Chapter 14 Flashcards
"Communication and Internet Technologies"
what is a protocol?
a set of rules for successful transmission and receiving of data, which must be agreed between sender and receiver. enables cross communication between devices functioning on different platforms
explain why a protocol is used in communication between computers
- provides a set standard for communication (gives accepted set of rules for transmitting and receiving data)
- enables communication between different platforms
therefore if two devices were sending messages to each other but using different protocols, they would not be able to communicate properly
list the TCP/IP Protocol stack
- application layer
- transport layer
- internet layer
- data link layer
application layer
- sends files to transport layer
- contains all programs that exchange data e.g. web browser
- to allow access to network resources
- presents data to the user, (allows user to communicate with the server?)
HTTP, SMTP, DNS, FTP, POP3, IMAP
transport layer
- handles data packets - data is broken into packets and a packet header is added
- data is sent to the network layer/receives from application
- controls the flow of packets, ensures that packets arrive in sequence without errors
- handles packet loss/corruption
- protocols in this layer: TCP (transmission control protocol - standard for exchanging messages)
internet layer
ensures correct routing over the internet // handles the transmission of data using IP addresses
- identifies the intended network and host
- routes packets independently through the optimum route
- transmits packets to the data link layer
- addresses packets with their source and destination IP addresses
- then uses an IP address and port number to form a socket
IP
data link layer
- handles how data is physically sent
- ensures network/internet protocols are followed
- delivers data/communicates with other computer
- maps IP addresses to physical/MAC addresses
- formats the data into frames for transmission
ethernet protocol, wifi protocol, bluetooth protocol
IMAP
internet message protocol
- a pull protocol
- used to receive/download email messages from the mail server
- allows a copy of the email to be downloaded from the mail server
- same purpose as POP but mail doesn’t get deleted and can be accessed from different devices
POP3
post office protocol,
for receiving/downloading emails from the server. pull protocol
HTTP(S)
hypertext transfer protocol, for sending and receiving web pages
(every time a user accesses a website using a browser, HTTP is used. browser sends a request for a web page to a web server)
FTP
file transfer protocol, for sending and receiving files over a network/between devices
SMTP
simple mail transfer protocol, for sending/uploading emails. a push protocol
ethernet
a protocol primarily focused on LANs, transmitting data in frames. each frame has a course and a destination address, being the physical or MAC address, uniquely defining one NIC. used in the data-link layer
what is stored in a packet header
- source IP address and destination IP address
- checksum
- protocol used
- message data, known as the payload
- ID number of that packet
- packet length
purpose of a packet header
- to store data about packet
- …and its routing to ensure that it reaches its destination
- to ensure that messages can be properly reconstructed
function of TCP protocol
Transmission Control Protocol and works at the Transport layer.
- allows applications to exchange data
- ensures delivery of data - establishes and maintains connection until exchange of data is completed
- determines how to break application data into packets
- adds packet header
- sends packets to and from the network layer
- manages flow control of data to avoid congestion
function of the IP protocol
internet protocol, functions at the internet/network layer.
* provides rules for exchange of packets over the internet
* decides the path for transmission of each packet
* passes packet to the link layer for transmission on the LAN
bit torrent
a peer-to-peer file sharing model. peers act as both clients and servers. the swarm shares a torrent
swarm
all the connected peer computers
that have all or part of the file to be uploaded/downloaded
they share a torrent
tracker
central server
stores details of other computers/swarm
store IP addresses of other peers in swarm allowing them to connect
leeches
peers who download much more than they upload
seed
a peer computer that has 100% of the file it is uploading
BitTorrent downloading/uploading process
torrent file is made available
file to be shared is split into pieces
bit-torrent client software is made available to other peers which allows them to work as seeds or leeches
once a peer has a piece of a file it can become a seed for the parts downloaded
tracker keeps record of all the peers and the parts of the file they have and can pause and restart at any time
packet switching
- data is split into same-size packets
- packets have a header and a payload (the message)
- The header contains a source IP address, destination IP address, and serial number
- each packet is given its own independent route that may be different.
- routes determined based on congestion
- packets are reassembled in the correct order at the receiver’s end
- if packets are missing, re-send
used for: high-volume data transmission, more secure, e.g. email, text messages, VOIP
not for: real-time transmission e.g. live streaming
(a circuit does not have to be established at the start of communication)
(packets can travel different routes independently)