When you send an email or load a webpage, your computer doesn't send one giant block of data. Instead, it breaks the data down into much smaller, manageable pieces.
As data travels down the OSI model, headers and footers are attached to it. This process is called Encapsulation, and the name of the data changes depending on which layer it is currently passing through. These chunks are known as Protocol Data Units (PDUs).
When data reaches the Transport Layer, it is broken down into pieces called Segments.
When the Segment moves down to the Network Layer, it gets encapsulated again and becomes a Packet.
Finally, when the Packet drops down to the Data Link Layer, it is packaged into a Frame.
Once the frame is fully built, it drops to the Physical Layer where it is converted into raw Bits (1s and 0s) and shot across a physical cable or wireless radio wave.
Data (Application) → Segment (Add Ports) → Packet (Add IPs) → Frame (Add MACs) → Bits (Cables).
Why do we break data down into these tiny pieces in the first place? Why not just send the whole file at once?
The answer is the Maximum Transmission Unit (MTU). Network cables and routers have strict hardware limitations on the size of the packages they can carry. The standard MTU over a normal Ethernet network is exactly 1,500 bytes.
If a computer tries to send a large 5 Megabyte image file, it physically cannot fit through the cable. The Network Layer must perform Fragmentation—chopping the massive image into thousands of tiny 1,500-byte Packets.
Cybercriminals frequently abuse this process to bypass firewalls in what is called a Fragmentation Attack (e.g., a Teardrop Attack).
Normally, a firewall inspects a packet to see if it contains malicious code. Hackers will intentionally slice a malicious virus into highly fragmented, overlapping packets. Because the firewall cannot see the whole picture in a single packet, it lets them through. Once all the tiny pieces pass the firewall and arrive at the victim's computer, the computer automatically reassembles them, accidentally reconstructing the virus inside the network walls!
At the Network Layer (Layer 3), what is the Protocol Data Unit (PDU) called, and what addressing does it use?