0% found this document useful (0 votes)
10 views

Computer Network

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Computer Network

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

IT TOOLS FOR

BUSINESS

Ms. Arti Bhadouria


CONTENTS
 Learning outcomes
 Need for Computer Communication Networks
 Types of Network
 Network Topologies
 Network Protocol
 OSI and TCP/IP model
LEARNING OUTCOMES
After reading this document and attending the lecture,
students will be able to:
 L01 – Understand about the ‘Need for Computer
Communication Networks’.
 L02 – Understand about the ‘Types of Network’.
 L03 – Create an insight about the various ‘Network
Topologies’.
 L04 – Understand about the concept of ‘Network
Protocol’.
 L05 – Create an insight about ‘OSI and TCP/IP model’.
NEED FOR COMPUTER COMMUNICATION NETWORKS

In the modern era, computers have become a vital component of both commercial and private
operations in the industry sector. As technological developments have accelerated, networking
has become increasingly important. We have gradually transitioned from the first wired
network technology to wireless networking technology. If we look at it now, we can see that
networking affects everything.
A computer network is a collection of interrelated devices that can share resources and
exchange data with one another. A network's devices can be physically connected with wires
or wirelessly with the help of radio waves or infrared signals. These devices employ a set of
regulations and rules called protocols that help to transmit data over physical wire or wireless
technologies.
The main motivation for a computer network is to enable devices to communicate with one
another and share resources, including files, information, apps, and hardware components such
as printers and scanners. E-mail, virtual teamwork, sharing files, video conferencing, playing
games online, and accessing the internet are all potential uses for computer networks. Computer
networks are now a crucial part of any business communication system.

How Does a Computer Network Work?


 Devices are linked − Devices are physically linked via wires or wirelessly via Wi-Fi
or other wireless technology.
 IP addresses are assigned to devices − Each network device is assigned a unique IP
address, enabling it to be recognized on a network.
 Data transfer − When equipment sends data across a network, it is broken down into
small fragments called packets, which are then delivered to the final destination device.
 Routing − Data packets are routed via a network using different pieces of equipment
known as switches, routers, and hubs, which guide the data packets to their final
destination.
 Shared resources − Users can more easily access resources like printers, data, and
internet access because equipment on a network can collaborate on these things.
In general, a computer network is an intricate framework that involves numerous devices
cooperating to offer interaction and communication.
Need for Computer Network
The need for computer communication networks arises from various factors, and these
networks play a crucial role in modern information technology and business environments.
Here are several reasons highlighting the importance and necessity of computer communication
networks:

1. Resource Sharing:
 Hardware Resources: Computer networks enable the sharing of hardware
resources such as printers, scanners, and storage devices, optimizing resource
utilization.
 Software Resources: Networked systems can share software applications and
databases, reducing redundancy and improving efficiency.
2. Data Transfer and Accessibility:
 File Sharing: Networks facilitate the seamless transfer of files and data between
connected devices, allowing users to access information from any location
within the network.
 Remote Access: With network connectivity, users can remotely access and
control resources and data, fostering flexibility and mobility.
3. Communication and Collaboration:
 Email and Messaging: Networks provide the infrastructure for email and
messaging systems, enhancing communication among individuals and
organizations.
 Collaborative Tools: Collaborative platforms, enabled by computer networks,
allow users to work together on projects in real-time, regardless of their physical
location.
4. Centralized Data Management:
 Centralized Databases: Computer networks support centralized databases,
ensuring that data is stored, updated, and managed in a controlled and
coordinated manner.
 Data Security: Centralized data management allows for the implementation of
security measures, backups, and access controls to protect sensitive information.
5. Cost Efficiency:
 Shared Resources: By sharing resources, organizations can reduce costs
associated with the purchase and maintenance of redundant equipment and
software.
 Communication Cost: Computer networks enable cost-effective
communication, particularly for long-distance or international communication,
compared to traditional methods.
6. Automation and Control:
 Industrial Control Systems: Networks play a crucial role in automation and
control systems, allowing for the remote monitoring and management of
industrial processes and machinery.
 Smart Devices: The Internet of Things (IoT) relies on networks to connect and
control smart devices, improving efficiency in various domains.
7. Global Information Access:
 Internet Access: Computer networks, especially the global internet, provide
access to a vast amount of information and resources from around the world,
facilitating research, education, and business operations.
 Information Exchange: Networks enable the exchange of information on a
global scale, fostering innovation, collaboration, and knowledge sharing.
8. Business Operations and Transactions:
 E-commerce: Computer networks support e-commerce platforms, enabling
online transactions, electronic payments, and digital commerce.
 Supply Chain Management: Networks play a critical role in coordinating and
managing supply chains, connecting suppliers, manufacturers, distributors, and
retailers.
9. Scalability and Flexibility:
 Scalability: Networks can easily scale to accommodate the addition of new
devices, users, or resources, allowing organizations to adapt to changing
requirements.
 Flexibility: Networked systems provide flexibility in terms of device
connectivity, allowing users to choose from a variety of devices while
maintaining seamless communication.
In summary, computer communication networks are essential for facilitating efficient, secure,
and collaborative information exchange in diverse domains. They form the backbone of
modern computing, supporting the interconnected and digital nature of today's societies and
businesses.
TYPES OF NETWORK
A computer network is a cluster of computers over a shared communication path that works to
share resources from one computer to another, provided by or located on the network nodes.

Uses of Computer Networks


 Communicating using email, video, instant messaging, etc.
 Sharing devices such as printers, scanners, etc.
 Sharing files.
 Sharing software and operating programs on remote systems.
 Allowing network users to easily access and maintain information.

Types of Computer Networks


There are mainly five types of Computer Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)

Types of Computer Networks


1. Personal Area Network (PAN)
PAN is the most basic type of computer network. This network is restrained to a single person,
that is, communication between the computer devices is centered only on an individual’s
workspace. PAN offers a network range of 1 to 100 meters from person to device providing
communication. Its transmission speed is very high with very easy maintenance and very low
cost.
This uses Bluetooth, IrDA, and Zigbee as technology.
Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc.

Personal Area Network (PAN)


2. Local Area Network (LAN)
LAN is the most frequently used network. A LAN is a computer network that connects
computers through a common communication path, contained within a limited area, that is,
locally. A LAN encompasses two or more computers connected over a server. The two
important technologies involved in this network are Ethernet and Wi-fi. It ranges up to 2km &
transmission speed is very high with easy maintenance and low cost.
Examples of LAN are networking in a home, school, library, laboratory, college, office, etc.

Local Area Network (LAN)


3. Campus Area Network (CAN)
CAN is bigger than a LAN but smaller than a MAN. This is a type of computer network that
is usually used in places like a school or colleges. This network covers a limited geographical
area that is, it spreads across several buildings within the campus. CAN mainly use Ethernet
technology with a range from 1km to 5km.
Its transmission speed is very high with a moderate maintenance cost and moderate cost.
Examples of CAN are networks that cover schools, colleges, buildings, etc.

Campus Area Network (CAN)


4. Metropolitan Area Network (MAN)
A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network
that connects computers over a geographical distance through a shared communication path
over a city, town, or metropolitan area. This network mainly uses FDDI, CDDI, and ATM as
the technology with a range from 5km to 50km. Its transmission speed is average. It is difficult
to maintain and it comes with a high cost.
Examples of MAN are networking in towns, cities, a single large city, a large area within
multiple buildings, etc.

Metropolitan Area Network (MAN)


5. Wide Area Network (WAN)
WAN is a type of computer network that connects computers over a large geographical distance
through a shared communication path. It is not restrained to a single location but extends over
many locations. WAN can also be defined as a group of local area networks that communicate
with each other with a range above 50km.
Here we use Leased-Line & Dial-up technology. Its transmission speed is very low and it comes
with very high maintenance and very high cost.
The most common example of WAN is the Internet.

Wide Area Network (WAN)


Comparison between Different Computer Networks

PAN LAN CAN MAN WAN


Parameters

Personal Campus Metropolitan


Local Area Wide Area
Full Name Area Area Area
Network Network
Network Network Network

Bluetooth, Leased
Ethernet & FDDI,
Technology IrDA,Zigb Ethernet Line, Dial-
Wifi CDDi. ATM
ee Up

Above 50
Range 1-100 m Upto 2km 1 – 5 km 5-50 km
km

Transmission
Very High Very High High Average Low
Speed

Private or Private or
Ownership Private Private Private
Public Public

Very
Maintenance Very Easy Easy Moderate Difficult
Difficult

Cost Very Low Low Moderate High Very High


Other Types of Computer Networks
1. Wireless Local Area Network (WLAN):
 Technology: Uses wireless communication technologies, such as Wi-Fi, to
connect devices within a limited area.
 Purpose: Provides flexibility and mobility for device connectivity without the
need for physical cables.
2. Home Area Network (HAN):
 Scope: Connects devices within a home environment.
 Purpose: Enables communication and data sharing among devices within a
household, including computers, smart TVs, and IoT devices.
3. Intranet:
 Scope: Private network within an organization.
 Purpose: Facilitates internal communication, collaboration, and sharing of
resources among employees.
4. Extranet:
 Scope: Extends beyond the organization to include external partners, suppliers,
or customers.
 Purpose: Allows controlled access to certain parts of the organization's network
by external entities for collaboration and data sharing.
5. Virtual Private Network (VPN):
 Technology: Utilizes public networks (e.g., the internet) to create a secure and
private connection.
 Purpose: Enables secure remote access to a private network, often used for
telecommuting or accessing company resources from outside the office.
6. Client-Server Network:
 Architecture: Centralized with dedicated servers providing services to
connected clients.
 Purpose: Facilitates resource sharing, centralized data storage, and efficient
management of network resources.
7. Peer-to-Peer Network (P2P):
 Architecture: Decentralized, with devices acting as both clients and servers.
 Purpose: Allows devices to communicate and share resources directly without
the need for a central server.
Advantages of Computer Network
Some of the main advantages of Computer Networks are:
 Central Storage of Data: Files are stored on a central storage database which helps to
easily access and available to everyone.
 Connectivity: A single connection can be routed to connect multiple computing
devices.
 Sharing of Files: Files and data can be easily shared among multiple devices which
helps in easily communicating among the organization.
 Security through Authorization: Computer Networking provides additional security
and protection of information in the system.

Disadvantages of Computer Network


Some of the main disadvantages of Computer Networks are:
 Virus and Malware: A virus is a program that can infect other programs by modifying
them. Viruses and Malware can corrupt the whole network.
 High Cost of Setup: The initial setup of Computer Networking is expensive because
it consists of a lot of wires and cables along with the device.
 loss of Information: In case of a System Failure, might lead to some loss of data.
 Management of Network: Management of a Network is somehow complex for a
person, it requires training for its proper use.
NETWORK TOPOLOGIES
A network topology is the physical and logical arrangement of nodes and connections in a
network. Nodes usually include devices such as switches, routers and software with switch and
router features. Network topologies are often represented as a graph.
Network topologies describe the arrangement of networks and the relative location of traffic
flows. Administrators can use network topology diagrams to determine the best placements for
each node and the optimal path for traffic flow. With a well-defined and planned-out network
topology, an organization can more easily locate faults and fix issues, improving its data
transfer efficiency.

Types of Network Topology


Physical topology is the geometric representation of all the nodes in a network. There are six
types of network topology which are Bus Topology, Ring Topology, Tree Topology, Star
Topology, Mesh Topology, and Hybrid Topology.

1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected through
a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly connected
to the backbone cable.
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).

CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling the
problems that occur when two nodes send the messages simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the data.
Therefore, it works on "recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the
collision by checking whether the transmission media is busy or not. If busy, then the
sender waits until the media becomes idle. This technique effectively reduces the
possibility of the collision. It does not work on "recovery after the collision".

Advantages of Bus topology:


o Low-cost cable: In bus topology, nodes are directly connected to the cable without
passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
o Limited failure: A failure in one node will not have any effect on other nodes.
Disadvantages of Bus topology:
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine the cable
faults. If any fault occurs in the cable, then it would disrupt the communication for all
the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the signals
of both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down the
network.
o Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters
are used to regenerate the signal.

2) Ring Topology

o Ring topology is like a bus topology, but with connected ends.


o The node that receives the message from the previous computer will retransmit to the
next node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from
one node to another node.
o Token: It is a frame that circulates around the network.

Working of Token passing


o A token moves around the network, and it is passed from computer to computer until it
reaches the destination.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination address
matches. Once the token received by the destination device, then it sends the
acknowledgment to the sender.
o In a ring topology, a token is used as a carrier.

Advantages of Ring topology:


o Network Management: Faulty devices can be removed from the network without
bringing the network down.
o Product availability: Many hardware and software tools for network operation and
monitoring are available.
o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the
installation cost is very low.
o Reliable: It is a more reliable network because the communication system is not
dependent on the single host computer.

Disadvantages of Ring topology:


o Difficult troubleshooting: It requires specialized test equipment to determine the cable
faults. If any fault occurs in the cable, then it would disrupt the communication for all
the nodes.
o Failure: The breakdown in one station leads to the failure of the overall network.
o Reconfiguration difficult: Adding new devices to the network would slow down the
network.
o Delay: Communication delay is directly proportional to the number of nodes. Adding
new devices increases the communication delay.
3) Star Topology

o Star topology is an arrangement of the network in which every node is connected to the
central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.

Advantages of Star topology


o Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as
compared to bus topology. In a bus topology, the manager has to inspect the kilometers
of cable. In a star topology, all the stations are connected to the centralized network.
Therefore, the network administrator has to go to the single station to troubleshoot the
problem.
o Network control: Complex network control features can be easily implemented in the
star topology. Any changes made in the star topology are automatically accommodated.
o Limited failure: As each station is connected to the central hub with its own cable,
therefore failure in one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are cost-
effective.
o Easily expandable: It is easily expandable as new stations can be added to the open
ports on the hub.
o Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial
cable.
o High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is
one of the most popular Star topology networks.

Disadvantages of Star topology


o A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
o Cable: Sometimes cable routing becomes difficult when a significant amount of
routing is required.

4) Tree topology

o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.

Advantages of Tree topology


o Support for broadband transmission: Tree topology is mainly used to provide
broadband transmission, i.e., signals are sent over long distances without being
attenuated.
o Easily expandable: We can add the new device to the existing network. Therefore, we
can say that tree topology is easily expandable.
o Easily manageable: In tree topology, the whole network is divided into segments
known as star networks which can be easily managed and maintained.
o Error detection: Error detection and error correction are very easy in a tree topology.
o Limited failure: The breakdown in one station does not affect the entire network.
o Point-to-point wiring: It has point-to-point wiring for individual segments.

Disadvantages of Tree topology


o Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main bus cable
will damage the overall network.
o Reconfiguration difficult: If new devices are added, then it becomes difficult to
reconfigure.

5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central point
of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
Where n is the number of nodes that represents the network.

Mesh topology is divided into two categories:


o Fully connected mesh topology
o Partially connected mesh topology

o Full Mesh Topology: In a full mesh topology, each computer is connected to all the
computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are
connected to those computers with which they communicate frequently.

Advantages of Mesh topology:


Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect
the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the communication between
other devices.
Disadvantages of Mesh topology
o Cost: A mesh topology contains a large number of connected devices such as a router
and more transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to maintain
and manage. If the network is not monitored carefully, then the communication link
failure goes undetected.
o Efficiency: In this topology, redundant connections are high that reduces the efficiency
of the network.

6) Hybrid Topology

o The combination of various different topologies is known as Hybrid topology.


o A Hybrid topology is a connection between different links and nodes to transfer the
data.
o When two or more different topologies are combined together is termed as Hybrid
topology and if similar topologies are connected with each other will not result in
Hybrid topology. For example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank, connecting these two
topologies will result in Hybrid topology.
Advantages of Hybrid Topology
o Reliable: If a fault occurs in any part of the network will not affect the functioning of
the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new devices without
affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a way that
the strength of the network is maximized and weakness of the network is minimized.

Disadvantages of Hybrid topology


o Complex design: The major drawback of the Hybrid topology is the design of the
Hybrid network. It is very difficult to design the architecture of the Hybrid network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs
are different from usual Hubs used in other topologies.
o Costly infrastructure: The infrastructure cost is very high as a hybrid network requires
a lot of cabling, network devices, etc.
NETWORK PROTOCOL
Network protocols are a set of rules outlining how connected devices communicate across a
network to exchange information easily and safely. Protocols serve as a common language for
devices to enable communication irrespective of differences in software, hardware, or internal
processes.

Types of network protocols


Different protocols serve different functions to ensure efficient, quick, and secure network
communication. Various types of network protocols can be categorized into the following three
broad categories to help organizations operate seamlessly across different business scenarios:

1. Network Communication Protocols: These protocols determine the rules and formats to
transfer data across networks. Communication protocols govern various aspects of analog and
digital communications, such as syntax, authentication, semantics, and error detection, among
others. Some key network communication protocols include:
o Hyper-Text Transfer Protocol (HTTP): Commonly referred to as the protocol of the
internet that allows communication between a server and browser.
o Transmission Control Protocol (TCP): A reliable, connection-oriented protocol that
helps in the sequential transmission of data packets to ensure data reaches the
destination on time without duplication.
o Internet Protocol (IP): Facilitates routing the data packets across networks. IP
contains addressing and control information to deliver packets across a network. It
works along with TCP. While it ensures delivering the packets to the right address, TCP
aligns them in the right order.
o User Datagram Protocol (UDP): Unlike TCP, UDP is a connectionless protocol that
doesn’t ensure a connection between the application and server before transmitting a
message. It’s effective for use cases such as broadcasts or multicast connections.
o File Transfer Protocol (FTP): Allows file sharing between servers by establishing two
TCP connections, one for data transfer and the other for control. The data transfer
connection transfers the actual files while the control connection transfers control
information such as passwords to ensure data retrieval in case of data loss.
Helps diagnose network connectivity issues. Network devices employ ICMP for sending error
messages, highlighting congestion and timeouts, and transmitting other operational
information to assist in network troubleshooting.

2. Network Security Protocols: These protocols ensure safe data transmission over the
network connections. Network security protocols define the procedures to secure data from any
unauthorized access. These protocols leverage encryption and cryptography to safeguard. Here
are the most widely used network security protocols:
o Secure File Transfer Protocol (SFTP): Helps securely transfer files across a network
by using public-key encryption and authenticating the client and server.
o Hyper-Text Transfer Protocol Secure (HTTPS): Overcomes the limitation of HTTP
by ensuring the security of data transmitted between the browser and server through
data encryption. HTTPS is a secure version of HTTP.
o Secure Socket Layer (SSL): Primarily helps secure internet connections and safeguard
sensitive data using encryption. SSL protocol enables both server-client communication
and server-server communication.

3. Network Management Protocols: Network managers require standard policies and


procedures to manage and monitor the network for maintaining smooth communication.
Network management protocols ensure quick troubleshooting and optimal performance across
the network. The following are essential network protocols management:
o Simple Network Management Protocol (SNMP): Helps administrators manage
network devices by monitoring endpoint information to proactively track network
performance and pinpoint network glitches for quick troubleshooting.
o Internet Control Message Protocol (ICMP): Helps diagnose network connectivity
issues. Network devices employ ICMP for sending error messages, highlighting
congestion and timeouts, and transmitting other operational information to assist
in network troubleshooting.

How do network protocols work?


Understanding how network protocols work makes it crucial to see how connected devices
communicate over a network. The most popular model, the Open Systems Interface (OSI),
demonstrates how computer systems communicate over a network. This seven-layer model
visualizes the communication process between two network devices across seven layers.
Network protocols split the communication process into discrete tasks across each OSI model
layer. To enable network communication, one or more protocols operate at every layer. For
example, the Internet Protocol (IP) routes data by managing the information such as data
packets’ source address and destination to enable network-to-network communications.
Therefore, it’s referred to as a network layer protocol.
OSI AND TCP/IP MODEL
Data communication is a process or act in which we can send or receive data. For data
communication two models are available.
 OSI Model
 TCP/IP Model

What is OSI model?


The OSI stands for Open System Interconnection, which was developed in 1980s. It is a
conceptual model used for network communication. It is not implemented entirely, but it is still
referenced today. This OSI model consists of seven layers, and each layer is connected to each
other. The data moves down the OSI model, and each layer adds additional information. The
data moves down until it reaches the last layer of the OSI model. When the data is received at
the last layer of the OSI model, then the data is transmitted over the network. Once the data is
reached on the other side, then the process will get reversed.

What is TCP/IP model?


The TCP model stands for Transmission Control Protocol, whereas IP stands for Internet
Protocol. A number of protocols that make the internet possibly comes under the TCP/IP
model. Nowadays, we do not hear the name of the TCP/IP model much, we generally hear the
name of the IPv4 or IPv6, but it is still valid. This model consists of 4 layers. Now, we will
look at the diagrammatic representation of the TCP/IP model.
As shown in the above diagram, the TCP/IP model has 4 layers, while the OSI model consists
of 7 layers. Diagrammatically, it looks that the 4 layers of the TCP/IP model exactly fit the 7
layers of the OSI model, but this is not reality. The application layer of the TCP/IP model maps
to the first three layers, i.e., application, session, and presentation layer of the OSI model. The
transport layer of the TCP maps directly to the transport layer of the OSI model. The internet
layer of the TCP/IP model maps directly to the network layer of the OSI model. The last two
layers of the OSI model map to the network layer of the TCP/IP model. TCP/IP is the most
widely used model as compared to the OSI model for providing communication between
computers over the internet.

Similarities between the OSI and TCP/IP model


The following are the similarities between the OSI and TCP/IP model:
o Share common architecture
Both the models are the logical models and having similar architectures as both the models are
constructed with the layers.
o Define standards
Both the layers have defined standards, and they also provide the framework used for
implementing the standards and devices.
o Simplified troubleshooting process
Both models have simplified the troubleshooting process by breaking the complex function
into simpler components.
o Pre-defined standards
The standards and protocols which are already pre-defined; these models do not redefine them;
they just reference or use them. For example, the Ethernet standards were already defined by
the IEEE before the development of these models; instead of recreating them, models have
used these pre-defined standards.
o Both have similar functionality of 'transport' and 'network' layers
The function which is performed between the 'presentation' and the 'network' layer is similar
to the function performed at the transport layer.

Differences between the OSI and TCP/IP model

OSI Model TCP/IP Model

It stands for Open System Interconnection. It stands for Transmission Control Protocol.

OSI model has been developed by ISO It was developed by ARPANET (Advanced
(International Standard Organization). Research Project Agency Network).

It is an independent standard and generic It consists of standard protocols that lead to the
protocol used as a communication gateway development of an internet. It is a communication
between the network and the end user. protocol that provides the connection among the
hosts.

In the OSI model, the transport layer provides a The transport layer does not provide the surety for
guarantee for the delivery of the packets. the delivery of packets. But still, we can say that it
is a reliable model.

This model is based on a vertical approach. This model is based on a horizontal approach.

In this model, the session and presentation In this model, the session and presentation layer
layers are separated, i.e., both the layers are are not different layers. Both layers are included in
different. the application layer.

It is also known as a reference model through It is an implemented model of an OSI model.


which various networks are built. For example,
the TCP/IP model is built from the OSI model.
It is also referred to as a guidance tool.

In this model, the network layer provides both The network layer provides only connectionless
connection-oriented and connectionless service.
service.
Protocols in the OSI model are hidden and can In this model, the protocol cannot be easily
be easily replaced when the technology replaced.
changes.

It consists of 7 layers. It consists of 4 layers.

OSI model defines the services, protocols, and In the TCP/IP model, services, protocols, and
interfaces as well as provides a proper interfaces are not properly separated. It is protocol
distinction between them. It is protocol dependent.
independent.

The usage of this model is very low. This model is highly used.

It provides standardization to the devices like It does not provide the standardization to the
router, motherboard, switches, and other devices. It provides a connection between various
hardware devices. computers.

You might also like