0% found this document useful (0 votes)
10 views

TCP/IP Model

Uploaded by

ulnoor315
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

TCP/IP Model

Uploaded by

ulnoor315
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

TCP/IP model

o The TCP/IP model was developed prior to the OSI model.


o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer,
network layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first four layers
of the OSI model and these four layers are represented in TCP/IP model by a
single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of
them provides specific functionality.

Here, hierarchical means that each upper-layer protocol is supported by two or more
lower-level protocols.

Functions of TCP/IP layers:


Network Access Layer
o A network layer is the lowest layer of the TCP/IP model.
o A network layer is the combination of the Physical layer and Data Link layer defined in
the OSI reference model.
o It defines how the data should be sent physically through the network.
o This layer is mainly responsible for the transmission of the data between two devices on
the same network.
o The functions carried out by this layer are encapsulating the IP datagram into frames
transmitted by the network and mapping of IP addresses into physical addresses.
o The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay.

Internet Layer
o An internet layer is the second layer of the TCP/IP model.
o An internet layer is also known as the network layer.
o The main responsibility of the internet layer is to send the packets from any network, and
they arrive at the destination irrespective of the route they take.

Following are the protocols used in this layer are:

IP Protocol: IP protocol is used in this layer, and it is the most significant part of the
entire TCP/IP suite.

Following are the responsibilities of this protocol:

o IP Addressing: This protocol implements logical host addresses known as IP addresses.


The IP addresses are used by the internet and higher layers to identify the device and to
provide internetwork routing.
o Host-to-host communication: It determines the path through which the data is to be
transmitted.
o Data Encapsulation and Formatting: An IP protocol accepts the data from the
transport layer protocol. An IP protocol ensures that the data is sent and received
securely, it encapsulates the data into message known as IP datagram.
o Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by
data link layer protocol is known as Maximum Transmission unit (MTU). If the size of IP
datagram is greater than the MTU unit, then the IP protocol splits the datagram into
smaller units so that they can travel over the local network. Fragmentation can be done
by the sender or intermediate router. At the receiver side, all the fragments are
reassembled to form an original message.
o Routing: When IP datagram is sent over the same local network such as LAN, MAN,
WAN, it is known as direct delivery. When source and destination are on the distant
network, then the IP datagram is sent indirectly. This can be accomplished by routing the
IP datagram through various devices such as routers.
o ARP Protocol
o ARP stands for Address Resolution Protocol.
o ARP is a network layer protocol which is used to find the physical address from
the IP address.
o The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical address of the
device, it broadcasts the ARP request to the network.
o ARP reply: Every device attached to the network will accept the ARP
request and process the request, but only recipient recognize the IP
address and sends back its physical address in the form of ARP reply. The
recipient adds the physical address both to its cache memory and to the
datagram header

ICMP Protocol

o ICMP stands for Internet Control Message Protocol.


o It is a mechanism used by the hosts or routers to send notifications regarding datagram
problems back to the sender.
o A datagram travels from router-to-router until it reaches its destination. If a router is
unable to route the data because of some unusual conditions such as disabled links, a
device is on fire or network congestion, then the ICMP protocol is used to inform the
sender that the datagram is undeliverable.
o An ICMP protocol mainly uses two terms:
o ICMP Test: ICMP Test is used to test whether the destination is reachable or not.
o ICMP Reply: ICMP Reply is used to check whether the destination device is
responding or not.
o The core responsibility of the ICMP protocol is to report the problems, not correct them.
The responsibility of the correction lies with the sender.
o ICMP can send the messages only to the source, but not to the intermediate routers
because the IP datagram carries the addresses of the source and destination but not of
the router that it is passed to.

Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data
which is being sent over the network.

The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.

o User Datagram Protocol (UDP)


o It provides connectionless service and end-to-end delivery of transmission.
o It is an unreliable protocol as it discovers the errors but not specify the error.
o User Datagram Protocol discovers the error, and ICMP protocol reports the error
to the sender that user datagram has been damaged.
o UDP consists of the following fields:
Source port address: The source port address is the address of the application
program that has created the message.
Destination port address: The destination port address is the address of the
application program that receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
o UDP does not specify which packet is lost. UDP contains only checksum; it does
not contain any ID of a data segment.
o Transmission Control Protocol (TCP)
o It provides a full transport layer services to applications.
o It creates a virtual circuit between the sender and receiver, and it is active
for the duration of the transmission.
o TCP is a reliable protocol as it detects the error and retransmits the
damaged frames. Therefore, it ensures all the segments must be received
and acknowledged before the transmission is considered to be completed
and a virtual circuit is discarded.
o At the sending end, TCP divides the whole message into smaller units
known as segment, and each segment contains a sequence number which
is required for reordering the frames to form an original message.
o At the receiving end, TCP collects all the segments and reorders them
based on sequence numbers.

Application Layer
o An application layer is the topmost layer in the TCP/IP model.
o It is responsible for handling high-level protocols, issues of representation.
o This layer allows the user to interact with the application.
o When one application layer protocol wants to communicate with another application
layer, it forwards its data to the transport layer.
o There is an ambiguity occurs in the application layer. Every application cannot be placed
inside the application layer except those who interact with the communication system.
For example: text editor cannot be considered in application layer while web browser
using HTTP protocol to interact with the network where HTTP protocol is an application
layer protocol.

Following are the main protocols used in the application layer:


o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the
data over the world wide web. It transfers the data in the form of plain text, audio, video.
It is known as a Hypertext transfer protocol as it has the efficiency to use in a hypertext
environment where there are rapid jumps from one document to another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used
for managing the devices on the internet by using the TCP/IP protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports
the e-mail is known as a Simple mail transfer protocol. This protocol is used to send the
data to another e-mail address.
o DNS: DNS stands for Domain Name System. An IP address is used to identify the
connection of a host to the internet uniquely. But, people prefer to use the names
instead of addresses. Therefore, the system that maps the name to the address is known
as Domain Name System.
It stands for Open System Interconnection. It stands for Transmission Control Protocol.

OSI model has been developed by ISO (International It was developed by ARPANET (Advanced
Standard Organization). Research Project Agency Network).

It is an independent standard and generic protocol It consists of standard protocols that lead to
used as a communication gateway between the the development of an internet. It is a
network and the end user. communication protocol that provides the
connection among the hosts.

In the OSI model, the transport layer provides a The transport layer does not provide the surety
guarantee for the delivery of the packets. for the delivery of packets. But still, we can say
that it is a reliable model.

This model is based on a vertical approach. This model is based on a horizontal approach.

In this model, the session and presentation layers In this model, the session and presentation
are separated, i.e., both the layers are different. layer are not different layers. Both layers are
included in the application layer.

It is also known as a reference model through which It is an implemented model of an OSI model.
various networks are built. For example, the TCP/IP
model is built from the OSI model. It is also referred
to as a guidance tool.

In this model, the network layer provides both The network layer provides only connectionless
connection-oriented and connectionless service. service.

Protocols in the OSI model are hidden and can be In this model, the protocol cannot be easily
easily replaced when the technology changes. replaced.

It consists of 7 layers. It consists of 4 layers.

OSI model defines the services, protocols, and In the TCP/IP model, services, protocols, and
interfaces as well as provides a proper distinction interfaces are not properly separated. It is
between them. It is protocol independent. protocol dependent.

The usage of this model is very low. This model is highly used.

It provides standardization to the devices like router, It does not provide the standardization to the
motherboard, switches, and other hardware devices. devices. It provides a connection between
various computers.
o TELNET: It is an abbreviation for Terminal Network. It establishes the connection
between the local computer and remote computer in such a way that the local terminal
appears to be a terminal at the remote system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for
transmitting the files from one computer to another computer.

Similarities between the OSI and TCP/IP model


o Share common architecture

Both the models are the logical models and having similar architectures as both the
models are constructed with the layers.

o Define standards

Both the layers have defined standards, and they also provide the framework used for
implementing the standards and devices.

o Simplified troubleshooting process

Both models have simplified the troubleshooting process by breaking the complex
function into simpler components.

o Pre-defined standards

The standards and protocols which are already pre-defined; these models do not
redefine them; they just reference or use them. For example, the Ethernet standards
were already defined by the IEEE before the development of these models; instead of
recreating them, models have used these pre-defined standards.

o Both have similar functionality of 'transport' and 'network' layers

The function which is performed between the 'presentation' and the 'network' layer is
similar to the function performed at the transport layer.

What is UDP?
The UDP stands for User Datagram Protocol. Its working is similar to the TCP as it is
also used for sending and receiving the message. The main difference is that UDP is a
connectionless protocol. Here, connectionless means that no connection establishes
prior to communication. It also does not guarantee the delivery of data packets. It does
not even care whether the data has been received on the receiver's end or not, so it is
also known as the "fire-and-forget" protocol. It is also known as the "fire-and-
forget" protocol as it sends the data and does not care whether the data is received or
not. UDP is faster than TCP as it does not provide the assurance for the delivery of the
packets.

o Type of protocol
Both the protocols, i.e., TCP and UDP, are the transport layer protocol. TCP is a
connection-oriented protocol, whereas UDP is a connectionless protocol. It
means that TCP requires connection prior to the communication, but the UDP
does not require any connection.
o Reliability
TCP is a reliable protocol as it provides assurance for the delivery of the data. It
follows the acknowledgment mechanism. In this mechanism, the sender receives
the acknowledgment from the receiver and checks whether the acknowledgment
is positive or negative. If the ACK is positive means, the data has been received
successfully. If ACK is negative, then TCP will resend the data. It also follows the
flow and error control mechanism.
UDP is an unreliable protocol as it does not ensure the delivery of the data.
o Flow Control
TCP follows the flow control mechanism that ensures a large number of packets
are not sent to the receiver at the same time, while UDP does not follow the flow
control mechanism.
o Ordering
TCP uses ordering and sequencing techniques to ensure that the data packets are
received in the same order in which they are sent. On the other hand, UDP does
not follow any ordering and sequencing technique; i.e., data can be sent in any
sequence.
o Speed
Since TCP establishes a connection between a sender and receiver, performs error
checking, and also guarantees the delivery of data packets while UDP neither
creates a connection nor it guarantees the delivery of data packets, so UDP is
faster than TCP.
o Flow of data
In TCP, data can flow in both directions means that it provides the full-duplex
service. On the other hand, UDP is mainly suitable for the unidirectional flow of
data.

Let's look at the differences between the TCP and UDP in a tabular form.

TCP UDP

Full form It stands for Transmission Control It stands for User Datagram
Protocol. Protocol.

Type of It is a connection-oriented protocol, which It is a connectionless protocol,


connection means that the connection needs to be which means that it sends the
established before the data is transmitted data without checking whether
over the network. the system is ready to receive or
not.

Reliable TCP is a reliable protocol as it provides UDP is an unreliable protocol as it


assurance for the delivery of data packets. does not take the guarantee for
the delivery of packets.

Speed TCP is slower than UDP as it performs error UDP is faster than TCP as it does
checking, flow control, and provides not guarantee the delivery of data
assurance for the delivery of packets.

Header size The size of TCP is 20 bytes. The size of the UDP is 8 bytes.

Acknowledgment TCP uses the three-way-handshake UDP does not wait for any
concept. In this concept, if the sender acknowledgment; it just sends the
receives the ACK, then the sender will send data.
the data. TCP also has the ability to resend
the lost data.

Flow control It follows the flow control mechanism in This protocol follows no such
mechanism which too many packets cannot be sent to mechanism.
the receiver at the same time.

Error checking TCP performs error checking by using a It does not perform any error
checksum. When the data is corrected, then checking, and also does not
the data is retransmitted to the receiver. resend the lost data packets.

Applications This protocol is mainly used where a secure This protocol is used where fast
and reliable communication process is communication is required and
required, like military services, web does not care about the reliability
browsing, and e-mail. like VoIP, game streaming, video
and music streaming, etc.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy