Hacker Fundamentals: A Tale of Two Standards

A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!

OSI, TCP and What's Going on Here?

A good way to understand what a protocol is, would be to view it like a language. If people were network interfaces and all spoke their own language, there would be no way for them to properly communicate. A protocol works the same way, by agreeing to use certain methods or standards, many groups can build and create things that can all communicate with each other. So when you see TCP/IP protocol, think of it like a collection of rules computers must all follow to allow the millions and millions of networked machines called the Internet to function.

OSI was never meant to be just a model. Back in the 1970s, it was a competing protocol against TCP/IP and was actually a better protocol in design. The main reason it didn't take hold was that its addresses were hexadecimal and very complex. In fact, it was thought back then, that it had too many available addresses. Being based in hex, it allowed far more than the current protocol standard of IPv4. I should point out that the next version of IP, version 6, uses hex addresses which allow many more available ranges then IPv4. Go figure.

Examples of addresses include:

  • Hexadecimal - 12:34:56:78:9A:BC
  • IPv4 (current standard) -
  • IPv6 (new format) - fe80::223:4eff:fec0:5b48

A Tale of Two Models

OSI is still used today to describe network communication and for standards to unite, while the TCP model is used to show relation between the various protocols it contains. Below is a diagram of how the two map out to each other.

The first thing you might notice is that TCP/IP is not just one protocol, but an entire suite of protocols. Next, you should notice that the layers of the TCP/IP architecture and the OSI model line up more or less the same.

Layers one and two of the OSI model are considered to both be physical and local, so they are simply grouped together as the Network Interface Layer under TCP/IP. The Network layer is just renamed the Internet layer and carries the same functions. Following that, you can see layers five through seven of OSI have been compiled into the Application layer, as that is where they operate.

Still with me? Now let's take a look at all of these three- and four-letter abbreviations in the suite. This is the good stuff coming up here.

The TCP/IP Suite

The TCP/IP suite is where we talk about things like FTP, DNS and other protocols you might have heard and read about before. Again, looking at the picture above, we can see what protocols are used in what layers.

An entire book could be written on the TCP/IP suite—and they have. To keep things in focus, we are only going to discuss a few protocols here. Feel free to ask any other questions about the protocols in the comments.

A good example of this is the Transport layers of both the OSI and TCP models. When data arrives there, it has two options for transport, TCP and UDP. TCP allows for reliable transit, where as UDP is unreliable. If you are wondering why you would ever want to send something unreliable, here is the answer...


In a very short nutshell, when you send a request with TCP, you will always get a confirmation of its receipt. This is like me throwing you a ball, you yelling "I got it!", then throwing it back to me, where I would then yell "I got it". But what if I drop it? I would simple yell back, "I need it again!", and would wait until you threw me a new one.

In contrast, UDP is like you throwing me ball after ball and just hoping I catch them. If I drop one or sixteen—it doesn't matter—because you have no way to know.

UDP sounds pretty bad right now, but listen to this: services like VOIP and online games are too fast for TCP. Imagine you were playing Halo and you dropped a packet or two. Can you stop and wait for it? Of course not. You would see a little jump in the frame rate and you'd keep going. If you had to wait for it to get back to you, you would surely be fragged. The same applies if you were talking to your mate on Skype and you dropped a few packets; it makes no sense to pause the conversation to retrieve them.

TCP is great when you need to make sure all the packets arrive and in order. Web browsing and the like would be awfully hard without having reliable transportation.

It is the Transport layer that determines, based on its parameters, what protocol to use.

IP and MAC Addresses

Every single packet being sent around has two addresses inside of it—an Internet Protocol and a Media Access Control address. An IP address really only identifies your network, as all internal IP addresses are actually private and handled by Network Address Translation (NAT) at the router. You might have an IP address from your ISP of that identifies your network, and your actual computer might have a private, inside-the-network address of

This is done so that many devices, like your PlayStation and your computer, can get on the Internet at the same time, while only needing one IP address. If every single device online today had its own address, we would have already ran out of new ones to use!

So, where does a MAC address come in? As it is, IP addresses are of no use inside of your network, as your machines don't use them to talk to each other.

Where IP addressing functions at the network layer, MAC addressing works at the data link layer. It's a slight oversimplification, but one can think of IP addressing as supporting the software implementation and MAC addresses as supporting the hardware implementation of the network stack. The MAC address generally remains fixed and follows the network device, but the IP address changes as the network device moves from one network to another.

So, how in the world does this actually work? Your network maintains a mapping between the IP address of a device and its MAC address. This mapping is known as the ARP Table.

Putting It All Together: Address Resolution Protocol

ARP stands for Address Resolution Protocol and it is used to associate a Network layer address (IP address) with a Data Link layer address (MAC address).

Let's say you have some data to send. When the data gets to the Network layer, it will put on the destination IP address. All of this info (the Network layer datagram, aka packet) is passed down to the Data Link layer where it is taken and placed within a data link frame.

Based on the IP address and subnet mask, your computer should be able to figure out if the destination IP is local to your network or not. If the IP is local, your computer will look in its ARP table, the table where the responses to previous ARP requests are cached, to find the MAC address.

If it's not there, then your computer will broadcast an ARP request to find out the MAC address for the destination IP. Since this request is broadcast, all machines on the network will receive it and examine the contents. If the IP address in the request is their own, they'll reply back. On receiving this information, your computer will update its ARP table to include the new information and will then send out the frame addressed with the destination hosts MAC address.

Request for Comments

With all this talk about protocols, I'm sure you have some questions about specific ones you have come across. It turns out the Internet Engineering Task Force has put together a memorandum describing, collecting, and categorizing details about protocols, research, and ideas on how the actual Internet functions. This is needed because there's no one authority that mandates certain protocols to be used over other ones, and in fact, you can create and submit your own for review and use!

Want to learn the more technical components of UDP, ARP and TCP? Check out those RFC white papers describing the protocols.

In Closing

We are another step further in giving you the skills you need to navigate the Internet like a pro. If some of this didn't quite make sense, I encourage you to check out our OSI model and Intro to IP Addresses articles for some more back knowledge. Next in the series, we will look at penetration attacks that work on these ideas!

Questions? Comments? Have anything to add to this walkthrough? Leave us a comment or visit our forum and share it with the community.

Just updated your iPhone? You'll find new features for Podcasts, News, Books, and TV, as well as important security improvements and fresh wallpapers. Find out what's new and changed on your iPhone with the iOS 17.5 update.

Images by NetFaq, SoftPanorama, Network Cable Tester


Dude! I love this article. It's right up my alley. Ok, with the descriptions of the protocols (UDP/TCP), I'd love to see a follow up article on 'how to use' (what are they called?) TCP/UDP wrappers(?). I dont know if I asked it the right way.

From what I've looked/still looking into, it seems that its a good idea to use both, depending on the application.

Related to this: want to introduce not just networking, but how to program networking applications?
I've been looking into starting to program using sockets in python, but on top of not having it come naturally, I find it difficult to come up with decent tasks or appropriate difficult to help learn with.

hi im trying to find some more guides about networking including the internet and my home network

Hi i dindt understood very well the "Putting It All Together: Address Resolution Protocol" because i cant see what is my mac adress my mac adress is associated with a piece of my hardware like motherboard or something and whats the prupose of the mac adress i know the tutorial is good but i want to understand all to start to getting solid


The MAC address is associated with a network device. On your system, it is associated with your network interface card.

The purpose of the MAC address is to provide a fixed, globally unique address of every networked device. Since internal, private IP addresses are reused and recycled, the MAC provides us a way to map an IPv4 address to a specific machine through the ARP.


Now im like half head geek,
What you explained everything hpns on Local or client side, To be simple one side.

Now what happnes on the other end. or is it the same there to.

BTB, i have never ever heard of ARP thankxxx for that.
+1 kudos

It's a good article ?? but still I'm not sure what is protocol itself. Can you explain it using real life examples ? Thanks ??

Missed a beat! When reply received from Web request at modem/router. How is my individual machine identified on my LAN? Is it the private IP or MAC address and are these contained in the wrapper? Thanks in advance...

Forget last question please..just read about NAT. Always learning!!

2 wht level would it be crutical if sb had known my mac or private IP address es.. d also 4 mac spoofing i tried on some watsapp acc of my friends with their knowldge 2 see if it is working but i could do nothong !! if sb can help me 2 handle it ., thanks

in the article discussing the TCP 3- way handshake he said that the handshaking technique is a method of setting up a TCP connection over an internet protocol

based network between two computer then he said we wanted to negotiate the parameters of the network TCP socket . what does it mean ?

Share Your Thoughts

  • Hot
  • Latest