Communication Protocols - Computer Science
Communication Protocols - Computer Science
Illustrations by Pixeltrue on
icons8
Protocols
At the simplest level, a protocol could
define that a positive voltage
represents a bit with value 1.
A protocol might define a transmission
speed that a sender must not exceed.
Many of the rules relate to the format of
a message or of a component of a
message. For example, a definition of
the format of the first 40 bytes in a
packet.
Illustrations by Pixeltrue on
icons8
A protocol stack
For a protocol suite the protocols can be viewed as layers within a protocol
stack. There are a number of aspects relating to this concept.
Each layer can only accept input from the next higher layer or the next
lower layer.
There is a defined interface between adjacent layers which constitutes
the only interaction allowed between layers.
A layer is serviced by the actions of lower layers.
With the possible exception of the lowest layer the functioning of a layer
is created byinstalled soft ware.
A layer may comprise sub-layers.
Any user interaction will take place using protocols associated with the
highest level layer in the stack.
Any direct access to hardware is confined to the lowest layer in the
stack.
The TCP/IP protocol suite
Using layers breaks the process down into manageable self-contained modules
(this process is known as decomposition), making it easier to develop and
easier to make software and hardware compatible.
When sending data across the internet (network), the layers are used in the
order layer 4 to layer 1.
02 Transport 04 Link
The Transport layer then Finally, the Link layer
segments the data into smaller encapsulates the packets into
packets and adds necessary frames for transmission.
information.
The TCP/IP suite comprises a number of protocols,
including the following:
“
application layer: HTTP, SMTP, DNS, FTP, POP3, IMAP
”
Application layer
Of the two protocols shown being used, SMTP (Simple Mail Transfer Protocol) is a ‘push’
protocol whereas POP3 (Post Office Protocol version 3) is a ‘pull’ protocol.
There is a more recent alternative to POP3, which is IMAP (Internet Message Access
Protocol).
The approach using POP3 is for emails to be downloaded onto the client computer. With
IMAP the emails are not downloaded; they remain stored on the server but remain
accessible from the client.
It can be argued that POP3 is more secure to cyber-attack because emails are locally
stored.
However, the server will be backed up regularly whereas the local client might not be.
The major advantage for IMAP is that the server can be accessed from any client. This
makes it suitable for anyone on the move or if someone is using a system other than that
normally used. POP3 emails are only accessible from the one client system.
SMTP has been largely replaced by the use of web-based mail. A browser is used to
access the email application, so HTTP is now the protocol used. However, SMTP remains
in use for transfer between the mail servers.
Email protocols
Transport layer
The transport layer regulates the network connections; this is where data is broken up
into packets which are then sent to the internet/network layer (IP protocol).
The transport layer ensures that packets arrive in sequence, without errors, by swapping
acknowledgements and retransmitting packets if they become lost or corrupted.
The main protocols associated with the transport layer are transmission control protocol
(TCP), user datagram protocol (UDP) and SCTP.
Transmission control protocol (TCP)
TCP is responsible for the safe delivery of a message by creating sufficient packets for
transmission.
For this last reason, TCP is often referred to as a host-to-host transmission protocol.
The term host refers to a computer or device that can communicate with another
computer/device (host).
Hosts can include clients and servers that send/receive data, provide services or apps.
These are the steps taken when host computer ‘X’ communicates with another
host ‘Y’ :
» Host ‘X’ will first of all send host ‘Y’ a segment (packet) which will include
synchronisation sequence bits so that segments will be received in thecorrect order.
» Host ‘Y’ will now respond by sending back its own segment (containing an
acknowledgement together with its own synchronisation sequence bits).
» Host ‘X’ now sends out its own acknowledgement that the segment from ‘Y’
was received.
» Transmission of data between ‘X’ and ‘Y’ can now take place.
Internet/network layer and network/data-link layer
Packets are known as frames at the data-link layer,
Datagrams at the internet layer;
Segments at the transport layer.
Different names are used as each layer adds its own header to the packet.
Ethernet protocols
Description:
▻
Ethernet is a system that connects a number of computers or devices together
▻
to form a LAN.
▻
It uses protocols to control the movement of frames between computers or
devices and to avoid simultaneous transmission by two or more devices.
▻
It is a local protocol and does not provide any means to communicate
▻
with external devices. This requires the use of IP which sits on top of the
▻
Ethernet protocol.
A typical frame used by the Ethernet protocol
The components that make up Ethernet data are:
Wireless LANs (standard IEEE 802.11 protocol) use a MAC protocol called carrier
sense multiple access with collision avoidance (CSMA/CA) (not to be confused
with CSMA/CD).
CSMA/CA uses distributed control function (DCF) to ensure a WiFi device can
only transmit when there is a free channel available.
Since all transmissions are acknowledged when using DCF, if a device does not receive
an acknowledgement it will assume a collision will occur and waits for a random time
interval before trying again.
This is an important protocol to ensure the security and integrity of data being sent over
a wireless network (such as WLAN).
Bluetooth protocols
Bluetooth uses the standard IEEE 802.15 protocol for short-range data
transmission/communication.
There are numerous additional Bluetooth protocols due to the many applications that
may use this wireless connectivity.
WiMax
Worldwide interoperability for microwave access (WiMax) runs under IEEE 802.16
protocol.
Fixed WiMax networks are based on the IEEE 802.16-2004 protocol, whereas mobile
WiMax is based on IEEE 802.16-2005 protocol.