Networking – The Layer Model

Hi there kids, welcome to networking club. Here are the rules:

  • Don’t talk about fight club.

Annnnd that’s it. Ok, let’s get started then. So you realized you don’t know how dem old internet tube highways things actually work, and you thought you would get some learnings. You have come to the right place.

This post assumes you know basic things about IP addresses. If you don’t, well, this is going to be confusing.

In this first lesson, I want to start simple. I just want to explain what actually happens when two computers on the same network send each other messages.

Suppose I have two computers, A and B.



Make sure you take note of these numbers closely, because as it turns out I never actually reference these numbers later on and they are useless. Got it? Great.

Let’s suppose A and B are connected to the same switch, and nothing else is connected to the switch. When A sends a packet to B, what happens?

WRONG! Oh, you didn’t actually answer? Well… you are still wrong. Here is what happens:

It sends the packet. Duh. You should know that part already.

But as it turns out, it isn’t actually that simple. There is a hidden layer underneath that you probably haven’t touched before.


When computer A wants to send a packet to computer B, it first must check its ARP cache for computer B’s IP address.

ARP cache? What de heck is an ARP cache?

I was just getting to that. So, the first thing most people learn about computers networks is that all computers have an IP address, and that is how they send packets to each other.

Now as it turns out, there are multiple layers of protocols. And, because humans are so creative, we gave each of them a number. Layer 1, the lowest level, is basically just the electrical part, where all the fancy bits go in the fancy cable and woop de do they end up on the other side. I don’t know how any of that stuff works, so let’s skip that.

After layer 1 is… dun dun dun… layer 2. Layer 2 is technically called the data link layer, or something fancy like that, but practically speaking it is just the “Ethernet protocol.” Layer 2 actually has its own type of addresses: MAC addresses. You may have encountered these before. They look like this:


Anything that has an IP address also has a MAC address. If you run ipconfig /all on windows, it is listed as the Physical Address for a given interface.

After layer 2, naturally, is layer 3. Layer 3 is the network layer. You can think of it as the IP layer. So you have layer 2 addresses – MAC addresses – and you have layer 3 addresses – IP addresses. Every packet on the network has a layer 2 and layer 3 component.

The layer 3 part is contained inside the layer 2 part. If you read a networking textbook, they have fancy diagrams explaining this concept, which is called encapsulation. But we aren’t fancy here, so I will make it simple. Let’s say you have a box. Then, because you do like boxes so good, you put that box in a bigger box. Oh, and also, you wrapped both of them in wrapping paper, because it is shiny.

In other words, you encapsulated a box inside another box. Now, suppose somebody sent you a similar box, which has an outer box and an inner box. And maybe you think of yourself as an outer box guy, and your friend is the inner box guy. So the outer box comes to you, you unwrap it, then you pass the inner box to your friend, who then opens it and finds what is on the inside. In this example, you, the outer box guy, are acting as layer 2. Your friend is layer 3.

Let’s use another example. Suppose you went to Let’s say that is the innermost contents of the box. Then, you wrap that up in a box that has google’s IP address on it, so it ends up in the right place. That is, you put on the layer 3 wrapping. Then, you put that box in another box, and label that outer box with the MAC address of your destination – this is the layer 2 wrapping. You feel very accomplished, and send your box to the destination.

When your box arrives at the destination, this entire process happens in reverse. When you sent the box, you had the packet contents (, for example – we can call this the application layer), then the network layer was added onto it, and then the data link/ethernet layer – layer 2 – was added onto that. So, when the destination end unwraps the box, they first see layer 2, and then layer 3, and then inside it all is whatever you sent to

Earlier, when I said I wasn’t fancy? I lied. I am super fancy, and I made this picture with a bunch of rectangles just for you. As you can see, when Computer A sends a packet, it starts at the highest layer – in this case, transport – and makes its way down the green arrow path, adding more and more layer wrappings, until it reaches the physical layer. There are also a bunch of turtles below there – turtles all the way down, as it turns out – but we can ignore those.

So the packet goes down to the physical layer. It then goes across the network in a cable, or perhaps calls for a cab. Then, it reaches the other computer at the physical layer, and works its way all the way up to the transport layer on the other side, shedding layers as it goes up.

When computer B sends a reply packet, that entire process happens in reverse. The packet goes down the stack on computer B, adding each successive layer, and it then is transmitted on the physical layer. Upon reaching computer A, each layer is peeled back, and the inner box is passed up to its respective layer.

As indicated by the fancy black lines in the middle, each layer, in a way, only communicates with its direct neighbor. Generally speaking, no protocol knows anything about the layer above it, and for the most part doesn’t care what is below it.

For common TCP/IP networks, Layer 2 is Ethernet, Layer 3 is IP, and Layer 4 is TCP (or UDP).

The “box” at each layer in this diagram, and the data it contains, has a specific name. There is a generic name, Protocol Data Unit (PDU), that is often used for the higher layers. But the lower layers have special names because they are referenced often. The outermost box with layer 2 information is called a frame. The inner box, with layer 3 information, is called a packet. They basically mean the same thing, but reference which step/layer we are looking at.

So that explains what layers are. The remaining question is, what is the ARP cache, and why is it needed to sent packets?


ARP is Address Resolution Protocol. It is used to map IP addresses to MAC addresses, and vice versa.

When computer A wants to send a packet to computer B, it has to prepare the boxes – layers – we mentioned before, so it can be “shipped” across the network. In this case, that means we need a layer 3 box as well as a layer 2 box. So computer A not only needs the IP address of computer B, which we already have (layer 3), but also the MAC address of computer B (layer 2). We cannot send computer B a packet (box) until we get its MAC address. This is where ARP comes in.

As I mentioned, everything with an IP address also has a MAC address. But how do you know which IP address corresponds with which MAC address, and vice versa? ARP to the rescue!

ARP is a layer 2 protocol. Most protocols you use, like HTTP (websites), are pretty high on the protocol stack (network layer stack), involving at least four layers of network protocols. But some protocols only exist at lower levels of the protocol stack, and ARP is one of them. So ARP, being at layer 2, exists below the IP layer (layer 3).

That means that when we send boxes for ARP, they only contain layer 2 stuff, not layer 3 stuff. It would be like if sending mail to somebody in the same city didn’t require a zip code. Because the path between the sender and recipient is simple (two computers on the same local network), less information (layer 3 box) is needed to get the box from A to B. So, ARP messages only need to be wrapped in a frame and not a packet.

Also, with Ethernet (layer 2), there is a special MAC address used for broadcasts, FF-FF-FF-FF-FF-FF. That’s a lot of F’s, my friends.

When we send layer 2 frames – just like packets, but at layer 2 – to this broadcast address, they actually go to every computer on our layer 2 network. This basically means every computer in your house.

So when your computer is trying to find the MAC address of another computer it has the IP of, it sends out an ARP discovery message to the entire network, asking “Who is using IP Please respond to me, I am so lonely.”

Because that is sent to the broadcast MAC address, all computers on your network get it. One of the computer that gets it is computer B. Computer B looks at it and says “hm… I think that is my IP”, and having realized that, it replies to computer A and says “sup”.

When computer A sent the broadcast message, the source MAC address was also included – like a return mailing address. So when computer B received the message, it also received the MAC address of computer A, which allows it to send an answer directly back to computer A. The answer computer B sends to computer B is basically “I am using that IP address.”

And once A receives that frame from computer B, it looks at the source MAC address, and it now has the MAC address associated with that IP. Computer A has learned the MAC address of computer B.

So in the bigger picture, computer A wanted to send something to computer B. But it cannot do that until it finds computer B’s MAC address, so it sends out an ARP message. Computer B responds to that message. Now computer A, armed with computer B’s IP and MAC address, has all the information required to send a packet (and frame) over the network.

So that is what ARP is. That just leaves the cache part.

Packets get sent all the time on most networks. If computers had to send ARP requests every single time they sent a packet, it would double the traffic on the network, which is no good. So instead of doing that, computers remember MAC addresses they have learned through ARP in the ARP cache. In windows you can view this with the arp -a command, which shows (a)ll entries your computer has learned.

This is just like DNS caching. Entries in the ARP cache are only stored for a bit – as short as a minute – before they “fall out” of the cache and an ARP request has to be performed again. The reason for this is that if a computer’s IP address changes and a different computer gets that same IP address, then traffic intended for the first computer would end up going to the second since the ARP cache stores things by IP address. So it is stored long enough to prevent needing to send ARP packets all the time, but also refreshed often enough to not cause connectivity problems.


What did we learn today?

Um… a^2 + b^2 = c^2?

Kids these days….

In theory, you learned two things. First, computer networking involves layers of protocols, and layer 3 is the network (IP) layer and layer 2 is the data link (Ethernet/MAC address) layer. Every packet on the network contains both of these things.

Second, ARP is the protocol which binds these two layers together, by enabling computers to find MAC addresses based on an IP address.

Understanding that networking works in layers might not seem important at first, but as it turns out, most higher-level networking is just adding more layers on, and understanding how these layers interact with each other and what each layer does makes it much easier to troubleshoot when things go wrong.


Jacob Clarity


13 thoughts on “Networking – The Layer Model

  1. Hello!
    FAST AND ACCURATE PAPER EDITORS SUBMIT YOUR ESSAY IN UNDER 3 MINUTES FOR EDITING. Your paper editor won’t just proofread and edit ANY English written work, they’ll tackle your: essay, manuscript, business report, assignment, dissertation, thesis, admission statement and resume to get you a better grade!. Need something else? Contact us to receive a custom quote to have your essay…

    essay help
    i need someone to write my essay

  2. Hello!
    When a paper is written, you could use the free revision period (14-30 days) to have your term paper writer work on the texts more to make writing even better. If a tutor asks you to make some additions to your assignment, send this information to your writer and they will make all the necessary changes.

    write my essay for money
    top essay writing service

  3. Hello!
    Exceptional Dissertation Service from UK Writings. Many writing companies do not offer UK dissertation writing service, because it involves true scholarly research, using primary resources, and an original project that must follow very strict guidelines from the student’s institution. Unless a writing service has graduate-degreed writers with …

    custom law essay
    national junior honor society essay help

  4. Здравствуйте, мы представляем российского производителя “Мотомул Крым”.

    Конструкция этой самоходной машины для строительных работ, получившей индекс «Мотомул» МТ-300, является оригинальной отечественной разработкой (несмотря на то, что внешне машина похожа на технику иностранных конкурентов).
    Самоходная моторизованная тележка предназначена для выполнения транспортных работ – перевозки различных грузов весом до 300 кг.
    На стальную раму Мотомул МТ-300 устанавливаются бензиновые одноцилиндровые двигатели воздушного охлаждения производства Японии или Китая (в зависимости от модификации).
    Надо отметить, что полноприводный самоходный грузовичок-самосвал Мотомул МТ-300 – это тяжёлый специфический моторный агрегат «для настоящих мужчин».
    Найти нас можно по запросу в Яндексе: “Мотомул Крым”.

  5. See the Opt-Out section below to learn about choices available to you with respect to this type of advertising.After Illness, Willie Nelson Is On The Road Again With Family At His Side.Yo no me niego al amor, no me niego a nada Que me de pasiГіn, yo no me niego a sus besos Que son traicioneros y matan de dolor Y si soy sentimental.Secret meetings, phone calls and anonymity will dictate our relationship, said Ali.The back to basics trend was also evident in the Rolling Stones albums starting from Beggar s Banquet 1968 to Exile on Main St. Tuttavia, il male sul quale posa lo sguardo il regista inglese ha tutt altre sembianze.People with thrombocytopenia are, in general, initially cared for by an internist or a family practice physician.Than we have the chorus why does love with the chords Bmaj7 and Emaj7, we now change the key to B notes are B C D E F G A B until 0 45.So feel free to get creative with your cocktails and see what you love best.Steely Dan Steely Dan Aja lyrics.

  6. Another study published last year found that engine sounds from highways diminished the ability for nearby animals to find prey or, conversely, to avoid predators , even when the animals live in parks and other protected areas.Quiero llenarte de mil rosas, y rosas de mil colores quiero darte las canciones que sГіlo te hablen de amores Y que pienses en mР“ , quiero que seas feliz.Senator Frank Horch emphasized Sharing bees means looking after them.Manchmal reicht schon ein Keyboarder in der Band aus was viele Metalfans als VerwГ¤sserung des Metal ansehen , um eine Metalband als Progressive Metal zu bezeichnen.I JosГ© LuГ­s RodrГ­guez 01. Joyce Manor performing in Toronto in August of 2012.Bass player Jay Davis views his recruitment to Rod Stewart s group as largely a matter of luck – being in the right place at the right time.Robert s got a quick hand Р  , He ll look around the room Рћ He won t tell you his plan И.This is evident in, for instance Duran Duran – Wikipedia s style of hair and dress which references that of the Sex Pistols.Per tД… tylos laikД…, kai neiЕЎД—jo pajusti klausytojЕі, kildavo daugiau abejoniЕі ir visokiЕі insecurities shit.

Leave a Reply