• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

This report focuses on how the OSI (Open System Interconnection) and TCP/IP (Transmission Control Protocol/Internet Protocol) compare and contrast.

Extracts from this document...


TCP/IP versus OSI


This report focuses on how the OSI (Open System Interconnection) and TCP/IP (Transmission Control Protocol/Internet Protocol) compare and contrast. Beginning with the short history of evolving of both protocols, we will then define the similar stack architecture of both protocols, and then discuss the differences and similarities in their corresponding layers.

Background History:

In the late sixties the ARPA (Advanced Research Projects Agency) started to develop an experimental network, working on the principle of packet switching messaging. The aim of the project was to develop a reliable and manufacturer-independent data communications network, later called ARPANET. Its success lead to conversion of ARPANET from experimental to an operational network in 1975. By 1983 the TCP/IP protocols were adopted as Military Standards, and at about the same time the term Internet came into common usage.

In the mid-1980s, the ISO (International Standards Organisation) developed OSI (Open Systems Interconnection) reference model. This networking suite consisting of seven-layer abstract model and a set of protocols, serves as a guide for manufacturers to build compatible networking architectures.

Main Body:

...read more.


Layer-by-Layer Comparison:



Data link (Layer 2)

Network Access Layer

Physical (Layer 1)

Physical layer in the OSI model defines the physical and electrical characteristics of the hardware. It transforms binary signals into corresponding signals for the particular transmission media (electromagnetic – wires, flashes of light – fibre optics, etc.). Network Interface Card and modem run at this level. Data Link layer controls the physical layer and provides error-free data transmission from one node to another by framing a binary stream into data frames and retransmission of every frame until acknowledgement from the other end is received.

Network Access layer in TCP/IP replaces Data Link and Physical layers by treating them as one. This layer as well frames the data and sends it over the network.



Network (Layer 3)


Both Network layer in OSI and Internet layer in TCP/IP manage connections across the network, routing and addressing. OSI provides both connectionless and connection-oriented networking. That is connection-oriented protocol exchanges control information with the receiving end (handshaking)

...read more.




Application (Layer 7)


Presentation (Layer 6)

The OSI Presentation layer provides data presentation and type conversion routines. This layer is responsible for packing and unpacking of the application data, encryption/decryption and graphics expansion. The Application layer provides interfaces for the applications protocols, such as telnet, ftp, and mail.

Application layer of TCP/IP combines the functions of both the Application and Presentation layer of the OSI.


Because the OSI model was developed before the protocols were invented, it is not biased towards any of them. That makes it a general model. In contrast, the TCP/IP was just a description of already existing protocols. That makes it an applied suite for internetworking. It is relatively simple and reliable and available on virtually every hardware and operating system.


  • Heywood, D, Scrimger, R. “Networking with Microsoft TCP/IP. Certified Administrator’s Resource Edition”, New Riders Publishing, 1997
  • Parker, T et al. “TCP/IP Unleashed”, Macmillan Computer Publishing, 1996
  • Hunt, C. “TCP/IP Network Administration” (2nd Edition), O’Reilly, 1997
  • Connected: An Internet Encyclopaedia web page, 2002, http://freesoft.org/CIE/index.htm

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Introduction to Internet Report- - creating a website

    value="true" /><param name="allowscriptaccess" value="always" /><param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=16596346&server=vimeo.com&show_title=0&show_byline=0&show_portrait=0&color=00adef&fullscreen=1&autoplay=0&loop=0" /><embed src="http://vimeo.com/moogaloop.swf?clip_id=16596346&server=vimeo.com&show_title=0&show_byline=0&show_portrait=0&color=00adef&fullscreen=1&autoplay=0&loop=0" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="480" height="208"></embed></object><p></p> </p> <h4> <!--Contents of the news section--> Want a set of 15�8? Grid V wheels cheaper than ever before?</h4> <p>We?re over-stocked here at Driftworks at the moment and so a continued effort to clear some space

  2. TCP wireshark. This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The ...

    How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment? Sequence number of the SYNACK segment from gaia.cs.umass.edu to the client computer in reply to the SYN has the value of 0 in this trace.

  1. Precise analysis about The legal or illegal utilization of Internet cookies

    that without the use of cookies it is impossible for websites to distinguish someone who has just arrived from someone who has spent much time on the site. In spite of the fact that cookies can be advantageous for users, there are many unanswered questions for this research paper and also for internet users.

  2. Impact of Social Networking on e-business

    This however required technical experience. This led to organizations creating community sites for users to indulge in online activities. One of the first social network services to dominate the market was SixDegrees.com in 1997. The diagram below details out the various dates some major SNSs were launched.

  1. Network report for Middlesex University. The current network design is a star topology with ...

    and that the distribution-layer switch on the right is always HSRP primary for odd-numbered subnets (VLANs). Another way to achieve load balancing is to use Multigroup HSRP (MHSRP). With MHSRP, a single IP subnet is configured on a wiring-closet switch, but two different gateway router addresses are used.

  2. IP network design

    * Operating a Web hosting service. (4.3) * Providing content filtering abilities. (4.2, 4.3) * Providing methods of external access when requested. (4.4) * Operating a support centre for schools. (5.1) * Operating network management and monitoring. (5.2) * Providing training and advice to schools.

  1. A Research Proposal on &amp;quot;Identity Theft in Internet Technology&amp;quot;

    And make the Internet users aware of the tools, technology, and programs are available in the market to protect them from Identity theft in Internet technology. I am going make an animation website to guide the Internet users, how to use and install the tools, technology and programs to protect them from Identity theft.

  2. Precautions against internet scamming

    This can make the involved party to make large profits within a short period of time. It also involves individual selling of securities, investment funds, or annuity sales by unlicensed people. This form of internet scam affects the financial market performance of companies involved, and investors may be discouraged to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work