TCP/IP and the OSI Model
In the previous chapter we were introduced to computer networks and we got to know their importance in everyday lives. In this chapter, we will look at the layered models that are used in communication over networks.
To better understand the various protocols and how they work with each other, we use layered models. A layered model shows how the protocols work at each layer as well as how the layers interact with the layers either above them or below them. The layered models that are used in modern computer networks are two; the OSI model (Open Systems Interconnection) and the TCP/IP model (Transmission Control Protocol/ Internet Protocol)
There are several benefits that to using the OSI and TCP/IP models in explaining how network protocols work and these include the following.
- Each layer in a model defines different protocols, therefore by using a layered model, network engineers can be able to define and design protocols which conform to the specific layer.
- Competitions between different vendors is increased, this is because the models define standards and therefore product superiority is not based on the use of certain protocols since all products support them.
- The layered model is useful since it allows for independence between other layers. This means that if a change in technology or capabilities is made in one layer, it will not affect another layer either above it or below it.
- Since the layered model is an open standard, it provides for conformity and interoperability between different networking devices.
The OSI model provides an extensive list of functions and services that can occur at each layer. It also describes the interaction of each layer with the layers directly above and below it.
This model was first introduced in the 1970’s. There are four categories as you can see from the output above. Network communications were first defined using this model and for successful communication to occur, the functions of each layer must be in place in a network.
From the output below, you can see the function of each and every layer of this model. The application layer, is the component that interfaces with the user, when you are using a web browser, this is a component of the application layer
The transport layer defines the various ports and helps differentiate the different types of communication from a single user. You may be sending an email, browsing and listening to internet radio on one computer. It is the work of the transport layer to differentiate the different types of communications. The transport layer also helps in interoperability between different network devices such as a PDA and a computer.
The internet layer is meant to provide the best path to remote networks, this differentiates the different devices on a network. If a message is to be sent from one computer to another on a remote network, it is the work of the internet layer to make sure the message gets to the intended recipient. You may compare the internet layer to an address you use when you want to send a letter.
The network access layer acts as an interface between the hardware and software components in the network. The application, transport and internet layers are all implemented by software, however, the network access translates the messages from these layers to a form that can be transmitted over various media such as fiber optic cables, copper wire and wirelessly.
1. At the application layer, we would create the email and this would be the data that would be communicated over the network.
2. The transport layer would then break this data into segments and add information in a process known as encapsulation.
3.The segments would then be passed down to the internet layer and encapsulated into packets, in this layer, logical addressing would be added. (more on logical addressing will be discussed later)
4.The packets would then be passed to the network access layer, the network access layer would then prepare the packets for transmission over the physical media such as fiber optic cable by converting the data to light signals.
5.When the data is received at the destination, the reverse process would happen, i.e., removal of protocol specific information – decapsulation as well as reassembly into the application data would be carried out.
6.The data would then be passed to the user. This process is illustrated below.
TCP/IP and OSI Model
- Data – the end user information, this may include, email content, website information among others. This is the information presented to the user.
- Segment – as mentioned earlier, this is the PDU at the transport layer.
- Packet – in the internetwork layer, the packets are the PDUs and they include the logical addressing for remote delivery.
- Frame – this is the form that data at the network access layer takes, there is also addressing at this layer which is physical addressing such as the MAC address.
- Bits – the form that is carried over the physical media form is Bits, these may be in many forms such as electrical signals, light signals and others.
PDUs and communication over a layered mode
The OSI model defines how messages are encoded, formatted, encapsulated, and segmented so that they can be transmitted over networks. As we mentioned earlier, the data is usually broken down into different PDUs and the layers in the OSI model define how each PDU is controlled so as to make communication successful.
Addresses are one of the ways that communication is made successful in the network. If we can use the post office analogy, you can imagine how difficult it would be if not impossible to send letters without a destination address or how difficult it would be if the recipient would not know who to reply to. The diagram below shows the various addresses that are used in communication over the network.
In this chapter, we have discussed how communication works over the layered model. We have looked at the TCP/IP and OSI reference models and how they define communication at each layer. We have also looked at the protocol data units and compared the two models. In the next chapter, we will look at the application layer.
Post By – RamCruiseWalker