Home » » OSI Model vs TCP/IP Model in Cyber Security

OSI Model vs TCP/IP Model in Cyber Security

 OSI Model vs TCP/IP Model in Cyber Security

Cyber security is the practice of protecting networks, systems, devices, and data from unauthorized access, malicious attacks, or damage. Cyber security relies on various methods and techniques to ensure the confidentiality, integrity, and availability of information. One of the fundamental aspects of cyber security is the use of network communication models, which define how data is transmitted and processed over the internet.

Two of the most widely used network communication models are the OSI model and the TCP/IP model. These models provide a conceptual framework for understanding how different layers of network communication work together to enable data exchange between different devices and applications. In this article, we will compare and contrast the OSI model and the TCP/IP model in terms of their history, structure, functions, advantages, and disadvantages.

History of OSI Model and TCP/IP Model

The OSI model stands for Open Systems Interconnection. It was developed in 1984 by the International Organization for Standardization (ISO) as a universal reference model for network communication. The OSI model was designed to facilitate interoperability and compatibility between different network systems and protocols. The OSI model is also known as the ISO/IEC 7498-1 standard1.

The TCP/IP model stands for Transmission Control Protocol/Internet Protocol. It was developed in the 1970s by the Advanced Research Projects Agency Network (ARPANET), which was a precursor to the modern internet. The TCP/IP model was created to address specific communication challenges and requirements of the ARPANET project, such as packet switching, error control, and routing. The TCP/IP model is also known as the Internet Protocol Suite2.

Structure of OSI Model and TCP/IP Model

The OSI model consists of seven layers, each of which performs a specific set of functions to enable network communication. The seven layers are:

  • Application layer: This layer provides services and interfaces for user applications, such as web browsers, email clients, file transfer programs, etc. It also handles issues such as authentication, encryption, compression, and formatting of data.
  • Presentation layer: This layer ensures that data is presented in a compatible and understandable format for different applications and systems. It also performs functions such as data translation, encryption, decryption, compression, decompression, etc.
  • Session layer: This layer establishes, maintains, and terminates sessions between different applications and devices. It also manages issues such as synchronization, dialogue control, recovery, etc.
  • Transport layer: This layer provides reliable and efficient data transfer between different devices and applications. It also performs functions such as segmentation, reassembly, error detection, error correction, flow control, congestion control, etc.
  • Network layer: This layer handles the routing and forwarding of data packets across different networks and devices. It also performs functions such as addressing, fragmentation, reassembly, error handling, etc.
  • Data link layer: This layer provides physical access to the network medium and ensures reliable data transmission over it. It also performs functions such as framing, error detection, error correction, flow control, etc.
  • Physical layer: This layer defines the physical characteristics and specifications of the network medium and devices. It also performs functions such as modulation, demodulation, encoding, decoding, signaling, etc.

The TCP/IP model consists of four layers, each of which corresponds to one or more layers of the OSI model. The four layers are:

  • Application layer: This layer provides services and interfaces for user applications that use the internet protocol suite. It includes protocols such as HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol), DNS (Domain Name System), etc.
  • Transport layer: This layer provides reliable and efficient data transfer between different devices and applications that use the internet protocol suite. It includes protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
  • Internet layer: This layer handles the routing and forwarding of data packets across different networks and devices that use the internet protocol suite. It includes protocols such as IP (Internet Protocol), ICMP (Internet Control Message Protocol), ARP (Address Resolution Protocol), etc.
  • Network access layer: This layer provides physical access to the network medium and ensures reliable data transmission over it using various standards and protocols. It includes protocols such as Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), Bluetooth (IEEE 802.15), etc.

Functions of OSI Model and TCP/IP Model

The OSI model and the TCP/IP model perform similar functions to enable network communication but in different ways. The main differences between them are:

  • The OSI model is a theoretical and abstract model that defines network communication in a general way without relying on specific protocols or standards. The TCP/IP model is a practical and concrete model that addresses specific communication challenges and requirements using standardized protocols and standards.
  • The OSI model is a protocol-independent model that can accommodate various network communication methods and technologies. The TCP/IP model is a protocol-dependent model that uses a specific set of protocols that are widely adopted by the internet community.
  • The OSI model is a layered model that separates multiple functions into different layers. The TCP/IP model is a simplified model that groups some functions into single layers. For example, the application layer of the TCP/IP model encompasses the functions of the application, presentation, and session layers of the OSI model. Similarly, the network access layer of the TCP/IP model encompasses the functions of the data link and physical layers of the OSI model.
  • The OSI model is a connection-oriented model that supports both connection-oriented and connectionless services. The TCP/IP model is a hybrid model that supports both connection-oriented and connectionless services at different layers. For example, TCP is a connection-oriented protocol that provides reliable data transfer, while UDP is a connectionless protocol that provides fast data transfer.

Advantages of OSI Model and TCP/IP Model

Both the OSI model and the TCP/IP model have their own advantages and disadvantages. Some of the advantages of each model are:

  • The OSI model is a flexible and comprehensive model that can support various network communication methods and technologies. It also provides a common reference for network communication and facilitates interoperability and compatibility between different network systems and protocols.
  • The TCP/IP model is a robust and scalable model that can handle various communication challenges and requirements. It also provides a common platform for network communication and enables the development and evolution of the internet.

Disadvantages of OSI Model and TCP/IP Model

Some of the disadvantages of each model are:

  • The OSI model is a complex and challenging model to implement and maintain. It also suffers from some limitations and inefficiencies due to its rigid structure and design. For example, some functions are duplicated or unnecessary in some layers, while some functions are missing or inadequate in some layers.
  • The TCP/IP model is a less secure and less reliable model than the OSI model. It also suffers from some inconsistencies and ambiguities due to its historical development and adaptation. For example, some protocols are outdated or obsolete, while some protocols are overlapping or conflicting.

Conclusion

The OSI model and the TCP/IP model are two different ways of describing how network communication works. Both models have their own strengths and weaknesses, and both models are useful for understanding and analyzing network communication. However, neither model is perfect or complete, and both models are subject to change and improvement over time. Therefore, it is important to keep an open mind and learn from both models to enhance one’s knowledge and skills in cyber security.

0 comments:

Post a Comment

Office/Basic Computer Course

MS Word
MS Excel
MS PowerPoint
Bangla Typing, English Typing
Email and Internet

Duration: 2 months (4 days a week)
Sun+Mon+Tue+Wed

Course Fee: 4,500/-

Graphic Design Course

Adobe Photoshop
Adobe Illustrator

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 8,500/-

Web Design Course

HTML 5
CSS 3

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 8,500/-

Video Editing Course

Adobe Premiere Pro

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 9,500/-

Digital Marketing Course

Facebook, YouTube, Instagram, SEO, Google Ads, Email Marketing

Duration: 3 months (2 days a week)
Fri+Sat

Course Fee: 12,500/-

Advanced Excel

VLOOKUP, HLOOKUP, Advanced Functions and many more...

Duration: 2 months (2 days a week)
Fri+Sat

Course Fee: 6,500/-

Class Time

Morning to Noon

1st Batch: 08:00-09:30 AM

2nd Batch: 09:30-11:00 AM

3rd Batch: 11:00-12:30 PM

4th Batch: 12:30-02:00 PM

Afternoon to Night

5th Batch: 04:00-05:30 PM

6th Batch: 05:30-07:00 PM

7th Batch: 07:00-08:30 PM

8th Batch: 08:30-10:00 PM

Contact:

Alamin Computer Training Center

796, West Kazipara Bus Stand,

West side of Metro Rail Pillar No. 288

Kazipara, Mirpur, Dhaka-1216

Mobile: 01785 474 006

Email: alamincomputer1216@gmail.com

Facebook: www.facebook.com/ac01785474006

Blog: alamincomputertc.blogspot.com

Contact form

Name

Email *

Message *