SlideShare a Scribd company logo
1 of 3
Download to read offline
The OSI Layers

Background Information

The OSI architecture was set up by the ISO (International Standards
Organization) as the first formally defined way of connecting computers. The
OSI architecture divides network functionality up into seven layers, where
various protocols implement the functionality assigned to a given layer.




The Layers

The Physical Layer
This is the first layer of standards. It’s a set of rules regarding the hardware
used to transmit data. Among items covered at this layer are the voltages
used, the timings of transmission, and the rules used for the initial
handshaking connection.


The Data Link Layer
The physical layer provides the data link layer with bits. Now this layer
provides the bits with some meaning. We no longer deal with bits but
instead with data frames - packets, containing data as well as control
information. The data link layer adds flags to indicate the start and end of
messages.

This layer’s standards perform two important tasks. It ensures that data is
not mistaken for flags, and that it checks for errors within the frame.


The Network Layer
The network layer, is concerned with packet switching. It establishes virtual
circuits (Paths between terminals) for data communications. As the sending
end, the network layer repackages messages from the transport layer above
it into data packets, so the lower layers can transmit them.


The Transport Layer
The transport layer of the OSI model has many functions, including several
order f error recognitions and recoveries. As the highest order, the Transport
layer can detect errors, identify packets that have been sent in the incorrect
order, and then rearrange them. The transport layer also regulates the
information flow by controlling the messages movements.
The Session Layer
The session layer is concerned with the management of the network. The
user communicates directly with this layer. It can verify passwords entered
by the user. It can determine who uses the network, for how long, and for
what purpose. It controls data transfers and even handles recovery from
system crashes.


The Presentation Layer
This layer is concerned with the network security, file transfers and
formatting functions. At the bit level it is capable of encoding data in a
variety of different forms including ASCII and EBCDIC.

For true Communication, both communicating computers must contain the
same protocols. This level handles protocol conversions between different
computers using different formats.


The Application layer
The application layer handles messages, remote logons and the
responsibility of network management statistics. At this level are the
database management programs, electronic mail, file server and printer
server programs. The operating systems command and response language.




OSI Vs TCP/IP

Unfortunately (for the many people and companies that spent so much time
and money on the effort), the TCP/IP suite of protocols has eclipsed OSI,
and you don't hear much about OSI anymore (except for a few applications,
such as the X.500 directory service).

When work began (in the late 1970s) on providing a standard method for
communications between different hardware platforms, TCP/IP was not
considered an option for serious commercial applications, since TCP/IP:


Required you to run UNIX (which, at the time, was not used for commercial
applications and had only a command-line user interface)

Had poor security and management features

Had too small an address size
Therefore the ISO promoted development of OSI.

Although all major (and many minor) computer vendors now have OSI
products, the OSI protocols were never widely implemented, and TCP/IP has
become the first choice for multi-vendor networking, because of its:


Lower-cost and more-efficient implementation (less CPU time required,
smaller programs)

Availability for most operating systems

Fast standardization and development cycle (usually using the Internet to
facilitate communications) when a new requirement is identified

Familiarity among college graduates (universities use TCP/IP, so once out of
school, a graduate's first choice when designing a system is to use TCP/IP)

Easier-to-access (and zero-cost) documentation and standards (they are all
available on the Internet)




OSI Translation of TCP/IP Terms

The following table shows the OSI name for the protocol, standard, or
function of the homologous TCP/IP-based networking component.

TCP/IP Abbreviation    OSI Abbreviation   OSI Full name
FTP                    FTAM               File Transfer, Access, and
                                          Management
Host                   ES                 End System
IP                     IP                 Internet Protocol
OSPF                   IS-IS              Intermediate System to
                                          Intermediate System
Router                 IS                 Intermediate System
SMTP                   X.400              ITU-T's Electronic Mail Standard
SNMP                   CMIP               Common Management
                                          Information Protocol
TCP                    CONP               Connection-oriented Protocol
TELNET                 VTS                Virtual Terminal Service
UDP                    CNLP               Connectionless Protocol

More Related Content

What's hot (20)

ELEC2 - Lecture 1
ELEC2 - Lecture 1ELEC2 - Lecture 1
ELEC2 - Lecture 1
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOL
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
Osi model
Osi modelOsi model
Osi model
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Tcp/ip
Tcp/ipTcp/ip
Tcp/ip
 
Iso model
Iso modelIso model
Iso model
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
2nd class
2nd class2nd class
2nd class
 
Protocol
ProtocolProtocol
Protocol
 
Tcp/ip model and protocol
Tcp/ip model and protocolTcp/ip model and protocol
Tcp/ip model and protocol
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 

Similar to The OSI Layers

Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) ModelNetwax Lab
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
osi model
osi modelosi model
osi modelfaizan
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsArti Parab Academics
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 

Similar to The OSI Layers (20)

Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) Model
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
osi model
osi modelosi model
osi model
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Avani
AvaniAvani
Avani
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
Osi model
Osi modelOsi model
Osi model
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

The OSI Layers

  • 1. The OSI Layers Background Information The OSI architecture was set up by the ISO (International Standards Organization) as the first formally defined way of connecting computers. The OSI architecture divides network functionality up into seven layers, where various protocols implement the functionality assigned to a given layer. The Layers The Physical Layer This is the first layer of standards. It’s a set of rules regarding the hardware used to transmit data. Among items covered at this layer are the voltages used, the timings of transmission, and the rules used for the initial handshaking connection. The Data Link Layer The physical layer provides the data link layer with bits. Now this layer provides the bits with some meaning. We no longer deal with bits but instead with data frames - packets, containing data as well as control information. The data link layer adds flags to indicate the start and end of messages. This layer’s standards perform two important tasks. It ensures that data is not mistaken for flags, and that it checks for errors within the frame. The Network Layer The network layer, is concerned with packet switching. It establishes virtual circuits (Paths between terminals) for data communications. As the sending end, the network layer repackages messages from the transport layer above it into data packets, so the lower layers can transmit them. The Transport Layer The transport layer of the OSI model has many functions, including several order f error recognitions and recoveries. As the highest order, the Transport layer can detect errors, identify packets that have been sent in the incorrect order, and then rearrange them. The transport layer also regulates the information flow by controlling the messages movements.
  • 2. The Session Layer The session layer is concerned with the management of the network. The user communicates directly with this layer. It can verify passwords entered by the user. It can determine who uses the network, for how long, and for what purpose. It controls data transfers and even handles recovery from system crashes. The Presentation Layer This layer is concerned with the network security, file transfers and formatting functions. At the bit level it is capable of encoding data in a variety of different forms including ASCII and EBCDIC. For true Communication, both communicating computers must contain the same protocols. This level handles protocol conversions between different computers using different formats. The Application layer The application layer handles messages, remote logons and the responsibility of network management statistics. At this level are the database management programs, electronic mail, file server and printer server programs. The operating systems command and response language. OSI Vs TCP/IP Unfortunately (for the many people and companies that spent so much time and money on the effort), the TCP/IP suite of protocols has eclipsed OSI, and you don't hear much about OSI anymore (except for a few applications, such as the X.500 directory service). When work began (in the late 1970s) on providing a standard method for communications between different hardware platforms, TCP/IP was not considered an option for serious commercial applications, since TCP/IP: Required you to run UNIX (which, at the time, was not used for commercial applications and had only a command-line user interface) Had poor security and management features Had too small an address size
  • 3. Therefore the ISO promoted development of OSI. Although all major (and many minor) computer vendors now have OSI products, the OSI protocols were never widely implemented, and TCP/IP has become the first choice for multi-vendor networking, because of its: Lower-cost and more-efficient implementation (less CPU time required, smaller programs) Availability for most operating systems Fast standardization and development cycle (usually using the Internet to facilitate communications) when a new requirement is identified Familiarity among college graduates (universities use TCP/IP, so once out of school, a graduate's first choice when designing a system is to use TCP/IP) Easier-to-access (and zero-cost) documentation and standards (they are all available on the Internet) OSI Translation of TCP/IP Terms The following table shows the OSI name for the protocol, standard, or function of the homologous TCP/IP-based networking component. TCP/IP Abbreviation OSI Abbreviation OSI Full name FTP FTAM File Transfer, Access, and Management Host ES End System IP IP Internet Protocol OSPF IS-IS Intermediate System to Intermediate System Router IS Intermediate System SMTP X.400 ITU-T's Electronic Mail Standard SNMP CMIP Common Management Information Protocol TCP CONP Connection-oriented Protocol TELNET VTS Virtual Terminal Service UDP CNLP Connectionless Protocol