Chapter 2
Chapter 2
Protocols
Protocol is a set of standard rules that the communicating parties – the sender the receiver,
and all other intermediate devices need to follow. We know that the sender and receiver can be
parts of different networks, placed at different geographic locations. Besides. The data transfer
rates in different networks can vary, requiring data to be sent in different formats
We need flow control for different reasons such as flow Control, access Control, addressing, etc.
Flow control is required when the sender and receiver have different speeds of sending and
receiving the data. Let us consider that Computer A 1s sending data at the speed of 1024 Mbps
and computer B is receiving data at the speed of 512 Mbps. In this case, Computer B must be
able to inform computer A about the speed mismatch s so that computer A can adjust its data
transmission rate. Otherwise some data will be lost.
Access control is required to decide which nodes in a communication channel will access
otherwise, the transmitted data through the same link the link shared among them at a particular
instant of time.
Simultaneously packets will collide if computers are sending data resulting in the loss or
corruption ofdata.
3. Timing: The term timing refers to two characteristics: when data should be sent and how
fast they can be sent. For example, if a sender produces data at 100 Mbps but the receiver can
Process data at only 1 Mbps, the transmission will overload the receiver and some data will
be lost.
4. Standards
Standards are essential in creating and maintaining an open and competitive market for equipment
manufacturers and in guaranteeing national and international interoperability of data and
telecommunications technology and processes. Standards provide guidelines to manufacturers,
government agencies, and other service providers to ensure the kind of interconnectivity necessary in
today’s marketplace and international communications.
Layered tasks
The grouping of relevant communication functions into different hierarchical sets is known as
layering. Every batch of operations is a separate layer. As an example, let us consider two friends
who want to communicate through postal mail.
Layered Architecture
Enabling two or more devices to communicate effectively across the network is extremely
comp There must be a high degree of cooperation between the two computer systems A
systematic strategy is necessary for data transmission to occur for two or more users to send
data from one to the both This method allows users to communicate and send data in an
efficient and orderly manner It implemented in computer networks using layers, which are
referred to as layered architectures.
The major goal of layered architecture is to break down transmitting and receiving
data into smaller, more manageable activities.
Each lower layer contributes to the top layer, resulting in a comprehensive collection of
services for managing communications and running applications. These levels are
interconnected, with each layer providing and receiving data from its immediate upper
and lower layers.
Dividing a model into layers simplifies the structure, making it easier to see a problem if it
arises.
The objective of each layer is to offer the service from a lower to a higher layer while
masking the specifics of how the services are performed from the layers.
It provides modularity and explicit interfaces, allowing subsystems to interact with one
another.
It ensures layer independence by offering services from the lowest to the highest layer
without specifying how the services are implemented. As a result, any changes made to
one layer do not affect the other levels.
The number of levels, functions, and contents of each layer will differ from one
network to the next.
Network architecture is a collection of these layers and protocols.
1 Hierarchical communication:
• Each layer at the sending site uses the services of the layer immediately below it.
• The sender at the higher layer uses the services of the middle layer.
• The middle layer uses the services of the lower layer and the lower layer uses the service
of the carrier. (Physical medium).
• Each layer adds control information to the data. This extra information is called a header
• The header added by a layer is processed by the corresponding layer on the destination machine.
•
2. Peer-to-peer communication :
• Communication between the corresponding layers in the two systems is called as peer
to-peer communication.
• The same set of layered function must exists in both the communicating parties.
1. Modularity: Breaks down a system into manageable layers, each with a specific function.
2. Maintainability: Easier to update and maintain since changes in one layer typically don’t
affect others.
3. Scalability: Facilitates system expansion by allowing layers to be modified or replaced
independently.
4. Reusability: Layers can be reused across different projects or systems.
5. Isolation: Each layer only interacts with adjacent layers, which simplifies debugging and
testing.
1. Overhead: Multiple layers can introduce additional processing and communication overhead.
2. Complexity: Can become complex to design and manage as the number of layers increases.
3. Performance: Layer boundaries can sometimes create performance bottlenecks.
4. Dependency Management: Ensuring correct dependencies and interactions between layers
can be challenging.
5. Rigid Structure: Changes in one layer may necessitate changes in other layers, affecting
flexibility.
Protocol Layering
A protocol are the rules that both the sender and receiver and all intermediate devices need to
follow be able to communicate effectively. When communication is simple, we may need only
one simple protocol; when the communication is complex, we need a protocol at each layer, or
protocol layering
• A Single-Layer Protocol: communication will be so simple that it can occur in only
one layer. Example speaking in the phone
• A Multi-Layer Protocol (Protocol Layering) : When the communication is complex, we
must divide the task between different layers, so, we need to follow a protocol at each layer, this
technique we used to call protocol layering. This layering allows us to separate the services
from the implementation.
Each layer needs to receive a set of services from the lower layer and to give the services to the
upper layer. The modification done in any one layer will not affect the other layers.
1. OSI Model
2. TCP/IP Model
OSI Model
The Open Systems Interconnection (OSI) model describes seven layers that computer
systems use to communicate over a network. It was the first standard model for network
communications, adopted byall major computer and telecommunication companies in the year
1984 by the International
Organization for Standardization (ISO).
The term “Open” denotes the ability to connect any two systems which conform to the referend
model and associated standards. The OSI reference model divides the problem of moving
information between computers over a network medium into SEVEN smaller and more
manageable problem The seven layers are:
1. Physical Layer
The Physical Layer is the first layer in the OSI (Open Systems Interconnection) model. It is
responsible for the actual transmission of raw binary data (bits) over a physical medium. This layer
converts data into signals that can be transmitted over the network medium, such as electrical signals
over copper cables, light pulses over fiber optics, or radio waves for wireless communication.
Working:
1. Signal Conversion: Translates digital data from the higher layers into physical signals
suitable for the transmission medium. This includes electrical signals, light pulses, or radio
waves.
2. Transmission Medium: Defines the characteristics of the medium used for transmission,
including types of cables (e.g., twisted pair, coaxial) or wireless technologies.
3. Bit Synchronization: Ensures that the sender and receiver are synchronized in their timing so
that the transmitted bits are correctly interpreted.
4. Signal Encoding: Applies encoding schemes to prepare data for transmission, which helps in
error detection and optimizing the signal for the medium.
5. Medium Access Control: While not directly involved in network access control, the physical
layer influences how data is physically transmitted, which can affect medium access strategies.
Advantages:
Disadvantages:
1. No Error Correction: Does not handle error correction; errors detected at the physical layer
must be addressed by higher layers.
2. Susceptibility to Interference: Physical signals can be affected by noise and interference,
which can degrade performance and data integrity.
3. Limited Functionality: Focuses only on the transmission of bits without providing advanced
features like data compression, encryption, or complex error handling.
4. Hardware Dependence: Performance and reliability are highly dependent on the quality and
type of hardware used for transmission, which can increase costs and complexity.
The Data Link Layer is the second layer in the OSI (Open Systems Interconnection) model. It is
responsible for establishing, maintaining, and terminating logical links between network devices, and
ensuring that data is transferred reliably over the physical layer. It handles error detection, correction,
and framing of data.
Working:
1. Framing: Encapsulates raw data from the Physical Layer into frames, which include the
necessary control information (headers and trailers) to manage data transmission.
2. Error Detection and Correction: Implements error detection mechanisms, such as
checksums and cyclic redundancy checks (CRC), to identify and correct errors that occur
during data transmission.
3. Flow Control: Manages data flow between devices to prevent overwhelming a receiver with
too much data too quickly. Techniques like acknowledgments and buffering are used.
4. Addressing: Uses MAC (Media Access Control) addresses to identify devices on the same
network segment, ensuring that data frames are delivered to the correct device.
5. Access Control: Determines how devices on a shared medium (e.g., Ethernet) access the
network. Protocols like CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
are used in Ethernet networks to manage access and resolve collisions.
Advantages:
1. Error Handling: Detects and corrects errors in data transmission, enhancing reliability.
2. Efficient Data Transfer: Manages the framing and sequencing of data, which ensures
efficient and orderly data transfer.
3. Flow Control: Prevents data overload by managing the rate of data transmission, ensuring
smooth communication between devices.
4. Addressing: Provides MAC addressing to uniquely identify devices on a network segment,
facilitating accurate data delivery.
Disadvantages:
1. Overhead: The addition of headers and trailers to data frames increases the amount of
overhead, which can reduce effective data throughput.
2. Limited Error Handling: While it can detect and correct certain errors, it does not address
higher-level issues or ensure data integrity end-to-end.
3. Collision Management: In networks with many devices, managing collisions and access to
the medium can become complex and affect performance.
4. Scope Limitation: Operates only within a single network segment or local area network
(LAN), and does not handle routing or communication across different network segments.
1. Network Layer
The Network Layer is the third layer in the OSI (Open Systems Interconnection) model. It is
responsible for routing data packets across different networks, determining the best path for data to
travel from the source to the destination, and managing logical addressing and network traffic.
Working:
1. Routing: Determines the optimal path for data packets to travel from the source to the
destination across multiple network segments or intermediate devices (routers). Routing
algorithms and protocols (like OSPF, BGP) are used for this purpose.
2. Logical Addressing: Assigns logical IP addresses to devices, allowing them to be identified
and located on a network. This addressing enables communication between devices across
different networks.
3. Packet Forwarding: Receives packets from the Data Link Layer, encapsulates them in IP
packets, and forwards them to the next hop or destination based on routing decisions.
4. Fragmentation and Reassembly: Splits large packets into smaller fragments to accommodate
the maximum transmission unit (MTU) of the network and reassembles them at the
destination.
Advantages:
Disadvantages:
1. Complex Routing Protocols: The complexity of routing protocols and algorithms can lead to
issues with network performance and configuration.
2. Overhead: Adding IP headers and managing routing information increases network overhead
and may affect performance.
3. Addressing Limitations: The limited number of available IP addresses (especially in IPv4)
can constrain network growth, though IPv6 addresses this issue.
4. Routing Loops: Improper routing configurations can create loops, causing network
congestion and inefficiencies.
2. Transport Layer
The Transport Layer is the fourth layer of the OSI (Open Systems Interconnection) model. It is
responsible for providing end-to-end communication services for applications by managing data
transfer between devices and ensuring reliable, error-free delivery of data.
Working:
1. Segmentation and Reassembly: Divides large data from the application layer into smaller
segments for transmission and reassembles them at the destination.
2. Connection Management: Establishes, maintains, and terminates connections between
applications on different devices. This includes setting up a connection (e.g., TCP handshake),
managing data transfer, and gracefully closing the connection.
3. Error Detection and Recovery: Ensures data integrity by detecting errors during
transmission and retransmitting lost or corrupted segments.
4. Flow Control: Regulates the rate of data transmission between sender and receiver to prevent
the receiver from being overwhelmed by too much data at once.
5. Multiplexing: Allows multiple applications to use the network simultaneously by
distinguishing between different data streams or sessions on the same connection.
Advantages:
1. Reliable Data Transfer: Provides error detection and recovery mechanisms, ensuring that
data is delivered accurately and completely.
2. Flow Control: Prevents data overload by managing the rate of data transmission, enhancing
communication efficiency.
3. Connection-Oriented Communication: Supports connection-oriented protocols like TCP,
which establish a reliable connection before data transfer.
4. Multiplexing: Allows multiple applications to share the same network connection without
interference.
Disadvantages:
1. Overhead: The mechanisms for ensuring reliable communication, such as error checking and
retransmissions, add overhead to the data transfer process.
2. Complexity: Connection management and error recovery processes can increase the
complexity of network communication.
3. Performance Impact: The additional overhead for reliability and flow control may impact the
performance of high-speed networks or applications requiring minimal latency.
4. Resource Consumption: Managing multiple connections and sessions requires additional
resources, which can affect system performance.
3. Session Layer
The Session Layer is the fifth layer of the OSI (Open Systems Interconnection) model. It is
responsible for managing sessions between applications on different devices, facilitating
communication and data exchange by establishing, maintaining, and terminating sessions.
Working:
Advantages:
1. Session Management: Manages and maintains communication sessions, ensuring smooth and
continuous data exchange between applications.
2. Dialog Control: Supports various communication modes (e.g., full-duplex, half-duplex) and
manages the direction of data flow within a session.
3. Synchronization: Provides mechanisms for resuming sessions from checkpoints, enhancing
reliability and fault tolerance.
4. Session Establishment and Termination: Handles the setup and teardown of sessions,
simplifying application communication management.
Disadvantages:
4. Presentation Layer
The Presentation Layer is the sixth layer of the OSI (Open Systems Interconnection) model.
It is responsible for translating data between the application layer and the network format. This layer
ensures that data is presented in a format that the application layer can understand, performing tasks
such as data translation, encryption, and compression.
Working:
1. Data Translation: Converts data between different formats used by the application layer and
the network. This includes transforming data into a standard format that can be understood by
both sending and receiving applications (e.g., converting between character encoding schemes
like ASCII and EBCDIC).
2. Data Encryption and Decryption: Ensures data security by encrypting data before
transmission and decrypting it upon receipt. This helps protect data from unauthorized access
and tampering.
3. Data Compression: Reduces the size of data to optimize network bandwidth and speed up
data transfer. Compression techniques are used to minimize the amount of data that needs to
be transmitted.
4. Data Representation: Handles the representation of data structures and formats (e.g.,
converting between binary and text formats) to ensure compatibility between different systems
and applications.
Advantages:
1. Data Translation: Ensures compatibility between different data formats and systems,
allowing for seamless communication between heterogeneous applications.
2. Data Security: Provides encryption and decryption services to protect data during
transmission, enhancing security.
3. Data Compression: Reduces data size to improve transmission efficiency and reduce network
bandwidth usage.
4. Standardization: Facilitates the use of standardized data formats, which simplifies
interoperability between different systems and applications.
Disadvantages:
The Application Layer is the seventh and topmost layer of the OSI (Open Systems Interconnection)
model. It provides network services directly to end-user applications and facilitates communication
between software applications over a network. This layer is responsible for network services such as
file transfers, email, and network management.
Working:
Advantages:
1. User Interaction: Directly interfaces with end-user applications, enabling users to perform
tasks like sending emails, transferring files, and browsing the web.
2. Protocol Support: Implements various application protocols (e.g., HTTP, FTP, SMTP) that
facilitate standard communication services across different applications and platforms.
3. Service Provision: Offers a range of network services tailored to specific application needs,
such as file sharing, messaging, and remote access.
4. Data Formatting: Ensures that data is properly formatted and presented to applications,
facilitating smooth communication and data exchange.
Disadvantages:
1. Limited Security: Security features are often minimal at this layer, relying on lower layers or
additional protocols for comprehensive security measures.
2. Protocol Dependence: Application-specific protocols may introduce compatibility issues or
require updates and maintenance to ensure continued interoperability.
3. Overhead: Handling application-specific tasks and services can introduce additional
overhead, potentially impacting performance.
4. Complexity: The diversity of applications and services supported can lead to increased
complexity and challenges in managing network communications.
a. Upper Layers: The upper layers of the 0SI model deal with application issues and
generally are implemented only in software. The highest layer, the application layer,
is closest to the end user. Both users and application layer processes interact with
software applications that contain a communications component. The term upper
layer is sometimes used to refer to any layer above another layer in the OSl model.
b. Lower Layers: The lower layers of the 0SI model handle data transport issues. The
physical layer and the data link layer are implemented in hardware and software.
The lowest layer, the physical layer, is closest to the physical network medium (the
network cabling, for example) and is responsible for actually placing information on
the medium.
The 0SI Model being one of the most widely used computer network models does posses some
advantages which makes it so popular These are :
1. It is a layered model. Changes are one layer do not affect other layers, provided that the
interfaces between the layers do not change drastically.
2. Each layer has its definite structure and functionality which makes OSI model simple and
easy to use.
3. It is a general purpose reference model that can be used to develop any network model
4. The OSI model works as a standard model in data communication.
5. It distinctly separates services, interfaces, and protocols. Hence, it is flexible in nature.
Protocols in each layer can be replaced very conveniently depending upon the nature of
the network.
6. Connection oriented and connection-less services are supported.
7. Connection between any type of devices or host or hardware or software is possible.
1. The 0Sl model is a theoretical model and does not offer appropriate solutions for
practical implementation of the networks.
2. The implementation of the OSI model is slow and costly.
3. The OSI model is a very complex model.
4. Many companies were initially reluctant to use this OSI model due to the popularity of
TCP/IP model. The TCP/IP model were in use much before the ISO model. Therefore,
companies were not ready to accept this adaptation.
5. There is a duplication of services in various layers. Services like addressing, flow
controla error control are offered by multiple layers.
6. Some of the layers like the session layer and presentation layer have very little
functionality when practically deployed.
TCP/IP Model
TCP/IP started as one of many internet protocols created by DARPA (the Defense Advanced
Research Projects Agency in the United States) in the 1970s. The TCP/IP model was introduced
before the OSI model. This model helps users understand how a specific computer should be
connected to the internet and how data can transmit between them. TCP/IP is used more
compared to the OSI model for providing communication between computers over the internet.
• The TCP/IP model is Created to allow communication over long distances possible between
two devices. It also assists in how the data between two devices is transmitted over the
internet.
• TCP/IP specifies how the data should be packetized, addressed, transmitted, routed, and
received on a network by providing end-to-end communication.
• TCP specifies how applications will establish communication channels across a network. It also
controls how a message is split into multiple data packets, sent over the internet, and
reassembled in order at the destination address.
• IP specifies how each packet should be addressed and routed to ensure thatit arrives at its
destination. To identify where the message should be forwarded, each gateway computer on
the network verifies this IP address.
• TCP handles the flow of data and also handles errors in data transmission, while IP provides a
unique address to each device in the network.
Layers of TCP/IP Model :The TCP/IP model consists of4 layers, i.e., the application layer,
transport layer, network layer, and data link layer. Each layer is responsible for a particular task
strictly according to the protocols.
1. Network Access Layer
The Network Access Layer (also known as the Link Layer or Data Link Layer in the TCP/IP model)
is the lowest layer of the TCP/IP protocol suite. It is responsible for defining how data is physically
transmitted over a network medium and how it interacts with the network hardware. This layer
encompasses the functions of both the Data Link Layer and the Physical Layer in the OSI model.
Working:
1. Framing: Encapsulates data into frames suitable for transmission over the physical network
medium. This includes adding headers and trailers to data packets to ensure correct delivery
and error detection.
2. Physical Transmission: Defines the physical aspects of network communication, including
the electrical, optical, or radio signals used to transmit data over various media (e.g., Ethernet
cables, fiber optics, wireless).
3. Addressing: Uses MAC (Media Access Control) addresses to uniquely identify devices on the
same network segment. This allows for accurate data delivery to the intended recipient within
a local network.
4. Error Detection and Handling: Implements error detection mechanisms (e.g., CRC - Cyclic
Redundancy Check) to identify and correct errors that occur during data transmission.
Advantages:
1. Data Framing: Ensures that data is properly framed for transmission over the network,
enhancing data integrity and delivery.
2. Physical Medium Support: Provides support for various physical network media and
transmission technologies, facilitating versatile network setups.
3. MAC Addressing: Uses MAC addresses for unique device identification on local networks,
enabling precise data delivery.
4. Error Detection: Implements mechanisms for detecting and correcting transmission errors,
improving data reliability.
1. Ethernet (IEEE 802.3): Commonly used in wired LANs for framing and addressing,
supporting various speeds and collision management.
2. Wi-Fi (IEEE 802.11): Manages wireless communication in LANs, operating in 2.4 GHz and
5 GHz bands, and supports multiple standards for different wireless needs.
3. Point-to-Point Protocol (PPP): Facilitates direct communication over serial links, offering
support for authentication, encryption, and compression.
4. High-Level Data Link Control (HDLC): Provides bit-oriented framing and error detection
for data links, applicable in both point-to-point and multipoint setups.
5. Media Access Control (MAC): Manages how devices access the network medium using
MAC addresses and access methods like CSMA/CD for Ethernet and CSMA/CA for Wi-Fi.
6. Virtual LANs (VLANs): Segments a physical network into multiple logical networks, using
VLAN tagging (e.g., IEEE 802.1Q) to enhance management and security.
2. Internet Layer
1. Ethernet (IEEE 802.3): Commonly used in wired LANs for framing and addressing,
supporting various speeds and collision management.
2. Wi-Fi (IEEE 802.11): Manages wireless communication in LANs, operating in 2.4 GHz and
5 GHz bands, and supports multiple standards for different wireless needs.
3. Point-to-Point Protocol (PPP): Facilitates direct communication over serial links, offering
support for authentication, encryption, and compression.
4. High-Level Data Link Control (HDLC): Provides bit-oriented framing and error detection
for data links, applicable in both point-to-point and multipoint setups.
5. Media Access Control (MAC): Manages how devices access the network medium using
MAC addresses and access methods like CSMA/CD for Ethernet and CSMA/CA for Wi-Fi.
6. Virtual LANs (VLANs): Segments a physical network into multiple logical networks, using
VLAN tagging (e.g., IEEE 802.1Q) to enhance management and security.
The Transport Layer is the third layer of the TCP/IP protocol suite. It is responsible for providing
end-to-end communication services for applications, ensuring reliable data transfer and error
recovery.
Key Protocols:
Working:
Data Segmentation: Breaks data into segments (TCP) or datagrams (UDP) for transmission,
ensuring that large messages can be sent efficiently.
Connection Management: TCP establishes and maintains a connection between sender and
receiver, managing the flow of data and ensuring reliable delivery.
Error Handling: TCP provides error detection and correction, while UDP does not; UDP
relies on higher layers or applications for error handling.
Advantages:
1. Reliability (TCP): Guarantees data delivery, order, and integrity with mechanisms for
retransmission and error checking.
2. Speed (UDP): Offers faster data transmission with lower overhead, suitable for real-time
applications.
3. Flow Control (TCP): Manages the rate of data transmission to avoid overwhelming the
receiver.
Disadvantages:
1. Overhead (TCP): Adds additional overhead for error checking, connection management, and
data reassembly, which can impact performance.
2. No Reliability (UDP): Lacks built-in mechanisms for error recovery and data integrity,
making it less reliable for critical data transmission.
3. Complexity (TCP): More complex due to connection management and congestion control,
compared to the simpler UDP.
4. Application Layer
The Application Layer is the topmost layer of the TCP/IP protocol suite. It provides network
services directly to end-user applications, facilitating communication between software applications
over a network.
Key Protocols:
Working:
Service Provision: Offers network services to applications, such as web browsing, file
transfer, and email communication.
Protocol Implementation: Implements various application-layer protocols to enable specific
functionalities and interactions between applications.
Data Formatting: Ensures that data is correctly formatted for transmission and understood by
both sender and receiver applications.
Advantages:
1. User Interaction: Directly supports end-user applications, enabling functionalities like web
browsing, file transfer, and email.
2. Protocol Variety: Implements a range of protocols to support different types of applications
and services.
3. Ease of Use: Provides user-friendly services and interfaces for interacting with network
resources.
Disadvantages:
1. Limited Security: Basic application protocols may lack comprehensive security features;
additional measures are often required.
2. Protocol Dependence: Applications are dependent on specific protocols, which may lead to
compatibility issues or require updates.
3. Overhead: The complexity and variety of supported protocols can add overhead to network
communications.
2. Transport Layer : This layer specifies how much data should be sent, when, and where:
what rate. TCP and UDP are two significant protocols of this Layer.
3. Internet Layer: The Internet layer’s primary function is to send packets from the source
orcomputer to their destination, regardless of their route. IP and ARP are two significant
protocols of this layer.
4. Network Access Layer: It handles data transmission between two adjacent devices on t same
network.
Advantages of TCP/IP Model
• It’s a client-server architecture and highly scalable. It allows the addition of new network
without disrupting existing services.
• It’s an industry-standard model that can be used to solve real-world networking problems
• It assigns a unique IP address to each device in a network such that each device has its ow
unique identity over the Internet.
• The concepts like “services,” “interfaces and “protocols” are not distinguished. As a result,
describing new technologies in new networks is not appropriate.
• This model was created to be used in wide-area networks. It is not designed for tiny networks
such as LANs and PANs (pervasive area networks) (personal area networks).
• It’s not generic. As a result, it can’t represent any protocol stack other than TCP/1P. It cannot,
for example, define a Bluetooth connection.
It stands for Open System Interconnection. It stands for Transmission Control Protocol.
OSI model has been developed by ISO (International It was developed by ARPANET (Advanced Research
Standard Organization). Project Agency Network).
It is an independent standard and generic protocol used It consists of standard protocols that lead to the
as a communication gateway between the network and development of an internet. It is a communication
the end user. protocol that provides the connection among the hosts.
The transport layer does not provide the surety for the
In the OSI model, the transport layer provides a
delivery of packets. But still, we can say that it is a
guarantee for the delivery of the packets.
reliable model.
This model is based on a vertical approach. This model is based on a horizontal approach.
In this model, the network layer provides both The network layer provides only connectionless
connection-oriented and connectionless service. service.
OSI model defines the services, protocols, and In the TCP/IP model, services, protocols, and
interfaces as well as provides a proper distinction interfaces are not properly separated. It is protocol
between them. It is protocol independent. dependent.
The usage of this model is very low. This model is highly used.
It provides standardization to the devices like router, It does not provide the standardization to the devices.
motherboard, switches, and other hardware devices. It provides a connection between various computers.