0% found this document useful (0 votes)
13 views11 pages

Communications Technology

CH 14 A level IT 9626 notes

Uploaded by

Mansimar Kaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views11 pages

Communications Technology

CH 14 A level IT 9626 notes

Uploaded by

Mansimar Kaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

The protocols

Monday, February 27, 2023

11:11 PM

Transmission Control Protocol:

Transmission Control Protocol (TCP) is a reliable transport protocol that is used in the preparation, addressing,
sending, and receiving of data across networks including the Internet. TCP is responsible for ensuring that data is
reliably delivered from one device to another, and it does this through a number of mechanisms:

Connection-oriented communication: TCP establishes a connection between the sending and receiving devices
before data is exchanged. This ensures that both devices are ready to receive data and can handle any errors that
occur during transmission.

Reliable data transfer: TCP ensures that all data is delivered reliably to the destination by using sequence numbers to
keep track of the data being sent and received. If any data is lost or damaged during transmission, TCP will retransmit
the missing data until it is successfully received.

Flow control: TCP ensures that data is transmitted at an appropriate rate by using a windowing mechanism. The
sending device will only send data as fast as the receiving device can process it, preventing congestion and ensuring
efficient use of network resources.

Congestion control: TCP is designed to prevent network congestion by slowing down the rate of data transmission if
the network becomes congested. This helps to ensure that other devices on the network can still access the
resources they need.

Overall, TCP plays a critical role in the preparation, addressing, sending, and receiving of data across networks
including the Internet. Its reliability and ability to handle errors make it an essential protocol for many applications,
including email, file transfers, and web browsing.

Internet Protocol:

Internet Protocol (IP) is a protocol that is used in the preparation, addressing, sending, and receiving of data across
networks including the Internet. IP provides the fundamental mechanism for routing packets of data from a source
device to a destination device on a network.

Here are some specific purposes and uses of IP:

Addressing: IP provides a way to uniquely identify devices on a network by assigning each device a unique IP address.
IP addresses are used to route data between devices on a network and are an essential component of the addressing
scheme used on the Internet.
Packet routing: IP is responsible for routing packets of data between devices on a network. When a device sends a
packet of data, IP determines the most efficient route for the data to take to reach its destination.

Fragmentation and reassembly: IP is responsible for fragmenting large packets of data into smaller packets that can
be transmitted over the network. IP also ensures that these packets are reassembled in the correct order at the
destination device.

Error reporting: IP provides error reporting capabilities, allowing devices to detect and report errors such as packet
loss, congestion, and other issues that can impact network performance.

Overall, IP is a critical protocol in the preparation, addressing, sending, and receiving of data across networks
including the Internet. It provides a reliable mechanism for routing packets of data between devices on a network
and plays a key role in ensuring that data is transmitted efficiently and effectively.

Internet Control Message Protocol:

Internet Control Message Protocol (ICMP) is a protocol that is used in the preparation, addressing, sending, and
receiving of data across networks including the Internet. ICMP is responsible for providing feedback to devices on the
network regarding network conditions, connectivity, and errors.

Here are some specific purposes and uses of ICMP:

Error reporting: ICMP provides error reporting capabilities, allowing devices to detect and report errors such as
packet loss, congestion, and other issues that can impact network performance. For example, if a device sends a
packet to another device that cannot be delivered, ICMP will generate an error message indicating the cause of the
failure.

Network connectivity testing: ICMP is commonly used to test network connectivity between devices. The ping utility,
for example, uses ICMP to send packets of data to a remote device and measure the round-trip time for the packets
to be transmitted and received.

Path MTU discovery: ICMP provides a mechanism for devices to determine the maximum transmission unit (MTU)
size for a given path on the network. This information is used to ensure that packets are not fragmented during
transmission, which can lead to performance issues.

Router discovery: ICMP provides a mechanism for devices to discover the routers on a network. This information is
used to determine the best path for packets to take to reach their destination.

Overall, ICMP plays a critical role in the preparation, addressing, sending, and receiving of data across networks
including the Internet. Its ability to provide feedback on network conditions and errors helps to ensure that data is
transmitted efficiently and effectively.
Address Resolution and inverse Address resolution:

Address Resolution Protocol (ARP) is a protocol that is used to map a device's IP address to its physical MAC address
on a local network. When a device wants to send a packet of data to another device on the same network, it needs to
know the MAC address of the recipient. ARP allows a device to determine the MAC address of a device with a known
IP address.

In ARP, the requesting device sends a broadcast message on the network, asking for the MAC address of a device
with a particular IP address. All devices on the network receive the broadcast message, but only the device with the
requested IP address responds with its MAC address. The requesting device then caches the mapping between the IP
address and the MAC address, so that it can use the same mapping for future communication with that device.

ARP is an essential component of the TCP/IP protocol suite and is used in almost all local area networks. It allows
devices to communicate with each other on the same network without requiring a separate router to forward
packets between them. ARP requests and responses are broadcast messages, which means that they are sent to all
devices on the network. As a result, ARP can be vulnerable to attacks such as ARP poisoning, in which an attacker
sends false ARP messages to redirect traffic to their own device.

Inverse Address Resolution Protocol (InARP) is a protocol that is used to discover a device's IP address when its MAC
address is known. In some situations, a device may know its own MAC address but not its own IP address. InARP
allows a device to discover its own IP address by broadcasting its MAC address on the network and waiting for a
response from a device with a matching IP address. InARP is used in more specialized scenarios, such as in
Asynchronous Transfer Mode (ATM) networks.

Overall, ARP and InARP play a critical role in the preparation, addressing, sending, and receiving of data across
networks including the Internet. They help to ensure that packets of data are sent to the correct destination by
providing a mechanism for mapping between IP addresses and MAC addresses. ARP is commonly used in local area
networks (LANs) while InARP is used in more specialized scenarios, such as in Asynchronous Transfer Mode (ATM)
networks.

DHCP:

Dynamic Host Configuration Protocol (DHCP) is a network management protocol that is used to automatically assign
IP addresses and other network configuration parameters to devices on a network. DHCP helps to simplify network
administration by eliminating the need to manually assign IP addresses to each device on the network.

When a device connects to a network, it sends a broadcast message requesting network configuration information. A
DHCP server on the network responds to the request with an offer of an IP address and other configuration
parameters, such as subnet mask, default gateway, and DNS server address. The device can then accept the offer and
use the assigned IP address to communicate on the network.

DHCP is used extensively in local area networks (LANs) and is supported by most network devices, including routers,
switches, and wireless access points. It simplifies the task of network administration by automating the process of IP
address assignment and reducing the likelihood of IP address conflicts.
DHCP also allows for more efficient use of IP addresses by leasing them to devices for a limited period of time. When
a lease expires, the device must request a new IP address from the DHCP server, which allows the server to reclaim
unused IP addresses and reassign them to other devices on the network.

In addition to IP address assignment, DHCP can also be used to distribute other network configuration parameters,
such as domain name, network time protocol (NTP) server address, and network boot server address. This makes
DHCP a versatile protocol for network management and configuration. Overall, DHCP plays an important role in the
preparation, addressing, sending, and receiving of data across networks including the internet, by automating the
process of IP address assignment and simplifying network administration.

HTTP and HTTPS:

HTTP and HTTPS are crucial protocols for communication on the web, and they are used extensively in the
preparation, addressing, sending, and receiving of data across networks, including the internet.

HTTP operates on top of the Internet Protocol (IP) and Transmission Control Protocol (TCP), which provide the
underlying infrastructure for the internet. HTTP is a stateless protocol, which means that each request and response
is independent of any previous interactions between the client and server. This makes HTTP simple and efficient, but
it also means that it cannot maintain information about the client or the state of the connection.

HTTPS, on the other hand, adds a layer of security to HTTP by using SSL/TLS encryption to protect data in transit. This
encryption makes it difficult for attackers to eavesdrop on or tamper with data as it travels between the server and
client. HTTPS also provides authentication and integrity verification, which helps to ensure that the client is
communicating with the intended server and that the data has not been modified in transit.

HTTP and HTTPS are used for a wide range of applications, including browsing the web, sending and receiving email,
uploading and downloading files, and interacting with web-based services. They are also used extensively in web
development for creating dynamic, interactive web applications.

Web developers use HTTP and HTTPS to build websites that are responsive, fast, and secure. They use HTTP to
transmit static resources such as images, HTML, and CSS, and use HTTPS to transmit sensitive data such as login
credentials, credit card information, and other personal data.

Overall, HTTP and HTTPS are essential protocols that enable communication on the web and support the
development of innovative web-based applications and services. Their widespread use and adoption have made the
internet a vital resource for information, commerce, and communication.

File Transfer Protocols:

File Transfer Protocol (FTP) is a protocol used to transfer files over networks, including the internet. FTP uses a client-
server model, where the client sends requests to the server, and the server responds by sending data back to the
client. FTP is widely used for uploading and downloading files, such as documents, images, videos, and software.
FTP provides several features that make it a useful protocol for file transfer, including:

Authentication and Authorization: FTP requires users to authenticate themselves using a username and password
before they can access files on the server. This ensures that only authorized users can access files.

Remote Access: FTP allows users to access files on remote servers, which is useful when files need to be accessed
from different locations.

Support for Different Data Types: FTP supports different data types, such as ASCII and binary, to ensure that files are
transferred correctly.

Large File Transfers: FTP is designed to handle large files, making it ideal for transferring large files or data sets.

FTP is used in various scenarios, such as:

Web Development: Web developers use FTP to upload and download files to web servers. This includes uploading
HTML, CSS, and JavaScript files, as well as images and other media files that are needed for a website.

Data Backup: FTP is commonly used for backing up data to remote servers. This ensures that data is stored offsite and
can be recovered in case of a disaster or data loss.

File Sharing: FTP can be used for file sharing, allowing users to access shared files on a server. This is useful for
organizations that need to share files between employees or departments.

Software Distribution: FTP is often used for software distribution. Software vendors can make their software available
for download using FTP, making it easy for customers to download and install software.

In summary, FTP is a versatile protocol used for transferring files over networks, including the internet. Its features
make it a useful tool for a wide range of applications, including web development, data backup, file sharing, and
software distribution.

Tunneling protocol, e.g. L2TP:

Tunneling protocols, such as Layer 2 Tunneling Protocol (L2TP), are used to encapsulate and send data packets across
networks that are not compatible with the original protocol. They create a virtual tunnel between two endpoints,
allowing the transmission of data packets over networks that may not support the original protocol.

Layer 2 Tunneling Protocol (L2TP) is a widely used tunneling protocol that is commonly used for VPNs (Virtual Private
Networks). L2TP is often used in combination with other protocols, such as IPsec, to create a secure VPN connection.
The purpose and use of L2TP include:

Encapsulation: L2TP encapsulates data packets in a tunnel between two endpoints, allowing the transmission of data
across networks that may not support the original protocol.

Security: L2TP is often used in combination with other protocols, such as IPsec, to create a secure VPN connection.
This allows users to access resources on a remote network securely.

Compatibility: L2TP is widely supported by most operating systems, making it a useful protocol for creating VPN
connections between different types of devices.

Remote Access: L2TP is often used for remote access to a network. This allows users to access resources on a remote
network, such as files and applications, from a different location.

In summary, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol that is commonly used for VPNs. It allows the
transmission of data packets over networks that may not support the original protocol, provides security for VPN
connections, and is widely supported by most operating systems.

Simple mail transfer Protocol:

The Simple Mail Transfer Protocol (SMTP) is a standard protocol used for sending and receiving email messages over
the Internet. SMTP is responsible for sending email messages from the sender's mail server to the recipient's mail
server.

The purpose and use of SMTP include:

Sending email: SMTP is used to send email messages from the sender's mail server to the recipient's mail server. It is
responsible for transferring the message from the sender to the recipient.

Protocol Standardization: SMTP is a standardized protocol that enables communication between different email
systems. This means that email messages can be sent and received between different email providers using SMTP.

Reliable delivery: SMTP ensures reliable delivery of email messages by utilizing a store-and-forward approach. This
means that messages are stored at each mail server until they can be delivered to the recipient.

Spam filtering: SMTP is also used for spam filtering by implementing various mechanisms such as sender
authentication, blacklists, and whitelists. These mechanisms help in identifying and blocking spam emails.
In summary, SMTP is a standard protocol used for sending and receiving email messages over the Internet. It is
responsible for transferring email messages between mail servers, standardizing email communication, ensuring
reliable delivery of messages, and implementing mechanisms for spam filtering.

Post Office Protocols (e.g. POP3) :

Post Office Protocol version 3 (POP3) is a standard protocol used for retrieving email messages from a mail server.
The purpose and use of POP3 include:

Retrieving email: POP3 is used to retrieve email messages from a mail server. It enables users to download their
emails to their local devices such as computers or mobile devices for offline access.

Compatibility with email clients: POP3 is supported by most email clients, including Microsoft Outlook, Mozilla
Thunderbird, and Apple Mail. It allows users to access their emails using their preferred email client.

Simple and efficient: POP3 is a simple and efficient protocol for retrieving email messages. It provides a
straightforward mechanism for retrieving messages from the server, making it easy to use for non-technical users.

Message deletion: POP3 allows users to delete email messages from the server after they have been downloaded to
their local devices. This helps to free up server space and reduce storage costs.

Encryption: POP3 can be secured using encryption mechanisms such as SSL or TLS. This ensures that email messages
are transmitted securely between the client and server, protecting them from eavesdropping and interception.

In summary, POP3 is a standard protocol used for retrieving email messages from a mail server. It allows users to
download their emails to their local devices, is compatible with most email clients, provides a simple and efficient
mechanism for retrieving messages, allows for message deletion, and can be secured using encryption mechanisms.

Internet Message Access Protocol (IMAP) :

Internet Message Access Protocol (IMAP) is a protocol used for email retrieval from a remote server. The main
purpose of IMAP is to enable users to access and manage their email messages from different devices while keeping
the messages stored on the remote server. This allows users to access their email messages from anywhere in the
world, using any device with an Internet connection.

IMAP provides a set of commands and responses that allow email clients to interact with the email server. With
IMAP, users can perform a variety of operations on their email messages, including reading, replying, forwarding,
deleting, and moving messages between folders.

One of the key advantages of IMAP is that it allows users to organize their email messages into folders on the server,
which can be accessed from any device. This means that users can keep their email messages organized and easily
searchable, without having to worry about transferring messages between devices.
In addition, IMAP supports a variety of security features, such as SSL and TLS encryption, which help to protect email
messages and user credentials from interception and unauthorized access.

Telnet:

Telnet is a network protocol used to provide remote access to devices or computers over a network. The purpose of
Telnet is to allow a user to connect to a remote device or computer and interact with its command-line interface as if
they were physically present at the device or computer's console.

The primary use of Telnet is for remote administration of network devices such as routers, switches, and servers. It
allows network administrators to connect to remote devices and perform administrative tasks from a central location
without having to physically access the device.

Another common use of Telnet is for accessing and using remote computer systems or services over a network. For
example, Telnet can be used to remotely access a database server or web server and execute commands or run
scripts.

Telnet uses a client-server architecture, where a Telnet client application is used to connect to a Telnet server running
on the remote device or computer. Once the connection is established, the user can enter commands or execute
scripts on the remote device or computer through the Telnet session.

However, Telnet has been largely replaced by more secure remote access protocols such as Secure Shell (SSH) due to
Telnet's lack of encryption and vulnerability to attacks.

Secure Shell:

SSH (Secure Shell) is a cryptographic network protocol that is used to provide secure communication between two
networked devices. Here are some purposes and uses of SSH in the preparation, addressing, sending, and receiving
of data across networks, including the internet:

Secure Remote Access: SSH allows users to securely access remote devices over an unsecured network like the
Internet. By using encryption techniques, SSH ensures that data transmitted over the network is secure and cannot
be intercepted by unauthorized third parties.

File Transfer: SSH can be used to transfer files securely between two networked devices. SFTP (Secure File Transfer
Protocol) is a popular SSH-based protocol used for transferring files over the network.

Remote Management: System administrators often use SSH to remotely manage servers and other networked
devices. SSH allows administrators to access command-line interfaces of remote devices, execute commands, and
manage configurations.

Tunneling: SSH can be used for secure tunneling of network traffic over the internet. This technique allows users to
securely access resources on a remote network without exposing their data to third-party interception.

Secure Messaging: SSH can also be used for secure messaging between two networked devices. By using SSH to
encrypt messages, users can ensure that their messages are secure and cannot be intercepted by unauthorized third
parties.
In summary, SSH is a versatile protocol that can be used for a variety of purposes in the preparation, addressing,
sending, and receiving of data across networks, including the internet. Its primary use case is to provide secure
communication between two networked devices, but it can also be used for file transfer, remote management,
tunneling, and secure messaging.

MAC Address:

The Media Access Control (MAC) address is a unique identifier that is assigned to network interface cards (NICs) by
the manufacturer. The MAC address is a 48-bit number that is divided into six groups of two hexadecimal digits,
separated by colons or hyphens (e.g., 00:1A:2B:3C:4D:5E).

The purpose of the MAC address is to provide a unique identifier for each device on a network. When data is
transmitted over a network, it is packaged into frames that contain the MAC address of the source and destination
devices. The MAC address is used by the network hardware to identify the destination device and route the data to
the correct destination.

The MAC address is essential for the operation of the Ethernet protocol, which is the most widely used LAN
technology. Ethernet uses the MAC address to control access to the network and to identify the source and
destination devices for each frame. Other LAN technologies, such as Wi-Fi and Bluetooth, also use MAC addresses for
similar purposes.

One of the advantages of using MAC addresses is that they are unique and cannot be easily changed. This makes it
easy to identify and track devices on a network, which can be useful for troubleshooting and network management.
However, MAC addresses can be spoofed or manipulated, which can be a security risk.

In summary, the MAC address is a unique identifier that is assigned to network interface cards by the manufacturer. It
is used to identify devices on a network and to route data between them. The MAC address is an essential
component of LAN technologies such as Ethernet, Wi-Fi, and Bluetooth, and is used for network management and
troubleshooting.

IP Addressing:

The purpose of IP addressing is to provide a unique identifier for each device on a network, and to enable
communication between devices across different networks. An IP address is a numerical label that is assigned to each
device on a network that uses the Internet Protocol (IP) for communication.

IPv4 (Internet Protocol version 4) is the most widely used version of IP addressing. It uses a 32-bit address space,
which allows for approximately 4.3 billion unique addresses. IPv4 addresses are written in decimal notation, with
four groups of numbers separated by periods (e.g., 192.168.0.1). Each group represents eight bits of the address, or
one byte.

IPv6 (Internet Protocol version 6) is a newer version of IP addressing that is designed to address the limitations of
IPv4. It uses a 128-bit address space, which allows for approximately 3.4 x 10^38 unique addresses. IPv6 addresses
are written in hexadecimal notation, with eight groups of four hexadecimal digits separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334). IPv6 also supports additional features such as improved security,
quality of service (QoS), and support for mobile devices.
The use of IP addressing enables devices on different networks to communicate with each other by routing data
through a series of network devices, such as routers and switches. When a device wants to communicate with
another device, it sends a data packet containing the destination IP address to the network. The network devices
then use routing tables to determine the best path for the packet to reach its destination, and forward it accordingly.

IP addressing is essential for the operation of the Internet and other computer networks. It enables devices to
communicate with each other across different networks and facilitates the exchange of information and data. The
transition to IPv6 is currently underway to address the limitations of IPv4 and ensure that there are enough IP
addresses to support the growth of the Internet and other networks in the future.

Frame Relay:

Frame Relay is a packet-switching technology that operates on layer 2 of the OSI (Open Systems Interconnection)
model. It uses a virtual circuit (VC) concept to establish a logical connection between two endpoints over a shared
network infrastructure. Here's how Frame Relay works:

Frame Format: Data is transmitted in variable-sized units called frames. A Frame Relay frame consists of a header and
a payload. The header contains information such as the destination address, source address, and control information.

Virtual Circuit (VC): A Virtual Circuit (VC) is a logical connection established between two endpoints across the Frame
Relay network. There are two types of Virtual Circuits in Frame Relay:

Permanent Virtual Circuit (PVC): A PVC is a fixed connection established between two endpoints, and it remains
active until it is manually terminated.

Switched Virtual Circuit (SVC): An SVC is a temporary connection established on demand between two endpoints. It is
dynamically set up and torn down as needed.

Data Transmission: When data is sent across the Frame Relay network, it is encapsulated in a Frame Relay frame and
sent to the nearest Frame Relay switch. The switch examines the destination address in the frame header and
forwards the frame to the appropriate destination. The switches along the path through the network use the Virtual
Circuit identifier to direct the frame to the correct endpoint.

In summary, Frame Relay is a packet-switching technology that uses Virtual Circuits to establish logical connections
between endpoints over a shared network infrastructure. It offers a cost-effective, reliable, and scalable solution for
connecting multiple geographically dispersed sites over long distances. However, with the advent of newer and more
advanced WAN technologies like MPLS and VPNs, Frame Relay has become less common in recent years.

Connectionless (datagram) mode: In connectionless mode, each packet is treated as an independent unit and is
delivered to the destination without establishing a logical connection. There is no handshaking process to establish a
connection, and each packet is transmitted based on the destination address in the packet header. This mode is used
in protocols such as Ethernet, where packets are transmitted between nodes in a local area network. Because there
is no connection setup, connectionless mode is faster and more efficient than connection-oriented mode, but it is
less reliable.

Internet Protocol (IP): IP is a connectionless protocol that is used for transmitting data over the internet. IP operates
at the network layer of the OSI model and is responsible for routing packets between networks. When a packet is
transmitted over the internet, it is encapsulated in an IP header that contains the source and destination IP
addresses. The packet is then transmitted from one network to another based on the destination address in the IP
header. IP is a connectionless protocol, which means that it does not establish a logical connection between the
sender and receiver before transmitting data. Instead, packets are transmitted independently of each other and are
delivered to the destination as they arrive.

UDP:

UDP is a connectionless transport protocol that operates at the transport layer of the OSI model. Unlike TCP, which is
a connection-oriented protocol that establishes a logical connection between the sender and receiver before
transmitting data, UDP does not establish a connection. Instead, it sends packets of data, called datagrams,
independently of each other.

UDP packets contain a header that includes the source and destination port numbers, the length of the packet, and a
checksum value that is used for error detection. The port numbers allow the receiver to identify the application or
service that should receive the packet. The length field indicates the size of the packet in bytes, including the header.
The checksum value is used to detect errors in the packet during transmission.

When a UDP packet is sent, it is encapsulated in an IP packet that includes the source and destination IP addresses.
The IP packet is then transmitted over the network to the destination. When the packet arrives at the destination,
the UDP header is used to route the packet to the appropriate application or service.

Because UDP does not provide reliability or flow control mechanisms, packets can be lost or delivered out of order.
This can result in degraded performance or errors in the application. However, because UDP is lightweight and
efficient, it is often used in applications that require fast and efficient data transfer, such as video streaming and
online gaming.

In summary, UDP is a connectionless transport protocol that sends packets of data independently of each other. It
does not provide reliability or flow control mechanisms, which makes it less reliable than TCP. However, UDP is
lightweight and efficient, which makes it well-suited for applications that require fast and efficient data transfer.

In summary, connectionless protocols like Ethernet and IP are used for fast and efficient data transfer, while
connection-oriented protocols like Frame Relay and TCP are used for reliable data transfer over long distances. UDP is
a lightweight transport protocol that is often used in situations where speed and efficiency are more important than
reliability. Each protocol has its own strengths and weaknesses, and the choice of protocol depends on the specific
requirements of the application or network.

You might also like