Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (2024)

Contents

  • TCP/IP Five-Layer Software Model
    • Basic Needs for TCP/IP Communication
    • TCP/IP Five-Layer Software Model Overview
    • TCP/IP Five-Layer Model
    • Transmit Data Using Network Layers
    • Terminology Reference
  • Common TCP/IP Applications
    • Dynamic Host Configuration Protocol (DHCP)
    • DNS (Domain Name System)
    • Hypertext Transfer Protocol (HTTP)
    • NetBIOS Name Service (NBNS)
    • Simple Mail Transfer Protocol (SMTP)
    • Simple Network Management Protocol (SNMP)
    • Simple Network Time Protocol (SNTP)
    • Telnet (Bi-directional Serial Text Communication)
    • Trivial File Transfer Protocol (TFTP)
  • Learn More

TCP/IP Five-Layer Software Model

Basic Needs for TCP/IP Communication

Some of the applications we use require us to move data across a network from point A to point B. The Transmission Control Protocol/Internet Protocol (TCP/IP) network provides a framework for transmitting this data, and it requires some basic information from us to move this data.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (1)

We need to specify if we want the most reliable or fastest transmissions and we need to specify where we want the data delivered. Sometimes our data is routed based on itsIP addressesand sometimes it's routed based on itsMAC address. The data we send needs both addressing capabilities. This information needs to be sent along with all transmitted data. We also need to physically transmit the data from one location to another.

Back to top

TCP/IP Five-Layer Software Model Overview

We need to provide this basic information needed by TCP/IP in a standard format the network can understand. This format is provided by its five-layer software model.

Each layer provides TCP/IP with the basic information it needs to move our data across the network. These layers group functions according to the task that needs to be performed. Every function in this model is targeted to help a specific layer perform its job.

Each layer only communicates with adjacent layers. Software running in a higher layer does not have to know about or perform tasks delegated to lower-layer functions and vice versa. For example, the software you write for your application only needs to know how to request a connection with a remote host using theTransport layer. It doesn’t need to know how bits are encoded before transmission. That’s thePhysical layer’sjob.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (2)

​You are probably familiar with theseven-layer OSI model. TCP/IP simplifies this model to five layers. OSI stands for Open Systems Interconnect, which is a standard communication systems model. The top four layers of the seven-layer OSI model have been condensed into the top two TCP/IP layers.

Back to top

TCP/IP Five-Layer Model

Application Layer (Layer 5)

As you might have guessed, theApplication layeris where applications requiring network communications live. Examples of these applications include email clients (SMTP) and web browsers (HTTP). These applications use the Transport Layer to send requests to connect to remote hosts.

Common TCP/IP applications >

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (3)

Back to top

Transport Layer (Layer 4)

Layer 4 is theTransportlayer. The transport layer creates virtual Transfer Control Protocol (TCP) or User Datagram Protocol (UDP) connections between network hosts.

This layer sends and receives data (packets) to and from theapplicationsrunning on its host. The Transport layer assignsportnumbers to the processes running in applications on the host and adds a TCP or UDP header to the messages received from the applications detailing the source and destination port numbers.

Note that some of the applications, specifically Telnet, SMTP, and HTTP require TCP as the transport protocol while others use UDP.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (4)

Someapplicationsrequire reliable ordered delivery ofpackets. The TCP protocol provides this capability. It uses error detection, retransmissions and acknowledgments. This protocol cares about your data.

Other applications don’t care if every packet is received. These applications can take advantage of UDP’s lower overhead to enable faster transmissions.

Typical TCP applications include email and web browsing and typical UDP applications include VoIP and music streaming.

TCP is strictly used for point-to-point or unicast transmissions while UDP can also be used for multicast and broadcast transmissions.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (5)

For more information on TCP, visit the "Transmission Control Protocol" page.
For more information on UDP, visit the "User Datagram Protocol"page

Back to top

TCP and UDP Headers

The header added to messages by the Transport layer includes more than just the source and destinationportnumbers. Here we are showing all the information included in TCP and UDP headers.

Note how the TCP protocol requires more information and overhead to guarantee data delivery.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (6)

Back to top

Network Layer (Layer 3)

Layer 3 is theNetworkorInternetlayer.

When transmitting data (packets), this layer adds a header containing the source and destinationIP addressesto the data received from theTransport layer. The packet it creates will then be forwarded to theMAC or Data Link layer.

When receiving data, this layer is used to determine if the packet received by the host contains the host’s IP address. If it does, the data is forwarded up to the Transport layer.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (7)

Routersare referred to as “layer 3” devices because they route packets based on their IP addresses.

Back to top

TCP/IP IPv4 Packet Header

The Network layer header includes more than just the source and destinationIP addresses.
Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (8)

Back to top

Data Link Layer (Layer 2)

Layer 2 is theData Linklayer. This layer uses aMedia Access Controller (MAC)to generate the frames that will be transmitted. As the name suggests, the MAC controls the physical transmission media. The wireless transmission media used forWi-Fi®or 802.11 has different requirements from the wired transmission media used forEthernetor 802.3, and therefore needs a different MAC andPHY. Note the upper layer software is not aware of or affected by the physical interface.

When transmitting data, this layer adds a header containing the source and destination MAC addresses to thepacketreceived from theNetwork layer(layer 3). The frame it creates will then be forwarded to thePhysical layer.

When receiving data, this layer is used to determine if the frame received by the host contains the host’sMAC address. If it does, the data is forwarded up to the Network layer.

Every host on the network has at least one MAC address. Laptops typically have two, one for the wired LAN and one for the wireless LAN. Home routers also typically have two MACs: one for the local network and one for the Internet.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (9)

​Mostswitchesare referred to as “layer 2” devices because they route frames based on their MAC addresses.

Back to top

Ethernet and Wi-Fi® Frame Format

As you probably guessed, the Data Link layer adds more than just the source and destination MAC addresses to thepacket. Note that the MAC for Ethernet and Wi-Fi are different and generate different frames.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (10)

​For more information on Ethernet frames, visit the "Ethernet frame" page.
For more information on Wi-Fi frames, visit the "How 802.11 Wireless Works" page.

Back to top

Physical Layer (Layer 1)

Layer 1 is thePhysicallayer. It sends and receives signals on the physical wire or antenna to transmit the bits found inframes.

There is a PHY found at the end of every network interface (e.g., end of wire or antenna).

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (11)

Back to top

Transmit Data Using Network Layers

Now that we know the primary job of each layer, let’s see how they work together to send and receive data across a TCP/IP network.

This is a simplified view of how the network layers work together to generate frames. Higher layers pass information to lower layers. Each layer adds information called a header to the data being passed to it. This header contains information the layer needs to perform its job. We will start at the Application layer.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (12)

Back to top

Data Flow (Transmitting Data)

To send and receive data across a TCP/IP network, data is passed to each lower layer, which will add to the data until the full packet is formed. This is a simplified view of how the network layers work together to generate frames. Higher layers pass information to lower layers. Each layer adds information called a header to the data being passed to it. This header contains information the layer needs to perform its job.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (13)

  • Application Layer
    • The Application layer generates a message. In this case, the specific application is a web browser requesting a webpage download. This message is then sent to the Transport layer.
  • Transport Layer
    • The Transport layer adds the TCP or UDP header which includes the source and destination port addresses. Additional information like the packet sequence number used for TCP will also be added to the header. The data generated by the transport layer is referred to as a Segment if TCP is used, and is referred to as a Datagram if UDP is used. This segment is then sent to the Network layer.
  • Network Layer
    • The Network layer adds a header including the source and destination IP address to generate a packet. This packet is then sent to the Data Link layer.
  • Data Link Layer
    • The Data Link layer adds a header containing the MAC address information to create a frame. The frame is then sent it to the Physical layer to transmit the bits.

Back to top

Data Flow (Receiving Data)

When receiving data, the network layers act as filters.

When the frame is received in the Data Link layer, the destination MAC address is compared with its own. If the data received is not intended for that host, it is immediately discarded. If it matches, the header is stripped and the payload, which in this case is a packet, is forwarded up to the next layer. Here, the Network layer checks if the destination IP address matches its own. If it matches, the header is stripped and the payload is forwarded up to the next layer. Here, the Transport layer checks to determine if there is a process running on the host with a destination port number of 80, which is the case. So, the header is stripped and the message is sent to process number 80 in the Application layer. Process number 80 is a function running in the HTTP server. This completes the message transmission process from one application to another.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (14)

Back to top

Terminology Reference

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (15)

Back to top

Common TCP/IP Applications

Dynamic Host Configuration Protocol (DHCP)

The dynamic host configuration protocol (DHCP) is the application responsible for requesting and offeringIP addresses. A DHCPclientautomatically requests an IP address from a DHCPserverwhen a network is detected. A DHCP server typically runs in arouterand offers IP addresses to DHCP clients.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (16)

Back to top

DNS (Domain Name System)

A Domain Name System(DNS)enables us to browse a website by providing the website or domain name instead of the website’sIP address.

It maps domain names to IP addresses. A network host needs the IP address (not the domain or hostname) of the webserver to generate a packet.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (17)

Back to top

Hypertext Transfer Protocol (HTTP)

The Hypertext Transfer Protocol (HTTP) is the most commonly used TCP/IP application as it transfers web pages from a web server to a web browser.

Web pages are written using HTML, which stands for Hypertext Markup Language. In other words, the HTTP is used to transfer HTML files.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (18)

Back to top

NetBIOS Name Service (NBNS)

NBNS stands for NetBIOS Name Service. It is used to translate host names on a local network to localIP addresses. This is similar to whatDNSdoes on the Internet.

In this example, the name “Board_A” has been assigned to a network host. NBNS allows us to access this host by typing its host name into a browser instead of typing its IP address. It maps host names to IP addresses.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (19)

Back to top

Simple Mail Transfer Protocol (SMTP)

Your embedded device can be configured to send emails. SMTP would be used for this.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (20)

Back to top

Simple Network Management Protocol (SNMP)

SNMP stands for Simple Network Management Protocol which manages network devices. It is primarily used to monitor network devices for conditions that may need a user's attention.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (21)

Simple Network Time Protocol (SNTP)

SNTP stands for Simple Network Time Protocol, which is a service that provides the time of day to network devices. Typical accuracy is in the range of hundreds of milliseconds.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (22)

Back to top

Telnet (Bi-directional Serial Text Communication)

Telnet is an application that enables bi-directional text communication via a terminal application likeHyperTermorTera Term.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (23)

Back to top

Trivial File Transfer Protocol (TFTP)

TFTP is used to transfer files on a local network. It can be used to update firmware on an embedded device with a boot loader.

TFTP is a stripped-down version of FTP. TFTP has no provisions for security, so it is only used on local networks. Files are transferred in blocks of 512 bytes with a maximum file transfer size of 4GB.

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (24)

Learn More

  • All TCP/IP Protocol Suite topics
  • Introduction to TCP/IP (Part 3) - Client Server Model

Back to top

Introduction to TCP/IP (Part 2) - Five Layer Model and Applications (2024)

FAQs

What are the 5 layers of the TCP/IP model? ›

Each host that is involved in a communication transaction runs a unique implementation of the protocol stack.
  • Physical Network Layer. The physical network layer specifies the characteristics of the hardware to be used for the network. ...
  • Data-Link Layer. ...
  • Internet Layer. ...
  • Transport Layer. ...
  • Application Layer.

What is the TCP IP model introduction? ›

The TCP/IP model defines how devices should transmit data between them and enables communication over networks and large distances. The model represents how data is exchanged and organized over networks.

What is Layer 2 of the TCP IP model? ›

Layer 2 (Data Link) receives packets from Layer 3. Whereas Layer 4 performs logical addressing (IPv4, IPv6), Layer 2 performs physical addressing.

What is the application of TCP IP model? ›

Application/Uses of TCP/IP

File Transfer Protocol(FTP): It is used for sending large files. Dynamic Host Configure Protocol(DHCP): It assigns the IP address. Telnet: Bi-directional text communication via a terminal application. HyperText Transfer Protocol(HTTP): Used to transfer the web pages.

What is TCP IP for dummies? ›

TCP/IP allows computers on the same network to identify and communicate with each other. TCP/IP is a two-layer protocol, with the transport layer (TCP) responsible for reliable end-to-end communication and the Internet layer (IP) accountable for routing packets from the host to the host.

What is the application layer of TCP IP? ›

The application layer is responsible for providing the interface between the user or the application and the network. It handles the formatting, encoding, and presentation of data, as well as the authentication, encryption, and error detection of messages.

Why is TCP/IP important? ›

TCP/IP allows communication between a number of computers (called hosts) connected on a network. Each network can be connected to another network to communicate with hosts on that network.

Why is it called TCP IP model? ›

It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard.

What are layer 2 examples? ›

Two major examples of layer 2 solutions are the Bitcoin Lightning Network and the Ethereum Plasma. Despite having their own working mechanisms and particularities, both solutions are striving to provide increased throughput to blockchain systems.

What is the layer 2 protocol used for? ›

The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer.

What does TCP stand for? ›

Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between devices on a network. It defines how to establish and maintain a network conversation by which applications can exchange data.

What is a real life example of TCP IP model? ›

Example: Download a Webpage From the Internet. Let's observe the first TCP/IP transactions that enable a local host to download a webpage from the Internet. Before continuing through this example, you should be familiar with local network TCP/IP communication, and how DNS servers and NAT work.

What applications is TCP used for? ›

What are TCP and UDP used for? TCP is best used for direct communication in which a reliable connection is needed, such as web browsing, email, text messaging, and file transfers. UDP is best used for live and real-time data transmission when speed is more important than reliability.

What is the introduction of TCP IP? ›

TCP/IP is a data link protocol used on the internet to let computers and other devices send and receive data. TCP/IP stands for Transmission Control Protocol/Internet Protocol and makes it possible for devices connected to the internet to communicate with one another across networks.

How many layers are there in the TCP IP model 5 4 8 2? ›

The four layers of the TCP/IP Model include the Network Access Layer, Internet Layer, Host to Host Layer, and Application Layer. A collection of four-layered communication protocols is the TCP/IP Reference Model. The Department of Defense (DOD) created it in the 1960s.

What are the 4 layers of the TCP IP model and 7 layers of the OSI model? ›

From lowest-level to highest-level they are:
  • #1. The Physical Layer.
  • #2. The Data Link Layer.
  • #3. The Network Layer.
  • #4. The Transport Layer.
  • #5. The Session Layer.
  • #6. The Presentation Layer.
  • #7. The Application Layer.

Which is thought of as a five layer model? ›

TCP/IP Five-Layer Software Model Overview

Each layer provides TCP/IP with the basic information it needs to move our data across the network. These layers group functions according to the task that needs to be performed. Every function in this model is targeted to help a specific layer perform its job.

What is the first layer of the TCP/IP model? ›

The first layer of them all is the data link layer and here's where all the physical parts that are part of the information transfer and connection to the network are located. That is to say, the wireless network, the Ethernet cable, the controller, the network interface card...

Top Articles
Ethereum Transactions - Pending, Mined, Dropped & Replaced
How to Buy xrp | KuCoin
Craigslist Free En Dallas Tx
Metallica - Blackened Lyrics Meaning
Jonathon Kinchen Net Worth
Free Atm For Emerald Card Near Me
Coindraw App
Coffman Memorial Union | U of M Bookstores
<i>1883</i>'s Isabel May Opens Up About the <i>Yellowstone</i> Prequel
Lycoming County Docket Sheets
Corporate Homepage | Publix Super Markets
Bill Devane Obituary
[2024] How to watch Sound of Freedom on Hulu
Pwc Transparency Report
Flights To Frankfort Kentucky
Dallas’ 10 Best Dressed Women Turn Out for Crystal Charity Ball Event at Neiman Marcus
Craigslist Blackshear Ga
Nashville Predators Wiki
Dumb Money, la recensione: Paul Dano e quel film biografico sul caso GameStop
Vrachtwagens in Nederland kopen - gebruikt en nieuw - TrucksNL
Is The Yankees Game Postponed Tonight
Tyler Sis University City
Grimes County Busted Newspaper
Rimworld Prison Break
Horn Rank
Sam's Club Gas Price Hilliard
Bleacher Report Philadelphia Flyers
Hrconnect Kp Login
Things to do in Pearl City: Honolulu, HI Travel Guide by 10Best
Srjc.book Store
1964 Impala For Sale Craigslist
Why comparing against exchange rates from Google is wrong
Kempsville Recreation Center Pool Schedule
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
Att U Verse Outage Map
Gerber Federal Credit
Atlantic Broadband Email Login Pronto
October 31St Weather
2008 Chevrolet Corvette for sale - Houston, TX - craigslist
Henry County Illuminate
Brandon Spikes Career Earnings
Best Restaurants West Bend
Craigslist Food And Beverage Jobs Chicago
The Sports Academy - 101 Glenwest Drive, Glen Carbon, Illinois 62034 - Guide
Cult Collectibles - True Crime, Cults, and Murderabilia
How to Do a Photoshoot in BitLife - Playbite
Goosetown Communications Guilford Ct
Amourdelavie
Leslie's Pool Supply Redding California
Elizabethtown Mesothelioma Legal Question
Emmi-Sellers
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6405

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.