8/6/2019 The Internet Protocol Suite Also Known as TCP
1/29
The Internet Protocol Suite also known as TCP/IP is the set of communications
protocols used for the Internet and other similar networks. It is named from two of
the most important protocols in it: the Transmission Control Protocol (TCP) and
the Internet Protocol (IP), which were the first two networking protocols defined
in this standard. IP networking represents a synthesis of several developments that
began to evolve in the 1960s and 1970s, namely the Internet and LANs (LocalArea Networks), which emerged in the mid- to late-1980s, together with the
advent of the World Wide Web in early 1990s.
The Internet Protocol Suite, like many protocol suites, may be viewed as a set of
layers. Each layer solves a set of problems involving the transmission of data, and
provides a well-defined service to the upper layer protocols based on using
services from some lower layers. Upper layers are logically closer to the user and
deal with more abstract data, relying on lower layer protocols to translate data into
forms that can eventually be physically transmitted.The main differences between the two models are as follows:
1. OSI is a reference model and TCP/IP is an implementation of OSI model.2.TCP/IP Protocols are considered to be standards around which the internet
has developed. The OSI model however is a "generic, protocol-independent standard."
3. TCP/IP combines the presentation and session layer issues into itsapplication layer.4. TCP/IP combines the OSI data link and physical layers into the network
access layer.
5. TCP/IP appears to be a simpler model and this is mainly due to the fact thatit has fewer layers.
6. TCP/IP is considered to be a more credible model- This is mainly due to the
fact because TCP/IP protocols are the standards around which the internet
was developed therefore it mainly gains creditability due to this
reason. Where as in contrast networks are not usually built around the OSI
model as it is merely used as a guidance tool.7. The OSI model consists of 7 architectural layers whereas the TCP/IP onlyhas 4 layers.
8. In the TCP/IP model of the Internet, protocols are deliberately not as rigidly
designed into strict layers as the OSI model.[6] RFC 3439 contains a
section entitled "Layering considered harmful." However, TCP/IP does
recognize four broad layers of functionality which are derived from the
operating scope of their contained protocols, namely the scope of the
software application, the end-to-end transport connection, the
internetworking range, and lastly the scope of the direct links to other nodes
on the local network.9. The presumably strict consumer/producer layering of OSI as it is usually
described does not present contradictions in TCP/IP, as it is permissible that
protocol usage does not follow the hierarchy implied in a layered model.
Such examples exist in some routing protocols (e.g., OSPF), or in the
description of tunneling protocols, which provide a Link Layer for an
application, although the tunnel host protocol may well be a Transport or
even an Application Layer protocol in its own right.
8/6/2019 The Internet Protocol Suite Also Known as TCP
2/29
10. The TCP/IP design generally favors decisions based on simplicity,
efficiency and ease of implementation.
OSI Model Reference TCP/IP Model
Reference
Service, interfaceand protocol
Service, interface and
protocol are not clearly
defined. For example, the
only real services offered
by the Internet layer are
- Send IP Packet
- Receive IP Packet
Protocols in the OSI
model are better hidden
and can be replaced
relatively easily as the
technology changes,
which is one of the mainobjective of layered
protocols.
Functionalities
Because models were
invented beforeprotocols, functionalities
put in each layer are not
very optimized.
In this case, the protocols
have been invented beforemodels, so the
functionalities are
perfectly described.
Numbers oflayers
Seven layers, Network
(Internet), Transport andApplication layers being
similar to TCP/IP
Only four layers.
Connectionless/ Connection-
orientedcommunication
Both connectionless andconnection-oriented
communication are
supported in the network
layer, but only
connection-oriented
communication in the
transport layer.
Only one mode in the
network layer
(connectionless) but both
modes in the transport
layer are supported, giving
the users a choice.
Internet Protocol Suite:
The Internet Protocol Suite also known as TCP/IP is the set of communications protocols
used for the Internet and other similar networks. It is named from two of the mostimportant protocols in it: the Transmission Control Protocol (TCP) and the Internet
Protocol (IP), which were the first two networking protocols defined in this standard. IPnetworking represents a synthesis of several developments that began to evolve in the
1960s and 1970s, namely the Internet and LANs (Local Area Networks), which emerged
in the mid- to late-1980s, together with the advent of the World Wide Web in early
8/6/2019 The Internet Protocol Suite Also Known as TCP
3/29
1990s.
The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers.Each layer solves a set of problems involving the transmission of data, and provides a
well-defined service to the upper layer protocols based on using services from somelower layers. Upper layers are logically closer to the user and deal with more abstract
data, relying on lower layer protocols to translate data into forms th at can eventually be
physically transmitted.
The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these arethe Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.
OSI model:
The Open Systems Interconnection Reference Model also known to be OSI Reference
Model or OSI Model is an abstract description for layered communications and computer
network protocol design. It was developed as part of the Open Systems Interconnection(OSI) initiative. In its most basic form, it divides network architecture into seven layers
which, from top to bottom, are the Application, Presentation, Session, Transport,Network, Data-Link, and Physical Layers. It is therefore often referred to as the OSI
Seven Layer Model.
A layer is a collection of conceptually similar functions that provide services to the layerabove it and receives service from the layer below it. For example, a layer that provides
error-free communications across a network provides the path needed by applicationsabove it, while it calls the next lower layer to send and receive packets that make up thecontents of the path.
All aspects of OSI design evolved from experiences with the CYCLADES network, which
also influenced Internet design. The new design was documented in ISO 7498 and its
various addenda. In this model, a networking system is divided into layers. Within eachlayer, one or more entities implement its functionality. Each entity interacts directly only
with the layer immediately beneath it, and provides facilities for use by the layer above
it.
Protocols enable an entity in one host to interact with a corresponding entity at the
same layer in another host. Service definitions abstractly describe the functionalityprovided to an ( N)-layer by an (N-1) layer, where N is one of the seven layers of
protocols operating in the local host.
#4
02-02-2009
Layers in the TCP/IP Suite:
The TCP/IP suite uses encapsulation to provide abstraction of protocols and services.Such encapsulation usually is aligned with the division of the protocol suite into layers ofgeneral functionality. In general, an application (the highest level of the model ) uses a
set of protocols to send its data down the layers, being further encapsulated at each
level.
This may be illustrated by an example network scenario, in which two Internet hostcomputers communicate across local network boundaries constituted by their
internetworking gateways (routers).
8/6/2019 The Internet Protocol Suite Also Known as TCP
4/29
The functional groups of protocols and methods are the Application Layer, the TransportLayer, the Internet Layer, and the Link Layer (RFC 1122). It should be noted that thismodel was not intended to be a rigid reference model into which new protocols have tofit in order to be accepted as a standard.
y Application Layer:
DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC, NNTP, POP3, SIP,SMTP,SMPP, SNMP, SSH, Telnet, Echo, RTP, PNRP, rlogin, ENRPRouting protocols like BGP and RIP which run over TCP/UDP, may also be
considered part of the Internet Layer.y Transport Layer:
TCP, UDP, DCCP, SCTP, IL, RUDP, RSVPy Internet Layer:
IP (IPv4, IPv6) ICMP, IGMP, and ICMPv6
OSPF for IPv4 was initially considered IP layer protocol since it runs per IP-subnet, but has been placed on the Link since RFC 2740.
y Link Layer:
ARP, RARP, OSPF (IPv4/IPv6), IS-IS, NDP
Different authors have interpreted the RFCs differently regarding whether the Link Layerand the four-layer TCP/IP model covers physical layer issues or a hardware layer is
assumed below the link layer. Some authors have tried to use other names for the link
layer, such as Network interface layer, in effort to avoid confusion with the Data linklayer of the seven-layer OSI model. Others have attempted to map the Internet Protocol
model onto the seven-layer OSI Model. The mapping often results in a five-layer TCP/IP
model, wherein the Link Layer is split into a Data Link Layer on top of a Physical Layer.Especially in literature with a bottom-up approach to computer networking, where
physical layer issues are emphasized, an evolution towards a five-layer Internet model
can be observed out of pedagogical reasons.
The Internet Layer is usually directly mapped to the OSI's Network Layer. At the top ofthe hierarchy, the Transport Layer is always mapped directly into OSI Layer 4 of the
same name. OSIs Application Layer, Presentation Layer, and Session Layer are collapsed
into TCP/IP's Application Layer. As a result, these efforts r esult in either a four- or five-layer scheme with a variety of layer names. This has caused considerable confusion in
the application of these models. Other authors dispense with rigid pedagogy[17]focusing instead on functionality and behavior.
The Internet protocol stack has never been altered by the Internet Engineering TaskForce (IETF) from the four layers defined in RFC 1122. The IETF makes no effort to
follow the seven-layer OSI model and does not refer to it in standards-track protocol
specifications and other architectural documents. The IETF has repeatedly stated thatInternet protocol and architecture development is not intended to be OSI -compliant.
Description of OSI layers:
Layer 1: Physical Layer:
The Physical Layer defines the electrical and physical specifications for devices. In
particular, it defines the relationship between a device and a physical medium. This
includes the layout of pins, voltages, cable specifications, Hubs, repeaters, network
8/6/2019 The Internet Protocol Suite Also Known as TCP
5/29
adapters, Host Bus Adapters (HBAs used in Storage Area Networks) and more.
To understand the function of the Physical Layer in contrast to the functions of the Data
Link Layer, think of the Physical Layer as concerned primarily with the interaction of a
single device with a medium, where the Data Link Layer is concerned more with the
interactions of multiple devices (i.e., at least two) with a shared medium. The Physical
Layer will tell one device how to transmit to the medium, and another device how toreceive from it (in most cases it does not tell the device how to connect to the medium).
Standards such as RS-232 do use physical wires to control access to the medium.
Layer 2: Data Link Layer:
The Data Link Layer provides the functional and procedural means to transfer data
between network entities and to detect and possibly correct errors that may occur in the
Physical Layer. Originally, this layer was intended for point-to-point and point-to-
multipoint media, characteristic of wide area media in the telephone system. Local area
network architecture, which included broadcast-capable multiaccess media, was
developed independently of the ISO work, in IEEE Project 802. IEEE work assumed
sublayering and management functions not required for WAN use. In modern practice,
only error detection, not flow control using sliding window, is present in modern data link
protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE
802.2 LLC layer is not used for most protocols on Ethernet, and, on other local area
networks, its flow control and acknowledgment mechanisms are rarely used. Sliding
window flow control and acknowledgment is used at the Transport Layer by protocols
such as TCP, but is still used in niches where X.25 offers performance advantages.
WAN Protocol architecture:
Connection-oriented WAN data link protocols, in addition to framing, detect and may
correct errors. They also are capable of controlling the rate of transmission. A WAN DataLink Layer might implement a sliding window flow control and acknowledgment
mechanism to provide reliable delivery of frames; that is the case for SDLC and HDLC,
and derivatives of HDLC such as LAPB and LAPD.
IEEE 802 LAN architecture:
Practical, connectionless LANs began with the pre-IEEE Ethernet specification, which is
the ancestor of IEEE 802.3. This layer manages the interaction of devices with a shared
medium, which is the function of a Media Access Control sublayer. Above this MAC
sublayer is the media-independent IEEE 802.2 Logical Link Control (LLC) sublayer, which
deals with addressing and multiplexing on multi access media.
Layer 3: Network Layer:
The Network Layer provides the functional and procedural means of transferring variable
length data sequences from a source to a destination via one or more networks, while
maintaining the quality of service requested by the Transport Layer. The Network Layer
performs network routing functions, and might also perform fragmentation and
reassembly, and report delivery errors. Routers operate at this layersending data
throughout the extended network and making the Internet possible. This is a logical
8/6/2019 The Internet Protocol Suite Also Known as TCP
6/29
addressing scheme values are chosen by the network engineer. The addressing
scheme is hierarchical.
The best-known example of a Layer 3 protocol is the Internet Protocol (IP). It manages
the connectionless transfer of data one hop at a time, from end system to ingress router,
router to router, and from egress router to destination end system. It is not responsible
for reliable delivery to a next hop, but only for the detection of errored packets so theymay be discarded. When the medium of the next hop cannot accept a packet in its
current length, IP is responsible for fragmenting the packet into sufficiently small
packets that the medium can accept.
Layer 4: Transport Layer:
The Transport Layer provides transparent transfer of data between end users, providing
reliable data transfer services to the upper layers. The Transport Layer controls the
reliability of a given link through flow control, segmentation/desegmentation, and error
control. Some protocols are state and connection oriented. This means that the
Transport Layer can keep track of the segments and retransmit those that fail.
Although not developed under the OSI Reference Model and not strictly conforming to
the OSI definition of the Transport Layer, the best known examples of a Layer 4 protocol
are the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).[citation
needed]
Layer 5: Session Layer:
The Session Layer controls the dialogues/connections (sessions) between computers. It
establishes, manages and terminates the connections between the local and remote
application. It provides for full-duplex, half-duplex, or simplex operation, and establishes
checkpointing, adjournment, termination, and restart procedures. The OSI model madethis layer responsible for "graceful close" of sessions, which is a property of TCP, and
also for session checkpointing and recovery, which is not usually used in the Internet
Protocol Suite. The Session Layer is commonly implemented explicitly in application
environments that use remote procedure calls (RPCs).
Layer 6: Presentation Layer:
The Presentation Layer establishes a context between Application Layer entities, in which
the higher-layer entities can use different syntax and semantics, as long as the
Presentation Service understands both and the mapping between them. The presentation
service data units are then encapsulated into Session Protocol Data Units, and moved
down the stack.
This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can
accept. This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax layer.
Layer 7: Application Layer:
8/6/2019 The Internet Protocol Suite Also Known as TCP
7/29
The application layer is the OSI layer closest to the end user, which means that both the
OSI application layer and the user interact directly with the software application. This
layer interacts with software applications that implement a communicating component.
Such application programs fall outside the scope of the OSI model. Application layer
functions typically include identifying communication partners, determining resource
availability, and synchronizing communication. When identifying communicationpartners, the application layer determines the identity and availability of communication
partners for an application with data to transmit. When determining resource availability,
the application layer must decide whether sufficient network resources for the requested
communication exist. In synchronizing communication, all communication between
applications requires cooperation that is managed by the application layer. Some
examples of application layer implementations include Telnet, File Transfer Protocol
(FTP) , and Simple Mail Transfer Protocol (SMTP).
General Comparison with TCP/IP:
In the TCP/IP model of the Internet, protocols are deliberately not as rigidly designed
into strict layers as the OSI model.[6] RFC 3439 contains a section entitled "Layeringconsidered harmful." However, TCP/IP does recognize four broad layers of functionality
which are derived from the operating scope of their contained protocols, namely thescope of the software application, the end-to-end transport connection, theinternetworking range, and lastly the scope of the direct links to other nodes on the local
network.
Even though the concept is different than in OSI, these layers are nevertheless often
compared with the OSI layering scheme in the following way: The Internet ApplicationLayer includes the OSI Application Layer, Presentation Layer, and most of the Session
Layer. Its end-to-end Transport Layer includes the graceful close function of the OSI
Session Layer as well as the OSI Transport Layer. The internetworking layer (InternetLayer) is a subset of the OSI Network Layer, while the Link Layer includes the OSI Data
Link and Physical Layers, as well as parts of OSI's Network Layer. These comparisons arebased on the original seven-layer protocol model as defined in ISO 7498, rather than
refinements in such things as the internal organization of the Network Layer document.
The presumably strict consumer/producer layering of OSI as it is usually described does
not present contradictions in TCP/IP, as it is permissible that protocol usage does not
follow the hierarchy implied in a layered model. Such examples exist in some routingprotocols (e.g., OSPF), or in the description of tunneling protocols, which provide a Link
Layer for an application, although the tunnel host protocol may well be a Transport oreven an Application Layer protocol in its own right.
The TCP/IP design generally favors decisions based on simplicity, efficiency and ease ofimplementation.
TCP/IP Model Vs OSI ModelThis article is on TCP/IP model vs OSI model. It is meant to highlight the differences between the two set standards of
the industry. TCP/IP model and the OSI model have been the two protocol suites on which communication industryheavily relies on.
8/6/2019 The Internet Protocol Suite Also Known as TCP
8/29
Both, TCP/IP model and OSI model, work in very similar fashions. But they do have very subtle differences.Knowing these differences is crucial to learning computer networking. This article will try to show the comparisonbetween TCP/IP model vs OSI model.
ABackgroundOSI reference model came into existence way before TCP/IP model was created. Advance research project
agency (ARPA) created OSI reference model so that they can logically group the similarly working components ofthe network into various layers of the protocol. But after the advent of the Internet, there arose the need for astreamlined protocol suite, which would address the need of the ever growing Internet. So the Defense AdvancedResearch Project Agency (DARPA), decided to create TCP/IP protocol suite. This was going to address many, ifnot all the issues that had arisen with OSI reference model.
TCP/IP Model Layers ExplainedSo, what does TCP/IP stand for? It is a suite of protocol which is named after its most significant pair of protocols.That is Transmission Control Protocol and Internet Protocol. TCP/IP are are made up of layers. Each layer isresponsible for a set of computer network related tasks. Every layer provides service to the the layer above it.There are in all four layers in the TCP/IP reference model.
y Application Layer: This is the topmost layer of the TCP/IP suite. This isresponsible for coding of the packet data.
y Transport layer: This layer monitors end to end path selections of the
packets. It also provides service to the application layer.y Internet Layer: This layer is responsible for sending packets through
different networks.
y Link Layer: It is the closest layer to the network hardware. It providesservice to Internet layer.
OSI Model Layers ExplainedIn OSI reference model there seven layers of protocols. Again, in OSI reference model, each layer providesservices to the layer above it. There are in all seven layers of in OSI. They are
y Physical Layer: It is the lower most layer of the OSI reference model. It islayer which is responsible for direct interaction of OSI model with hardware.The hardware provides service to the physical layer and it provides serviceto the datalink layer.
y Datalink Layer: There may be certain errors, which may occur at physicallayer. If possible, these errors are corrected by datalink layer. Datalink layerprovides the way by which various entities can transfer the data to thenetwork.
y Network Layer: It does not allow the quality of the service to be degradedthat was requested by transport layer. It is also responsible for data transfersequence from source to destination.
y Transport Layer: The reliability of the data is ensured by the transport layer.It also retransmits those data that fail to reach the destination.
y Session Layer: The sessions layer is responsible for creating andterminating the connection. Management of such connection is taken careof by sessions layer.
8/6/2019 The Internet Protocol Suite Also Known as TCP
9/29
8/6/2019 The Internet Protocol Suite Also Known as TCP
10/29
8/6/2019 The Internet Protocol Suite Also Known as TCP
11/29
The OSI (open Systems interconnection) model was developed by the InternationalStandards Organization (ISO) in 1984 in an attempt to provide some standard to theway networking should work. It is a theoretical layered model in which the notion ofnetworking is divided into several layers, each of which define specific functions and
features. However it must be noted that this model only represents a general guidelinefor developing usable network interfaces and protocols. Sometimes it may become very
difficult to distinguish between each layer as some systems do not rigorously adhere to
the model. Despite all this, however the OSI model has earned the honour of being "themodel" upon which all good network protocols are based.
The OSI Model is based upon 7 layers (Application layer, Presentation Layer, Session
Layer , Transport Layer, Network Layer, Data Link Layer and the Physical layer). Eachone of these are used to perform particular tasks, which include "supporting end user
processes, encrypting the data as-well as providing transparent data transfer over a
network" (Croucher P, "Communications and Networks", 1999 British Librarypublication).
The architectural framework of each layer is implemented throughout with software and
hardware to establish how data can be transmitted transparently.
Figure 1 below highlights the responsibility of each layer according to the OSI model.
Layer Responsibility
Application
(Layer 7)
The application layer consists of application programs and user interfaces. It is at this layer that user's interac
systems that the model defines. It supports many features that allow exchange of information across users.
provides application services for transfer of e-mails, and other network software services. The applications that us
include FTP and Telnet which exist entirely on this layer. In Addition to this the layer focuses on a
"communication partners, quality of service, constraints on data syntax ,authentication and privacy".
guide.co.uk/tcp-ip)
Presentation
(Layer 6)
The purpose of the presentation layer is to represent data in such a form that it can be exchanged through a net
example of this would be encrypting the data. This layer is also referred to as the syntax layer.
Session
(Layer 5)
The Session layer is used for establishing, managing and terminating connections on a network. Additionally
concerned with setting up, coordinating, terminating and managing conversations between the user and netw
level that the user and machine names are interpreted.
Transport
(Layer 4)
The Transport layer controls the quality and reliability of the data transmission. At this layer each data packet i
acknowledged . In addition to this layer also provides transparent transfer of data between end users and th
responsible for end to end error recovery and flow control.
Network
(Layer 3)
The network layer is used for routing data across configured network nodes.
This layer uses many technologies to enable the data to be transmitted which are known
as switching and routing. These technologies create logical (known as virtual circuits)
paths for transmitting data across a network from a node to node transmission.
Additionally other functions of this layer include addressing, error handling,
congestion control and finally packet sequencing.
8/6/2019 The Internet Protocol Suite Also Known as TCP
12/29
Data Link
(Laye 2)
The Data link laye is primarily c ncerne with packaging and un-packaging data packets s that they can b
dec ded into bits which will enable the data packets to be transmitted through a network. The Data Link la
transmission protocol bysupporting error handling in the physical layer and corruption (through check summin
is also known that the Data Link Layer is divided in to two sub-layers; these are known as The Media Access C
Logical Link Control Layer. The MAC sub-layer controls the flow of how a computer sends data across a netw
network will receive it. Apart from this
it also gives permission to transmit data. Whilst the Logical Link Contrframesynchronization and flow control.
Physical
(Layer 1)
The Physical layer establishes the physical connection between a computer and the network. This layer also contr
transmission of information as it specifies the mechanical and electrical characteristics of the protocol in terms of
pin assignments and voltage levels.
The Transmission Control Protocol/Internet Protocol (TCP/IP) originated in the 1970s. It was initially
developed by the Department of Defence (DOD) in an attempt to connect a number ofdifferent networks
Today however it is morecommonly used as a standard communication protocol used in a number of
networks the most common of which is the Internet.
FIGURE 2
TCP/IP HISTORY
8/6/2019 The Internet Protocol Suite Also Known as TCP
13/29
As it is depicted in Figure 2 above, the TCP/IP model itself consists of four layers and each layer is responsible
for performing prescribed functions which will be discussed in detail below:
Application Layer - This layer is basically concerned with defining the protocols. It consists of application
programs and user interfaces. In practice it works by sending an unbroken "data stream" to the Transport layer
. At this stage the stream is broken into packets , each of which is "framed" with a TCP header (which contains
the sender's and recipient's addresses and error checking information). According to writers such as Buchanan
it supports a number of protocols such as"SMTP, FTP and Telnet".(Buchanan. W, "Distributed Systems and
Networks", McGraw- Hill, 2000)
Transport Layer - This layer is responsible for providing communication session management between host
computers. Generally speaking it defines the level of service and status of the connection used when
transporting the data. The main protocols that are used in this layer include TCP, UDP and RTP.
Internet Layer - This layer is basically concerned with the Packaging of data. Here the data is packaged into IP
datagram's. which contain the source and destination address information. This is what is used to forward the
datagram's between hosts and across networks and the, main protocols used in this layer are IP, ICMP, ARP as
well as RARP.
Network Interface Layer - This layer is responsible for specifying how the data will be sent through the
network physically. This includes assessing "how bits are electrically signalled by the hardware devices that
interface directly with a network medium" (Croucher P, "Communications and Networks", 1999
British Library publication). These devices generally include the types of caballing used such as the
coaxial cable or the twisted pair copper wire. Typical examples of protocols used throughout this layer are the
"Token Ring", "Ethernet" and FDDI.
TCP/IP and the OSI modelThere is brief discussion on mapping the TCP/IP model onto the OSI model. Since the
TCP/IP and OSI protocol suites do not match precisely, there is no one correct answer.
The following diagram attempts to show where various TCP/IP and other protocols
would reside in the original OSI model:
The OSI Model: Application
PresentationSessionTransport
NetworkData Link
PhysicalCommonly, the top three layers of the OSI model (Application, Presentation and Session)
are considered as a single Application Layer in the TCP/IP suite. Because the TCP/IPsuite has no unified session layer on which higher layers are built, these functions are
8/6/2019 The Internet Protocol Suite Also Known as TCP
14/29
typically carried out (or ignored) by individual applications.The most notable difference between TCP/IP and OSI models is the Application layer, as
TCP/IP integrates a few steps of the OSI model into its Application layer. A simplifiedTCP/IP interpretation of the stack is shown below
Application"layer 7"
e.g. HTTP, FTP, DNS4 Transport e.g. TCP, UDP, RTP, SCTP
3 NetworkFor TCP/IP this is the Internet Protocol (IP)
2 Data Linke.g. Ethernet, Token ring, etc.
1 Physical e.g. physical media, and encoding techniques.
Professor Kevin Roark, Computer Science Department (2)
The physical layerThe Physical layer describes the physical characteristics of the communication, such as
conventions about the nature of the medium used for communication (such as wires, fiber
optic links ect.), and all related details such as connectors, channel codes and modulation,and maximum distances. The Internet protocol suite does not cover the physical layer of
any network.
The data link layerThe data link layer specifies how packets are transported over the physical layer,
including the framing(i.e. the special bit patterns which mark the start and end of
packets). Ethernet, for example, includes fields in the packet header which specify which
machine or machines on the network a packet is destined for.
The network layerAs originally defined, the Network layer solved the problem of getting packets across a
single network. With the advent of the concept of internetworking, additional
functionality was added to this layer, such as getting data from the source network to the
destination network.
In the internet protocol suite, IP performs the basic task of getting packets of data from
source to destination.The transport layerThe protocols at the Transport layer can solve problems like reliability ("did the data
reach the destination?") and ensure that data arrives in the correct order. In the TCP/IPprotocol suite, transport protocols also determine which application any given data is
intended for.The dynamic routing protocols which technically fit at this layer in the TCP/IP Protocol
Suite (since they run over IP) are generally considered to be part of the Network layerTCP is a "reliable", connection-oriented, transport mechanism providing a reliable byte
stream, which makes sure data arrives complete, undamaged, and in order. TCP tries to
continuously measure how loaded the network is and throttles its sending rate in order to
avoid overloading the network. Furthermore, TCP will attempt to deliver all data
correctly in the specified sequence.UDP is a connectionless datagram protocol. It is a "best effort" or "unreliable" protocol -
not because it is particularly unreliable, but because it does not verify that packets have
reached their destination, and gives no guarantee that they will arrive in order. If an
Application requires these characteristics, it must provide them itself, or use TCP.
Professor Kevin Roark, Computer Science Department (3)
UDP is typically used for applications such as streaming media (audio and video, etc)
where on-time arrival is more important than reliability, or for simple query/response
applications like DNS lookups, where the overhead of setting up a reliable connection is
8/6/2019 The Internet Protocol Suite Also Known as TCP
15/29
disproportionately large.
T ppli i lThe Application layeris the layerthat most common network-aware programs interface
use in orderto communicate across a network with other programs. Processes that occurin this layer are application specific; data is passed from the network-aware program, in
the format used internally by this application, and is encoded into a standard protocol.
Some specific programs are considered to run in this layer. They provide services thatdirectly support user applications. These programs and their corresponding protocolsinclude: HTTP (The World Wide Web), FTP (File transport), SMTP (Email), SSH
(Secure remote login), DNS (Name IP Address lookups) and many others.
Once the data from an application has been encoded into a standard application layer
protocolit will be passed down to the nextlayer ofthe IP stack.
Atthe Transport Layer, applications will most commonly make use of TCP or UDP, and
are often associated with a well-known port number. The most common ports are listed
below:
File Transfer Protocol (FTP) on port 21
Secure Shell (SSH) on port 22
Telnet on port 23
Simple Mail Transport Protocol (SMTP) for outgoing e-mail on port 25
Domain Name System (DNS) lookups on UDP (or sometimes TCP) port 53
Dynamic HostConfiguration Protocol (DHCP) on ports 67 and 68
Gopher on port 70
Finger on port 79
HTTP on TCP port 80
POP3 read e-mail on port 110
Network News Transfer Protocol (NNTP) on port 119Network Time Protocol (NTP) on port 123
NetBIOS on port 139IMAP read e-mail on port 143
Simple network management protocol (SNMP) on port 161
HTTPS secure HTTP on port 443
IMAPS on port 993Universal Plug and Play (UPnP) on port 5000
IRC on port 6667
OSI m lFrom Wikipedia, the freeencyclopedia
Jump to: nvi
tion, s
h
This articlen
ds additionalcitationsfoverification.
Please help imp
ov
this arti
l
by adding reliable referen
es. Unsourced material may be
hallen
ed and removed. (April 2011)
OSI model
8/6/2019 The Internet Protocol Suite Also Known as TCP
16/29
7. Application Layer
NNTP SIP SSI DNS FTP Gopher HTTP
NFS NTP SMPP SMTP SNMP Telnet
DHCP Netconf RTP (
ore)
6. Presentation Layer
MIME XDR TLS SSL
5. Session Layer
Na
ed Pipes NetBIOS SAP L2TP PPTP SPDY
4. Transport Layer
TCP UDP SCTP DCCP SPX
3. Network Layer
IP (IP 4, IP 6) ICMP IPsec IGMP IPX
AppleTalk
2. Data Link Layer
ATM SDLC HDLC ARP CSLIP SLIP GFP
PLIP IEEE 802.3 Fra
e Relay ITU-
T G.hn DLL PPP X.25 Network Switch
1. Physical Layer
EIA/TIA-232 EIA/TIA-449 ITU-T V-Series
I.430 I.431 POTS PDH SONET/SDH PON
OTN DSL IEEE 802.3 IEEE 802.11
IEEE 802.15 IEEE 802.16 IEEE 1394 ITU-
8/6/2019 The Internet Protocol Suite Also Known as TCP
17/29
T G.hn PHY USB Bluetooth Hubs
This box: viewtal edit
The Op i l (OSI model) was a product ofthe Open
Systems Interconnection effort atthe International Organization for Standardization. Itis a way of sub-dividing a communications systeminto smaller parts called layers. Similar
communication functions are grouped into logicallayers. A layer provides services to itsupperlayer while receiving services from the layer below. On each layer, aninstance
provides service to the instances atthe layer above and requests service from the layer below.
For example, a layerthat provides error-free communications across a network provides thepath needed by applications above it, while it calls the nextlowerlayerto send and receive
packets that make up the contents ofthat path. Two instances at one layer are connected by a
hori ontal connection on thatlayer.
Communication in the OSI-Model (Example with layers3 to 5)
8/6/2019 The Internet Protocol Suite Also Known as TCP
18/29
Contents
[hide]
y 1History
y 2Description of OSI layers
o 2.1Layer 1: Physical Layero 2.2Layer 2: Data Link Layer
2.2.1WAN Protocol architecture
2.2.2IEEE 802 LAN architecture
o 2.3Layer 3: Network Layer
o 2.4Layer 4: Transport Layer
o 2.5Layer 5: Session Layer
o 2.6Layer 6: Presentation Layer
o 2.7Layer 7: Application Layer
y 3Cross-layer functions
y 4Interfaces
y 5Examples
y 6Comparison with TCP/IPy 7See also
y 8References
y 9External links
[edit] History
Work on a layered model of network architecture was started and the International
Organi ation for Standardi ation (ISO) began to develop its OSI framework architecture.
OSI had two major components: an abstract modelof networking, called the Basic Reference
Model or seven-layer model, and a set of specific protocols.
Note: The standard documents that described the OSI model could be freely downloadedfrom the ITU-T as the X.200-series of recommendations.
[1]A number of the protocol
specifications were also available as part of the ITU-T X series. The equivalent ISO andISO/IEC standards for the OSI model were available from ISO, but only some of them at no
charge.[2]
The concept of a 7 layer model was provided by the work ofCharles Bachman, Honeywell
Information Services. Various aspects of OSI design evolved from experiences with the
ARPANET, the fledgling Internet, NPLNET, EIN, CYCLADES network and the work in
IFIP WG6.1. The new design was documented in ISO 7498 and its various addenda. In this
model, a networking system was divided into layers. Within each layer, one or more entitiesimplement its functionality. Each entity interacted directly only with the layer immediately
beneath it, and provided facilities for use by the layer above it.
Protocols enabled an entity in one host to interact with a corresponding entity at the same
layer in another host. Service definitions abstractly described the functionality provided to an
(N)-layer by an (N-1) layer, where N was one of the seven layers of protocols operating in the
local host.
8/6/2019 The Internet Protocol Suite Also Known as TCP
19/29
8/6/2019 The Internet Protocol Suite Also Known as TCP
20/29
These services are aimed to improve the CIA triad (i.e.confidentiality, integrity,availability) of transmitted data. Actually the availability of communication service is
determined by network design and/ornetwork management protocols. Appropriate choicesfor these are needed to protect against denial of service.
[edit] Layer 1: Physical Layer
The Physical Layer defines electrical and physical specifications for devices. In particular, it
defines the relationship between a device and a transmission medium, such as a copper oroptical cable. This includes the layout ofpins, voltages, cablespecifications, hubs,
repeaters, network adapters, host bus adapters (HBA used in storage area networks) andmore.
To understand the function of the Physical Layer, contrast it with the functions of the Data
Link Layer. Think of the Physical Layer as concerned primarily with the interaction of asingle device with a medium, whereas the Data Link Layer is concerned more with the
interactions of multiple devices (i.e., at least two) with a shared medium. Standards such as
RS-232 do use physical wires to control access to the medium.
The major functions and services performed by the Physical Layer are:
y Establishment and termination of a connection to a co unications ediu .
y Participation in the process whereby the communication resources are effectively shared
among multiple users. For example, contention resolution and flow control.
y Modulation, or conversion between the representation ofdigital data in user equipment
and the corresponding signals transmitted over a communicationschannel. These are
signals operating over the physical cabling (such as copper and optical fiber) or over a radio
link.
Parallel SCSI buses operate in this layer, although it must be remembered that the logicalSCSI protocol is a Transport Layer protocol that runs over this bus. Various Physical Layer
Ethernet standards are also in this layer; Ethernet incorporates both this layer and the DataLink Layer. The same applies to other local-area networks, such as token ring, FDDI, ITU-
TG.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE802.15.4.
[edit] Layer 2: Data Link Layer
The Data Link Layer provides the functional and procedural means to transfer data between
network entities and to detect and possibly correct errors that may occur in the PhysicalLayer. Originally, this layer was intended for point-to-point and point-to-multipoint media,
characteristic of wide area media in the telephone system. Local area network architecture,which included broadcast-capable multiaccess media, was developed independently of the
ISO work in IEEE Project 802. IEEE work assumed sublayering and managementfunctions not required for WAN use. In modern practice, only error detection, not flow
control using sliding window, is present in data link protocols such as Point-to-PointProtocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most
protocols on the Ethernet, and on other local area networks, its flow control and
acknowledgment mechanisms are rarely used. Sliding window flow control and
8/6/2019 The Internet Protocol Suite Also Known as TCP
21/29
acknowledgment is used at the Transport Layer by protocols such as TCP, but is still used inniches where X.25 offers performance advantages.
The ITU-TG.hn standard, which provides high-speed local area networking over existing
wires (power lines, phone lines and coaxial cables), includes a complete Data Link Layer
which provides both error correction and flow control by means of a selective repeatSliding
Window Protocol.
Both WAN and LAN service arrange bits, from the Physical Layer, into logical sequences
called frames. Not all Physical Layer bits necessarily go into frames, as some of these bits are
purely intended for Physical Layer functions. For example, every fifth bit of the FDDI bit
stream is not used by the Layer.
[edit] WAN Protocol architecture
Connection-oriented WAN data link protocols, in addition to framing, detect and maycorrect errors. They are also capable of controlling the rate of transmission. A WAN Data
Link Layer might implement a sliding window flow control and acknowledgment
mechanism to provide reliable delivery of frames; that is the case forSDLC and HDLC, andderivatives of HDLC such as LAPB and LAPD.
[edit] IEEE 802 LAN architecture
Practical, connectionless LANs began with the pre-IEEE Ethernet specification, which is
the ancestor ofIEEE 802.3. This layer manages the interaction of devices with a sharedmedium, which is the function of a Media Access Control (MAC) sublayer. Above this
MAC sublayer is the media-independent IEEE 802.2Logical Link Control (LLC) sublayer,which deals with addressing and multiplexing on multiaccess media.
While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.
11 the wireless LANprotocol, obsolescent MAC layers include Token Ring and FDDI. The MAC sublayer
detects but does not correct errors.
[edit] Layer 3: Network Layer
The Network Layer provides the functional and procedural means of transferring variable
length data sequences from a source host on one network to a destination host on a differentnetwork, while maintaining the quality of service requested by the Transport Layer (in
contrast to the data link layer which connects hosts within the same network). The NetworkLayer performs networkrouting functions, and might also perform fragmentation and
reassembly, and report delivery errors. Routers operate at this layersending data
throughout the extended network and making the Internet possible. This is a logicaladdressing scheme values are chosen by the network engineer. The addressing scheme is
not hierarchical.
Careful analysis of the Network Layer indicated that the Network Layer could have at leastthree sublayers:
1. Subnetwork Access that considers protocols that deal with the interface to networks, such
as X.25
8/6/2019 The Internet Protocol Suite Also Known as TCP
22/29
2. Subnetwork Dependent Convergence when it is necessary to bring the level of a transit
network up to the level of networks on either side
3. Subnetwork Independent Convergence which handles transfer across multiple networks.
The best example of this latter case is CLNP, or IPv7 ISO 8473. It manages the
connectionless transfer of data one hop at a time, from end system to ingress router, router
to router, and from egress router to destination end system. It is not responsible for reliabledelivery to a next hop, but only for the detection of erroneous packets so they may bediscarded. In this scheme, IPv4 and IPv6 would have to be classed with X.25 as subnet access
protocols because they carry interface addresses rather than node addresses.
A number of layer management protocols, a function defined in the Management Annex, ISO
7498/4, belong to the Network Layer. These include routing protocols, multicast groupmanagement, Network Layer information and error, and Network Layer address assignment.
It is the function of the payload that makes these belong to the Network Layer, not theprotocol that carries them.
[edit] Layer 4: Transport Layer
The Transport Layer provides transparent transfer of data between end users, providing
reliable data transfer services to the upper layers. The Transport Layer controls the reliability
of a given link through flow control, segmentation/desegmentation, and error control. Some
protocols are state- and connection-oriented. This means that the Transport Layer can keeptrack of the segments and retransmit those that fail. The Transport layer also provides the
acknowledgement of the successful data transmission and sends the next data if no errorsoccurred.
Although not developed under the OSI Reference Model and not strictly conforming to the
OSI definition of the Transport Layer, typical examples of Layer 4 are the Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP).
Of the actual OSI protocols, there are five classes of connection-mode transport protocols
ranging from class 0 (which is also known as TP0 and provides the least features) to class 4
(TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error
recovery, and was designed for use on network layers that provide error-free connections.
Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, whichOSI assigns to the Session Layer. Also, all OSI TP connection-mode protocol classes provide
expedited data and preservation of record boundaries, both of which TCP is incapable.Detailed characteristics of TP0-4 classes are shown in the following table:[4]
Feature Na e TP0TP1TP2TP3TP4
Connection oriented network Yes Yes Yes Yes Yes
Connectionless network No No No No Yes
Concatenation and separation No Yes Yes Yes Yes
Segmentation and reassembly Yes Yes Yes Yes Yes
8/6/2019 The Internet Protocol Suite Also Known as TCP
23/29
Error Recovery No Yes Yes Yes Yes
Reinitiate connection (if an excessive number ofPDUs are unacknowledged) No Yes No Yes No
Multiplexing and demultiplexing over a single
irtual circuit No No Yes Yes Yes
Explicit flow control No No Yes Yes Yes
Retransmission on timeout No No No No Yes
Reliable Transport Service No Yes No Yes Yes
Perhaps an easy way to visualize the Transport Layer is to compare it with a Post Office,
which deals with the dispatch and classification of mail and parcels sent. Do remember,
however, that a post office manages the outer envelope of mail. Higher layers may have the
equivalent of double envelopes, such as cryptographic presentation services that can be read
by the addressee only. Roughly speaking, tunneling protocols operate at the TransportLayer, such as carrying non-IP protocols such as IBM's SNA orNovell's IPX over an IP
network, or end-to-end encryption with IPsec. While Generic Routing Encapsulation
(GRE) might seem to be a Network Layer protocol, if the encapsulation of the payload takes
place only at endpoint, GRE becomes closer to a transport protocol that uses IP headers but
contains complete frames or packets to deliver to an endpoint. L2TP carries PPP frames
inside transport packet.
[edit] Layer 5: Session Layer
The Session Layer controls the dialogues (connections) between computers. It establishes,
manages and terminates the connections between the local and remote application. It provides
forfull-duplex, half-duplex, orsimplex operation, and establishes checkpointing,adjournment, termination, and restart procedures. The OSI model made this layer responsible
for graceful close of sessions, which is a property of the Transmission Control Protocol,
and also for session checkpointing and recovery, which is not usually used in the Internet
Protocol Suite. The Session Layer is commonly implemented explicitly in application
environments that use remote procedure calls.
[edit] Layer 6: Presentation Layer
The Presentation Layer establishes context between Application Layer entities, in which the
higher-layer entities may use different syntax and semantics if the presentation service
provides a mapping between them. If a mapping is available, presentation service data units
are encapsulated into session protocol data units, and passed down the stack.
This layer provides independence from data representation (e.g., encryption) by translatingbetween application and network formats. The presentation layer transforms data into the
form that the application accepts. This layer formats and encrypts data to be sent across a
network. It is sometimes called the syntax layer.[5]
8/6/2019 The Internet Protocol Suite Also Known as TCP
24/29
The original presentation structure used the basic encoding rules ofAbstract SyntaxNotation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to
an ASCII-coded file, orseriali ation ofobjects and otherdata structures from and toXML.
[edit] Layer 7: Application Layer
The Application Layer is the OSI layer closest to the end user, which means that both the
OSI application layer and the user interact directly with the software application. This layerinteracts with software applications that implement a communicating component. Such
application programs fall outside the scope of the OSI model. Application layer functionstypically include identifying communication partners, determining resource availability, and
synchronizing communication. When identifying communication partners, the applicationlayer determines the identity and availability of communication partners for an application
with data to transmit. When determining resource availability, the application layer must
decide whether sufficient network or the requested communication exist. In synchronizing
communication, all communication between applications requires cooperation that is
managed by the application layer. Some examples of application layer implementations also
include:
y On OSI stack:
o FTAM File Transfer and Access Management Protocol
o X.400 Mail
o Co on anage ent infor ation protocol (CMIP)
y On TCP/IP stack:
o Hypertext Transfer Protocol (HTTP),
o File Transfer Protocol (FTP),
o Si j ple Mail Transfer Protocol (SMTP)
o Sik
ple Network Managek
ent Protocol (SNMP).
[edit] Cross-layer functions
There are some functions or services that are not tied to a given layer, but they can affectmore than one layer. Examples are
y security serl
ice (telecom m
unication)[3] as defined by ITU-T X.800 Recommendation.
y management functions, i.e. functions that permit to configure, instantiate, monitor,
terminate the communications of two or more entities: there is a specific application layer
protocol Con n
onn
anagen
ent inforn
ation protocol (CMIP) and its corresponding service
con n on n anagen ent infor n ation sero
ice (CMIS), they need to interact with every layer in
order to deal with their instances.
y
MPLS operates at an OSI Model layer that is generally considered to lie between traditionaldefinitions of Layer 2 (Data Link Layer) and Layer 3 (Network Layer), and thus is often
referred to as a "Layer 2.5" protocol. It was designed to provide a unified data-carrying
service for both circuit-based clients and packet-switching clients which provide a datagram
service model. It can be used to carry many different kinds of traffic, including IP packets, as
well as native ATM, SONET, and Ethernet frames.
y ARP is used to translate IPv4 addresses (OSI Layer 3) into Ethernet MAC addresses (OSI Layer
2)
8/6/2019 The Internet Protocol Suite Also Known as TCP
25/29
[edit] Interfaces
Neither the OSI Reference Model nor OSI protocols specify any programming interfaces,
other than as deliberately abstract service specifications. Protocol specifications precisely
define the interfaces between different computers, but the software interfaces inside
computers are implementation-specific.
For example Microsoft Windows' Winsock, and Unix's Berkeley sockets and System VTransport Layer Interface, are interfaces between applications (Layer 5 and above) and the
transport (Layer 4). NDIS and ODI are interfaces between the media (Layer 2) and thenetwork protocol (Layer 3).
Interface standards, except for the Physical Layer to media, are approximate implementations
of OSI Service Specifications.
[edit] Examples
Layer
OSIprotocols
TCP/IPprotocols
Signali
ngSystem
7[6]
AppleTalk
IPX SNA UMTS Misc.exa ples
# Na
e
7Applicatio
n
FTAM,
X.400,
X.500,
DAP,
ROSE,
RTSE,ACSE[7]
CMIP[8]
NNTP, SIP,
SSI, DNS,
FTP,
Gopher,
HTTP, NFS,
NTP, DHCP,
SMPP,
SMTP,
SNMP,
Telnet, RIP,
BGP
INAP,
MAP,
TCAP,
ISUP,
TUP
AFP, ZIP,
RTMP,
NBP
RIP,
SAPAPPC
HL7,
Modbus
6Presentati
on
ISO/IEC 88
23, X.226,
ISO/IEC 95
76-1, X.236
MIME, SSL,
TLS, XDRAFP
TDI, ASCII,
EBCDIC,
MIDI, MPEG
5Session
ISO/IEC 83
27, X.225,
ISO/IEC 95
48-1, X.235
Sockets.
Session
establishm
ent in TCP,
RTP
ASP,
ADSP,
PAP
NWLin
kDLC?
Na
ed
pipes,
NetBIOS,
SAP, half
duplex, full
duplex,
si
plex,
8/6/2019 The Internet Protocol Suite Also Known as TCP
26/29
RPC
4Transport
ISO/IEC 80
73, TP0,
TP1, TP2,
TP3, TP4
(X.224),
ISO/IEC 86
02, X.234
TCP, UDP,
SCTP, DCCP
DDP,
SPXNBF
3Network
ISO/IEC 82
08, X.25
(PLP),
ISO/IEC 88
78, X.223,
ISO/IEC 84
73-1, CLNP
X.233.
IP, IPsec,
ICMP,
IGMP,
OSPF
SCCP,
MTP
ATP
(TokenT
alk or
EtherTal
k)
IPX
RRC (Radio
Resource
Control) Packet
Data
Con
ergence
Protocol (PDCP)
and BMC(Broadcast/Multi
cast Control)
NBF, Q.931,
IS-IS
Leaky
bucket,token
bucket
2Data Link
ISO/IEC 76
66, X.25
(LAPB),
Token Bus,
X.222,
ISO/IEC 88
02-2LLC
Type 1 and
2[9]
PPP, SLIP,
PPTP, L2TP
MTP,
Q.710
LocalTal
k,
AppleTal
k
Re
ote
Access,
PPP
IEEE
802.3
framin
g,
Ethern
et II
fra
in
g
SDLC
LLC (Logical Link
Control), MAC
(Media Access
Control)
802.3
(Ethernet),
802.11a/b/
g/n
MAC/LLC,
802.1Q
(VLAN),
ATM, HDP,
FDDI, Fibre
Channel,
Fra
e
Relay,
HDLC, ISL,
PPP, Q.921,
Token Ring,
CDP, NDP
ARP (maps
layer 3 tolayer 2
address),
ITU-T G.hn
DLL
CRC, Bit
stuffing,
ARQ, Data
8/6/2019 The Internet Protocol Suite Also Known as TCP
27/29
O
er Cable
Ser
ice
Interface
Specificatio
n (DOCSIS)
1Physical
X.25
(X.21bis,
EIA/TIA-
232,
EIA/TIA-
449, EIA-
530,
G.703)[9]
MTP,
Q.710
RS-232,
RS-422,STP,
PhoneN
et
Twin
ax
UMTS Physical
Layer or L1
RS-232, Full
duplex,
RJ45, V.35,
V.34, I.430,
I.431, T1,
E1, 10BASE-
T, 100BASE-
TX, POTS,
SONET,
SDH, DSL,
802.11a/b/g/n PHY,
ITU-T G.hn
PHY,
Controller
Area
Network,
Data O
er
Cable
Ser
ice
Interface
Specificatio
n (DOCSIS)
[edit] Comparison with TCP/IP
In the TCP/IP model of the Internet, protocols are deliberately not as rigidly designed into
strict layers as the OSI model.[10]RFC 3439 contains a section entitled "Layering considered
harmful." However, TCP/IP does recognize four broad layers of functionality which are
derived from the operating scope of their contained protocols, namely the scope of the
software application, the end-to-end transport connection, the internetworking range, and
lastly the scope of the direct links to other nodes on the local network.
Even though the concept is different from the OSI model, these layers are nevertheless often
compared with the OSI layering scheme in the following way: The Internet Application
Layer includes the OSI Application Layer, Presentation Layer, and most of the Session
Layer. Its end-to-end Transport Layer includes the graceful close function of the OSI
Session Layer as well as the OSI Transport Layer. The internetworking layer (Internet
Layer) is a subset of the OSI Network Layer (see above), while the Link Layer includes the
OSI Data Link and Physical Layers, as well as parts of OSI's Network Layer. These
8/6/2019 The Internet Protocol Suite Also Known as TCP
28/29
comparisons are based on the original seven-layer protocol model as defined in ISO 7498,rather than refinements in such things as the internal organization of the Network Layer
document.
The presumably strict peer layering of the OSI model as it is usually described does not
present contradictions in TCP/IP, as it is permissible that protocol usage does not follow the
hierarchy implied in a layered model. Such examples exist in some routing protocols (e.g.,OSPF), or in the description oftunneling protocols , which provide a Link Layer for an
application, although the tunnel host protocol may well be a Transport or even an Application
Layer protocol in its own right
Open Systems Interconnection ( OSI ) is a standard reference model for communication
between two end users in a network. The model is used in developing products and
understanding networks. Also see the notes below the figure.
Illustration republished with permission from The manual Page .
8/6/2019 The Internet Protocol Suite Also Known as TCP
29/29
OSI divides telecommunication into seven layers. The layers are in two groups. The upperfour layers are used whenever a message passes from or to a user. The lower three layers are
used when any message passes through the host computer. Messages intended for thiscomputer pass to the upper layers. Messages destined for some other host are not passed up to
the upper layers but are forwarded to another host. The seven layers are:
Layer 7: The application layer ...This is the layer at which communication partners areidentified, quality of service is identified, user authentication and privacy are considered, and
any constraints on data syntax are identified. (This layer is notthe application itself, although
some applications may perform application layer functions.)
Layer 6: The presentation layer ...This is a layer, usually part of an operating system, that
converts incoming and outgoing data from one presentation format to another (for example,
from a text stream into a popup window with the newly arrived text). Sometimes called the
syntax layer.
Layer 5: The session layer ...This layer sets up, coordinates, and terminates conversations,
exchanges, and dialogs between the applications at each end. It deals with session and
connection coordination.
Layer 4: The transport layer ...This layer manages the end-to-end control (for example,
determining whether all packets have arrived) and error-checking. It ensures complete data
transfer.
Layer 3: The network layer ...This layer handles the routing of the data (sending it in the
right direction to the right destination on outgoing transmissions and receiving incoming
transmissions at the packet level). The network layer does routing and forwarding.
Layer 2: The data-link layer ...This layer provides synchronization for the physical leveland does bit-stuffing for strings of 1's in excess of 5. It furnishes transmission protocol
knowledge and management.
Layer 1: The physical layer ...This layer conveys the bit stream through the network at the
electrical and mechanical level. It provides the hardware means of sending and receiving data
on a carrier.