02 Communication and Internet Technologies
02 Communication and Internet Technologies
Technologies
Candidates should be able to:
Show understanding of why a protocol is essential for communication
between computers
Definitions
TCP/IP Protocol A set of protocols for transmitting data over the internet
A peer that downloads many files but does not make available
Lurker
any new content for the community
2.1 Protocols
2.1.1 The need for protocols
Needed so that all data uses the same format
Application Layer
Host ‘X’ will send host ‘Y’ a packet which will include synchronization
sequence bits to that segments will be received in the correct order (TR)
Host ‘Y’ will now respond by sending back its own packet (containing an
acknowledgement together with its own synchronization sequence bits (TR)
Transmission of data between ‘X’ and ‘Y’ can now take place (TR)
Take a packet form the transport layer and adds it own header which will
include the IP address of both sender and recipient (DL)
The IP packet (datagram) is sent to the data-link layer where it assembles the
data grams into frames for transmission (DL)
Application Layer
Handles access to services
Browsing websites
It allows users to access files without the need to identify who they are to the
ftp server
POP3/4 and IMAP (Post Office Protocol and Internet Message Access Protocol)
Pull protocol
When emails are downloaded by client, they are then deleted from the
server
Push protocol
A client opens a connection to a server and keeps the connection active all
the time, the client then uploads a new email to their server
Transport Layer
Handles forwarding packets
Checks packet destination so the packet can be sent to the correct application
TCP
Adds IP header
Passes data to and from network access layer and transport layer
Computer downloads torrent descriptor file and joins swarm using the
software
Server called “tracker” keeps records of all computers in the swarm and
shares their IP addresses so that they can connect to each other
At least one computer has the complete file and makes it available to swarm
Once a computer has a piece of the torrent file, it can start uploading it and
become a “seed”
2. A group of over 100 students has produced a movie. The size of the
movie file is very large.
The students would like to use peer-to-peer file sharing to share this file
with friends and family.
Identify the
most appropriate TCP/IP protocol for sharing this file over the Internet
and describe the way this protocol works. [5]
Solution
2. BitTorrent
BitTorrent client software is made available to friends and family’s
computers. A complete copy of the torrent to be shared is available
on at at least one computer. The file is split into small pieces. The
rarer pieces are given priority for downloading. A user joins by using
the BitTorrent software to load the torrent descriptor file. Once a
computer has a piece, it can become a seed. A server called a
tracker keeps records of all the computers in the swarm the tracker
shares their IP addresses allowing connection to each other
Advantages:
No delays
Disadvantages:
Lower security because easier to intercept since only one route used
Process:
Destination IP address
Sequence number
They may arrive out of order and must be reassembled into original
message at destination using sequence number in the header
Advantages:
Disadvantages:
Routing Tables
Router reads packet header
The router has a routing table, containing info about available hops and status
of different routes
Skill Check 2
Solution
Points To Note
Circuit switching requires a dedicated circuit to be established between
sender and receiver before transmission can start
Ethernet is the most likely option for use in the Network and Data link layers