KEMBAR78
Review of The OSI Model and TCP/IP Protocol Suite On Modern Network Communication | PDF | Internet Protocol Suite | Osi Model
0% found this document useful (0 votes)
6 views10 pages

Review of The OSI Model and TCP/IP Protocol Suite On Modern Network Communication

The document reviews the OSI Model and TCP/IP Protocol Suite, highlighting their layered approaches to modern network communication. It compares the seven layers of the OSI model with the four layers of the TCP/IP model, detailing the roles and functions of each layer in facilitating efficient data transmission. The paper emphasizes the importance of these models in standardizing network protocols and improving communication systems.

Uploaded by

abdulmuheeb.hyd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views10 pages

Review of The OSI Model and TCP/IP Protocol Suite On Modern Network Communication

The document reviews the OSI Model and TCP/IP Protocol Suite, highlighting their layered approaches to modern network communication. It compares the seven layers of the OSI model with the four layers of the TCP/IP model, detailing the roles and functions of each layer in facilitating efficient data transmission. The paper emphasizes the importance of these models in standardizing network protocols and improving communication systems.

Uploaded by

abdulmuheeb.hyd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

International Journal of Current Science Research and Review

ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

Review of the OSI Model and TCP/IP Protocol Suite on Modern Network
Communication
Annu1, Dr. Anil Dudy2
1
Research Scholar, Department of Electronics and Communication Engineering
Baba Mastnath University, Rohtak (Haryana) India
2
Associate Professor, Department of Electronics and Communication Engineering
Baba Mastnath University, Rohtak (Haryana) India

ABSTRACT: Layered approaches to networking are possible. Network architects categorize protocols in order to simplify their
designs. Each layer has its own protocol for talking to the outside world. Every component of the network implements some of the
nth layer. Messages are sent back and forth between these parts. Layer n protocol data units [n-PDU] are the official name for these
transmissions. All the steps necessary for efficient conversation are covered and these steps are organized into layers for easy
comprehension. Layered architecture describes this kind of planning for a communications system. The OSI model is a framework
for developing and implementing network-based software applications. It also serves as a basis for the development of new
networking protocol hardware, and architectures. This document compares and contrasts the OSI Reference Model seven layers
with those of the TCP/IP Model four. There are distinct roles at each successive level. All Internet communication duties may be
traced back to the TCP/IP reference model.

KEYWORDS: TCP/IP, OSI, Networking

INTRODUCTION
Computer networks are groups of independent computers linked together using a common protocol. Network protocols are the
lingua franca of the computer world. These protocols detail the bit-by-bit nature of computer-to-computer communication. It
explains the norms and protocols that must be followed by all gadgets on a network. Packet switching is often used by protocols to
transmit and receive data [1].
Protocols in a network provide the rules for how information is to be formatted and sent in messages and how devices are to find
and connect with one another. For dependable and/or fast data transfer via networks certain protocols include message
acknowledgment and data compression. The protocols build upon one another.
By the time the Internet was created, layering was a tried-and-true method for developing compilers and operating systems [3]. As
a result, the idea of layered protocols emerged and they are currently the foundation of protocol design [4]. Each layer exists to
support the ones above it by delivering certain functions. To the layer above it, each successive layer is like a virtual machine. Data
encapsulation, abstract data types and information concealing are several names for the same idea in computer science and
programming. The basic concept is to serve its consumers while concealing information about its internal state and the algorithms
it employs.
In order for two data communication devices to exchange information with one another, a network protocol is required. Data
transmission and reception is the foundation of every communication system. The following should be done to a large extent most
of the time:
 Information interchange formats for digital bit strings.
 A lookup by address.
 The sending and receiving addresses in an electronic communication must have the same format.
 Internetworking-based routing.
 Networks that cannot guarantee fault-free operation need error detection.
 Timeouts and failed attempts to retrieve lost data.
 Management of sequence in the face of lost, delayed or divergent lengthy strings of bits.
1230 *Corresponding Author: Annu Volume 07 Issue 02 February 2024
Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

 Managing the flow of data when one party transmits at a higher rate than the other.
 If transmission is unidirectional, the direction of information flow must be considered.
 Connection-oriented communication acknowledgments for packet delivery success.
The networking protocol is put into action by connecting the protocol software modules to the OS framework [2]. Transmissions
between systems seldom employ a solitary protocol. “Instead, they use a collection of interoperating protocols, sometimes known
as a protocol family or suite. IPX/SPX, AX.25, AppleTalk, and TCP/IP are only a few of the most well-known protocols.”
Modern layouts include several layers of protocols. Layering is a design strategy that breaks down complex protocols into smaller,
more manageable pieces, each of which is responsible for a discrete sub-task and only communicates with other layers in a few,
well-defined ways [5]. The benefits of layered protocols include clearer specification of the techniques for transmitting information
across levels as part of the protocol suite and isolation of modifications made inside a protocol layer from the other layers. Having
them separated into their own functional levels makes it much easier to designate appropriate protocols for each layer's specific
tasks. The four-layer Protocol Stack used by TCP/IP and the seven-layer OSI model are both examples of layered protocols. If you
break the rules, it will be hard to talk to each other.
The diagram below depicts a four-layer network. Peers are the entries that make up the matching levels on separate computers. The
peers may either be other processes or other hardware devices. There is no one-to-one correspondence between machines layers n.
Instead, information is sent from one layer to the next, all the way down to the bottom layer. Layer 1 at the bottom is the actual
medium that allows for communication to take place.
In Figure 1, the dotted lines represent virtual communication whereas the solid lines represent physical communication [8]. Each
set of neighboring layers has an interface between them. The interface specifies the set of basic operations and services provided by
the underlying layer to the one above it. Determining uncluttered interfaces between layers is a crucial factor.

Figure 1: Layers, Protocols and Interfaces [7]

Each layer has to carry out a small set of well-defined tasks to keep the data footprint to a minimum. Since the new implementation
provides the same set of services to the upstairs neighbor as the previous version, it is easier to replace one layer with a totally
different implementation.”
We refer to the framework of a network as its architecture. Since the implementation and interface specifications are internal to the
machines, they cannot be considered part of the architecture. A protocol stack is a hierarchical set of protocols utilized by a given
system. “The OSI reference model and the TCP/IP reference model” are two widely used frameworks for designing networks. The
OSI reference model is briefly explained. We learn what the TCP/IP reference model is. There will be a comparison of the two

1231 *Corresponding Author: Annu Volume 07 Issue 02 February 2024


Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

models, followed by a summary and final thoughts.


OSI Reference Model
In 1984, ISO (the International Organization for Standardization) presented the Open System Interconnection Model. The approach
provides a seven-layer summary of complex network phenomena and instances. By dividing a communication system into
abstraction layers, its inner workings may be defined and standardized. The seven logical levels of the model are used to organize
the various communication functions. Each layer is both a provider and a recipient of services from the layers above and below it.
The seven-layer structure is based on the following principles:
 Each layer requests to serve a specific purpose.
 When a new level of abstraction is required, a layer should be added.
 International protocols should be defined by the roles that each layer plays.
 Information leakage between layers should be kept to a minimum at their borders.
 There should be a sufficient number of levels so that unrelated tasks aren't lumped together where they won't be useful [9], but
not so many that the design becomes unmanageable.
This model was created to reduce the learning curve for working with networks and to make troubleshooting networks less
complicated [10]. Figure 2 below describes the OSI model's layers:

Figure 2: OSI Reference Model

The Physical Layer


The Physical Layer is the OSI Model lowest level. It deals with the actual network's features, such that the cables utilized, the
connections, the maximum length of the wires and so on [11]. The physical layer is in charge of sending unencoded data via the
network. The data connection's electrical and physical requirements are laid forth. The connection “between a gadget and its physical
transmission medium (such as a wire or a fiber optic cable) is also discussed. The design challenges must ensure that when one side
transmits a 1, the other side also receives a 1, and not a 0.
The Electrical Characteristics of the Signals Used in Data Transmission Over Cables are also defined by the Physical Layer. These

1232 *Corresponding Author: Annu Volume 07 Issue 02 February 2024


Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

signals have no significance beyond the binary values 0 and 1 as defined by the Physical Layer. The bits sent at the Physical Layer
need to have meanings assigned to them at higher OSI model layers.
The Data Link Layer”
At the Data Link Layer, the bottommost layer of a network, bits are conferred with significance before being transmitted. Data-link
protocols handle concerns such as the utmost packet magnitude, how to authenticate that only one node at a given moment is
transmitting data across the network, and how to stop numerous nodes from transmitting data simultaneously.
The information connection layer's main duty is to hide any transmission issues from the network layer, rendering a basic
transmission capability appear flawless. Mistakes in the physical layer may be identified and conceivably reestablished to offer a
stable linkage between two directly connected nodes.
The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer are two sub-layers of the data link layer. Entry
to network information and permission to transmit it are regulated by the MAC sub layer. Frame synchronization, stream regulation
and error verification are all supervised by the LLC layer.”
The task is accomplished by sequentially transmitting data frames that were previously fragmented by the sender. If the service is
reliable, the receiving end will verify successful delivery of each frame with an acknowledgment frame of its own. “PPP, FDDI,
ATM, IEEE 802.5/802.2 and IEEE 802.3/802.2 are all examples of Layer 2 Data Links.”
The Network Layer
Communications transmitted across a network are conveyed through the Network Layer. It controls the operation of the subnet. The
Network Layer is accountable for logical addressing within other things. MAC addresses are visible addresses that are assigned to
each network device when it is initially formed. To gain entry to a device on a network, it must be allocated a sensible location. IP
and IPX are the network layer accountable for this. MAC addresses are obtained from logical addresses through the Network Layer
protocol.
The Network layer is additionally accountable for routing or establishing the finest way across the network. A computer on one
network utilizes routing when it desires to transfer a packet to another computer on a distinct network. A router functions at the
Network Layer and is accountable for transmitting the packet to its ultimate endpoint. Routers' capacity to connect different Layer-
2 protocols is an important capability. A router, for example, can connect the divide between two networks functioning on different
collections of low-level protocols, like an Ethernet-based local area network and a TCP/IP-based wide area network [12].
The Transport Layer
The Transport Layer is the bottommost tier of a network's structure where information can be transmitted from one device to another.
End-to-end mistake retrieval and stream regulation are managed by this layer, which additionally enables data conveyance between
hosts. It ensures the complete transfer of information. It additionally determines the type of assistance the session layer, and thus
the users of the network will receive.
The transport layer is accountable for the dependable and punctual conveyance of information without any distortion, replication,
or misplacement. It liberates the higher layer protocols from worrying about data interchange with their counterparts. The abilities
of the underlying network layer determine the ideal magnitude and difficulty of a transport protocol. A skilled network level with
virtual pathway assistance may be achieved with simply a handful of layers of conveyance. The transportation protocol should
possess flexible error identification and restoration capabilities if the network layer is unreliable and/or exclusively sustains
datagrams.
Frequently, the Transport Layer protocol will disassemble a message into smaller packets so that it can be transmitted more rapidly
and efficiently across the network. When a message is received, the Transport Layer protocol assembles all the fragments to
guarantee that no data is misplaced during transportation.
The Session Layer
Sessions are established between nodes in a network at the Session Layer. Before any data is transmitted over a network, a session
must initially be established. The session layer is accountable for establishing and sustaining these connections. Discussions,
interactions and talks between apps are initiated, coordinated, and closed via the session layer. It's focused on synchronizing
meetings and connections.

1233 *Corresponding Author: Annu Volume 07 Issue 02 February 2024


Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

The Presentation Layer


When the demonstration service provides an extensive correlation between application-level entity syntax and semantics, the
Presentation Layer establishes a setting in which the application-level entities can employ their facilitated syntax and semantics. If
a mapping is discovered, information entities from the presentation service are enveloped in information entities from the session
protocol and transported further down the protocol stack [13]. This layer frequently discovered in an operating system, translates
with distinct exhibition arrangements for information as it travels in both directions [14]. By converting from application to network
format, and vice versa, this layer enables applications to operate autonomously of corrections in data interpretation (such as
encoding). Information is converted by the presentation layer so that it can be utilized by the application layer. This layer prepares
information for conveyance across a network by arranging and ciphering it, executing it universally employable.
The Application Layer
The OSI application layer is the most directly user-facing layer, enabling for two-way communication between the user and the
program. This layer communicates with applications that utilize a networking component. Numerous user-solicited protocols can
be discovered on the application layer. The functioning of applications and end users are aided by this layer.
Collaborators in communication are established, excellence of service is evaluated, user verification and confidentiality are
considered, and data grammatical limitations are acknowledged. At this stage, everything is customized to a specific software. Hyper
Text Transfer Protocol (HTTP) is one frequently utilized application protocol since it serves as the basis of the World Wide Web.
A browser requests a webpage by transmitting the server the desired page's title via the Hypertext Transfer Protocol (HTTP). The
page is subsequently delivered by the server. File exchanging, electronic mail, and network message boards all utilize diverse
application protocols. The application layer is the unique site of protocols such as Telnet and FTP. This layer is accountable for
layered application frameworks [15].
TCP/IP Model
Transmission Control Protocol/Internet Protocol is abbreviated as "TCP/IP." It establishes the guidelines for how computers and
other electronic devices should interact with each other through the Internet. TCP is the protocol in control of dividing data into
packets before transmitting them over a network and assembling them after they have reached their target. Inter-machine
conversation is managed via IP. It manages online packet addressing, transmission, and reception. Transmission Control Protocol
(TCP) guarantees the accurate transmission of data packets between applications on diverse computers through a network (like the
Internet). The transport layer is where it might be discovered.
Numerous educational institutions and governmental establishments were interconnected via rented phone lines and the
APPARNET, a research network supported by the Department of Defense (DoD). A fresh reference framework was formulated
because existing protocols encountered challenges when interacting with recently introduced satellite and wireless networks. The
main goal was to guarantee the seamless functioning of interconnected networks. The TCP/IP Model is the title that ultimately
followed for this specific structure.
The continuation of ongoing discussions was another crucial requirement [16] for the network design. What this implies is that the
Department of Defense required links to endure as long as the source and destination device were operational, even if any of the
devices or communication lines in between suddenly ended operation. Various applications, ranging from document exchange to
voice over IP in live time, require a versatile layout. IP and TCP rely on each other immensely. IP designates where data packets
should go while TCP guarantees their secure transmission.
TCP/IP functions on two separate tiers. Transmission Control Protocol, an upper layer, is accountable for dismantling a
communication or document into smaller fragments for conveyance across the World Wide Web and subsequently reconstructing
them into the initial communication upon reception. Internet Protocol, a subordinate layer protocol, is accountable for ensuring that
packets are dispatched to the accurate destinations. This location is utilized by each gateway machine in the network to ascertain
where the message must to be dispatched. A few of the communication packets might follow an alternative route, but they will all
be reconstructed at the ultimate endpoint [17].
The seven layers of the Open Systems Interconnection (OSI) framework correspond to one or more of the model's layers. Figure 3
displays the model's stratification configuration.

1234 *Corresponding Author: Annu Volume 07 Issue 02 February 2024


Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

Application Layer

Transport Layer

Internet Layer

Network Access Layer

Figure 3: TCP/IP Model.

The Network Access Layer


In the TCP/IP model, the uppermost layer is the Network Access Layer. How bits are electrically or visually signaled by hardware
devices that interface directly with a network media like coaxial cable, optical fiber, or twisted pair copper wire is explained in the
Network Access Layer [19]. This layer manages the transfer and receipt of TCP/IP packets across the network medium. TCP/IP
was engineered to operate with any frame structure and medium, irrespective of the manner in which the network is accessed.
TCP/IP enables the interlinking of numerous various network structures. Local Area Network (LAN) technologies like Ethernet and
Token Ring, and Wide Area Network (WAN) technologies like X.25 and Frame Relay are examples of these. TCP/IP's ability to be
adjusted to unique network technologies such as Asynchronous Transfer Mode (ATM)” is primarily recognized to its autonomy
from any specific network technology.
The OSI model Data Link and Physical layers are merged into a solitary entity known as the Network Access Layer. It is crucial to
bring in mind that the Internet layer does not utilize any ordering or acknowledgment services that might be accessible at the Data-
Link layer. It is thought that the Network Access layer is unpredictable and it is the duty of the Transport layer to offer dependable
communications by establishing sessions and appropriately ordering and acknowledging packets.
Internet Layer
The Internet Layer is the middle layer of the TCP/IP architecture. Between the underlying Network Access Layer and the higher-
level Transport Layer is where you'll find the Internet. The Internet Protocol layer encapsulates data into packets called IP data
grams, which are then sent from host to host and network to network using the data's source and destination addresses. IP datagrams
are also routed via the Internet layer.”
A layer of connectionless internetwork is essential to the operation of a packet switching network. The Internet layer is the highest
level. Its purpose is to let hosts send packets into any network and have those packets reach their destination without any intervention
from the sending network. Data packets arriving at their destination may not be in the same sequence as they were transmitted. The
upper layers are responsible for rearranging the packets such that the Application layer of the network can receive them and process
them appropriately [20].
Packet transmission over various networks falls under this layer's purview. In order to do any kind of internetworking, data must be
sent from one network to another. The term for this procedure is "routing" [21].
The Internet layer is not only neutral with regards to transport layer data formats, but it also does not make any distinctions between
the functions performed by the different transport layer protocols. Information for many uppers may be sent through IP. “Internet
Control Message Protocol (ICMP) and Internet Group Management Protocol (IGMP) are examples of such protocols and they are
both designated by the numbers 1 and 2 respectively. Some of the most important protocols implemented at the Internet layer include
the Internet Control Message Protocol (ICMP), the Address Resolution Protocol (ARP), the Reverse Address Resolution Protocol
(RARP), and the Internet Group Management Protocol (IGMP).
1235 *Corresponding Author: Annu Volume 07 Issue 02 February 2024
Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

Transport Layer
Data packets may be sent from one end of the network to the other merits to the Transport Layer. End-to-end (host-to-host)
communication is the focus of the Transport Layer. Transmission Control Protocol (TCP) is an Internet Protocol (IP) layer protocol
that ensures the secure, connection-oriented transfer of data between two computers' endpoints (sockets). The User Datagram
Protocol allows for the unreliable, connectionless transfer of data between two Internet Protocol endpoints (sockets) on different
systems. When sending data, the Transport Layer passes it on to the Internet Layer and when receiving data, it passes it on to the
application layer [22]. The transport layer controls the flow of data during a communication session between hosts and specifies the
quality of service and connection status being utilized.”
Application Layer
The TCP/IP Application Layer specifies the protocols used by applications running on a host computer to communicate with network
services provided by the Transport Layer.
The user's communication interface is provided by this layer. The browser, email client, or file transfer client are all examples of
such software. Here is where you'll find your web browser, telnet client, FTP client, email client, and so on. Any program that runs
on top of TCP or UDP utilizes two IP addresses and two corresponding virtual network sockets. Data is sent to and received from
the transport layer by the application layer.
For the TCP/IP protocol suite, this is the highest level. Applications and processes that rely on transport layer protocols to transmit
data to their final destinations are part of this layer. Options for protocols to use at each tier allow it to perform its specified function.
Therefore, apps may connect with the second layer, the transport layer, through a variety of protocols available at the application
layer. “Domain Name System (DNS), Hypertext Transfer Protocol (HTTP), Telnet, Secure Shell (SSH), File Transfer Protocol
(FTP), Trivial File Transfer Protocol (TFTP), Simple Mail Transfer Protocol (SMTP), Dynamic Host Configuration Protocol
(DHCP), X Window System (X Windows), Remote Desktop Protocol (RDP), etc. are all examples of protocols found in the
application layer [23].
Comparison between OSI and TCP/IP Models
Email, the World Wide Web, File Transfer Protocol, etc. all utilize Transmission Control Protocol to communicate across the
Internet. The Digital Advanced Research Projects Agency (DARPA) created TCP/IP so that different devices may communicate
over a single network (the Internet). The primary goal of the protocol's development was to provide a reliable, self-repairing phone
line breakdown on the battlefield. Open Systems Interconnection, on the other hand, was created by ISO (the International
Organization for Standardization).” The seven-layer model and a selection of protocols [24] make up the two main parts of this
paradigm.

Table 1: OSI and TCP/IP Model.


OSI Reference Model TCP/IP
Application Layer
Presentation Layer
Session Layer Application Layer
Transport Layer Transport Layer
Network Layer Internet Layer
Data Link Layer
Physical Layer Network Access Layer”

Although the TCP/IP Model merely consists of four layers, the OSI Model encompasses a total of seven layers. This is due to the
fact that, beyond the Transport Layer, TCP/IP anticipates programs to manage everything themselves. It's significant to mention
that the TCP/IP Model combines the Physical and Data Link Layers of the OSI into a solitary Network Access Layer [26]. Table 1
illustrates the main disparities between the OSI and TCP/IP architectures.”
The Open System Interconnection (OSI) proposal was formulated by the International Organization for Standardization (ISO) as a
"benchmark model" to describe the appropriate partition of work and interaction amongst the numerous software and hardware
1236 *Corresponding Author: Annu Volume 07 Issue 02 February 2024
Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

constituents that constitute a network communication. From the Physical interface at Layer 1 (also recognized as the physical layer)
to the application layer at Layer 7, it constructs a seven-layer stack of operational components.
A few of the utmost significant protocols that constitute “the Internet are the Transmission Control Protocol (TCP) and the Internet
Protocol (IP). Internet Protocol (IP) designates the methods by which computers can interchange information across a network of
routed and interconnected networks. TCP describes how applications can establish secure channels of communication in such a”
framework. TCP specifies how to maintain a communication over the network without data distortion or depletion, whereas Internet
Protocol specifies how addresses and packets are directed.
TCP/IP is a protocol suite that evolved from studies conducted “by the United States Department of Defense and is built on a flexible
rather than rigid layered architecture. The Hypertext Transfer Protocol (HTTP), which is the foundation of the World Wide Web,
and the Simple Mail Transfer Protocol (SMTP), which is the backbone of email, are both constructed on top of TCP. The User
Datagram Protocol (UDP), a companion to TCP, sacrifices the stability guarantees made by TCP in favor of a more rapid data
transfer rate. TCP/IP was created before the OSI model and was meant to address a particular set of issues; it was not intended to
serve as a universal representation of network communications. The OSI model and TCP/IP are related and different in ways [27]”:
 Several features of Layer 5 (session) are performed by TCP, which corresponds to OSI Layer 4 (transport) and the network
layer.
 While OSI specifies a number of standardized functions at higher levels than Layer 5, where a network session occurs, TCP/IP
makes no such assumptions.
 Whereas OSI prescribes two connection layers below IP, TCP/IP makes no such requirements.
In cases when the system requires functionality that is not provided by TCP/IP, the application must provide it. Because of the
abstract nature of the interfaces between the layers in the OSI model, it is presumed that applications would never implement any
functionality that properly belongs in any designated layer. The TCP/IP model and the OSI model are quite similar in how they
function. But there are distinctions between them that are worth observing. The primary distinction is the thickness of the layers.
TCP/IP has a four-layer architecture, whereas OSI has seven. Differences between the OSI Model and the TCP/IP Model [29]
Table 2: Illustrates the comparative summary:

Table 2: Differences between OSI and TCP/IP Model.


TCP/IP OSI
Implementation of OSI model Reference model
Model around which Internet is Developed This is a theoretical model
Has only 4 layers Has 7 layers
Considered more reliable Considered a reference tool
Protocols are not strictly defined Stricter boundaries for the protocols
Horizontal approach Vertical approach
Combines the session and presentation layerHas separate session and
in the application layer Presentation layer
Protocols were developed first and thenModel was developed before the development of
the model was developed protocols

Supports only connectionless communication Supports connectionless and connection-oriented in


in the network layer the network layer
Protocol dependent standard Protocol independent standard”

CONCLUSION
Variations between the TCP/IP and OSI frameworks are examined in this investigation. The Open Systems Interconnection (OSI)
model is a communication structure that demonstrates how information packages journey across a network. The Department of
Defense (DoD) created TCP/IP (Transmission Control Protocol/Internet Protocol) to guarantee the safety of classified military

1237 *Corresponding Author: Annu Volume 07 Issue 02 February 2024


Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

information and to maintain channels of communication accessible during periods of trouble. The effectiveness and feasibility of a
TCP/IP network rely on detailed preparation and implementation in accordance with industry norms. In opposition to the OSI
standards, which have a tendency to be prescriptive (for instance, the "level N" must traverse "all levels beneath it"), the TCP/IP
protocols are illustrative and permit the implementers with as much flexibility as conceivable. TCP/IP's modular structure enables
implementations to control OS-specific characteristics, which frequently enhances effectiveness (limited CPU cycles, increased
throughput for comparable tasks) while still ensuring "compatibility" with each other.
Both the TCP/IP and the OSI frameworks utilize both connection-oriented and distributed transport systems. On the contrary,
"connections" and "information packets" are the phrases employed by the Internet's fundamental framework to depict the two
TCP/IP categories. In comparison, the "accurate" OSI reference model employs connection-type and connection-based for the
connection model and connectionless-type for the connectionless model. TCP/IP is the further established of the two data
transmission protocols and has been in use for a greater duration. However, the OSI framework is a well-established concept that is
incorporated in all alternative data transfer protocols. It will continue as the benchmark by which all other forms of communication
software are evaluated.
When it pertains to TCP/IP, the application layer is both the demonstration and meeting layers collectively. The OSI data link and
physical layers are combined into one by TCP/IP. The smaller layers of TCP/IP contribute to its apparent simplicity of usage. In
contrast to the OSI model's transport layer, the TCP/IP transport layer's utilization of UDP does not guarantee the equal delivery of
packets.

REFERENCES
1. http://compnetworking.about.com/od/networkprotocols/g/ protocols.htm
2. Marsden 1986, Section 6.1 - Why are standards necessary? pp. 64-65, uses BSC as an example to showthe need for both
standard protocols and a standard framework.
3. Comer 2000, Sect. 11.2 - The Need for Multiple Protocols, pp. 177, explains this by drawing analogies between computer
communication and programminglanguages.
4. Sect. 11.10 - The Disadvantage of Layering, pp. 192,states: layering forms the basis for protocol design
5. http://en.wikipedia.org/wiki/Internetwork_protocol
6. American Psychological Association (APA): Protocol layer. (n.d.). The Free On-line Dictionary of Computing. Retrieved
November 04, 2014.Chicago Manual Style (CMS): Protocol layer. Dictionary.com. the Free On-line Dictionary of
Computing. Denis Howe. Http (accessed: November 04, 2014)
7. http://www.ee.surrey.ac.uk/Projects/CAL/networks/Intro. htm
8. Andrew S. Tanenbaum in Computer networks, pp. 27 [2008].
9. Andrew S. Tanenbaum in Computer networks, pp. 38 [2008].
10. Stewart, K., Adams, A. and Reid, A. (2008). Designing and Supporting Computer Networks, CCNA discovery Learning
Guide, Cisco Press, USA
11. http://www.dummies.com/how-to/content/layers-in-the-osi-model-of-a-computer-network.html
12. http://www.dummies.com/how-to/content/layers-in-the-osi-model-of-a-computer-network.html
13. http://en.wikipedia.org/wiki/OSI_model
14. http://searchnetworking.techtarget.com/definition/OSI
15. http://www.webopedia.com/quick_ref/OSI_Layers.asp Updated March 11, 2014 / Posted September 24, 1999, byVangie
Beal.
16. Andrew S. Tanenbaum in Computer networks, pp. 41[2008].
17. http://searchnetworking.techtarget.com/definition/TCP-IP Posted by Margaret Rouse WhatIs.com
18. http://en.kioskea.net/faq/1855-the-tcp-ip-model Publishedby-aakai1056-Latest update by deri58, November 2014.
19. http://www.omnisecu.com/tcpip/tcpip-model.php Published by: Jajish Thomason.
20. http://www.omnisecu.com/tcpip/tcpip-model.php Published by: Jajish Thomason.
21. IP Packet Structure http://www.inetdaemon.com/tutorials/basic_concepts/net work_models/TCP-IP_model/
22. http://www.omnisecu.com/tcpip/tcpip-model.php Published by: Jajish Thomason.

1238 *Corresponding Author: Annu Volume 07 Issue 02 February 2024


Available at: www.ijcsrr.org
Page No. 1230-1239
International Journal of Current Science Research and Review
ISSN: 2581-8341
Volume 07 Issue 02 February 2024
DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943
IJCSRR @ 2024 www.ijcsrr.org

23. http://www.buzzle.com/articles/tcpip-model-vs-osi- model.html


24. http://www.buzzle.com/articles/tcpip-model-vs-osi- model.html
25. A Comparison of OSI Model vs. TCP/IP Model http://www.inetdaemon.com/tutorials/basic_concepts/net
work_models/comparison.shtml Last Updated: Saturday,15-Feb-2014 12:46:31 MST | By InetDaemon
26. http://searchnetworking.techtarget.com/answer/What-is- the-difference-between-OSI-model-and-TCP-IP-other- than-the-
number-of-layers
27. http://www.buzzle.com/articles/tcpip-model-vs-osi- model.html
28. http://www.studytonight.com/computer- networks/comparison-osi-tcp-model
29. OSI Reference Model: An Overview by Gaurav Bora,Saurabh Bora, Shivendra Singh, Sheikh Mohamad Arsalan published
in International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 4– Jan 2014

Cite this Article: Annu, Dr. Anil Dudy (2024). Review of the OSI Model and TCP/IP Protocol Suite on Modern Network
Communication. International Journal of Current Science Research and Review, 7(2), 1230-1239

1239 *Corresponding Author: Annu Volume 07 Issue 02 February 2024


Available at: www.ijcsrr.org
Page No. 1230-1239

You might also like