3.1.3 Protocols 2 Flashcards
Transmission Control Protocol/ internet protocol
TCPIP
A set of protocols
TCP
IP
TCP
Enables two devices on the network to establish a connection and communicate.
Splits data into packets that contain a sequence number so that packets can be reassembled.
Supports the security needed to transfer files.
Controls error checking to verify if sent and received packets were transmitted without errors.
IP
Adds source and destination address to packet IP address
Contains a method that enables devices to send/ receive packets from node to node.
IP specifies the times for his packets are forwarded
Depending on network traffic, packets of the same message may be sent by different routes.
Ethernet
Works at both physical and transport layers of OSI
Physical Ethernet
Defines HW standards to be used.
Transport Ethernet
Divides network traffic into frames
Adds error checking data
Adds source destination address.
CDMA/ CD
Carrier sense multiple access with collision detection.
Physical layer protocol that works alongside Ethernet.
Contains set of rules for how network devices can deal with collisions.
Collisions- two devices try to use data channel simultaneously.
When happens stations that caused the collision will each wait for random time interval before attempting to retransmit.
If collide again wait time increases.
Token passing
Used in ring network topology
Uses a series of hits that allow a device to transmit data.
Only device that has token can put data onto network.
Once that device has finished transmitting token moves to next device.
Rules in token passing protocol-
How long a device may keep token for
How long it can transmit for
Hot to generate new token
Wireless fidelty
Governed by new IEEE standard states how WiFi protocol will work.
Works a physical layer
WAP receives internet data and converts it into physical radio waves.
Network device with a wireless receiver can receive these radio waves and convert them back into 1s and 0s
WiFi enables 2 or more devices to communicate wirelessly.
Devices must have wireless NIC
Wireless network can be open or closed.
Bluetooth
Communication protocol which works on physical layer.
Uses radio waves to communicate. V low power so v low range.
Security is at the device level.
If several Bluetooth devices were near enough to each other, could form a piconet.
VoIP Voice over internet protocol
Protocol which allows telephone calls to be made over the internet.
Converts analogue voice signals to data packets.
Enables packets to be sent: received over the internet.
Skype.
RFID radio frequency identification
Uses radio waves to transmit info about an object or product.
An antenna emits radio signals to activate the RFID tag/ chip.
The data in tag could be encoded.
Also possible for reader to alter data on the tag.
Tag can hold kilobytes of data.
Range can be anything from cm to m
In Active systems the chip has own power supply
Passive systems chip is activated by readers power.
RFID uses
No line of sight required
Read from distance
Data on tag could be updated.
Tags could be inside product.
Reader does not have to make contact with object being read.
Reader could track a moving object.
Barcodes degrade very easily.
No human intervention is required with RFID Products could move and be logged without anyone doing anything