer you are examining. You will also learn a more professional habit: asking what changes at each hop, what stays constant end to end, and what evidence proves your interpretation.

Learning Outcomes

  • LO1: Explain why layered models are used to describe network communication and protocol interoperability.
  • LO2: Distinguish the seven OSI layers from the four TCP/IP layers and map them accurately.
  • LO3: Describe encapsulation and decapsulation using correct PDU names, headers, trailers, and addressing fields.
  • LO4: Trace packet flow for both same-subnet traffic and routed traffic, identifying what changes at each hop.
  • LO5: Use a layer-based approach to verify and troubleshoot communication with basic tools and simulation evidence.

Key insight: Layered models do not simplify networking by hiding complexity. They simplify it by organizing complexity into questions an engineer can test.

1) Why Networking is Taught in Layers

A network conversation involves many jobs happening at once: applications create data, transport protocols manage delivery, IP provides logical addressing, Ethernet or Wi-Fi handles local delivery, and physical media carries signals. If one protocol had to do all of that alone, networks would be rigid, vendor-specific, and nearly impossible to evolve.

Layering solves that problem by separating responsibilities. Each layer provides a service to the layer above it and depends on the layer below it. This is why a web browser can work over Ethernet, Wi-Fi, or fiber without being rewritten for each medium. The application cares that transport and network delivery exist; it does not need to generate electrical signals itself.

Reason for layering What it means operationally Why engineers care
Abstraction Each layer focuses on a narrower responsibility Complex systems become easier to reason about
Interoperability Different vendors can implement compatible protocols Mixed environments can still communicate
Modularity One part of the stack can change without redesigning everything Networks evolve as technologies improve
Troubleshooting discipline Symptoms can be grouped by where they likely originate Engineers isolate faults faster and with less guesswork
Mental model

Think of layering as a chain of translators. The application speaks in user data, transport translates that into a managed conversation, IP translates it into network reachability, and the local medium translates it into a frame and then a signal. No single layer sees the whole system at once, but together they make communication possible.

2) The OSI Model: Seven Questions About One Conversation

The Open Systems Interconnection (OSI) model is a conceptual framework with seven layers. It is especially useful for teaching and troubleshooting because it breaks communication into fine-grained responsibilities. Not every modern protocol stack maps perfectly to all seven layers, but the model remains one of the best ways to ask disciplined questions about traffic behavior.

Layer Main responsibility Common examples PDU or data view Typical identifier
7. Application Provides services used by user-facing software HTTP, DNS, SMTP, DHCP Data URL, hostname, service request
6. Presentation Formats, transforms, compresses, or encrypts data TLS concepts, character encoding, media formats Data Format and encoding rules
5. Session Coordinates dialog state between applications Session establishment concepts, RPC behavior Data Session state
4. Transport End-to-end delivery, reliability, multiplexing TCP, UDP Segment or datagram Port numbers
3. Network Logical addressing and inter-network forwarding IPv4, IPv6, ICMP Packet IP addresses
2. Data Link Local delivery on the current medium Ethernet, Wi-Fi, ARP in local operation Frame MAC addresses
1. Physical Signals, timing, connectors, radio or optical transmission UTP copper, fiber, radio frequencies Bits Signal encoding

Two teaching cautions matter here. First, the OSI model is a reference model, not a literal checklist every vendor stack implements separately. Second, upper-layer distinctions such as session and presentation are still useful even when modern protocol suites do not expose them as stand-alone protocol families. The point is analytical precision, not diagram worship.

Professional habit

When you hear a symptom, translate it into a layer question. "The cable light is off" is a Layer 1 question. "The default gateway is wrong" is a Layer 3 question. "The website name does not resolve" is often an Application-layer question with a DNS dependency underneath it.

3) TCP/IP: The Internet's Practical Stack

The Internet does not run the OSI model as a literal implementation. It runs the TCP/IP suite, a more compact model that groups responsibilities into four broad layers. TCP/IP is closer to operational reality, while OSI provides finer analytical vocabulary. Strong engineers can use both without confusing them.

TCP/IP layer Rough OSI mapping Primary function Examples
Application OSI 5-7 combined User-facing network services and data interpretation HTTP, HTTPS, DNS, SMTP, DHCP
Transport OSI 4 End-to-end conversation management TCP, UDP
Internet OSI 3 Logical addressing and routing across networks IPv4, IPv6, ICMP
Network Access OSI 1-2 combined Local media access, framing, and physical transmission Ethernet, Wi-Fi, fiber, copper
Quick mapping

OSI 7 Application      \
OSI 6 Presentation      > TCP/IP Application
OSI 5 Session          /
OSI 4 Transport        -> TCP/IP Transport
OSI 3 Network          -> TCP/IP Internet
OSI 2 Data Link        \
OSI 1 Physical          > TCP/IP Network Access

Students often ask which model is "correct." That is the wrong question. TCP/IP is the practical protocol suite, while OSI is the richer explanatory framework. In professional work, engineers routinely say "Layer 2 problem" or "Layer 4 control" even when the real device is implementing a TCP/IP stack.

4) Encapsulation and Decapsulation: How One Message Becomes Network Traffic

Encapsulation is the process of wrapping data with the control information each layer needs. Decapsulation is the reverse process at the receiving side. This is one of the most important ideas in networking because it explains why a single communication event can be described in multiple ways without contradiction.

Consider a student laptop with IP address 192.168.10.25 opening an HTTPS connection to a web server at 203.0.113.20. The browser creates application data. As that data moves down the stack, each layer adds information required for its own job.

Application layer:
- Creates the request data

Transport layer:
- Adds TCP header
- Source port: ephemeral client port
- Destination port: 443
- Resulting PDU: segment

Network layer:
- Adds IP header
- Source IP: 192.168.10.25
- Destination IP: 203.0.113.20
- Resulting PDU: packet

Data link layer on the first LAN:
- Adds Ethernet header and trailer
- Source MAC: laptop NIC
- Destination MAC: default gateway interface
- Resulting PDU: frame

Physical layer:
- Sends bits as signals across the medium

At the remote end, decapsulation happens in the opposite direction. The receiving NIC accepts the frame, the IP layer confirms the packet is relevant, the transport layer matches the destination port to the correct application process, and the application reconstructs useful data from the received stream.

Headers and trailers are not decoration

Each added field answers a real operational question. Ports identify the right service, IP addresses identify the right network endpoints, MAC addresses identify the next local destination, and the Ethernet trailer helps detect corruption on the local medium.

5) Packet Flow in Practice: Same-Subnet vs Routed Traffic

Week 1 introduced the basic idea that local traffic stays on the switch while remote traffic uses the router. Week 2 adds the layer logic underneath that behavior. The destination IP address always identifies the intended end system, but the destination MAC address identifies the next local hop on the current link.

Scenario Destination IP in packet Destination MAC in first frame Does the router forward it?
PC-A to PC-B in the same subnet PC-B's IP address PC-B's MAC address No. The switch handles local delivery.
PC-A to a remote server on another network The remote server's IP address The default gateway's MAC address Yes. The router must forward the packet.
Comparison of the first hop

Same subnet:
PC-A creates packet for 192.168.10.50
PC-A learns PC-B MAC with ARP
Frame sent as: PC-A MAC -> PC-B MAC
Path: PC-A -> Switch -> PC-B

Different subnet:
PC-A creates packet for 203.0.113.20
PC-A recognizes destination is remote
PC-A learns default gateway MAC with ARP
Frame sent as: PC-A MAC -> Router MAC
Path: PC-A -> Switch -> Router -> next network

This distinction matters because many beginners assume the default gateway is used for all communication. That is incorrect. A host with a configured default gateway still sends local traffic directly to other local hosts at Layer 2. The gateway is only used when the destination IP is outside the local network.

Critical bachelor-level detail

At each router hop, the Layer 2 frame is removed and rebuilt for the next link. The IP packet usually keeps the same source and destination addresses end to end, while the MAC addresses change from hop to hop. Engineers who do not understand that boundary struggle later with VLANs, routing, ARP, and packet captures.

6) Peer-to-Peer Interaction, PDUs, and What Changes at Each Hop

Layered communication is often described as if each layer on one host "talks" to the same layer on the remote host. That is a useful teaching abstraction, but it needs precision. The transport layer behaves as an end-to-end peer relationship, the IP layer provides logical end-to-end addressing across networks, and the data link layer works hop by hop, not end to end.

Field or concept Typical behavior across a routed path Why it matters
TCP or UDP ports Usually stay the same end to end They identify the conversation or service
Source and destination IP Usually stay the same end to end unless translation occurs They identify the communicating network endpoints
Source and destination MAC Change at every hop They identify only the local link sender and next receiver
PDU name Changes depending on the layer being discussed Terminology shows which part of the stack you are analyzing
PDU language

Application / upper layers: data
Transport: segment (TCP) or datagram (UDP)
Network: packet
Data Link: frame
Physical: bits

This is why packet analysis requires discipline. A student may say "the packet goes to the gateway," but at the first hop that statement is only partially correct. The frame goes to the gateway MAC, while the packet still names the remote destination IP. Precise language is not pedantry here; it is the difference between shallow memorization and real engineering understanding.

7) Verification: Prove the Layer Model with Tools

Degree-level networking should always connect theory to evidence. Layered models are most useful when you can observe them through commands, simulation, or packet capture. Even beginner tools can provide strong evidence if you ask the right question.

Tool or command What it helps prove Layer emphasis
ipconfig / ifconfig / ip addr Local addressing and interface state Layer 3 with some Layer 2 context
arp -a / ip neigh Which MAC address the host associates with a local IP Layer 2 to Layer 3 boundary
ping Basic reachability and response path Layer 3 with ICMP evidence
tracert / traceroute Which routed hops a packet crosses Layer 3 path visibility
nslookup / dig Name resolution behavior before application access Application layer with transport and IP dependencies
Packet Tracer Simulation Mode Encapsulation, forwarding path, and protocol events Multi-layer evidence
Wireshark Actual headers, ports, addresses, and frame details Layer 2 through Layer 7 depending on traffic
Suggested beginner verification sequence

1. Confirm local IP, subnet mask, and default gateway
2. Confirm ARP learned the expected local MAC address
3. Ping a same-subnet host
4. Ping the default gateway
5. Ping a remote destination
6. Use Simulation Mode or Wireshark to compare headers

Key insight: a command is only useful when you know what layer-level claim it can actually support.

8) Troubleshooting by Layer Instead of Guesswork

Layered troubleshooting is not an academic exercise. It prevents random changes and reduces incident time. If you can describe the symptom in layer terms, you usually know where to start and what evidence to gather next.

Symptom Likely layer focus First check
No link light or interface stays down Layer 1 Cable, transceiver, interface state, speed and duplex if relevant
Host cannot reach a local device in the same subnet Layer 2 or addressing boundary Switch connectivity, VLAN membership, ARP resolution, local IP and mask
Host reaches local peers but not remote networks Layer 3 Default gateway, routing path, router interface reachability
IP connectivity works but the application still fails Layer 4 or Layer 7 Port availability, DNS, application service status
Name resolves incorrectly or not at all Application with transport and IP dependencies DNS server settings, DNS queries, upstream reachability

Notice that the layers do not replace one another. A web page that fails to load may be a DNS problem, a port problem, a routing problem, or a physical outage underneath all of them. Layering helps you move from symptom to evidence rather than assuming the most visible failure is the true root cause.

Real-World Context: Why Layer Fluency Separates Operators from Engineers

In real environments, teams constantly translate between abstractions. A network engineer may say, "The frame is reaching the gateway, but the routed path beyond the firewall is failing." A systems engineer may report, "DNS resolves, TCP connects, but the application response is malformed." A security analyst may say, "This is a Layer 7 attack riding on valid Layer 3 reachability." All of those statements depend on layer fluency.

This is why the week matters. The OSI and TCP/IP models are not school-only diagrams. They are the grammar professionals use to describe outages, packet captures, ACL logic, VPN tunnels, routing behavior, and protocol dependencies across every later topic in the degree.

Guided Lab: Model a Conversation Across the Stack

Goal: Use TryHackMe and Packet Tracer together to explain one local conversation and one routed conversation with correct layer language.

Suggested topology

PC-A -----\
           \
PC-B ------ Switch ------ Router ------ Server

PC-A:   192.168.10.10/24
PC-B:   192.168.10.20/24
R1 G0/0 192.168.10.1/24
R1 G0/1 172.16.20.1/24
Server: 172.16.20.10/24

Step 1: Complete the theory lab

  1. Work through the TryHackMe OSI Model room.
  2. Write down one protocol example for Layer 2, Layer 3, Layer 4, and Layer 7.
  3. Record the PDU names associated with those layers.

Step 2: Build the Packet Tracer topology

  1. Add two PCs, one switch, one router, and one server or equivalent endpoint.
  2. Place PC-A and PC-B in the same subnet.
  3. Place the server on a different subnet behind the router.
  4. Set the PCs' default gateway to the router LAN interface.

Step 3: Compare same-subnet and routed traffic

  1. Ping PC-B from PC-A and observe that the switch handles local delivery.
  2. Ping the server from PC-A and observe that the frame goes to the router first.
  3. In Simulation Mode, record the source and destination MAC addresses on the first hop for each case.
  4. Record the source and destination IP addresses for each case and note whether they changed.

Step 4: Document encapsulation

  1. For the remote-server test, write the packet's journey from application data to bits.
  2. Identify the Layer 4 protocol and the Layer 3 addresses involved.
  3. Explain what the router changes and what it does not change when forwarding the traffic.

Step 5: Produce evidence, not just conclusions

  1. Take one screenshot showing same-subnet traffic in Simulation Mode.
  2. Take one screenshot showing routed traffic in Simulation Mode.
  3. Write a short paragraph explaining why the destination MAC differs between the two cases.

Lab reflection (mandatory)

  1. Why is it inaccurate to say that "the router is always used" once a default gateway exists?
  2. Which header fields proved the packet's true destination, and which fields only proved the next hop?
  3. How would a packet capture become misleading if you confused frames with packets?

Week 2 Outcome Check

By the end of this week, you should be able to:

  • Use the OSI model to explain where a protocol or failure belongs
  • Map the four TCP/IP layers to the seven OSI layers without oversimplifying them
  • Describe encapsulation using correct terms such as segment, packet, frame, and bits
  • Explain why MAC addresses change hop by hop while IP destinations usually remain end to end
  • Use layer-based verification to investigate a connectivity problem with evidence instead of guesses

Next week moves downward into Layer 1, where logical models meet real cables, optics, radio, and signal constraints.

Hands-On Labs

Use these activities to turn layer diagrams into packet-path reasoning.

Lab 1: TryHackMe OSI Model Room

Task: Complete the TryHackMe OSI Model room and record one protocol example per major layer.
Deliverable: Short notes with layer, protocol, and PDU mapping.
Why it matters: Students need repetition with the layer vocabulary before they can troubleshoot confidently.
Time estimate: 45-60 minutes

Start Lab

Lab 2: Encapsulation Trace in Packet Tracer

Task: Build the guided topology and compare a same-subnet ping with a routed ping.
Deliverable: Packet Tracer file plus a worksheet listing IP and MAC source and destination values for each test.
Why it matters: This is where students stop treating the OSI model as a memorization chart and start using it as evidence.
Time estimate: 60-75 minutes

Lab 3: Layered Troubleshooting Worksheet

Task: Take five network symptoms and classify the most likely starting layer, command, and expected evidence.
Deliverable: One-page troubleshooting matrix.
Why it matters: Employers value engineers who can narrow a fault domain quickly and defend their reasoning.
Time estimate: 30-40 minutes

Checkpoint Questions

  1. Why do engineers still use the OSI model even though the Internet runs a TCP/IP stack?
  2. Which OSI layers are effectively grouped into the TCP/IP Application layer?
  3. What is the difference between a segment, a packet, and a frame?
  4. Why can the destination IP remain the same while the destination MAC changes at each hop?
  5. How does a host decide whether to send traffic directly to another local host or to the default gateway?
  6. Which command or tool would you use first to confirm whether a host learned the correct next-hop MAC address?
  7. Why is layered troubleshooting more reliable than changing settings at random?

Weekly Reflection

Reflection prompt (200-300 words):

This week formalized networking as a series of coordinated translation layers. Reflect on how layered models change the way you interpret a communication problem.

  • Why is "the network is down" usually an incomplete statement?
  • How does encapsulation help multiple protocols cooperate without collapsing into one giant protocol?
  • What did the same-subnet versus routed comparison teach you about the difference between IP destinations and MAC next hops?
  • How would your troubleshooting process improve if you always named the layer you are testing?

A strong reflection should connect abstract models to observed packet behavior.

Recommended References

Strong students read standards selectively: not to memorize every field, but to learn how protocol designers describe responsibilities with precision.

Week 02 Quiz

Test your understanding of layered models, encapsulation, PDU terminology, and packet-path analysis.

Take Week 02 Quiz