Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Microproject

Data Communication and


Computer Network
(DCC)
Microproject Topic

OSI reference model and


TCP/IP Model
Team Members
Sr. No. Name Roll No.

1. Madhur Madane 32

2. Kalpesh Mahale 33

3. Hrishikesh Mali 34

4. Sainath Pawar 45

5. Samarth Pawar 46
Brief Information About OSI Model
• The OSI (Open Systems Interconnection) model is a conceptual framework that describes how data communication should
take place between different systems in a network. It was developed by the International Organization for Standardization
(ISO) in the 1980s to provide a standardized way for different vendors to develop and implement networking solutions that
work together.
• The OSI model is structured as a series of seven layers, each with a specific set of functions and responsibilities. These
layers are:
1. Physical layer: This layer defines the physical and electrical characteristics of the network, such as the type of cable and the
way data is transmitted.
2. Data Link layer: This layer defines how data is framed and transmitted over the physical layer, and includes functions such
as error detection and correction.
3. Network layer: This layer is responsible for routing and forwarding data between different networks, and includes functions
such as addressing and packet switching.
4. Transport layer: This layer provides end-to-end communication between different applications or hosts, and includes
functions such as flow control and error recovery.
Brief Information About OSI Model
1. Session layer: This layer establishes, maintains, and terminates communication sessions between different applications or
hosts, and includes functions such as authentication and encryption.
2. Presentation layer: This layer formats and translates data between different formats and character sets, and includes
functions such as data compression and encryption.
3. Application layer: This layer provides a common interface between applications and the network, and includes functions
such as email, file transfer, and web browsing.
Advantages of OSI Model
1. Standardization: The OSI model is a standardized framework that helps ensure interoperability between different network
devices and software. It defines a common language and set of rules for data communication, which makes it easier for
different vendors to develop and implement networking solutions that work together.
2. Layered approach: The OSI model is structured as a series of layers, each with a specific set of functions and
responsibilities. This layered approach makes it easier to design, test, and troubleshoot complex networking systems, as
each layer can be developed and tested independently of the others.
3. Modular design: Each layer of the OSI model is designed to be independent of the others, meaning that changes or
upgrades to one layer will not affect the operation of the others. This makes it easier to add new features or technologies to
a network without having to completely overhaul the entire system.
4. Clear separation of functions: The OSI model defines clear boundaries between the different functions involved in data
communication, such as addressing, routing, and error detection. This makes it easier to identify and isolate problems when
they occur, and to implement security measures at specific layers of the network.
5. Widely accepted: The OSI model is a widely accepted standard in the networking industry, and is used as a basis for many
other networking protocols and standards. This means that knowledge of the OSI model is a valuable asset for networking
professionals, and can help facilitate communication and collaboration between different teams and organizations.
Disadvantage of OSI Model
• The Open Systems Interconnection (OSI) model is a conceptual model that describes how data communication occurs
between networked devices. While the OSI model provides a useful framework for understanding network communication,
there are some disadvantages associated with its use:
1. Complexity: The OSI model is complex, with seven layers that each have a specific function. This complexity can make it
difficult for network administrators and engineers to understand and troubleshoot problems that occur within the network.
2. Inflexibility: The OSI model is a rigid model, and network protocols must conform to its strict layering scheme. This
inflexibility can make it challenging to integrate new technologies and protocols into the network.
3. Limited practicality: While the OSI model provides a useful conceptual framework for understanding network
communication, it is not always practical in real-world situations. Many network protocols do not neatly fit into the OSI
model's seven-layer scheme, and network administrators may need to use other models or methods to effectively manage
their networks.
4. Limited adoption: While the OSI model is widely recognized as a useful framework for understanding network
communication, it has not been widely adopted in practice. Instead, most network administrators and engineers use simpler,
more practical models and methods to manage their networks.
Brief Information About TCP/IP Model
• The TCP/IP model is a networking model that describes how data is transmitted over the Internet. It consists of four layers:
the application layer, transport layer, internet layer, and network access layer.
1. Application Layer: The topmost layer of the TCP/IP model is the application layer. This layer is responsible for providing
services to the end user, such as email, file transfer, and web browsing.
2. Transport Layer: The transport layer is responsible for providing end-to-end communication services to the applications. It
ensures reliable transmission of data and provides mechanisms for flow control, error correction, and congestion control.
The most common protocols used at this layer are the Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP).
3. Internet Layer: The internet layer is responsible for addressing and routing data between different networks. It provides an
abstraction of the underlying network topology and allows data to be transmitted across multiple networks. The most
common protocol used at this layer is the Internet Protocol (IP).
4. Network Access Layer: The network access layer is responsible for providing access to the physical network. It defines
how data is transmitted over a particular physical medium, such as Ethernet, Wi-Fi, or fiber optic. The most common
protocols used at this layer are Ethernet, Wi-Fi, and Token Ring.
Advantages Of TCP/IP Model
• The TCP/IP (Transmission Control Protocol/Internet Protocol) model is a communication protocol suite that is used for
communication between networked devices. Here are some advantages of the TCP/IP model:
1. Robustness: TCP/IP is a robust protocol suite that is designed to withstand a wide range of network issues, such as data
loss, packet corruption, and congestion.
2. Flexibility: TCP/IP is a flexible protocol suite that is capable of supporting a wide range of network topologies, including
LAN, WAN, and wireless networks.
3. Scalability: TCP/IP is a scalable protocol suite that can be easily adapted to support large and complex networks.
4. Compatibility: TCP/IP is a widely adopted protocol suite that is compatible with a wide range of operating systems and
devices, making it easy to integrate into existing networks.
5. Security: TCP/IP includes a range of security features, such as encryption and authentication, which can help to protect
against cyber attacks and unauthorized access.
6. Open Standards: TCP/IP is based on open standards, which means that it is freely available for use and development by
anyone, without the need for licensing fees or proprietary software.
Disadvantages Of TCP/IP Model
• While the TCP/IP (Transmission Control Protocol/Internet Protocol) model has many advantages, it also has some
disadvantages, which include:
1. Complexity: The TCP/IP model is a complex protocol suite that can be difficult to understand and implement, especially
for novice network administrators.
2. Lack of Quality of Service (QoS) Guarantee: TCP/IP does not provide any guarantee for Quality of Service (QoS), which
means that it is not well-suited for real-time applications such as voice and video calls.
3. Limited security: Although TCP/IP includes some security features, it is not inherently secure and can be vulnerable to
various cyber attacks such as IP spoofing, DDoS, and packet sniffing.
4. Limited Error Handling: TCP/IP relies on error detection rather than error correction, which means that it can sometimes
result in the loss of data or retransmission of packets.
5. Limited Multicasting Support: TCP/IP has limited support for multicasting, which can be a limitation in some network
applications.
6. Limited Network Management Features: TCP/IP lacks some network management features such as congestion control and
flow control, which can lead to network congestion and degradation of network performance.

You might also like