We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
Differences between OSI Model and TCP/IP Model
Parameters
Full Form
Layers
Usage
‘Approach
Detivery
Replacement
Reliability
OS! Model
OSI stands for Open Systems
Interconnection,
Ithas 7 layers,
It is Low in usage.
itis vertically approached,
Delivery of the package is guaranteed in
OSI Mode.
Replacement of tools and changes can
‘easily be done in this model.
It is tess reliable than TCP/IP Model.
TCP/IP Model
TCPIIP stands for Transmission Contrat
Protocol/Internet Protocol.
Ithas 4 layers
It is mostly used
It is horizontally approached.
Delivery of the package is not
guaranteed in TCP/IP Model.
Replacing the tools is not easy as it isin
OSI Model.
It is more reliable than OS! Model‘Geeusrortoeks. ee GeekstorGeekas promecy pORCY
Functions of the Data-link Layer ra Tamactsenee
“Thore are various benefits of data Unk layer s et’ lock intoit
ewer Layer
pose
ata tnk Layer
[aeiiaieiilinae
=
Physica tayer
Framing
“The packet received rom the Nanwatklavar is known 35a fame inthe Data ink ayer. At the cender's
side, DLL receives packets fom the Netwark layer and evides them nta small frames then, sends each
frame bit-by-bit the physical ava. algo staches some spec bts (or erorcontrl and addressing)
tthe header and end ofthe frame, At the receives end, DLL takes bits fom the Physical Laver organizes
‘them into te fame, and sends them tothe Network Laer.
Addressing
“The data ink ayer encapsulates the source and dectination’s MAC aditeza/ physical address in the
header of each frame to ensure red: to:node delivery MAC sess is the unique hardware adress that
in assigned tothe device while manectuing
Error Controt
Data can get corrupted du to various reazons like nose attenuation ete. So, tis the responsibilty ofthe
‘data tink Layer, to detec the errr the tranemnitted data and corec it using sor detection and
catuactan techniques respectively DLL adds error detection bits ints the frame's header, so that reciver
‘con check received data is correct or aot kad reliably to phyiscal layer by adding mechansims to
detect and vevancinit damaged or ast frames
Flow Control
Woe receivers receiving peed i lower than the sender's sending speed, then this can ead Wo an
‘vertiow inthe recive’ burr and some frames may gt Lost. Sit’ the responsibility of DLLto
smchronize the sanders and resive's ceds and establish low contol betwecn them
Access Control
When multe devices share the same communication channel there a high rababity of collision, so
isthe responsibilty of DLL to check which device has contol over the channel and CSMAJCO ond
(CSMA/CA canbe use ta avoid cllsions and loss of ames inthe channelServices Offered by Network Layer
Receiver
‘Teafie Source
with shaper
2-Rowting3. Forwarding
Forwarding is simply defined as the action applied by each router when a packet arrives at one of its
interfaces. When a router receives a packet from one of its attached networks, it needs to forward the
packet to another attached network (unicast routing) or to some attached networks (in the case of
multicast routing). Routers are used on the network for forwarding a packet from the local network to the
remote network. So, the process of routing involves packet forwarding from an entry interface out to an
exit interface.What is UDP (User Datagram Protocol)?
User Datagram Protocol (UDP) |s a communications protocol for time-sensitive applications like gaming, playing videos, or Domain
Name System (ONS) lookups. UDP results in speedier communication because it does not sprend time forming a firm connection with
the destination betore transferring the data, Because establishing the connection takes time, eliminating this step results in faster
data transfer speeds.
However, UDP can also cause data packets to get lost as they go from the source to the destination. It can also make it relatively easy
for a hacker to execute a distributed denial-of-service (DDos) attack,
In many cases, particularly with Transmission Control Protocol (TOP), when data is transferred across the internet, it not only has to
be sent from the destination but also the receiving end has to signal that itis ready for the data to arrive, Once both of these aspects
of the communication are fulfilled, the transmission can begin. However, with UDP, the data is sent before a connection has been
firmly established, This can result in problems with the data transfer, and it also presents an opportunity for hackers who seek to
‘execute DDOS attacks.