Unit 1
Unit 1
Data communication:
Data communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable. For data communications to occur,
the communicating devices must be part of a communication system made up of a combination
of hardware (physical equipment) and software (programs).
Data communication refers to the exchange of data between a source and a receiver via form
of transmission media such as a wire cable. Data communication is said to be local if
communicating devices are in the same building or a similarly restricted geographical area.
The meanings of source and receiver are very simple. The device that transmits the data is
known as source and the device that receives the transmitted data is known as receiver. Data
communication aims at the transfer of data and maintenance of the data during the process but
not the actual generation of the information at the source and receiver.
I. Delivery. The system must deliver data to the correct destination. Data must be received by
the intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late are useless.
In the case of video and audio, timely delivery means delivering data as they are produced, in
the same order that they are produced, and without significant delay. This kind of delivery is
called real-time transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are sent every
3D ms. If some of the packets arrive with 3D-ms delay and others with 4D-ms delay, an uneven
quality in the video is the result.
Data Representation:
Information today comes in different forms such as text, numbers, images, audio, and video.
Text
In data communications, text is represented as a bit pattern, a sequence of bits (Os or Is).
Different sets of bit patterns have been designed to represent text symbols. Each set is called a
code, and the process of representing symbols is called coding. Today, the prevalent coding
system is called Unicode, which uses 32 bits to represent a symbol or character used in any
language in the world.
The American Standard Code for Information Interchange (ASCII), developed some decades
ago in the United States, now constitutes the first 127 characters in Unicode and is also referred
to as Basic Latin.
Numbers
Numbers are also represented by bit patterns. However, a code such as ASCII is not used to
represent numbers; the number is directly converted to a binary number to simplify
mathematical operations.
Images
Images are also represented by bit patterns. In its simplest form, an image is composed of a
matrix of pixels (picture elements), where each pixel is a small dot.
The size of the pixel depends on the resolution. For example, an image can be divided into
1000 pixels or 10,000 pixels. In the second case, there is a better representation of the image
(better resolution), but more memory is needed to store the image.
After an image is divided into pixels, each pixel is assigned a bit pattern. The size and the value
of the pattern depend on the image. For an image made of only black and white dots (e.g., a
chessboard), a I-bit pattern is enough to represent a pixel.
If an image is not made of pure white and pure black pixels, you can increase the
size of the bit pattern to include gray scale. For example, to show four levels of gray scale, you
can use 2-bit patterns. A black pixel can be represented by 00, a dark gray pixel by 01, a light
gray pixel by 10, and a white pixel by 11.
There are several methods to represent color images. One method is called RGB,
so called because each color is made of a combination of three primary colors: red,
green, and blue. The intensity of each color is measured, and a bit pattern is assigned to it.
Audio
Audio refers to the recording or broadcasting of sound or music. Audio is by nature
different from text, numbers, or images. It is continuous, not discrete. Even when we use a
microphone to change voice or music to an electric signal, we create a continuous signal.
Video
Video refers to the recording or broadcasting of a picture or movie. Video can either be
produced as a continuous entity (e.g., by a TV camera), or it can be a combination of images,
each a discrete entity, arranged to convey the idea of motion. Again we can change video to a
digital or an analog signal.
Protocol: A protocol is a particular set of rules for having a conversation between two
computers to convey a specific set of information. It is an agreement between the
communicating parties on how the communication is to proceed. Violating the protocol will
make the communication more difficult. An example of protocol would be TCP/IP. The
specifics of the above would detail the addressing format, number of bits used, methods to
decide grouping, size of data chunks and more.
Standard: A standard (and in the networking arena, many protocols are standards) is a
document that specifies something that has the overwhelming support and agreement of the
standards making bodies. An example of standards would be 802 standards. One of them,
802.3u, lays down the specifications related to FastEthernet. So, if anyone were to design a
hardware or software related to FastEthernet, they would have to follow those specifications.
Some of the standards making organizations are given below:
IEEE- Institute of Electrical, Electronics Engineers. Formed in 1962 by grouping
Institute of Radio Engineers and American Institute of Electrical Engineers. Standards
are designed and maintained by IEEE-SA (IEEE Standards Association)
ANSI- American National Standard Institute- five societies are AIEE, ASME, ASCE,
AIME(mining), ASTM(testing & Material)
ITU-International telecommunication Union
ISO – International Organization for standards
EIA – Electronic Industries Association
ESTI (European Telecommunications Standards Institute)- ETSI has been successful
in standardizing the Low Power Radio, Short Range Device, GSM cell phone system
and the TETRA professional mobile radio system.
W3C-www consortium – formed on 18 Feb 2011
Protocol: It is a set of rules that govern the communication between the devices. Both sender
and receiver follow same protocols to communicate with each other.
It defines what is communicated, how it is communicated, and when it is communicated. The
key elements of a protocol are syntax, semantics and timing
Syntax
It refers to the structure or format of the data. This refers the order in which the data are
presented.
Example
The first 8 bits of data to be the address of the sender.
The second 8 bits to be the address of the receiver.
The rest of the stream may be the message itself
8. Data security. Providing data security and privacy is also built into most communication
software packages. It prevents access of data by unauthorized users.
9. Log information. Several communication software are designed to develop log information,
which consists of all jobs and data communications tasks that have taken place. Such
information may be used for charging the users of the network based on their usage of the
network resources.
Types of Medium:
Medium can be classified into 2 categories.
1. Guided Media: Guided media means that signals is guided by the presence of physical
media i.e. signals are under control and remains in the physical wire. For example.
Copper wire.
2. Unguided Media: Unguided Media means that there is no physical path for the signal
to propagate. Unguided media are essentially electro-magnetic waves. There is no
control on flow of signal. For example. Radio waves.
Communication Links:
In a network nodes are connected through links. The communication through links can be
classified as
1. Simplex: Communication can take place only in one direction. eg. T.V broadcasting.
2. Half-duplex: Communication can take place in one direction at a time. Suppose node
A and B are connected then half-duplex communication means that at a time data can
flow from A to B or from B to A but not simultaneously. eg. two persons talking to
each other such that when speaks the other listens and vice versa.
3. Full-duplex : Communication can take place simultaneously in both directions. eg. A
discussion in a group without discipline.
Bandwidth:
Bandwidth simply means how many bits can be transmitted per second in the communication
channel. In technical terms it indicates the width of frequency spectrum.
2. Half-duplex
In half-duplex mode ,each station can both transmit and receive but not at the same time. When
one device is sending ,the other can only receive.
The half-duplex mode is like a one-lane road with two directional traffic. The entire capacity
of a channel is taken over by whichever of the two devices is transmitting at the time.
Full-duplex
In full-duplex mode ,both stations can transmit and receive simultaneously. It is like a two-way
street with traffic flowing in both directions at the same time. Signals going in either direction
share the capacity of the link.
The full duplex is like a two –way street with traffic flowing in both directions at the same
time. Signals going in either direction share the capacity of the link.
Ex. Telephone network
When two people are communicating by a telephone line ,both can listen and talk at the same
time.
figure. Full Duplex
Network:
Uses of networks
Distributed Processing
Networks use distributed processing which is termed as a task divided among multiple
computers. Instead of a single machine responsible for all aspects of a process, separate
computers handle a subset.
Performance
Performance can be measured by means of transit time, response time, number of users, type
of transmission medium, capabilities of the connected hardware and the efficiency of the
software. Transit time
The amount of time required for a message to travel from one device to another.
Response time:: The elapsed time between an inquiry and a response.
Reliability: Reliability is read by the frequency of failure ,the time it takes a link to recover
from a failure. Security :Network security is protecting data from unauthorized access.
Type of connection:
There are two possible type of connections
1. Point-to-point
2. Multipoint
1. Point-to-point:
A point-to-point connection provides a dedicated link between two devices. The entire link is
reserved for transmission between those two devices.
Ex. Change of television channel by infrared remote control. A point-to-point connection is
established between the remote control and the televisions control system.
2. Multipoint:
A multipoint (also called multidrop) connection is one in which more than two specific devices
share a single link. The capacity of the channel is shared either spatially or temporally.
Physical Topology
Physical Topology refers to the way in which network is laid out physically. Two or more links
form a topology. The topology of a network is the geometric representation of the relationship
of all the links and the linking devices tone another.
The basic topologies are
1. Mesh
2. Star
3. Bus
4. Ring
1. Mesh
In a mesh topology each device has a dedicated point to point link to every other device. The
term dedicated means that the link carries traffic only between the two devices it connects.
A fully connected mash network therefore has n(n-1)/2 physical channels to link n devices. To
accommodate that many links every device on the network has (n-1) I/O ports.
Merits.
Dedicated link guarantees that each connection can carry its own data load. This
eliminates the traffic problems that occur when links shared by multiple devices.
If one link becomes unusable ,it does not incapacitate the entire system.
Privacy or security: When every message travels along a dedicated line only the
intended recipient
Demerits
The amount of cabling and the I/O ports required
Installation and reconnection are difficult
The sheer bulk of the wire accommodate more space than available.
2. Star topology
Each device has a dedicated point to point link only to a central controller usually called a hub.
If one device has to send data to another it sends the data to the controller, which then relays
the data to the other connected device.
Merits
Less expensive than a mesh topology. Each device needs only one link and I/O port to
connect it to any number of others.
Installation and reconfigure is easy.
Robustness. If one link fails only that link is affected.
Requires less cable than a mesh.
Demerits
Require more cable compared to bus and ring topologies.
3. Bus Topology
One long cable acts as a backbone to link all the devices in a network Nodes are connected to
the bus cable by drop lines and taps. A drop line is a connection running between the device
and the main cable. A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with a metallic core. As the signal travels farther and
farther ,it becomes weaker .So there is limitation in the number of taps a bus can support and
on the distance between those taps.(In this diagram taps and connectors are
Merits
Ease of installation.
Bus use less cabling than mesh or star topologies.
Demerits
Difficult reconnection and isolation.
Signal reflection at the taps can cause degradation in quality.
A fault or break in the bus cable stops all transmission. It also reflects signals back in
the direction of origin creating noise in both directions.
4. Ring Topology:
Each device has a dedicated point to point connection only with the two devices on either side
of it. A signal is passed along the ring in one direction from device to device until it reaches
the destination Each device in the ring incorporates a repeater. It regenerates the bits and passes
them along ,when it receives the signal intended for another device.
Merits:
Easy to install and reconfigure.
To add or delete a device requires changing only two connections.
The constraints are maximum ring length and the number of devices.
If one device does not receive the signal within a specified period, it issue an alarm that
alerts the network operator to the problem and its location
Demerits
A break in the ring disables the entire network. It can be solved by using a dual ring or
a switch capable of closing off the break.
Categories of Network:
The three primary categories are of network are Local Area Network (LAN), Metropolitan
Area Network (MAN), and Wide Area Network(WAN). The category into which a network
fall is determined by its size, ownership, the distance it covers and its physical architecture.
Standards
Peer-to-Peer Processes
The processes on each machine that communicate at a given layer are called peer-to-
peer processes.
At higher layers communication must move down through the layers on device A aver
to device B and then back up through the layers.
Each layer in the sending device adds its own information to the message it receives
from the layer just above it. and passes the whole package to the layer just below and
transferred to the receiving device.
The passing of data and network information down through the layers of the sending
device and back up through the layers of the receiving device is made possible by an
interface between each pair of adjacent layers.
Each interface defines what information and services a layer must provide for the
layer above it.
Transmission Media
Transmission media are actually located below the physical layer and directly controlled by
the physical layer.
Guided &
Unguided
Guided media
It is usually air.
Guided media
Guided media, which are those that provide a conduit from one device to another.
Coaxial cable
Coaxial cable carries signals of higher frequency ranges than twisted pair cable.
It has a central core conductor of solid or stranded wire enclosed in an insulating sheath.
This in turn encased in an outer conductor of metal foil ,braid or a combination of the
two.
The metallic wrapping serves both as a shield against noise and as the second
conductor completes the circuit.
The outer conductor is also enclosed in an insulating sheath and the whole cable is
protected by a plastic cover.
Coaxial cable Standards
Coaxial cables are categorized by their radio government (RG) ratings .Each RG number
denotes a set of physical specifications such as,
RG-59 75 Cable TV
Coaxial Cable Connectors are used to connect coaxial cable to devices. The most common
type of connector is the Bayone Neill-concelman or BNC connectors. There are three popular
types of connectors
BNC connector
BNC T connector &
BNC terminator
BNC connector
BNC T connector
It is used in Ethernet networks to branch out a cable for connection to a computer or other
devices.
BNC terminator
It is used at the end of the cable to prevent the reflection of the signal.
Performance
A fiber optic cable is made of glass or plastic and transmit signals in the form of light.
Properties of light
Light travels in a straight line as long as it moves through a single uniform substance.
If array traveling through one substance suddenly enters another the ray changes
direction.
Refraction:
If the angle of incidence (the angle the ray makes with the line perpendicular to the interface
between the two substances) is less than the critical angle the ray refracts and moves closer
to the surface.
Reflection:
If the angle of incidence is greater than the critical angle the ray reflects and travels again in
the denser substance.
Propagation Modes
There are two modes for propagating light along optical channels, each requires fiber with
different physical characteristics
Multimode
Single mode
Multimode
Multiple beams from a light source move through the core in different paths.
Wireless Transmission
1. Radio: Radio is a general term that is used for any kind of frequency. But higher
frequencies are usually termed as microwave and the lower frequency band comes
under radio frequency. There are many application of radio. For eg. cordless keyboard,
wireless LAN, wireless Ethernet. but it is limited in range to only a few hundred meters.
Depending on frequency radio offers different bandwidths.
2. Terrestrial microwave: In terrestrial microwave two antennas are used for
communication. A focused beam emerges from an antenna and is received by the other
antenna, provided that antennas should be facing each other with no obstacle in
between. For this reason antennas are situated on high towers. Due to curvature of earth
terrestrial microwave can be used for long distance communication with high
bandwidth. Telecom department is also using this for long distance communication. An
advantage of wireless communication is that it is not required to lay down wires in the
city hence no permissions are required.
Layering scenario:
The Internet was still restricted to non-commercial use and limited access, so gopher sites were
typically information repositories, e.g. universities and government public information.
1. Physical Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1. Physical Layer
This layer is the lowest layer in the OSI model. It helps in the transmission of data between
two machines that are communicating through a physical medium, which can be optical
fibres,copper wire or wireless etc. The following are the main functions of the physical layer:
1. Hardware Specification: The details of the physical cables, network interface cards,
wireless radios, etc are a part of this layer.
Coaxial Cable Hybrid Cable Wireless Card Network Card
2. Encoding and Signaling: How are the bits encoded in the medium is also decided by
this layer. For example, on the copper wire medium, we can use different voltage levels
for a certain time interval to represent '0' and '1'. We may use +5mV for 1nsec to
represent '1' and -5mV for 1nsec to represent '0'. All the issues of modulation is dealt
with in this layer. eg, we may use Binary phase shift keying for the representation of '1'
and '0' rather than using different voltage levels if we have to transfer in RF waves.
3. Data Transmission and Reception: The transfer of each bit of data is the
responsibility of this layer. This layer assures the transmission of each bit with a high
probability. The transmission of the bits is not completely reliable as their is no error
correction in this layer.
4. Topology and Network Design: The network design is the integral part of the physical
layer. Which part of the network is the router going to be placed, where the switches
will be used, where we will put the hubs, how many machines is each switch going to
handle, what server is going to be placed where, and many such concerns are to be taken
care of by the physical layer. The various kinds of topologies that we decide to use may
be ring, bus, star or a hybrid of these topologies depending on our requirements.
This layer provides reliable transmission of a packet by using the services of the physical layer
which transmits bits over the medium in an unreliable fashion. This layer is concerned with :
1. Framing: Breaking input data into frames (typically a few hundred bytes) and caring
about the frame boundaries and the size of each frame.
2. Acknowledgment: Sent by the receiving end to inform the source that the frame was
received without any error.
4. Error Detection: The frames may be damaged, lost or duplicated leading to errors. The
error control is on link to link basis.
6. Flow Control: Necessary for a fast transmitter to keep pace with a slow receiver.
3. Network Layer
Its basic functions are routing and congestion control.
Routing: This deals with determining how packets will be routed (transferred) from source to
destination. It can be of three types :
Static : Routes are based on static tables that are "wired into" the network and are rarely
changed.
Dynamic : All packets of one application can follow different routes depending upon
the topology of the network, the shortest path and the current network load.
Semi-Dynamic: A route is chosen at the start of each conversation and then all the
packets of the application follow the same route.
Routing
The services provided by the network can be of two types :
Connection less service: Each packet of an application is treated as an independent
entity. On each packet of the application the destination address is provided and the
packet is routed.
Connection oriented service: Here, first a connection is established and then all
packets of the application follow the same route. To understand the above concept, we
can also draw an analogy from the real life. Connection oriented service is modeled
after the telephone system. All voice packets go on the same path after the connection
is established till the connection is hung up. It acts like a tube ; the sender pushes the
objects in at one end and the receiver takes them out in the same order at the other end.
Connection less service is modeled after the postal system. Each letter carries the
destination address and is routed independent of all the others. Here, it is possible that
the letter sent first is delayed so that the second letter reaches the destination before the
first letter.
Congestion Control: A router can be connected to 4-5 networks. If all the networks send
packet at the same time with maximum rate possible then the router may not be able to handle
all the packets and may drop some/all packets. In this context the dropping of the packets
should be minimized and the source whose packet was dropped should be informed. The
control of such congestion is also a function of the network layer. Other issues related with this
layer are transmitting time, delays, jittering.
Internetworking: Internetworks are multiple networks that are connected in such a way that
they act as one large network, connecting multiple office or department networks.
Internetworks are connected by networking hardware such as routers, switches, and bridges.
Internetworking is a solution born of three networking problems: isolated LANs, duplication
of resources, and the lack of a centralized network management system. With connected LANs,
companies no longer have to duplicate programs or resources on each network. This in turn
gives way to managing the network from one central location instead of trying to manage each
separate LAN. We should be able to transmit any packet from one network to any other network
even if they follow different protocols or use different addressing modes.
Inter-Networking
Network Layer does not guarantee that the packet will reach its intended destination. There
are no reliability guarantees.
4. Transport Layer
The Open Systems Interconnection (OSI) architecture has been developed by the
International Organization for Standardization (ISO) to describe the operation and design of
layered protocol architectures. This forms a valuable reference model and defines much of the
language used in data communications.
Describes a seven-layer abstract reference model for a network architecture
Types of service : The transport layer also decides the type of service that should be
provided to the session layer. The service may be perfectly reliable, or may be reliable
within certain tolerances or may not be reliable at all. The message may or may not be
received in the order in which it was sent. The decision regarding the type of service to
be provided is taken at the time when the connection is established.
Error Control : If reliable service is provided then error detection and error recovery
operations are also performed. It provides error control mechanism on end to end basis.
Flow Control : A fast host cannot keep pace with a slow one. Hence, this is a
mechanism to regulate the flow of information.
Connection Establishment / Release : The transport layer also establishes and releases
the connection across the network. This requires some sort of naming mechanism so
that a process on one machine can indicate with whom it wants to communicate.
5. Session Layer
It deals with the concept of Sessions i.e. when a user logins to a remote server he should
be authenticated before getting access to the files and application programs. Another
job of session layer is to establish and maintain sessions. If during the transfer of data
between two machines the session breaks down, it is the session layer which re-
establishes the connection. It also ensures that the data transfer starts from where it
breaks keeping it transparent to the end user. e.g. In case of a session with a database
server, this layer introduces check points at various places so that in case the
connection is broken and reestablished, the transition running on the database is not lost
even if the user has not committed. This activity is called Synchronization. Another
function of this layer is Dialogue Control which determines whose turn is it to speak
in a session. It is useful in video conferencing.
6. Presentation Layer
This layer is concerned with the syntax and semantics of the information transmitted.
In order to make it possible for computers with different data representations to
communicate data structures to be exchanged can be defined in abstract way along with
standard encoding. It also manages these abstract data structures and allows higher level
of data structures to be defined an exchange. It encodes the data in standard agreed
way(network format). Suppose there are two machines A and B one follows 'Big
Endian' and other 'Little Endian' for data representation. This layer ensures that the data
transmitted by one gets converted in the form compatible to other machine. This layer
is concerned with the syntax and semantics of the information transmitted. In order to
make it possible for computers with different data representations to communicate data
structures to be exchanged can be defined in abstract way along with standard encoding.
It also manages these abstract data structures and allows higher level of data structures
to be defined an exchange. Other functions include compression, encryption etc.
7. Application Layer
The seventh layer contains the application protocols with which the user gains access
to the network. The choice of which specific protocols and their associated functions
are to be used at the application level is up to the individual user. Thus the boundary
between the presentation layer and the application layer represents a separation of the
protocols imposed by the network designers from those being selected and
implemented by the network users. For example commonly used protocols are
HTTP(Hyper text transfer protocol for web browsing), FTP(File transfer protocol for
file transfer) etc.
Network Layers as in Practice
In most of the networks today, we do not follow the OSI model of seven layers. What
is actually implemented is as follows. The functionality of Application layer and
Presentation layer is merged into one and is called as the Application Layer.
Functionalities of Session Layer is not implemented in most networks today. Also, the
Data Link layer is split theoretically into MAC (Medium Access Control) Layer and
LLC (Link Layer Control). But again in practice, the LLC layer is not implemented
by most networks. So as of today, the network architecture is of 5 layers only.
The Defense Advanced Research Projects Agency (DARPA), the research branch of the U.S.
Department of Defense, created the TCP/IP model in the 1970s for use in ARPANET, a wide
area network that preceded the internet. TCP/IP was originally designed for the Unix operating
system, and it has been built into all of the operating systems that came after it. The TCP/IP
model and its related protocols are now maintained by the Internet Engineering Task Force.
TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of
communication protocols used to interconnect network devices on the internet. TCP/IP can
also be used as a communications protocol in a private network (an intranet or an extranet).
The entire internet protocol suite -- a set of rules and procedures -- is commonly referred to as
TCP/IP, though others are included in the suite.
TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed, transmitted,
routed and received at the destination. TCP/IP requires little central management, and it is
designed to make networks reliable, with the ability to recover automatically from the failure
of any device on the network.
The two main protocols in the internet protocol suite serve specific functions. TCP defines how
applications can create channels of communication across a network. It also manages how a
message is assembled into smaller packets before they are then transmitted over the internet
and reassembled in the right order at the destination address.
IP defines how to address and route each packet to make sure it reaches the right destination.
Each gateway computer on the network checks this IP address to determine where to forward
the message.
TCP/IP uses the client/server model of communication in which a user or machine (a client) is
provided a service (like sending a webpage) by another computer (a server) in the network.
Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client
request is considered new because it is unrelated to previous requests. Being stateless frees up
network paths so they can be used continuously.
The transport layer itself, however, is stateful. It transmits a single message, and its connection
remains in place until all the packets in a message have been received and reassembled at the
destination. The TCP/IP model differs slightly from the seven-layer Open Systems
Interconnection (OSI) networking model designed after it, which defines how applications can
communicate over a network.
TCP/IP model layers
TCP/IP functionality is divided into four layers, each of which include specific protocols.
The application layer provides applications with standardized data exchange. Its
protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple
Network Management Protocol (SNMP).
The transport layer is responsible for maintaining end-to-end communications across the
network. TCP handles communications between hosts and provides flow control,
multiplexing and reliability. The transport protocols include TCP and User Datagram
Protocol (UDP), which is sometimes used instead of TCP for special purposes.
The network layer, also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The network
layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is used
for error reporting.
The physical layer consists of protocols that operate only on a link -- the network
component that interconnects nodes or hosts in the network. The protocols in this layer
include Ethernet for local area networks (LANs) and the Address Resolution Protocol
(ARP).
Advantages of TCP/IP:
TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore,
the internet protocol suite can be modified easily. It is compatible with all operating systems,
so it can communicate with any other system. The internet protocol suite is also compatible
with all types of computer hardware and networks. TCP/IP is highly scalable and, as a routable
protocol, can determine the most efficient path through the network.
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does
guarantees the delivery of packets. not guarantees delivery of packets. Still the
TCP/IP model is more reliable.
4. OSI model has a separate Presentation 4. TCP/IP does not have a separate
layer and Session layer. Presentation layer or Session layer.
6. Network layer of OSI model provides 6. The Network layer in TCP/IP model
both connection oriented and provides connectionless service.
connectionless service.
7. OSI model has a problem of fitting 7. TCP/IP model does not fit any protocol
the protocols into the model.
8. Protocols are hidden in OSI model 8. In TCP/IP replacing protocol is not easy.
and are easily replaced as the technology
changes.