
A 프로토콜 데이터 유닛 (PDU) represents a single unit of information. Networks transmit this unit between two peer entities. It exists at a specific layer of the OSI model. The Protocol data unit encapsulates data and control information. This encapsulation is essential for communication at its layer. It transforms as it moves through the network stack. This ensures successful data transfer across networks.
주요 테이크 아웃
- A 프로토콜 데이터 유닛 (PDU) is a unit of data. It changes at each layer of the OSI model.
- The Application Layer starts the data journey. It turns user data into the first PDU.
- The Transport Layer uses segments for reliable data. It uses datagrams for fast data.
- The Network Layer routes data across networks. It uses IP addresses to find paths.
- The Data Link Layer handles local delivery. It uses MAC addresses for devices on the same network.
- The Physical Layer sends data as bits. These bits become electrical signals or light pulses.
- Encapsulation adds information to the PDU. This happens as data moves down the layers.
- Decapsulation removes information from the PDU. This happens as data moves up the layers.
Understanding the Protocol Data Unit: A Layer-by-Layer Transformation
The Genesis of a Protocol Data Unit: Application Layer (Layer 7)
The journey of data across a network begins at the Application Layer. This layer directly interacts with software applications. Users initiate actions here, creating the initial data for transmission.
User Data Becomes the Initial Protocol Data Unit
When a user sends an email, browses a website, or transfers a file, the application generates raw data. This raw data becomes the very first form of a Protocol data unit. It represents the information the user intends to send. For example, in a data center, an application server might generate a request to a database server. This request forms the initial data unit.
Examples of Application Layer Protocol Data Units
Application Layer PDUs often carry meaningful names related to their function.
- HTTP Data: When a web browser requests a webpage, the HTTP request itself is an Application Layer PDU.
- FTP Data: File Transfer Protocol uses PDUs to manage file uploads and downloads.
- SMTP Data: Email clients send and receive emails using SMTP PDUs.
Formatting the Protocol Data Unit: Presentation Layer (Layer 6)
The Presentation Layer ensures data from the Application Layer is in a format understandable by the receiving system. It acts as a translator.
Protocol Data Unit Transformation for Interoperability
Different systems use various data formats. The Presentation Layer transforms the Protocol data unit to ensure interoperability. This transformation allows diverse systems to communicate effectively. Common data formats used for this purpose include:
- EDIFACT
- JSON
- XML
- Protocol Buffers
Encryption, Compression, and Data Representation
This layer also handles crucial services like encryption and compression. Data compression algorithms reduce the size of transmitted data. This directly decreases the PDU size, leading to improved bandwidth utilization and faster transmission times. Conversely, encryption transforms plaintext into ciphertext. This process does not inherently change the PDU size. However, it introduces processing overhead due to the additional CPU resources and memory required for mathematical algorithms and key management. This overhead can lead to increased latency, especially for complex transformations.
Managing the Conversation: Session Layer (Layer 5)
The Session Layer establishes, manages, and terminates communication sessions between applications. It ensures an orderly exchange of data.
Protocol Data Unit with Session Control Information
The PDU at this layer includes session control information. This information helps manage the dialogue between two communicating applications. It ensures the conversation flows smoothly.
Establishing, Managing, and Terminating Sessions
The Session Layer uses standard mechanisms to control the session.
- Dialog Control: This mechanism dictates which party can transmit data at any given time. It manages turns between communicating parties to ensure orderly data exchange.
- Synchronization: This involves creating coordination points, or checkpoints, within the dialogue for recovery purposes. If a session fails, communication can resume from the last synchronization point instead of restarting from the beginning. This is vital for large transfers, such as backing up large databases in a data center.
- Token Management: This mechanism uses control tokens passed between applications to maintain orderly communication. The application holding the token is granted permission to transmit data, preventing conflicts and ensuring organized data flow.
The Transport Layer’s Protocol Data Unit: Segments and Datagrams
The Transport Layer acts as a crucial bridge. It takes data from the Session Layer and prepares it for network transmission. This layer segments the data into smaller, manageable units. It also adds information for reliable delivery or fast, connectionless transfer. The resulting units are either segments (for TCP) or datagrams (for UDP).
The Protocol Data Unit as a Segment (TCP)
The Transmission Control Protocol (TCP) provides reliable, ordered, and error-checked delivery of a stream of bytes. It ensures data arrives at its destination completely and correctly.
Adding Port Numbers and Sequence Information
TCP segments include vital information for proper delivery. They add port numbers. These numbers identify the specific application process on the destination host. For instance, a web server in a data center listens on port 80 for HTTP requests. TCP also assigns sequence numbers to each byte of data. These numbers allow the receiving system to reassemble the data in the correct order. This ensures the integrity of the original message. The minimum size for a TCP header is 20 bytes. This 20-byte overhead is added by TCP at the Transport Layer for each data block.
Ensuring Reliable Data Delivery
TCP employs several mechanisms to guarantee reliable data delivery:
- Acknowledgment Packets (ACKs): The receiver sends an ACK for every successfully received packet. This ACK contains the sequence number of the next expected byte. This allows the sender to track received packets.
- Retransmission: If an acknowledgment does not arrive within a specified timeout, the sender retransmits the missing packet. This ensures all data delivers, even with network issues.
- Sequence Numbers: Each byte in a TCP segment has a unique sequence number. This enables the receiver to reassemble data in the correct order. This happens even if packets arrive out of sequence, preserving data integrity and preventing loss or duplication.
- Error Detection (Checksums): TCP uses checksums to identify corrupted segments during transmission. Corrupted segments are discarded, prompting retransmission.
- Guaranteed Delivery: The acknowledgment and retransmission system ensures all data reaches its destination. Alternatively, the sender receives notification of a permanent failure.
- Duplicate Prevention: Sequence numbers enable receivers to identify and discard duplicate segments. These might arise from network delays or retransmissions.
The Protocol Data Unit as a Datagram (UDP)
The User Datagram Protocol (UDP) offers a simpler, connectionless service. It prioritizes speed over reliability.
Prioritizing Speed Over Reliability
UDP does not establish a connection before sending data. It also does not guarantee delivery or order. This makes it faster and more efficient for certain applications. UDP is an ideal protocol for network applications where perceived latency is critical. This includes gaming, voice, and video communications. These applications can tolerate some data loss without significantly affecting perceived quality. UDP speeds up transmissions by enabling data transfer before the receiving party provides an agreement. This makes it beneficial for time-sensitive communications.
Consider these specific use cases where UDP’s speed advantage is critical:
- Video streaming (e.g., YouTube, Netflix): UDP is preferred because dropping a single frame is better than pausing the stream for retransmission. Users might only notice a minor glitch.
- Online gaming: Benefits from UDP because receiving slightly outdated information is better than perfect information arriving too late.
- Live video streaming (including VoIP and video conferencing): Benefits from UDP’s lower overhead and tolerance to packet loss, reducing latency.
- Domain Name System (DNS): Typically uses UDP for fast and lightweight queries.
- Internet of Things (IoT) devices: Often employ UDP for sending small data packets.
Connectionless Communication
UDP’s connectionless nature means it sends datagrams without prior setup. It does not maintain state information about the communication. This reduces overhead and latency. Each datagram is an independent Protocol data unit. The sender simply transmits it to the destination. The receiver processes it upon arrival. This makes UDP suitable for applications where occasional data loss is acceptable.
Routing the Protocol Data Unit: Network Layer (Layer 3)
The Network Layer takes on the critical task of routing data across different networks. At this stage, the Protocol data unit transforms into a "packet." This layer ensures packets travel from a source host to a destination host, even if they reside on geographically separate networks.
The Protocol Data Unit as a Packet
Logical Addressing for Global Reach
The Network Layer introduces logical addressing, primarily through IP (Internet Protocol) addresses. These addresses provide a hierarchical structure, allowing devices to communicate globally. For instance, a server in a data center uses its IP address to send data to a client across the internet.
IP addresses are hierarchical. They consist of a network part and a host part. This structure identifies hosts within specific networks. Originally, IP addresses were categorized into different classes (Class A, B, C) within a 32-bit address length. Classless Inter-Domain Routing (CIDR) later improved IPv4’s 32-bit address space utilization. CIDR allows arbitrarily sized networks and relies on network prefixes. IPv6 addresses are 128 bits long, significantly expanding the address space to approximately 3.4 × 10^38 unique identifiers. This addresses IPv4 exhaustion. IPv4, with its 32-bit address space, supports approximately 4.3 billion unique addresses. This has proven insufficient for modern internet growth. Private address ranges and Network Address Translation (NAT) mitigate this scarcity.
How Packets Find Their Way Across Networks
Routers operate at the Network Layer. They examine the destination IP address in each packet. Routers then use routing tables to determine the best path for the packet to reach its destination. This process allows packets to traverse multiple networks, crossing continents or connecting different data centers.
Network PDU (payload) sizes for common internet traffic vary:
| Frame Part | Minimum Size (bytes) | Maximum Size (bytes) |
|---|---|---|
| Network PDU (Payload) | 46 | 1,500 |
The typical sizes of network layer PDUs (packets) for common internet traffic, as represented by the Ethernet frame payload, range from a minimum of 46 bytes to a maximum of 1500 bytes. The 46-byte minimum payload is based on the slot time of Ethernet, while the 1500-byte maximum payload is standard, not considering larger ‘Jumbo frames’.
The Role of IP in Protocol Data Unit Routing
Source and Destination IP Addresses
Every packet carries both a source IP address and a destination IP address. The source IP identifies the sender, while the destination IP specifies the intended recipient. Routers use these addresses to make forwarding decisions. They direct the packet hop by hop until it reaches its final destination.
Fragmentation and Reassembly of Protocol Data Units
Sometimes, a packet is too large for a particular network link. This occurs when the packet size exceeds the Maximum Transmission Unit (MTU) of that link. When this happens, IP fragmentation breaks the packet into smaller pieces.
IP fragmentation is an Internet Protocol process where packets break into smaller fragments. This happens when the original packet size is larger than the Maximum Transmission Unit (MTU) of a link it needs to pass through. This allows the resulting smaller pieces to traverse that link. Under IPv4, if a router receives a network packet larger than the next hop’s MTU, it has two options. It can either drop the packet and send an ICMP ‘Fragmentation Needed’ message if the ‘Don’t Fragment’ (DF) flag is set. Alternatively, it can fragment the packet and send it over the link with the smaller MTU.
Fragmentation can introduce overhead and latency. The receiving host must reassemble all fragments to reconstruct the original packet. This process is crucial for ensuring data delivery across diverse network infrastructures, including various WAN or VPN tunnels connecting data centers.
Local Delivery of the Protocol Data Unit: Data Link Layer (Layer 2)
The Network Layer routes packets across different networks. The Data Link Layer then takes over for local delivery. This layer ensures data moves reliably between directly connected devices. It transforms the network layer’s packet into a "frame."
The Protocol Data Unit as a Frame
At the Data Link Layer, the Protocol data unit becomes a frame. This frame prepares data for physical transmission across a local network segment. An Ethernet frame, for example, encapsulates an IP packet as its payload. It includes specific headers, a trailer, and both source and destination Media Access Control (MAC) addresses. These MAC addresses identify the Network Interface Cards (NICs) of communicating devices, such as a server and the nearest router within a data center. Wi-Fi networks also use frames, categorizing them into management, control, and data frames. The size of a basic Ethernet frame is 1518 bytes. A more recent standard extended the Ethernet frame size to 2000 bytes. Frame formats typically support variable-length frames, with the upper limit known as the Maximum Transmission Unit (MTU).
Physical Addressing with MAC Addresses
MAC addresses provide physical addressing. Each network interface card has a unique MAC address. This address allows devices on the same local network segment to communicate directly. Routers use MAC addresses to forward frames to the correct device within a local area network.
Error Detection and Correction Mechanisms
The Data Link Layer ensures data integrity during local transmission. The Frame Check Sequence (FCS) provides error detection using a Cyclic Redundancy Check (CRC). The sender calculates a checksum based on the frame contents. It includes this checksum in the trailer. The receiver recalculates the checksum and compares it to the received FCS. If the checksums match, the frame likely arrived without errors. If they differ, the receiver discards the corrupted frame. Other error detection techniques include parity bits and checksums. Error correction methods, such as Forward Error Correction, allow the receiver to correct errors without retransmission.
Framing the Protocol Data Unit for Network Transmission
Start and End Frame Delimiters
A frame uses specific bit patterns at its beginning and end. These are known as frame delimiters. They help the receiving device identify where a frame starts and finishes. This ensures the receiver correctly interprets the data within the frame.
Flow Control at the Data Link Layer
Flow control prevents a fast sender from overwhelming a slower receiver. This ensures efficient data transfer. The Stop-and-Wait Protocol is a fundamental mechanism. The sender transmits one frame and waits for an acknowledgment from the receiver before sending the next. The Sliding Window Protocol is an advanced version. It improves data transfer efficiency by allowing multiple frames to be sent before acknowledgments are received. This reduces idle time and optimizes network usage.
The Physical Protocol Data Unit: Bits on the Wire (Layer 1)

The journey of a 프로토콜 데이터 유닛 culminates at the Physical Layer. This layer represents the actual transmission of raw data bits over a physical medium. It transforms the Data Link Layer’s frame into electrical signals, light pulses, or radio waves.
Transforming the Protocol Data Unit into Bits
Converting Frames to Electrical Signals or Light Pulses
At this fundamental layer, the frame from Layer 2 undergoes conversion into a stream of bits. These bits then transform into a physical signal. For instance, a network interface card (NIC) in a data center server converts digital data into electrical signals for transmission over copper cables. Each bit represents a specific voltage level. Alternatively, for fiber optic cables, data transmits as light pulses. Wireless mediums, like Wi-Fi, transmit data through radio waves. Engineers use various modulation techniques to optimize bandwidth and data rate. These include Quadrature Amplitude Modulation (QAM), Phase-Shift Keying (PSK), and Frequency-Shift Keying (FSK). For example, in older modem technologies, a one bit represented a sound, and a zero bit represented silence (AM Modulation). FSK used a high-pitched sound for a one bit and a low-pitched sound for a zero bit. Phase encoding uses the phase of a signal, allowing each Baud to encode multiple bits. Modern modems often combine these methods for higher speeds.
The Raw Transmission Medium
The physical layer utilizes various transmission media. These include Ethernet cables, Wi-Fi radio waves, and USB connections. These media carry the converted signals. The Physical Layer is responsible for the actual transmission of raw data bits over this physical medium. It handles the physical characteristics of the transmission medium. This includes voltage levels, timing of changes, and physical connectors.
The Unseen Journey of the Physical Protocol Data Unit
Encoding and Decoding Techniques
Encoding techniques are crucial for reliable data transmission. They convert digital data into a format suitable for the physical medium. For example, line coding converts data into electrical fluctuations. This process ensures effective data flow. The receiver then decodes these signals back into digital bits. This ensures the integrity of the transmitted data.
Synchronization of Bit Streams
Synchronization is vital at the Physical Layer. It ensures the receiver correctly interprets the incoming bit stream. Bit synchronization is achieved using a standard clock. One edge sends data, and a delayed edge receives it. A common clock often drives both interfaces. Physical layer synchronization is a fundamental method for frequency synchronization in networks. It commonly uses physical layer clock recovery in both traditional and modern digital transport systems. Clock recovery mechanisms extract timing information directly from the received signal. Some encoding methods integrate clock signals within the data stream itself. Other systems transmit clock signals independently alongside the data. Preamble bit patterns are also used for frame synchronization. These special patterns help receivers lock onto incoming signals and establish proper timing.
The Encapsulation Process: How a Protocol Data Unit Descends the Stack

The journey of a Protocol Data Unit (PDU) from the Application Layer down to the Physical Layer involves a crucial process called encapsulation. This process prepares the data for its eventual transmission across the network.
Adding Headers and Trailers to the Protocol Data Unit
As the PDU moves down the OSI stack, each layer adds its own control information. This information ensures proper handling and delivery at that specific layer.
Layer-Specific Information Added at Each Step
Each layer appends a header to the PDU it receives from the layer above. Sometimes, a layer also adds a trailer. These additions contain vital instructions for the peer layer on the receiving end. For example, the Transport Layer adds port numbers for application identification. The Network Layer adds IP addresses for routing. The Data Link Layer adds MAC addresses for local delivery. This systematic addition of information ensures each layer performs its function correctly.
The "Wrapping" of Data as it Descends
One can visualize encapsulation as a "wrapping" process. The Application Layer PDU becomes the data payload for the Presentation Layer. The Presentation Layer then adds its header, creating a new PDU. This new PDU then becomes the payload for the Session Layer, and so on. Each layer effectively wraps the PDU from the layer above with its own control information. This creates a nested structure, much like Russian dolls, where each layer’s PDU contains the PDU from the layer above.
The Cumulative Effect on the Protocol Data Unit
Encapsulation has a direct impact on the size and integrity of the Protocol Data Unit. Each added header or trailer contributes to the overall size.
Increasing Size with Each Layer’s Overhead
As each layer adds its header and sometimes a trailer, the PDU grows in size. This cumulative effect means the PDU becomes larger as it descends the stack. For instance, IPSec encapsulation typically increases packet size by 40–60 bytes per packet. This increase occurs due to the addition of a new IP header, security headers like ESP or AH, and padding for encryption algorithms. In a worst-case scenario, such as with AES-CBC and HMAC-SHA1-96 under ESP tunnel mode, IPSec encapsulation can lead to a total overhead approaching 73 bytes. This overhead includes tunnel IP headers, ESP headers, initialization vectors, padding, trailer fields, and integrity check values. A 31-byte plaintext IPv4 packet, for example, can become 104 bytes after ESP encapsulation, with 73 bytes of overhead. This overhead is a necessary cost for network functionality and security.
Maintaining Data Integrity During Encapsulation
Despite the size increase, the encapsulation process also includes mechanisms to maintain data integrity. PDUs include specific fields for error detection and correction. Trailers, particularly at the Data Link Layer, often contain error-checking information like Cyclic Redundancy Check (CRC) or Frame Check Sequence (FCS) data. These techniques involve generating a value based on the data content. The sender includes this value with the data. The receiving device recalculates and compares this value. A mismatch indicates an error, potentially leading to retransmission. Headers also carry control information such as sequencing and flags. These features help detect and correct errors, ensuring the payload arrives intact at its destination.
The Decapsulation Process: How a Protocol Data Unit Ascends the Stack
After a 프로토콜 데이터 유닛 (PDU) completes its journey across the network, it arrives at the destination device. Here, the decapsulation process begins. This process reverses encapsulation, allowing the receiving device to extract the original data. Each layer on the receiving end processes the PDU, removing its specific control information.
Removing Headers and Trailers from the Protocol Data Unit
Decapsulation systematically unwraps the data. Each layer removes the header and trailer added by its peer layer on the sending device.
Unwrapping the Data as it Ascends
As the PDU ascends the OSI stack, each layer strips away the control information relevant to its function. This unwrapping reveals the PDU from the layer below. For example, when a frame arrives at the Data Link Layer, it removes the Layer 2 header and trailer, including the Frame Check Sequence. The Network Layer then processes the resulting packet, stripping off the IP header. Finally, the Transport Layer removes the TCP header. The upper layers (Session, Presentation, and Application) do not remove further headers or trailers. They simply process the data they receive. This systematic removal ensures the original application data emerges intact.
| OSI Layer | Header/Trailer Removed |
|---|---|
| 데이터 링크 계층 | Layer 2 header and trailer (including Frame Check Sequence) |
| 네트워크 계층 | IP header |
| 전송 계층 | TCP header |
| Upper Layers (Session, Presentation, Application) | No further headers or trailers removed |
Verification and Error Checking at Each Layer
Each layer performs crucial verification and error checking during decapsulation. This ensures data integrity and proper processing. At the Physical Layer, devices detect issues like 8B/10B Decode Errors or Loss of Signal (LOS). These alarms indicate problems with the raw bit stream. The Data Link Layer uses the Cyclic Redundancy Check (CRC) in the frame trailer to identify corrupted frames. It discards any frame that fails this check. It also verifies MAC addresses for correct local delivery.
The Network Layer decrements the Time-to-Live (TTL) field. If TTL reaches zero, the packet is discarded, preventing endless loops. It also checks the header checksum to detect corruption in the IPv4 header. Invalid packets are discarded. Fragmentation is detected by inspecting specific fields in IPv4 headers. At the Transport Layer, for TCP packets, the system examines sequence numbers, acknowledgment numbers, and window sizes. UDP processing involves basic header validation. Each layer validates its header and payload using checksums or other verification methods. It discards packets that fail validation and may send error notifications.
Reconstructing the Original Protocol Data Unit
After successful verification and removal of all layer-specific information, the system reconstructs the original data.
Delivering Data to the Correct Application
그만큼 decapsulation process ultimately delivers the original data to the intended application. Transport Layer PDUs, or segments, contain source and destination port numbers. These numbers are crucial for identifying the specific sending and receiving applications. Headers, integral components of a PDU, carry control information such as source and destination addresses, error-checking codes, and sequencing details. This ensures correct data ordering. The decapsulation process at the destination device involves stripping away the headers and trailers added by each layer. This delivers the original data to the correct application.
The Final Form of the Application Layer Protocol Data Unit
Once the Transport Layer passes the data to the Session Layer, and then through the Presentation Layer, the PDU finally returns to its original form. It becomes the Application Layer PDU. This is the data the user or application initially sent. For example, an email message or a web page content, now fully reconstructed, is delivered to the email client or web browser. The journey of the PDU concludes with the successful delivery of the application’s data.
The Protocol Data Unit’s journey, from application data to bits on a wire, demonstrates the OSI model’s power. Each layer’s transformation is vital for successful, reliable data communication across complex networks. This systematic process ensures data integrity and proper delivery.
Understanding PDUs is crucial for network professionals and enthusiasts. It helps them troubleshoot issues, like packet loss in data centers, by analyzing sequence numbers. This knowledge also aids in monitoring traffic and detecting anomalies. The modularity and efficiency of the OSI model, enabled by these PDU transformations, allow for robust and adaptable network operations.
FAQ
프로토콜 데이터 유닛(PDU)이란 무엇입니까?
PDU는 데이터 단위입니다. transmitted between peer layers in the OSI model. It contains data and control information. Each layer transforms the PDU, adding specific details for communication.
Why does a PDU change its name at different OSI layers?
The PDU changes its name to reflect the control information added or removed at each layer. This helps identify its specific form and function within that layer. For example, it is a segment at the Transport Layer.
What is encapsulation in the context of PDUs?
Encapsulation is the process where each OSI layer adds its own header (and sometimes a trailer) to the PDU received from the layer above. This "wraps" the data with layer-specific control information as it descends the stack.
How does decapsulation work?
Decapsulation is the reverse of encapsulation. As the PDU ascends the OSI stack on the receiving device, each layer removes its specific header and trailer. This unwraps the original application data for delivery.
What is the main difference between a TCP segment and a UDP datagram?
A TCP segment offers reliable, ordered delivery with error checking and acknowledgments. A UDP datagram prioritizes speed over reliability, providing a connectionless, faster transmission without guarantees.
How do IP addresses and MAC addresses differ in PDU routing?
IP addresses provide logical addressing for global routing across networks. MAC addresses offer physical addressing for local delivery between devices on the same network segment. Routers use both.
Why is error checking important for PDUs?
Error checking ensures data integrity during transmission. Mechanisms like checksums and CRCs detect corrupted data. This prompts retransmission or discarding of faulty PDUs, guaranteeing the accuracy of the delivered information.
What happens to a PDU at the Physical Layer?
At the Physical Layer, the PDU transforms into raw bits. These bits convert into electrical signals, light pulses, or radio waves. The physical medium then transmits these signals across the network.


