0% found this document useful (0 votes)
5 views

Unit-01_004_TCPIP Reference Model (1)

Uploaded by

manvithreddy9885
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Unit-01_004_TCPIP Reference Model (1)

Uploaded by

manvithreddy9885
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

OSI (Open Systems Interconnection) model.

Key Responsibilities of the Physical Layer


1. Transmission of Raw Bits:
o Converts digital data into physical signals such as electrical voltages, light pulses, or
radio waves and vice versa.
2. Physical Medium Specification:
o Defines the types of transmission mediums used (e.g., copper cables, fiber optics,
wireless radio frequencies).
3. Data Encoding and Modulation:
o Encodes data into signals suitable for transmission (e.g., Non-Return-to-Zero (NRZ),
Manchester encoding).
o Modulates signals to allow data transmission over specific media (e.g., Amplitude,
Frequency, or Phase Modulation).
4. Bit Synchronization:
o Ensures the sender and receiver are synchronized so the receiver can correctly
interpret the bitstream.
5. Line Configuration:
o Defines how devices are connected to the transmission medium (e.g., point-to-
point, multipoint).
6. Transmission Mode:
o Specifies the direction of data flow:
 Simplex: Data flows in one direction only.
 Half-Duplex: Data flows in both directions, but one at a time.
 Full-Duplex: Data flows in both directions simultaneously.
7. Signal Strength and Quality:
o Maintains adequate signal strength and minimizes interference and noise for
successful transmission.
8. Physical Topology:
o Determines the arrangement of devices and connections in the network (e.g., star,
bus, ring, mesh topologies).

Key Functions of the Data Link Layer


1. Framing:
o Divides data from the network layer into manageable units called frames.
o Adds headers and trailers to frames to define start and end boundaries.
2. Addressing:
o Uses MAC (Media Access Control) addresses to identify devices on the
same network segment.
o Ensures that frames are delivered to the correct hardware device.
3. Error Detection and Correction:
o Ensures data integrity by detecting and correcting errors in transmitted frames
using techniques like Cyclic Redundancy Check (CRC).
4. Flow Control:
o Prevents fast senders from overwhelming slow receivers by regulating the data
transmission rate.
5. Access Control:
o Determines which device has control of the communication medium at a given
time (e.g., CSMA/CD in Ethernet).
6. Reliable Data Transfer:
o Implements mechanisms to acknowledge receipt of frames and retransmit lost
or corrupted frames.
Functions of the Network Layer
1. Logical Addressing
 Ensures unique identification of devices in a network.
 IP addresses are hierarchical:
o Network Part: Identifies the network.
o Host Part: Identifies the device within the network.
2. Routing
 Determines the best route based on metrics such as:
o Hop Count: Number of devices (routers) between source and destination.
o Bandwidth: Path with the highest available bandwidth.
o Latency: Path with the lowest delay.
3. Packet Handling
 Encapsulation: Adds headers to the data received from the Transport Layer.
 Decapsulation: Removes headers at the destination.
4. Fragmentation and Reassembly
 Breaks down data that exceeds the MTU (Maximum Transmission Unit) size.
 Reassembles packets using identifiers and offsets.
5. Error and Congestion Control
 TTL: A field in the IP header that decreases with each hop, discarding the packet if TTL
reaches zero.
 ICMP: Sends error messages like Destination Unreachable
Key Functions of the Transport Layer
1. Segmentation and Reassembly:
o Segmentation: The transport layer divides large data into smaller segments
for easier transmission.
o Reassembly: At the destination, it reassembles these segments back into the
original data.
2. Connection Management:
o Connection-Oriented Communication: Establishes, maintains, and
terminates connections between devices (e.g., TCP).
o Connectionless Communication: Sends data without establishing a dedicated
connection (e.g., UDP).
3. Error Detection and Correction:
o Ensures reliable data delivery by detecting errors in transmission and
retransmitting corrupted or lost data.
4. Flow Control:
o Prevents the sender from overwhelming the receiver by controlling the rate of
data transmission (e.g., TCP's sliding window protocol).
5. Multiplexing and Demultiplexing:
o Allows multiple applications to use the network simultaneously by assigning
unique port numbers to each application.
6. Data Integrity:
o Ensures the accuracy and completeness of transmitted data using checksums.
7. End-to-End Delivery:
o Ensures data is delivered to the correct application on the receiving device.
Key Features of the Session Layer
1. Stateful Communication:
o Maintains session information, such as the state of the connection and data
being transferred.
2. Session Multiplexing:
o Allows multiple sessions to run concurrently between devices, distinguishing
each session using unique identifiers.
3. Synchronization Points:
o Enables recovery in long data transfers by marking specific points where a
session can resume if interrupted.
Key Features of the Presentation Layer
1. Independence from Data Representation:
o Allows devices with different internal data representations to communicate.
2. Interoperability:
o Provides a common ground for different types of systems and applications.
3. Security and Efficiency:
o Handles encryption and compression to ensure data security and efficient
communication.
Functions of the Application Layer
1. Network Services to End Users:
o Facilitates direct interaction between users and network applications.
o Examples: Email clients, web browsers, and file-sharing applications.
2. Data Exchange:
o Ensures smooth data exchange by enabling communication between
applications on different systems.
3. Resource Sharing:
o Manages shared network resources such as files, printers, and storage devices.
4. Session Management:
o Coordinates communication sessions for applications, including start,
maintenance, and termination of sessions.
5. User Authentication:
o Verifies user credentials before granting access to services or resources.
6. Error Detection and Reporting:
o Identifies and reports errors to the user or the application layer service.
7. Protocol Implementation:
o Hosts the protocols required for application-level tasks, such as HTTP for web
browsing, SMTP for email, and FTP for file transfer.

The 4-layer TCP/IP Reference Model

The 4-layer TCP/IP model is a concise and practical framework for understanding how network protocols and
data transmission work in the internet architecture. This model divides the tasks involved in data
communication into four layers, each with specific functions and protocols.

1. Network Interface Layer (Link Layer)

Function:

 Responsible for the physical connection between devices in a network.


 Manages the hardware components and defines how data is physically sent and received over the
network medium.
 Handles the addressing of data packets for delivery within a local network segment (MAC addressing).

Protocols and Technologies:

 Ethernet
 Wi-Fi (IEEE 802.11)
 ARP (Address Resolution Protocol)
 PPP (Point-to-Point Protocol)
 Frame Relay

Key Tasks:

 Framing: Encapsulating data into frames.


 Physical addressing: Using MAC addresses to ensure data is delivered to the correct device on a local
network.
 Error detection and handling: Ensuring data integrity at the frame level.

2. Internet Layer

Function:

 Responsible for logical addressing and routing of data packets across multiple interconnected networks.
 Ensures data can be transmitted across diverse networks and reach its destination.
 Manages packet switching, routing, and forwarding.

Protocols:

 IP (Internet Protocol)
o IPv4: Provides 32-bit logical addresses.
o IPv6: Provides 128-bit logical addresses to accommodate the growing number of internet-
connected devices.
 ICMP (Internet Control Message Protocol): Used for error reporting and diagnostic functions.
 ARP (Address Resolution Protocol): Resolves IP addresses to MAC addresses within a local network.
 RARP (Reverse Address Resolution Protocol): Resolves MAC addresses to IP addresses.
Key Tasks:

 Logical addressing: Assigning IP addresses to devices.


 Routing: Determining the best path for data packets to travel across networks.
 Fragmentation and reassembly: Breaking down large data packets for transmission and reassembling
them at the destination.

3. Transport Layer

Function:

 Provides end-to-end communication and ensures data is delivered reliably and accurately between
devices.
 Manages data flow control, error detection, and correction.
 Establishes, maintains, and terminates connections between applications on different devices.

Protocols:

 TCP (Transmission Control Protocol)


o Ensures reliable, ordered, and error-checked delivery of data.
o Provides flow control and congestion control mechanisms.
 UDP (User Datagram Protocol)
o Provides a connectionless, unreliable service for applications that do not require guaranteed
delivery, such as streaming and online gaming.

Key Tasks:

 Segmentation and reassembly: Dividing large data messages into smaller segments for transmission and
reassembling them at the destination.
 Connection management: Establishing and terminating connections (in the case of TCP).
 Error detection and correction: Ensuring data integrity through checksums and acknowledgments (TCP).

4. Application Layer

Function:

 Provides network services directly to end-users and applications.


 Facilitates communication between software applications and the underlying network.
 Defines protocols that specify the data format, encryption, and dialog control needed for applications to
communicate over the network.

Protocols:

 HTTP (HyperText Transfer Protocol): Used for transferring web pages.


 FTP (File Transfer Protocol): Used for transferring files between computers.
 SMTP (Simple Mail Transfer Protocol): Used for sending emails.
 DNS (Domain Name System): Translates domain names to IP addresses.
 Telnet: Used for remote login to networked devices.

Key Tasks:
 Data representation: Formatting and encoding data for communication.
 Dialog control: Managing the sessions and interactions between applications.
 Application-specific services: Providing functionalities required by specific applications, such as email,
file transfer, and web browsing.

Comparison with the OSI Model:

The OSI (Open Systems Interconnection) model is a 7-layer reference model, which is more detailed and
conceptual than the TCP/IP model. The TCP/IP model is often considered more practical and closely aligned
with real-world networking standards.

Here’s a brief comparison between the OSI and TCP/IP models:

 Network Interface (Link) Layer: Corresponds to the OSI's Data Link and Physical layers.
 Internet Layer: Maps to the OSI's Network layer.
 Transport Layer: Maps directly to the OSI's Transport layer.
 Application Layer: Corresponds to the OSI's Session, Presentation, and Application layers.

You might also like