0% found this document useful (0 votes)
11 views

Cs Unit 5

The document discusses several key email, network, and mobile communication protocols: 1. Email protocols like SMTP, POP3, and IMAP define how emails are sent, retrieved from servers, and synchronized across devices. IMAP is becoming more popular than POP3 for its ability to synchronize mailboxes. 2. Network protocols like TCP, IP, Ethernet, and Wi-Fi establish rules for transmitting data within and between networks. The TCP/IP model uses four layers - application, transport, internet, and link - to deliver packets of data from source to destination. 3. Mobile communication standards like 2G, 3G, 4G, and 5G define protocols for digital cellular networks, improving data transmission

Uploaded by

devika suresh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Cs Unit 5

The document discusses several key email, network, and mobile communication protocols: 1. Email protocols like SMTP, POP3, and IMAP define how emails are sent, retrieved from servers, and synchronized across devices. IMAP is becoming more popular than POP3 for its ability to synchronize mailboxes. 2. Network protocols like TCP, IP, Ethernet, and Wi-Fi establish rules for transmitting data within and between networks. The TCP/IP model uses four layers - application, transport, internet, and link - to deliver packets of data from source to destination. 3. Mobile communication standards like 2G, 3G, 4G, and 5G define protocols for digital cellular networks, improving data transmission

Uploaded by

devika suresh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Email protocols

1. Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP)


 defines how e-mail messages are sent from an e-mail client to a mail server
 All e -mails are sent using SMTP
2. Post Office Protocol, version 3 (POP3)
 is a common e- mail protocol which defines how emails can be retrieved from a mail server?
 Inboxes are not kept coordinated: Once a user has downloaded their mail from the server, the
server deletes their copy
 Only a local copy remains.
3. Internet Message Access Protocol < Internet Message Access Protocol (IMAP)
 is another protocol for retrieving e- mails from a mail server?
 IMAP allows e-mails to be kept coordinated
 Actions on your local machine are synchronised with the server
 Inboxes remain consistent across multiple devices
 IMAP is becoming more popular than POP because of the ability to synchronise multiple
devices

Network protocols
A network protocol is a set of rules that define how data is transmitted between connected devices. Protocols
exist for any data exchange between two devices.
► Ethernet
Ethernet is a protocol that defines how data should be physically transmitted between network hardware.
Ethernet is used in wired networks.
► Wi-Fi
Is a set of protocols defining how data should be transmitted using radio waves? Wi-Fi is used in wireless
networks
► transmission control protocol transmission control protocol TCP
splits data from applications into small pieces called packets. Each packet has a header and a payload. The
header is data about how the packet should reach its destination. The payload is the actual data that needs to be
sent.
 Transmission control protocol or Internet Protocol
is a protocol stack which means collection of protocols that work together? It is named after the two most
important protocols used in the stack.
Application
 top layer of the stack
 interacts with user to provide access to services and data that is sent received over a network
 for example, hey HTTP, FTP, email protocols
transport
 Manage is ended to end communication over a network
 Two main protocols that operate at this level is TCP and UDP
Internet
 This layer deals with sending data across multiple networks from source network to destination
network
 Known as routing and is a roll of Internet Protocol
Link
 This layer controls transmission and reception of data to and from a local network
o Data sent using TCP and IP is broken up into packets each packet consist of the sending computer,
the recipient computer, how many packets the data has been split into, the number of this packet.
o The packet is Constructed once recipient computer receives it.
o Computer A – application layer – transport layer – internet layer – link layer – second link layer –
second internet layer – second transport layer – 2nd application layer – computer B receives it
o Routers use this information to deliver the packet to the network.
 Hypertext transfer protocol HTTP
 Hypertext transfer protocol defines how data should be exchanged between web browsers clients and
web servers
 H TTP relies on the idea of requests and responses next side HTTP is used to access websites from
servers
 If the web page does not exist, it will show forty forever messages

 hypertext transfer protocol secure HTTPS


 This is a secure version of HTTP
 This uses a secure socket layer SSL to encrypt the data that is sent between the client and the server
 This prevents the data being sent received from being read by a third party
 This is used so that passwords and bank details are safe

 File transfer protocol have FTP


 This device defines how binary and text data can be requested from a server and transmitted back
to the client next side this is used to download or transfer files over a network

Internet Protocol
Internet Protocol IP defines how data packets should be sent between networks an IP header is added to each
packet with the source and destination IP address.

 This is to address system to identify individual computer servers on the network usually the
Internet
 Splitting data into packets and adding the packet header with details such as asunder receiver
address
Each device linked to the Internet has a unique IP address
 The TCP IP is arranged in four layers (pneumonic – another task is done)

1. Application layer:
o is there the IP protocol is active it adds the source and destination IP address to the packet?
o It routes them to the recipient computer

2. Transport layer
o is where applications such as web browsers and email clients operate.
o All quests are made to web servers or where emails come from in applications net.
o This includes HTTP FTP a smtp the requests are passed on to the next transport layer

3. Internet layer/network layer


o Where TCP protocol is active and is concerned with host-to-host communication.
o This means you agree on settings such as language and size of packets.
o Then the received data is divided from the application layer into packets.
o It also cheques that the packets have arrived safely.
o If the data is received it sends an acknowledged acknowledgement to the computer that sent the
packet.
o The protocol uses datagram protocol UDP as an alternate comparison alternative
communication protocol to TCP which operates in this layer.
o When using UDP packets are just sent to the recipient it does not cheque that they have been
received.
o UDP is used when speed is desirable and error correction is not necessary first stop for example
live broadcasts.

4. Data link layer/ network access layer


o is concerned with transmitting the data through the local network using the protocols of the
specific network for example Ethernet.
o This is where the network interface card and the device drivers of the operating system are
located.
Protocols of the application layer
 FTP: this is a Rosa must be followed when files are being transmitted between computers
 H TTP: the rules to be followed by a web server and web browser when requesting and supplying
information
 HTTPS: allows for communications between a host and client to be secure with encryption next time
smtp is a protocol for sending email messages from client to server and then from server to server until
the reach’s destination
 POP: is used by a client to retrieve emails from a mail server all the emails are downloaded when there
is a connexion between client and server
 IMAP: unlike POP, the messages do not have to be downloaded. They can be read and stored on the
message server. This is better for users with different devices.
Protocol layer model:
 this is a group of group or collection of network protocols that work at similar level within the
networking process.
 Properties of layers are that the model should be independent of each other and should only interact
with each other by considering the inputs and outputs of that layer.
 Layers are not only used within networking there is also abstraction to help simplify problems for
example a user interface layer a processing layer at database layer
Advantages of using network layering
1. Debugging network engineers can diagnose and fix issues within individual layers when problems
happen
2. Specialists’ software developers and engineers can be employed to work within one specific player to
allow people to specialise in one area next line
3. layer independence if the inputs and outputs of the layer remain consistent then the Then the layer can
be changed without affecting the other layers. This allows layers to be improved for efficiency without
affecting other parts of the system.
4. It provides a universal standard for hardware and software manufacturers to follow this is to
communicate with each other.
Mobile communications
 This is a wireless network distributed through cells where each cell includes a fixed location transceiver
known as a base station.
 Each cell offer often covers between 9 to 21 miles over a large geographical area.
 Handover - When a user moves out of range the signal falls on the base station makes a request to
transfer control to another base station that is receiving the strongest signals without notifying subscriber
 Next side the Europe telecommunications standards institute developed a standard for mobile
communications called the global system for mobile communications to describe the protocols to be
used.
 New versions are called generation’s as in two G 3G-4G and 5G.
1. 2G:
o was first to use digital communications.
o Enable text messages to be sent and introduced a multimedia messaging service
o increase data transmission speed to two MB IT per second
o this gave wireless access to the Internet, so it enabled video calls and downloading and streaming
2. 4G:
o provided much higher speeds and gave rise to the popularity of mobile gaming a film that would
have taken more than five hours to download will take less than 8 minutes.
o It has higher capacity which means it can support a great turn number of users at the same time.
o It can also give a more immediate response to a user’s command which is useful and playing
online games.
3. 3G AND 4G:
o both IP based protocols for data but 4G also uses IP even for voice calls next side the new
generation
4. 5G
o is smarter faster and more efficient than 4G.
o This achieved this achieves peak speeds of 100Gbps which is 100 times faster than 4G and four
and faster than most home broadband networks.
o It has a far lower latency than 4G.
o 5G will be able to manage current devices and emerging technologies such as driverless cars and
connected home products

Secondary Storage:
Hard Disk Drives (HDD)
 Data is stored in a digital format on the magnetic surface of the disks (platter)
 Number of read/write heads can access all of the surfaces of the disk
 Each platter will have two surfaces which can be used to store the data
 Data is stored on the surfaces in sectors and tracks
 HDD have very slow data access compared to RAM
Solid-State Drive (SSD)
 No moving parts and all data is received at the same time (not like HDD)
 Store data by controlling the movement of electrons within NAND chips, as 1s and 0s
 Non-volatile rewritable memory
 Benets of using SSD rather than HDD: More reliable (no moving parts), Considerably lighter (suitable
for laptops), Lower power consumption, Run much cooler than HDDs, Very thin, Data access is faster
than HDD
 Drawback – questionable longevity (20GB per day)

Off-Line Storage:
CD/DVD Disks
 Laser (red) light is used to read and write data in the surface of the disk
 Use a thin layer of metal alloy to store data
 Both systems use a single, spiral track which runs from the centre of the disk to the edge
 DVD uses Dual-Layering which increases the storage capacity (two individual recoding layers)
Blu-ray Disks
 Uses blue laser to carry out read and write operations
 Wavelength of laser light is less than CD and DVD (stores up to ve times more data than DVD)
 Automatically come with secure encryption (prevent piracy and copyright infringement)
 Used as back-up systems
USB Flash Memories
 Very small, lightweight suitable from transferring files
 Small back-up devices for photo, music
 Solid state so need to be treated with care
High- & Low-Level Languages
High-Level Languages
 Easier to read and understand as the language is closer to human language
 Easier to write in shorter time
 Easier to debug at the development stage
 Easier to maintain once in use
Low-Level Languages
 Refer to machine code
 Binary instructions that computer understands

 Translators:
 A program must be translated into binary before a computer can use it
 Types of translators; Compiler, Interpreter and Assembler

Compiler
 Translates a program written in high-level language into machine code
 Used without compiler
 Executable le of machine code produced
 One high-level language translated into several machine code instructions
 Used for general use

Interpreter
 Executes a high-language program a statement at a time
 No executable le of machine code produced
 One high-level language program statement may require several machine code instructions to be
executed
 Cannot be used without interpreter
 Used when program is being developed

Assembler
 Translates a low-level language program into machine code
 Executable le of machine code produced
 One low-level language translated into one machine code instructions
 Can be used without assembler
 Used for general use

Syntax Errors:
 When program is being compiled, if any syntax errors are found no translated program is produced
 Instead, a list of all errors in program is produced
 Programmer corrects program and recompiles
 When a program is being interpreted, the interpreter preforms the action until syntax error is found
 The programmer is then alerted to the place in the program where error was found
 The error is corrected and interpretation continues

You might also like