0% found this document useful (0 votes)
73 views9 pages

Protocols Notes A Level

Protocols are essential rules for data transmission that ensure compatibility and standardization between different devices and platforms. The document details various protocols, including TCP/IP, HTTP, FTP, and email protocols like SMTP and IMAP, explaining their functions and the layers involved in data transmission. It also contrasts packet switching and circuit switching, highlighting their advantages and disadvantages in network communications.

Uploaded by

Trynos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views9 pages

Protocols Notes A Level

Protocols are essential rules for data transmission that ensure compatibility and standardization between different devices and platforms. The document details various protocols, including TCP/IP, HTTP, FTP, and email protocols like SMTP and IMAP, explaining their functions and the layers involved in data transmission. It also contrasts packet switching and circuit switching, highlighting their advantages and disadvantages in network communications.

Uploaded by

Trynos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

14.

1 Protocols
Protocols are a set of rules for data transmission which are agreed by the sender and receiver.
i.e. sets of rules which computers make use of when they communicate over a network. A network
communication protocol is a standard method for transmitting data from one computer to another
across a network

Reason for using protocols / why protocols is needed


- Protocols set a standard for communication
- Protocols enable communication/compatibility between devices from different manufacturers/
platforms
- If two devices were sending messages to each other but using different protocols, they would
not be able to communicate properly
- All data is sent and received using the same rules
- All data is sent and received using the same formats
- The communication is independent of the software used
- The communication is independent of the hardware used
Many different protocols exist since there are several activities taking
place over the internet.
TCP/IP protocols
TCP/IP Protocols is one of the most common sets of protocols, which are
implemented by using a stack structure with several layers.

Using layers breaks the process down into manageable self-contained


modules (this process is known as decomposition), making it easier to
develop and easier to make software and hardware compatible.
When sending data across the internet (network), the layers are used in
the order layer 4 to layer 1; when receiving data across the internet
(network), the layers are used in the order layer 1 to layer 4. Each of the
layers is implemented using software.

1|Page
A protocol stack
For a protocol suite the protocols can be viewed as layers within a stack.
There are a number of aspects relating to this concept.
- Each layer can only accept input from the next higher layer or the next
lower layer.
- There is a defined interface between adjacent layers which constitutes
the only interaction allowed between layers.
- A layer is serviced by the actions of lower layers
- With the possible exception of the lowest layer the functioning of a
layer is created by installed software
- A layer may comprise sub-layers
- Any user interaction will take place using protocols associated with the
highest level layer in the stack
- Any direct access to hardware is confined to the lowest layer in the
stack

NB: packets are known as frames at the data-link layer, datagrams at the internet
layer and segments at the transport layer. Different names are used as each layer adds
its own header to the packet.

Application layer
The application layer provides user services.
The application layer is where data is sent from software applications into the
protocol stack. At the other end of the communications link, the application layer
passes the data to the receiving application.

The application layer contains all the programs that exchange data, such
as web browsers or server software; it sends files to the transport layer.
This layer allows applications to access the services used in other layers
and also defines the protocols that any app uses to allow the exchange of
data.

Protocols at the Application layer

HTTP(S) – for sending and receiving web pages / hypertext documents


responsible for correct transfer of files / hypertext documents that make up web pages on
the world wide web
FTP – used when transferring files from a server to a client on a network. for sending and
receiving files via the internet or other networks / between devices
It is similar to HTTP and SMTP, but FTP’s only task is the application protocol for the transfer of files
over a network. Web browsers can be used to connect to an FTP address in a way similar to HTTP, for
example, ftp://[email protected]/.

 anonymous FTP – this allows a user to access files without the need to identify who they are
to the ftp server; for example, ‘331 Anonymous access allowed’ would be a message received
to confirm anonymous access

2|Page
 FTP commands – a user is able to carry out actions that can change files stored on the ftp
server; for example, delete, close, rename, cd (change directory on a remote machine), lcd
(change directory on a local machine)
 FTP server – this is where the files, which can be downloaded as required by a user, are
stored.

POP3 – handles the receiving of emails. i.e. for receiving/downloading emails /pull protocol
POP3
used by email clients to retrieve email messages // a pull protocol
POP3/4 does not keep the server and client in synchronisation; when emails are
downloaded by the client, they are then deleted from the server which means it
is not further updated

IMAP (Internet Message Access Protocol) – handles the receiving of emails i.e. for
receiving/downloading emails /pull protocol
IMAP Protocol
• used by email clients to retrieve email messages // a pull protocol
• from a mail server (over a TCP/IP connection)
• keeps the server and client in sync (by not deleting the original email). // allows
a copy of the email to be downloaded from the mail server.

SMTP – handles the sending of emails i.e. for sending/uploading emails /push protocol
Simple mail transfer protocol (SMTP) is a text-based (and connection-based) protocol
used when sending emails. It is sometimes referred to as a push protocol (in other words, a
client opens a connection to a server and keeps the connection active all the time; the client
then uploads a new email to the server).
Since SMTP is text-based only, it doesn’t handle binary files (a binary file is a file containing
media/images as well as text and is regarded as being computerreadable only). If an email
contains attachments made up of, for example, images, video, music then it is necessary to
use the multi-purpose internet mail extension (MIME) protocol instead. A MIME header is
used at the beginning of the transmission; clients use this header to select which media
player is needed when the attachment is opened.

BitTorrent protocol – provides peer-to-peer file sharing


The BitTorrent is a protocol which is based on the peer-to-peer networking concept. This allows for
very fast sharing of files between computers (known as peers). While peer-to-peer networks only
work well with very small numbers of computers, the concept of sharing files using BitTorrent can be
used by thousands of users who connect together over the internet. Because user computers are
sharing files directly with each other (rather than using a web server) they are sharing files in a way
similar to that used in a peer-to-peer network; the main difference is that the BitTorrent protocol
allows many computers (acting as peers) to share files.

 Swarm – a group of peers connected together is known as a swarm; one of the most
important facts when considering whether or not a swarm can continue to allow peers to
complete a torrent is its availability; availability refers to the number of complete copies of
torrent contents that are distributed amongst a swarm. Note: a torrent is simply the name
given to a file being shared on the peer-to-peer network.

 Seed – a peer that has downloaded a file (or pieces of a file) and has then made it available
to other peers in the swarm.

3|Page
 Tracker – this is a central server that stores details about other computers that make up the
swarm; it will store details about all the peers downloading or uploading the file, allowing
the peers to locate each other using the stored IP addresses.

 Leech – a peer that has a negative impact on the swarm by having a poor share ratio, that is,
they are downloading much more data than they are uploading to the others; the ratio is
determined using the formula:

 If the ratio > 1 then the peer has a positive impact on the swarm; if the ratio < 1 then the
peer has a negative effect on the swarm. one then the peer has a positive impact on the
swarm; otherwise, the peer has a negative effect on the swarm.

 Lurker – a peer that downloads many files but does not make
available any new content for the community as a whole.
routing information protocol; this is the protocol routers use to exchange routing information over
RIP
an IP network
simple network management protocol; protocol used when exchanging network management
SNMP information between network management and network devices (such as routers, servers and other
network devices)

The Transport Layer


The transport layer is responsible for delivery of data from the source host to the
destination host
It is where data is broken up into packets i.e. performs segmentation
It sends the packets to the Internet / Network Layer // It receives data from the
Application Layer
Adds the sequence number to the packet header
It establishes end to end contact i.e. it controls the flow of packets
It ensures data arrives error free // It retransmits packets if lost // Acknowledges
receipt of complete error free packets

The main protocols associated with the transport layer are transmission
control protocol (TCP), user datagram protocol (UDP) and SCTP

TCP
 Transmission Control protocol
 Working at the transport layer
 Sets up and maintains a connection between two nodes
 Ensures delivery of data between two nodes on the internet

TCP is responsible for the safe delivery of a message by creating sufficient


packets for transmission. It uses positive acknowledgement with retransmission
(PAR) which means it automatically re-sends a data packet if it has not received
a positive acknowledgement. TCP is also connection orientated since it
establishes an end-to-end connection between two host computers using
handshakes. For this last reason, TCP is often referred to as a host-to-host
transmission protocol.

4|Page
The term host has been used previously; this refers to a computer or device that
can communicate with another computer/device (host). Hosts can include clients
and servers that send/receive data, provide services or apps.

The Internet Layer


 handles transmission of data using IP addresses // provides (optimal) route
 The internet layer identifies the intended network and host
 It transmits packets to the (Data) Link / Physical Layer
 It routes the packets independently through the optimum route
 It addresses packets with their source and destination IP addresses
 It then uses an IP address and port number to form a socket.

This is a summary of the IP functions:


» Ensure correct routing of packets of data over the internet/network.
» Responsible for protocols when communicating between networks.
» Take a packet from the transport layer and add its own header which
will
include the IP addresses of both sender and recipient.
» The IP packet (datagram) is sent to the data-link layer where it is
assembles
the datagrams into frames for transmission.

The common protocol is IP


IP
 Internet Protocol
 Working at the Internet/network layer
 Provides rules for the exchange of packets/datagrams
 Decides the path for transmission of each packet

Network Access (Interface) / Link Layer // physical layer


Handles how data is physically sent.
The link layer is responsible for transporting IP packets across each of the individual links
that make up the path between two communicating computers. These links could be a
combination of Ethernet, WiFi, 4G, satellite or fibre.
To ensure correct network protocols are followed
To enable the upper layers to access the physical medium // enables
connection/ communication with the internet / network layer
To be responsible for transporting data within the network/local segments
To format the data into frames for transmission
Maps IP addresses to MAC/Physical addresses.

Link Layer

The link layer is responsible for transporting IP packets across each of the individual
links that make up the path between two communicating computers. These links
could be a combination of Ethernet, WiFi, 4G, satellite or fibre.

An IP packet will travel across many different physical and/or wireless links between
the original source and the final destination. Each different type of physical link uses
a different technology and, each has its own protocol. Each of the protocols adds its

5|Page
own headers to the IP packets to create frames. These frames are just used to carry
the IP packets across that particular link.

Ethernet is a common link layer protocol used in local area networks. It governs the
way data packets are transmitted on a shared channel.

The link layer at one end of a link communicates with the link layer at the end by
converting the frame into an electrical, electromagnetic (wireless) or light signal and
then sending this out onto the media.

At the link layer, we call the data structures frames to distinguish them from
'packets', which is the term used at the internet layer.

The frames carry, or encapsulate, the packets from the layer above.

If the link layer is Ethernet, the frames are called Ethernet frames. The header of an
Ethernet frame contains the source and destination MAC addresses. The source
MAC address is the device sending the frame, which is typically your computer. The
destination MAC address is the device on the Ethernet LAN receiving the frame,
typically your router.

The destination device then retrieves the packet and discards the frame, before
processing the packet, or sending it on its way across the next link where it will be
encapsulated by a new frame.

Most Common TCP/IP Protocols


Some widely used most common TCP/IP protocol are:

TCP
Transmission Control Protocol is an internet protocol suite which breaks up the message
into TCP Segments and reassembling them at the receiving side.

IP
An Internet Protocol address that is also known as an IP address is a numerical label. It is
assigned to each device that is connected to a computer network which uses the IP for
communication. Its routing function allows internetworking and essentially establishes
the Internet. Combination of IP with a TCP allows developing a virtual connection
between a destination and a source.

SNMP
SNMP stands for Simple Network Management Protocol. It is a framework which is used
for managing the devices on the internet by using the TCP/IP protocol.

Packet switching vs. circuit switching


6|Page
Packet switching

Description
Packet switching is a method of transmission in which a message is broken up into a number of
packets that can be sent independently to each other from start point to end point. The data packets
will need to be reassembled into their correct order at the destination.
 Each packet follows its own path.
 Routing selection depends on the number of datagram packets waiting to be processed at
each node (router).
 The shortest path available is selected.
 Packets can reach the destination in a different order to that in which they are sent.
Pros
 No need to tie up a communication line.
 It is possible to overcome failed or faulty lines by simply re-routing packages.
 Circuit switching charges the user on the distance and duration of a connection, but packet
switching charges users only for the duration of the connectivity.
 High data transmission is possible with packet switching.
 Packet switching always uses digital networks which means digital data is transmitted directly
to the destination.
 Packets can be rerouted if there are problems.
 More secure as harder to intercept messages.
Cons
 The protocols for packet switching can be more complex than those for circuit switching.
 If a packet is lost, the sender must re-send the packet (which wastes time).
 Does not work well with realtime data streams.
 The circuit/channel has to share its bandwidth with other packets.
 There is a delay at the destination while packets are reassembled.
 Needs large amounts of RAM to handle the large amounts of data.

Circuit switching

7|Page
Description
Circuit switching uses a dedicated circuit which lasts throughout the connection: the communication
line is effectively 'tied up'. When sending data across a network, there are three stages:
1. First, a circuit/channel between sender and receiver must be established.
2. Data transfer then takes place (which can be analogue or digital); transmission is usually
bidirectional.
3. After the data transfer is complete, the connection is terminated.
Pros
 The circuit used is dedicated to the single transmission only.
 The whole of the bandwidth is available.
 The data transfer rate is faster than with packet switching.
 The packets of data (frames) arrive at the destination in the same order as they were sent.
There is no need to reassemble packets.
 A packet of data cannot get lost since all packets follow on in sequence along the same single
route.
 It works better than packet switching in realtime applications.
 Less secure as only one route used.
Cons
 It is not very flexible (e.g., it will send empty frames and it has to use a single, dedicated
line).
 Nobody else can use the circuit/channel even when it is idle
 The circuit is always there whether or not it is used.
 If there is a failure/fault on the dedicated line, there is no alternative routing available.
 Dedicated channels require a greater bandwidth.
 Prior to actual transmission, the time required to establish a link can be long.
Application
 Public/private telephone networks
 Private data networks
Routing
Routing tables contain the information necessary to forward a package along the shortest/best route
to allow it to reach its destination. As soon as the packet reaches a router, the packet header is
examined and compared with the routing table. The table supplies the router with instructions to
send the packet (hop) to the next available router. Routing tables include
 number of hops
 MAC address of the next router where the packet is to be forwarded to (hopped)
 metrics (a cost is assigned to each available route so that the most efficient route/path is
found)
 network destination (network ID) or pathway
 gateway (the same information as the next hop; it points to the gateway through which
target network can be reached)

8|Page
 netmask (used to generate network ID)
 interface (indicates which locally available interface is responsible for reaching the gateway)

9|Page

Common questions

Powered by AI

The IP protocol manages routing and addressing by assigning each device a unique IP address, which is used to identify the source and destination of data packets. Routing is managed using routing tables within routers, which determine the optimal path for each packet based on metrics such as hops and network destinations. The internet layer is responsible for packet routing, addressing each packet with source and destination IP addresses, and forming a socket using the IP address and port number. This ensures correct routing of data packets and efficient communication between networks .

Within the TCP/IP model, packets are known as frames at the data-link layer, datagrams at the internet layer, and segments at the transport layer. These names indicate the specific function or modifications done by each layer: at the data-link layer, frames encapsulate packets for specific network protocols; at the internet layer, datagrams indicate the packets suited for routing across a network; and at the transport layer, segments reflect the division and sequencing of data for reliable delivery .

Packet switching differs from circuit switching in that it breaks messages into packets that can be sent independently, allowing each packet to follow its own unique path to the destination. This method does not require a dedicated path throughout the communication process, unlike circuit switching which uses a single, dedicated circuit_connection. Advantages of packet switching include higher data transmission rates, better utilization of available bandwidth, the ability to overcome faults through packet rerouting, and increased security as packets take different paths, making them harder to intercept. Additionally, users are charged based on connectivity duration rather than distance, making it cost-effective .

Simple Network Management Protocol (SNMP) operates by facilitating the exchange of network management information between network management systems and devices such as routers and servers. It is part of the TCP/IP protocol suite and allows for remote monitoring and modifications of network configurations, making it essential for maintaining effective network performance, diagnosing problems, and ensuring security and compliance within network systems .

In packet switching networks, packet reassembly is crucial because data is transmitted in independent packets which can arrive out of order or over different paths. At the destination, these packets are reordered and reassembled into the original message format before being delivered to the application layer. This ensures data integrity and accuracy, facilitating seamless communication despite the potential variability in packet arrival and routing paths across the network .

Communication protocols primarily set a standard for data transmission and ensure compatibility between devices from different manufacturers and platforms. They allow for communication to occur using the same rules and formats, which is independent of the software and hardware used by the devices .

The transport layer plays a critical role in ensuring reliable data transmission by performing segmentation of data into packets, appending sequence numbers, and managing the flow of packets between the source and destination hosts. This layer is responsible for establishing an end-to-end connection using protocols like TCP, which ensures error-free delivery of packets by implementing positive acknowledgment with retransmission strategies. This connection-oriented protocol facilitates the safe delivery of data by retransmitting lost packets and ensuring the correct sequence of received packets .

The TCP/IP protocol suite utilizes a stack structure with several layers by breaking the process of data transmission into manageable self-contained modules, known as decomposition. Each layer in the stack has a specific function: the application layer provides user services, the transport layer ensures data delivery and segmentation, the internet layer handles data routing, and the link layer manages physical data transmission. Each layer can only interact with the layer directly above or below it through a defined interface, allowing for modular development and compatibility .

Protocol layers are significant because they allow for the separation of different functions within a network, providing a structured approach to data transmission. This layered approach, particularly within the TCP/IP framework, enhances modularity allowing for easier troubleshooting, development, and compatibility of both software and hardware. Each layer handles a specific aspect of the communication process, from physical data transmission to application-specific services, thereby enabling protocols to be developed and upgraded independently without affecting other layers .

The link layer in the TCP/IP model is responsible for the physical transmission of data across local network segments. It interacts with different types of physical media such as Ethernet, WiFi, and fiber optics by formatting data into frames and mapping IP addresses to MAC addresses. This layer sends data between neighboring devices, encapsulating TCP/IP packets into frames for transmission over specific physical links. It plays a crucial role in accessing the physical medium and ensures the correct handling of data transmission across various media .

You might also like