Chapter 7.1 Internet protocols and Network hardware Flashcards
What are the 5 layers of internet group protocols?
1) Physical Modems
2) Data Link
3) Network/ Internet
4) Transport
5) Application
What is the Protocol & Function of Physical Modems?
Protocol: Modems
Function:This is the layer at which the basic
communication takes place bit by bit from device to device
What is the Protocol & Function of Data Link?
Protocol: Ethernet/ WiFi
Function: This layer acts as a correspondent between
the network and physical layer. It receives requests of services from the network layer and in turn requests services from the physical layer.
What is the Protocol & Function of Network/ Internet?
Protocol:Internet Protocol
Function: This layer is responsible for the transmission of data. It makes sure that the data packets reach the destination. It also performs routing i.e. deciding on the path to be taken by the packets to the destination
What is the Protocol & Function of Transport?
Protocol: TCP, UDP
Function: This layer divides the data into smaller packets and writes the source and destination addresses on each packet as well as the sequence number of the packet
What is the Protocol & Function of Application?
Protocol: FTP, TELNET, HTTP, SSH
Function: This layer consists of protocols which
provide services to the network layer via the transport layer.
Explain IP
1 IP or Internet Protocol makes sure that the data packets reach the correct address.
2 Every device has a specific IP address consisting of 4 bytes.
3 TCP or Transmission Control Protocol ensures that the data packets are transmitted accurately.
4 It divides the data into smaller packets and attaches the following to the header details in the packet:
1. Source IP
2. Destination IP
3. Sequence number of the packet i.e. it may be the 4th packet of data
Explain TCP
1 TCP makes duplicate copy of a packet in case of delay in transmission but also ensures that in the end only one copy of the data is received and is reassembled into order.
2 TCP is a connection oriented service i.e. it requires handshaking to take place before transmission of data.
3 TCP has a congestion control mechanism. This means that the speed of transmission has a maximum limit so that congestion or loss of data does not take place. Therefore it is not suited to real time applications where high bandwidths are required.
What is HANDSHAKING?
This is the process which takes between two devices after a physical link is established. The devices agree on rate of data transfer, the protocol to be used, the process of interruption (i.e. devices send a signal for attention in case of non-arrival of a data packet) as well the alphabetic code to be used
What is Parity Check?
- Parity Check is a check performed on transmitted data where one of the bits in a byte is checked to ensure that data transmitted is accurate:
1 The left most bit in a byte is called the parity bit while the rest of the seven are data bits.
2 The parity bit is set as 1 or 0 to keep the number of ones as even.
3 Errors in transmission may disturb the bits in the data therefore the parity may be disturbed as well. A disturbed parity would thus indicate an error.
4 However, parity check fails to detect an error of transposition i.e. when only position of a bit is changed. Moreover it may fail in case more than one bit is changed.
What is UDP?
1 UDP or User Datagram Protocol, unlike TCP is a connectionless service i.e. it does not require handshaking to take place and does not have a congestion control mechanism. It is a very basic protocol.
2 Data packets are sent to the destination with its address attached to the packet. However sequence numbers are not attached to packets.
3 It is useful for real time applications such as video on demand systems.
What is FTP?
1 FTP or File Transfer Protocol is an extensively used for downloading. It uses TCP/IP for transmission of data.
2 FTP allows the transfer of files over the internet between two computers.
3 It follows a client-server relationship i.e. users(client) have to log in using a username and password before being able to download files from or upload files to the server.
4 FTP is weak in terms of security and does not have any encryption. Therefore SSH or SSL protocols are used with it to provide additional security.
What is HTTP?
1 HTTP is a protocol used to transfer data across internet. It is a set of rules which must be followed while transferring data such as files, image, sound, videos etc on the World Wide Web.
2 It is also based on a client-server relationship i.e. when a user opens the web browser and types in or clicks on a Uniform Resource Locater (URL), the request is sent and URL is converted into an IP address which is used to locate the server.
3 The server contains text, images etc in HTML format or PDF or in original formats.
4 HTTP daemon is the program which acts upon the requests from clients and sends the requested file to them.
What is TELNET?
1 TELNET or Telecommunication Protocol is a network emulator i.e. it enables a computer to gain access to another computer and run software and execute commands on that computer.
2 The user’s computer has TELNET CLIENT SOFTWARE whereas the remote computer has TELNET SERVER SOFTWARE to make the connection possible.
3 A disadvantage of TELNET is that all the data is transferred as plain text and not in encrypted form.
4 However, it is considered helpful in detecting problems in a network. Network administrators use it to make changes to network settings and carry out diagnostic tests.
What is SSH?
1 SSH or Secure Shell Protocol has the same function as the TELNET.
2 However it offers higher levels of security during the transmission of data in the sense that the data is encrypted.
3 It also uses Public Key Authentication which is a feature of encryption that allows one computer to ensure that a genuine computer is trying to communicate with it.
4 Public key is a key given by a computer to other computers to encrypt and send data to it.