0% found this document useful (0 votes)
14 views28 pages

7-TCP - IP Model

The document provides an overview of the TCP/IP model, which is a four-layer architecture designed for efficient data transmission over networks. It details the history, features, and functions of each layer, including the application, transport, internet, and network access layers, as well as the protocols used within them. Additionally, it discusses the advantages and disadvantages of the TCP/IP model, its applications, and its importance in modern networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views28 pages

7-TCP - IP Model

The document provides an overview of the TCP/IP model, which is a four-layer architecture designed for efficient data transmission over networks. It details the history, features, and functions of each layer, including the application, transport, internet, and network access layers, as well as the protocols used within them. Additionally, it discusses the advantages and disadvantages of the TCP/IP model, its applications, and its importance in modern networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

1

CSC340: Computer Networks

Instructor:
Dr. Manzoor Ahmad
[email protected].
pk

COMSATS University Islamabad,


Vehari Campus
Topics 2

TCP/IP Model: The 4 Layers of Network Architecture


3
TCP/IP Model Overview
The TCP/IP model refers to the Transmission Control Protocol/Internet
Protocol Model. This model is a part of the network domain designed
specifically for overseeing efficient and error-free transmission of data.
The model works on a four-layered architecture model, where each layer
implicit the required network protocols on the data to be transmitted,
which remodels the data to the most optimum structure for efficient
transmission over the network.
In this tutorial on what is TCP/IP model is, you will understand the
working of each layer in detail to better understand the functioning of the
model.
4
TCP/IP Model History

TCP/IP was developed during the Cold War as a way for the
U.S. Department of Defense to connect computers within their
networks and with each other across national boundaries. It's
been used since the late 1960s when it was formalized by
DARPA and later adopted by government agencies and
universities worldwide as a common networking standard.
The first version of TCP/IP was ARPANET (1975), which stands
for Advanced Research Projects Administration Network. The
name changed to TCP/IP in 1983, when it became an open
standard that could be used on any network.
5
TCP/IP Model Features
The TCP/IP model is among one of the most important network
concepts that contributed to the working of ARPANET.
The TCP/IP model comprises four layers: the network access layer,
the internet layer, the transport layer, and the application layer (going
from bottom to top).
The network model is implemented during network and
communication-related issues.
Communication between different modes of network devices is
possible through the application of various layers.
The layers in the model provide maintenance of communication
channels, flow control, and reliability check format, among other
applications in the form of protocols.
6
TCP/IP Model Layers
Application 7
TCP/IP Model Layer (1/2)
This is the topmost layer which indicates the applications and
programs that utilize the TCP/IP model for communicating with
the user through applications and various tasks performed by the
layer, including data representation for the applications executed
by the user and forwards it to the transport layer.
The application layer maintains a smooth connection between
the application and user for data exchange and offers various
features as remote handling of the system, e-mail services, etc.
Application 8
TCP/IP Model Layer (2/2)
Some of the protocols used in this layer are:
HTTP: Hypertext transfer protocol is used for accessing the
information available on the internet.
SMTP: Simple mail transfer protocol, assigned the task of
handling e-mail-related steps and issues.
FTP: This is the standard protocol that oversees the transfer of
files over the network channel.
Transport 9
TCP/IP Model Layer (1/2)

This layer is responsible for establishing the connection between


the sender and the receiver device and also performs the task of
dividing the data from the application layer into packets, which
are then used to create sequences.
It also performs the task of maintaining the data, i.e., to be
transmitted without error, and controls the data flow rate over the
communication channel for smooth transmission of data.
Transport 10
TCP/IP Model Layer (2/2)
The protocols used in this layer are:
TCP: Is responsible for the proper transmission of segments over the
communication channel. It also establishes a network connection between
the source and destination system.
UDP: Is responsible for identifying errors, and other tasks during the
transmission of information. UDP maintains various fields for data
transmission such as:
Source Port Address: This port is responsible for designing the application
that makes up the message to be transmitted.
Destination Port Address: Receives the message sent from the sender side.
Total Length: The total number of bytes of the user datagram.
Checksum: Used for error detection of the message at the destination side.
Internet 11
TCP/IP Model Layer (1/2)
The Internet layer performs the task of controlling the transmission of the
data over the network modes and enacts protocols related to the various
steps related to the transmission of data over the channel, which is in the
form of packets sent by the previous layer.
This layer performs many important functions in the TCP/IP model:
It is responsible for specifying the path that the data packets will use for
transmission.
This layer is responsible for providing IP addresses to the system for the
identification matters over the network channel.
Internet 12
TCP/IP Model Layer (2/2)

Some of the protocols applied in this layer are:


IP: This protocol assigns your device with a unique address; the
IP address is also responsible for routing the data over the
communication channel.
ARP: This protocol refers to the Address Resolution Protocol
that is responsible for finding the physical address using the IP
address.
Network 13
TCP/IP Model Access Layer
This layer is the combination of data-link and physical layer,
where it is responsible for maintaining the task of sending and
receiving data in raw bits, i.e., in binary format over the physical
communication modes in the network channel.
It uses the physical address of the system for mapping the path
of transmission over the network channel.
TCP/IP 14
TCP/IP Model Layers
The Application Layer: The application layer is closest to the end user.
And this is the layer that users interact with directly, including protocols
such as HTTP, FTP, and SSH. This layer is responsible for providing
applications with access to the network.
The Transport Layer: The transport layer ensures that data is delivered
reliably and efficiently from one point to another. This layer handles data
transmission between hosts, including protocols like TCP and UDP.
The Internet Layer: The network layer is responsible for routing data
through the web. This layer delivers data packets from one host to another,
including the IP protocol.
The Link Layer: The link layer provides reliable data links between the
two nodes — for example, protocols like ethernet and Wi-Fi.
Protocols 15
TCP/IP Model Used (1/2)
There are four main protocols used in TCP/IP: the Transmission
Control Protocol (TCP), the User Datagram Protocol (UDP), the
Internet Protocol (IP), and the Internet Control Message Protocol
(ICMP).
 TCP ensures that data is delivered reliably and in order.
 UDP is used for applications where data doesn't need to be
delivered reliably or needs to be delivered quickly without the
overhead of TCP.
 IP is the protocol that routes data from one computer to another.
 ICMP is used for error-checking and for managing traffic
congestion.
Protocols 16
TCP/IP Model Used (2/2)
All four of these protocols are essential for the proper
functioning of the internet.
They work together to ensure that data is delivered quickly,
reliably, and in the appropriate order.
There are some other protocols also notable, and there are,
 Address Resolution Protocol (ARP)
 File Transfer Protocol (FTP)
 Hypertext Transfer Protocol (HTTP)
 Simple Mail Transfer Protocol (SMTP)
 Domain Name System (DNS)
Characteristi 17
TCP/IP Model cs
TCP is a connection-oriented protocol that establishes a connection
between two nodes before transmitting any data.
All data sent over a TCP connection is checked for accuracy and
retransmitted until the data is received correctly.
This reliability makes TCP well-suited for applications that require a high
degree of error-checking and for large data transfers.
TCP operates at the lowest level of the OSI model, transmitting data in
segments, which are then reassembled into whole frames by the receiver.
TCP also provides congestion control, which helps prevent network
congestion by regulating the rate at which data is sent.
Additionally, TCP can control the flow of data, allowing data to be sent at
different rates depending on the application's needs.
Advantages 18
TCP/IP Model of TCP/IP

Scalability: The TCP/IP model is highly scalable and can accommodate


small and large networks.
Reliability: The model is robust and reliable, making it suitable for
mission-critical applications.
Flexibility: It is very flexible, allowing for interoperability between
different types of networks.
Security: The various protocols in the model provide robust security
measures.
Cost-effectiveness: TCP/IP is relatively inexpensive to implement and
maintain.
Disadvantag 19
TCP/IP Model es of TCP/IP

Complexity: The model is quite complex and requires a certain degree of


expertise to configure and maintain.
Vulnerability: Because of its complexity, it is vulnerable to attack.
Performance: Performance can be degraded due to network congestion and
latency.
Uses of 20
TCP/IP Model TCP/IP
World Wide Web: TCP/IP transfers data b/w web browsers and servers.
Email: Applications such as Outlook, Thunderbird, and Gmail use TCP/IP
protocols to send and receive emails.
File Transfer: FTP, SFTP, and other file transfer services rely on TCP/IP to
move files from one computer to another.
Networking: TCP/IP links computers together in a network.
Virtual Private Networks: VPNs use TCP/IP to encrypt data before it
travels across a public or private network.
Internet of Things: Many smart home devices use TCP/IP to communicate
and transfer data.
Voice Over Internet Protocol: VOIP services such as Skype and Google
Voice use TCP/IP to transmit calls over the internet.
How Does 21
TCP/IP Model Work (1/2)
The TCP/IP protocol suite is the set of communication protocols used
to connect hosts on the Internet.
TCP/IP allows computers on the same network to identify and
communicate with each other.
TCP/IP is a two-layer protocol, with the transport layer (TCP)
responsible for reliable end-to-end communication and the Internet
layer (IP) accountable for routing packets from the host to the host.
 At the transport layer, TCP provides a reliable byte-stream service to
applications.
 TCP guarantees the delivery of data and that data will be delivered in the
same order in which it was sent.
How Does 22
TCP/IP Model Work (2/2)
 TCP uses several mechanisms to provide this service, including
sequence numbers, acknowledgments, and timeouts.
 At the Internet layer, IP is responsible for routing datagrams (packets) from
host to host.
 IP does not guarantee the delivery of datagrams, but it tries to deliver them as
best.
 If a datagram cannot be delivered, IP will return an error message to the
source host.
The TCP/IP protocol suite is the most commonly used protocol suite
on the Internet today, and it is also the protocol suite used by
most LANs and WANs.
Why 23
TCP/IP Model Important
TCP/IP is essential because it provides an architecture that
allows for virtually instantaneous communication across all types
of network media, such as copper, fiber, or wireless.
It does this using the Internet Protocol Suite, which encompasses
both the TCP and UDP protocols.
In turn, the TCP Protocol governs how packets move from one
place to another on a network, and the UDP Protocol governs
how packets move within a single machine or between two
devices on a local area network (LAN).
Without TCP/IP, there would be no way for computers to
communicate over the internet.
Vs. ISO 24
TCP/IP Model Model (1/2)
Vs. ISO 25
TCP/IP Model Model (2/2)
OSI Model TCP/IP Model
The OSI model consists of 7 TCP/IP model comprises 4
layers. layers.
The OSI model has separate This model comprises a session
session and presentation and presentation layer in the
layers. application layer.
The transport layer in this In this model, the transport layer
model provides a packet does not have any such
delivery protocol. protocols.
This model is implemented This model is used as a
during network reference model for the network
communication. channel.
26
TCP/IP Model TCP Vs. IP

The Transmission Control Protocol (TCP) is a communication


protocol responsible for ensuring that data is transferred reliably
and in order between the two devices.
On the other hand, IP is the network layer protocol responsible
for routing network traffic.
While TCP/IP are both crucial protocols on the internet, they
serve different purposes.
27
TCP/IP Model Conclusion

In this ‘What is TCP/IP model’ tutorial, you understood the network
communication details about data, which includes the basic idea behind
the working of the model, the functioning of each layer in the model, and
also how the data is restructured to achieve efficient transmission over the
communication channel.
To better understand the working of each layer and the different steps they
take during the data transmission over the network from a professional
point of view, you can refer to Simplilearn’s Cyber Security Expert
course, Cyber Security Course, and PGP in Cyber Security, which will
allow you to gain in-depth knowledge about the network functions and
working of the model at a whole new level.
28

You might also like