Posted on 2012-08-24
Last Modified: 2014-06-23
Could anyone give me an in depth explanation of the differences between the OSI model and the TCP-IP system, I understand that the OSI model has 2 extra layers but is only theoretical.
Question by:NoDependencies
    LVL 35

    Expert Comment

    by:Ernie Beek
    Simply put:

    The three top layers in the OSI model—the application layer, the presentation layer and the session layer—are not distinguished separately in the TCP/IP model where it is just the application layer

    Have a look at:
    LVL 50

    Expert Comment

    by:Don Johnston
    And the "Network Access" layer in the TCP model is represented by the "Physical" and "Data Link" layer in the OSI model.
    LVL 35

    Expert Comment

    by:Ernie Beek
    Ooops, forgot that one :-~
    LVL 6

    Expert Comment

    That link is pretty much a decent web overview. Both the OSI and the TCP/IP models have entire books dedicated to them so to get a full in depth review here from someone is a big ask. If you want to look in to it in greatest detail, then purchasing a book on a networking overview would be a better idea. This was a pretty good overview title and this gives more focus on TCP/IP
    LVL 38

    Accepted Solution

    Don't make this too difficult for yourself:

    TCP models were for network troubleshooting. So, anything happening on the end node (computer) was all encompassed into one layer.

    OSI broke the computer's responsibilities to be a more graphical and fluid with how a packet is really created. OSI is a way to see how packets are formed and then networked out. It's much better, because if you look at a wireshark packet capture, you can see the additional layers within the packet. OSI model is used for packet generation and networking. It's THE model you should get familiar with because it breaks down start to finish of trafficking data.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Suggested Solutions

    This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now