Comparative Analysis of TCP/IP and OSI Network Models
VerifiedAdded on  2025/05/02
|8
|1560
|421
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

MITS4004
ASSIGNMENT 1
ASSIGNMENT 1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
1.......................................................................................................................................................3
2.......................................................................................................................................................3
3.......................................................................................................................................................3
4.......................................................................................................................................................4
5.......................................................................................................................................................4
6.......................................................................................................................................................4
7.......................................................................................................................................................5
8.......................................................................................................................................................5
9.......................................................................................................................................................6
10.....................................................................................................................................................6
11.....................................................................................................................................................6
12.....................................................................................................................................................7
Reference.........................................................................................................................................8
1.......................................................................................................................................................3
2.......................................................................................................................................................3
3.......................................................................................................................................................3
4.......................................................................................................................................................4
5.......................................................................................................................................................4
6.......................................................................................................................................................4
7.......................................................................................................................................................5
8.......................................................................................................................................................5
9.......................................................................................................................................................6
10.....................................................................................................................................................6
11.....................................................................................................................................................6
12.....................................................................................................................................................7
Reference.........................................................................................................................................8

1.
The TCP/IP protocol suite consists of 4 layers that are-
ï‚· Fourth Layer- It is listed as application layer in this suite.
ï‚· Third Layer- It is listed as transport layer in the suite.
ï‚· Second Layer- It is listed as network layer in the suite.
ï‚· First Layer- It is listed as physical layer in the suite.
The OSI model consists of 7 layers that are-
ï‚· Seventh Layer- It is listed as application layer in the model.
ï‚· Sixth Layer- It is listed as presentation layer in the model.
ï‚· Fifth Layer- It is listed as session layer in the model.
ï‚· Fourth Layer- It is listed as transport layer in the model.
ï‚· Third Layer- It is listed as network layer in the model.
ï‚· Second Layer- It is listed as data link layer in the model.
ï‚· First Layer- It is listed as physical layer in the model.
2.
OSI model and TCP/IP protocol suite are created and presented so that the process of
communication can be easily performed to enhance connectivity from a device to another. Both
the layered protocol bundles since specifically generated for the services of communication using
the network, their layer functionalities correlate among each other. The layers in OSI model are
more in numbers but multiple layers are merged in the TCP/IP suite to enhance performance.
The entire layers are standardized to perform similar tasks in their own model perspective. These
layers main objective is to provide support in the process of communication (Zhao et al., 2018)
The TCP/IP protocol suite consists of 4 layers that are-
ï‚· Fourth Layer- It is listed as application layer in this suite.
ï‚· Third Layer- It is listed as transport layer in the suite.
ï‚· Second Layer- It is listed as network layer in the suite.
ï‚· First Layer- It is listed as physical layer in the suite.
The OSI model consists of 7 layers that are-
ï‚· Seventh Layer- It is listed as application layer in the model.
ï‚· Sixth Layer- It is listed as presentation layer in the model.
ï‚· Fifth Layer- It is listed as session layer in the model.
ï‚· Fourth Layer- It is listed as transport layer in the model.
ï‚· Third Layer- It is listed as network layer in the model.
ï‚· Second Layer- It is listed as data link layer in the model.
ï‚· First Layer- It is listed as physical layer in the model.
2.
OSI model and TCP/IP protocol suite are created and presented so that the process of
communication can be easily performed to enhance connectivity from a device to another. Both
the layered protocol bundles since specifically generated for the services of communication using
the network, their layer functionalities correlate among each other. The layers in OSI model are
more in numbers but multiple layers are merged in the TCP/IP suite to enhance performance.
The entire layers are standardized to perform similar tasks in their own model perspective. These
layers main objective is to provide support in the process of communication (Zhao et al., 2018)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3.
The Physical layer and Application layer can be termed as the user support layer in the protocol
suite. These layers are called as such is due to their process of working and their roles in
processing communication between source and destinations. These layers help in the processes
that directly help the users in commencing communication using the network.
On the other hand, the network layer and transport layer are defined as the network support layer
in the protocol suite. Both the layers are known as such because these layers enhance the process
of communication by performing the interchanging of packets. These layers also process the
transportation of messages from the source to the destination (Zou et al., 2015, pp. 42-48).
4.
The process of data encapsulation can be described as the method in which the header files of a
communication system are enclosed within the message that is required to be transferred across
the network. In a communication process, numerous packets of data are present in which specific
headers are inserted of encapsulated. These headers are coding that contains the addresses of the
source and destination which are encoded deep within the header files. These headers specify the
address of the source and the destination by which a message is conveyed across the network to
complete the process of communication.
5.
Data link layer is the layer in which all the processing of the requests of services received from
the network layer is responded and the service requests are finally issued to the layer present
below, thus enhancing the process of servicing requests. This layer is also responsible for
encrypting of bits into the data packets before commencing transmission of data and also in
decrypting after the process of transmission. Other responsibilities of the data link layers include
control of media access, detection of errors, control of logical link and also in the addressing of
hardware present in the devices used in the process of communication (Alotaibi et al., 2017, p.
91).
The Physical layer and Application layer can be termed as the user support layer in the protocol
suite. These layers are called as such is due to their process of working and their roles in
processing communication between source and destinations. These layers help in the processes
that directly help the users in commencing communication using the network.
On the other hand, the network layer and transport layer are defined as the network support layer
in the protocol suite. Both the layers are known as such because these layers enhance the process
of communication by performing the interchanging of packets. These layers also process the
transportation of messages from the source to the destination (Zou et al., 2015, pp. 42-48).
4.
The process of data encapsulation can be described as the method in which the header files of a
communication system are enclosed within the message that is required to be transferred across
the network. In a communication process, numerous packets of data are present in which specific
headers are inserted of encapsulated. These headers are coding that contains the addresses of the
source and destination which are encoded deep within the header files. These headers specify the
address of the source and the destination by which a message is conveyed across the network to
complete the process of communication.
5.
Data link layer is the layer in which all the processing of the requests of services received from
the network layer is responded and the service requests are finally issued to the layer present
below, thus enhancing the process of servicing requests. This layer is also responsible for
encrypting of bits into the data packets before commencing transmission of data and also in
decrypting after the process of transmission. Other responsibilities of the data link layers include
control of media access, detection of errors, control of logical link and also in the addressing of
hardware present in the devices used in the process of communication (Alotaibi et al., 2017, p.
91).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

6.
Network Layer Transport layer
Processes transfer of data packets from source
to destination.
Processes transfer of the complete message
from source to destination.
Uses two functions to transfer data packets i.e.
routing and addressing.
Uses three functions to transfer the complete
message i.e. linking, segmenting, and
management of the session.
Routing defines the searching of the system to
find the destination device in which the data
packets will be sent.
Linking defines the connecting of the network
and the application. Segmenting defines the
breaking down of the long message into
fragments.
Addressing defines the finding of the
destination device in which the data will be
sent.
Management of session defines the
establishment of point-to-point connection
between the source and destination.
7.
The data link layer comprises of programs which are used in finding errors present in the
communication process. This program specifically detects errors present in the hops by using the
bits and data frames which are required to be transferred to the destination. The need for a
different mechanism to detect errors in the data layer arises due to the limitations of the program
in error detection process. Data link layer can no doubt detect errors in hops but the other errors
in this layer such as the errors in the nodes cannot be detected by the system which can result in
loss of message integrity or corruption of packets in the transmission process.
8.
The network layer is the layer that commences transmission of messages by forwarding data in
the form of packets. These packets are ensured to be delivered to the destination using various
processes. The responsibilities of this layer are to transform a logical address to physical address.
This layer is also responsible for routing and addressing the data packets that are to be
transferred to the designated destination. This layer is responsible for breaking down bigger size
Network Layer Transport layer
Processes transfer of data packets from source
to destination.
Processes transfer of the complete message
from source to destination.
Uses two functions to transfer data packets i.e.
routing and addressing.
Uses three functions to transfer the complete
message i.e. linking, segmenting, and
management of the session.
Routing defines the searching of the system to
find the destination device in which the data
packets will be sent.
Linking defines the connecting of the network
and the application. Segmenting defines the
breaking down of the long message into
fragments.
Addressing defines the finding of the
destination device in which the data will be
sent.
Management of session defines the
establishment of point-to-point connection
between the source and destination.
7.
The data link layer comprises of programs which are used in finding errors present in the
communication process. This program specifically detects errors present in the hops by using the
bits and data frames which are required to be transferred to the destination. The need for a
different mechanism to detect errors in the data layer arises due to the limitations of the program
in error detection process. Data link layer can no doubt detect errors in hops but the other errors
in this layer such as the errors in the nodes cannot be detected by the system which can result in
loss of message integrity or corruption of packets in the transmission process.
8.
The network layer is the layer that commences transmission of messages by forwarding data in
the form of packets. These packets are ensured to be delivered to the destination using various
processes. The responsibilities of this layer are to transform a logical address to physical address.
This layer is also responsible for routing and addressing the data packets that are to be
transferred to the designated destination. This layer is responsible for breaking down bigger size

data packets into smaller packets for easy transmission of the packets. Network layer is also
responsible for providing control measures in the process of data transfer such as control of
packet sequence, control of error on network layer, and control of flow on network layer.
9.
The transport layer is the layer which has the ability to transfer full messages during the process
of transmission. This layer is responsible for detecting errors in the communication process such
as in reduced flow rates of messages or when overloading of messages occurs in the nodes. This
layer is also responsible for maintaining the traffic that occurs in the communication process in
which the traffic congestion factors are determined and then processes accordingly to actively
manage the control process. This layer is also responsible for maintaining the integrity of the
data which is to be transmitted across the internet (Patel et al., 2017, pp. 67-96).
10.
The port address of an application can be stated as the port number which is used for its
addressing in the process of communication whereas the logical address of an application can be
stated as the virtual address of the application and physical address is the MAC address or the
NIC address which is used in an application for addressing of the application. The port address
determines the application based in a similar network whereas logical address is used in the
identification of a particular network from the various available networks, and physical address,
on the other hand, is used for determining the particular device that is connected to a particular
network.
11.
Application layer is the final layer of both the OSI and the TCP/IP protocol suite. This layer
provides various services among which includes the directory service in which LDAP
methodology can be used for the separating various messages after the name service. This layer
also uses the POP3 commands of message and using this service, the messages present in far-
away devices can be retrieved and stored in the near device to be processed. Application layer
responsible for providing control measures in the process of data transfer such as control of
packet sequence, control of error on network layer, and control of flow on network layer.
9.
The transport layer is the layer which has the ability to transfer full messages during the process
of transmission. This layer is responsible for detecting errors in the communication process such
as in reduced flow rates of messages or when overloading of messages occurs in the nodes. This
layer is also responsible for maintaining the traffic that occurs in the communication process in
which the traffic congestion factors are determined and then processes accordingly to actively
manage the control process. This layer is also responsible for maintaining the integrity of the
data which is to be transmitted across the internet (Patel et al., 2017, pp. 67-96).
10.
The port address of an application can be stated as the port number which is used for its
addressing in the process of communication whereas the logical address of an application can be
stated as the virtual address of the application and physical address is the MAC address or the
NIC address which is used in an application for addressing of the application. The port address
determines the application based in a similar network whereas logical address is used in the
identification of a particular network from the various available networks, and physical address,
on the other hand, is used for determining the particular device that is connected to a particular
network.
11.
Application layer is the final layer of both the OSI and the TCP/IP protocol suite. This layer
provides various services among which includes the directory service in which LDAP
methodology can be used for the separating various messages after the name service. This layer
also uses the POP3 commands of message and using this service, the messages present in far-
away devices can be retrieved and stored in the near device to be processed. Application layer
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

also uses the multipurpose internet mail extension services by which a message is structured
and is also segregated according to the formats available.
12.
In the OSI model, the session, application, and presentation layer serve various different
operations to enhance the process of message/ data packet transmission. These layers are
integrated into a single layer of the TCP/IP protocol suite to integrate performance and ability of
processing into a system. This merging of multiple layers in a single layer provides various
benefits in the communication process such as by enhancing performance and reducing time
required the process of transmission. This process also reduces the quantity of data present in
data packets to increase the speed of processing of data. Other advantages include reduced time
requirements in establishing connections between source and destination (Colin et al., 2016, pp.
1-6).
and is also segregated according to the formats available.
12.
In the OSI model, the session, application, and presentation layer serve various different
operations to enhance the process of message/ data packet transmission. These layers are
integrated into a single layer of the TCP/IP protocol suite to integrate performance and ability of
processing into a system. This merging of multiple layers in a single layer provides various
benefits in the communication process such as by enhancing performance and reducing time
required the process of transmission. This process also reduces the quantity of data present in
data packets to increase the speed of processing of data. Other advantages include reduced time
requirements in establishing connections between source and destination (Colin et al., 2016, pp.
1-6).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Reference
Alotaibi, A. M., Alrashidi, B. F., Naz, S., & Parveen, Z. (2017). Security issues in Protocols of
TCP/IP Model at Layers Level. International Journal of Computer Networks and
Communications Security, 5(5), 96.
Colin, J. Y., Mathieu, H., & Nakechbandi, M. (2016, May). A proposal for an open logistics
interconnection reference model for a Physical Internet. In 2016 3rd International Conference on
Logistics Operations Management (GOL) (pp. 1-6). IEEE.
Patel, J., Shah, S., & Dalal, U. (2017). MAC and Network Layer Issues and Challenges for IoT.
In The Internet of Things(pp. 67-96).
Zhao, J., Bai, J., Zhang, Q., Yang, F., Li, Z., Zhang, X., ... & Bai, R. (2018, December). The
Discussion about Mechanism of Data Transmission in the OSI Model. In 2018 International
Conference on Transportation & Logistics, Information & Communication, Smart City (TLICSC
2018).
Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in wireless
communications using diversity techniques. IEEE Network, 29(1), 42-48.
Alotaibi, A. M., Alrashidi, B. F., Naz, S., & Parveen, Z. (2017). Security issues in Protocols of
TCP/IP Model at Layers Level. International Journal of Computer Networks and
Communications Security, 5(5), 96.
Colin, J. Y., Mathieu, H., & Nakechbandi, M. (2016, May). A proposal for an open logistics
interconnection reference model for a Physical Internet. In 2016 3rd International Conference on
Logistics Operations Management (GOL) (pp. 1-6). IEEE.
Patel, J., Shah, S., & Dalal, U. (2017). MAC and Network Layer Issues and Challenges for IoT.
In The Internet of Things(pp. 67-96).
Zhao, J., Bai, J., Zhang, Q., Yang, F., Li, Z., Zhang, X., ... & Bai, R. (2018, December). The
Discussion about Mechanism of Data Transmission in the OSI Model. In 2018 International
Conference on Transportation & Logistics, Information & Communication, Smart City (TLICSC
2018).
Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in wireless
communications using diversity techniques. IEEE Network, 29(1), 42-48.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.