Cs Unit 5
Cs Unit 5
Network protocols
A network protocol is a set of rules that define how data is transmitted between connected devices. Protocols
exist for any data exchange between two devices.
► Ethernet
Ethernet is a protocol that defines how data should be physically transmitted between network hardware.
Ethernet is used in wired networks.
► Wi-Fi
Is a set of protocols defining how data should be transmitted using radio waves? Wi-Fi is used in wireless
networks
► transmission control protocol transmission control protocol TCP
splits data from applications into small pieces called packets. Each packet has a header and a payload. The
header is data about how the packet should reach its destination. The payload is the actual data that needs to be
sent.
Transmission control protocol or Internet Protocol
is a protocol stack which means collection of protocols that work together? It is named after the two most
important protocols used in the stack.
Application
top layer of the stack
interacts with user to provide access to services and data that is sent received over a network
for example, hey HTTP, FTP, email protocols
transport
Manage is ended to end communication over a network
Two main protocols that operate at this level is TCP and UDP
Internet
This layer deals with sending data across multiple networks from source network to destination
network
Known as routing and is a roll of Internet Protocol
Link
This layer controls transmission and reception of data to and from a local network
o Data sent using TCP and IP is broken up into packets each packet consist of the sending computer,
the recipient computer, how many packets the data has been split into, the number of this packet.
o The packet is Constructed once recipient computer receives it.
o Computer A – application layer – transport layer – internet layer – link layer – second link layer –
second internet layer – second transport layer – 2nd application layer – computer B receives it
o Routers use this information to deliver the packet to the network.
Hypertext transfer protocol HTTP
Hypertext transfer protocol defines how data should be exchanged between web browsers clients and
web servers
H TTP relies on the idea of requests and responses next side HTTP is used to access websites from
servers
If the web page does not exist, it will show forty forever messages
Internet Protocol
Internet Protocol IP defines how data packets should be sent between networks an IP header is added to each
packet with the source and destination IP address.
This is to address system to identify individual computer servers on the network usually the
Internet
Splitting data into packets and adding the packet header with details such as asunder receiver
address
Each device linked to the Internet has a unique IP address
The TCP IP is arranged in four layers (pneumonic – another task is done)
1. Application layer:
o is there the IP protocol is active it adds the source and destination IP address to the packet?
o It routes them to the recipient computer
2. Transport layer
o is where applications such as web browsers and email clients operate.
o All quests are made to web servers or where emails come from in applications net.
o This includes HTTP FTP a smtp the requests are passed on to the next transport layer
Secondary Storage:
Hard Disk Drives (HDD)
Data is stored in a digital format on the magnetic surface of the disks (platter)
Number of read/write heads can access all of the surfaces of the disk
Each platter will have two surfaces which can be used to store the data
Data is stored on the surfaces in sectors and tracks
HDD have very slow data access compared to RAM
Solid-State Drive (SSD)
No moving parts and all data is received at the same time (not like HDD)
Store data by controlling the movement of electrons within NAND chips, as 1s and 0s
Non-volatile rewritable memory
Benets of using SSD rather than HDD: More reliable (no moving parts), Considerably lighter (suitable
for laptops), Lower power consumption, Run much cooler than HDDs, Very thin, Data access is faster
than HDD
Drawback – questionable longevity (20GB per day)
Off-Line Storage:
CD/DVD Disks
Laser (red) light is used to read and write data in the surface of the disk
Use a thin layer of metal alloy to store data
Both systems use a single, spiral track which runs from the centre of the disk to the edge
DVD uses Dual-Layering which increases the storage capacity (two individual recoding layers)
Blu-ray Disks
Uses blue laser to carry out read and write operations
Wavelength of laser light is less than CD and DVD (stores up to ve times more data than DVD)
Automatically come with secure encryption (prevent piracy and copyright infringement)
Used as back-up systems
USB Flash Memories
Very small, lightweight suitable from transferring files
Small back-up devices for photo, music
Solid state so need to be treated with care
High- & Low-Level Languages
High-Level Languages
Easier to read and understand as the language is closer to human language
Easier to write in shorter time
Easier to debug at the development stage
Easier to maintain once in use
Low-Level Languages
Refer to machine code
Binary instructions that computer understands
Translators:
A program must be translated into binary before a computer can use it
Types of translators; Compiler, Interpreter and Assembler
Compiler
Translates a program written in high-level language into machine code
Used without compiler
Executable le of machine code produced
One high-level language translated into several machine code instructions
Used for general use
Interpreter
Executes a high-language program a statement at a time
No executable le of machine code produced
One high-level language program statement may require several machine code instructions to be
executed
Cannot be used without interpreter
Used when program is being developed
Assembler
Translates a low-level language program into machine code
Executable le of machine code produced
One low-level language translated into one machine code instructions
Can be used without assembler
Used for general use
Syntax Errors:
When program is being compiled, if any syntax errors are found no translated program is produced
Instead, a list of all errors in program is produced
Programmer corrects program and recompiles
When a program is being interpreted, the interpreter preforms the action until syntax error is found
The programmer is then alerted to the place in the program where error was found
The error is corrected and interpretation continues