T3 - Protocols and layers: Flashcards
Protocols
- set of rules
HTTP
– Hypertext Transfer Protocol
HTTPS –
Hypertext Transfer Protocol Secure
FTP –
File Transfer Protocol
POP –
Post Office Protocol
IMAP –
Internet Message Access Protocol
SMTP –
Simple Mail Transfer Protocol
TCP/IP –
Transmission Control Protocol /
Internet Protocol
HTTP use
used for accessing and receiving web pages via the Internet - written in HTML
protocol requests a web page from the
web server
The server sends its response with the web page
HTTPS (secure HTTP) use
encrypts the information so that it cannot be understood by an eavesdropper
Websites using HTTPS =
Banks or online shops
FTP: role
used for sending or retrieving files to or from a FTP server
How email works:
email is sent from a computer it will first be sent to a mail server using the SMTP protocol
When it reaches the destination mail server it is stored
The user’s computer uses POP or IMAP to access the email
POP and IMAP:
email retrieval protocols fetch message data and attachments from your remote mail server
POP: role
will download every new message to your local device and delete from local server
IMAP: role
will leave the messages on a server.
They can be accessed by multiple devices
they only are removed if the user deletes them
SMTP: role
email protocol used for sending email
Email software sends the
email to the SMTP server used by the company or individual
the email arrives at the destination mail server
TCP protocol: role
Breaks up messages sent over the Internet into small chunks called packets
Reassembles the packets at the other end
Detects errors
Resends lost messages
IP protocol: role
Routes the individual packets from one IP address to another
Order of layers:
Application layer (SMTP, FTP and HTTP )
Transport layer (TCP)
Internet layer (Routers and IP)
Link layer (MAC (Media Access Control), Ethernet, Wi-Fi
Application layer:
email clients and web browsers create data to send in this layer
Transport layers:
creates the connection between two computers, or ‘hosts’
Data is then divided up into packets and given a packet number
Packets are reassembled by the recipient’s Transport layer
Lost packets are resent
Internet layer:
responsible for routing packets
Source and destination addresses are written on to the packets ready for transmission
Receiving data: order of layers
The link layer
The Internet layer
The Transport layer
The Application
Advantages of layers:
Self-contained
functionality of one layer can be changed without affecting the functionality of other layers
Different hardware or software operates on a particular layer = interoperability
Receiving data: link layer
removes the MAC address and passes packets up to the Internet layer
Receiving data: internet layer
The Internet layer removes the IP addresses and passes packets up to the Transport layer
Receiving data: transport layer
The Transport layer reassembles the packets and passes the data to the Application layer
Receiving data: application layer
The Application layer uses the correct protocol to correctly display the data, web page or email for the user