Professional Documents
Culture Documents
Levels of Protocols
1. Application level
* The actual data to be transmitted is
created by software application
• This data is organised in a format understood by the application that will receive the data
2. Control and Addressing level
• This is where communication with the network is established and maintained
• It manages the correct transmission of each packet of data
• Packets not reaching the destination are retransmitted
• The data is reorganised into a form suitable for transmission
3. Transmission level
• This layer defines how the transmission media is actually shared
• The device drivers control the physical transmission hardware and determine the size of
transmitted packets and the speed of transfer
• This layer performs the actual physical transfer
• Converse the bits to each message into signals that are transmitted down the transmission
media
Ways of Transmitting:
● Simplex means communication occurs in one direction only (feedback cannot be
received from the other end). Television and radio are examples of simplex
communication.
● Half-duplex means communication can occur in both directions, but never at the same
time. A walkie-talkie or two-way radio operates in half-duplex using a single channel.
● Full duplex, or just duplex, means data can be transferred in both directions at the same
time. Telephones/Online Gaming operates in this way using a single channel; it is
possible for both parties to talk at the same time.
● Synchronous, talking in real-time (telephone calls), trying to synchronise the receiving
and transmitting clock
● Asynchronous, there is a delay (emails and texts), only works successfully when small
amounts of data are transferred at relatively low speeds
◆ At the (2nd) Control level, the protocols are managed by operating system
◆ Protocols = ensure the packets reach their destination correctly
● Uses Error Checks
● Checks Flow control
● Uses Source and destination address
◆ This process is reversed on the receiving end (trailers and headers removed)
➔ Signal generation by the transmitter – Transmission Level
◆ The transmitter is the physical hardware that encodes the data onto the medium
creating the signal
◆ Transmitters and receivers are contained in the same hardware device
◆ Hardware is controlled by protocols at transmission level
➔ Transmission – Transmission Level
◆ Transmission occurs as the signal travels through the medium
◆ Each bit/pattern of bits move from sender to receiver in particular waveform
➔ Synchronising the exchange – Transmission Level
◆ Transmitter/receiver uses a common clock so transmission can be synchronised!
◆ Synchronous communication transfer large packets of data
◆ While the transmitter is encoding the signal, the receiver is decoding the signal
AT THE SAME TIME!!
➔ Addressing and Routing – Communication Control and Addressing Level
◆ Data packets pass through many different varied links during transmission
◆ The packets (of the same file) may travel many different paths from the
transmitter to the receiver
◆ Each communication link will have its own protocol
◆ Each packet will ascend each protocol level until it reaches the addressing and
routing protocol
● Then they descend the level as it is prepared for transmission down the
next path
➔ Error detection and correction – Communication Control and Addressing Level
◆ As message descend the levels prior to transmission, many protocols calculate
checksum and cyclic redundancy check (CRC) values and include them within
header or trailer
◆ Once the message has been received, it ascends protocol levels where the
headers and trailers are examined
◆ Error check calculation is performed (by TCP, using inventory-like list) and if an
error is detected that packet is discarded and a replacement packet is sent
➔ Security and management – Communication Control and Addressing Level
◆ Many protocols restrict messages based on usernames and passwords
◆ Others escrypt messages during transmission
Roles of Protocols in Communication
● Formal set of rules and procedures that must be observed for 2 devices to transfer data
efficiently and successfully
● Developed to allow devices to communicate over a network
● When computers were first developed, different brands/models of computers would have
their own programming languages
● Instead of programming all computers to speak everyone else’s language, a separate
‘protocol’ was developed to allow them to communicate over a network
○ Each device now only had to learn new protocol to speak to lots of devices
➔ Handshaking = Process of negotiating and establishing the
rules of communication between 2+ devices. (Before two
devices can communicate they “handshake” to agree on
protocols to use)
Client Server
Users interact with the client via application software Users often unaware of presence of servers
Users process files locally Server controls access to data by the use of log-on
procedures at the client end
Users transmit/retrieve data to or from the server as Server stores and supplies files as requested by the
required clients
User can communicate with servers Server can communicate with many clients
There are different types of clients existing on the same network. Thin or flat clients implies how
much processing is done at the user end of the client-server partnership
May not have a hard drive, and will rely on the server to Stores its application software on its hard drive
have the software application it needs
File server • stores files and programs shared by clients on the General application software, such as
network word processor, graphics application
Print server • controls one or more printers on the network and stores General application that requires
data waiting to be printed documents to be printed
Mail server • provides e-mail facilities, stores incoming messages Email application
ready for distribution to users and forwards outgoing mail
to appropriate devices.
• should also have virus and spam protection software
installed
Web server • provides a connection to the Internet, whereby web Web browser
pages can be retrieved and transmitted. Should have
firewall installed
Database server • stores and supplies database files or specific records Database application, DBMS
Proxy server • tries to perform the requested service on behalf of the Conventional clients and servers
real server, by keeping a record of recent requests and
responses within its large cache
• they can be set to block and/or filter inappropriate
content (like porn)
EFTPOS – Customers pay for goods using credit cards. Communication with financial
institutions; EFTPOS machine connects machine owner’s server, which connects to customer’s
bank server, where the transfer of funds occurs (A public key system is used to encrypt data)
Internet banking – Customer’s web browser connects directly to the bank’s web server using a
URL that starts with https (connection is secure!). http protocol is used with security protocols in
middle of protocol stack (using public key encryption = padlock icon confirms secure
connection)
Trading over the Internet – PayPal system can be used to ensure that funds are transferred
appropriately, and that credit card details are kept secure
Need/Purpose • The share ideas and Cheap and easy To provide fast and convenient
information alternative to the opportunities to shop, bank and pay
• Discuss options traditional telephone bills
• Make decisions system
Information • Web camera and microphone Microphone, speakers, Terminals, networks including the
technology • High speed Internet Internet connection, Internet, servers complex and
(including connection instant messaging sophisticated software
computer) • large monitors or data software
projects
• web conference software
Advantages • Saves on travel-time and • Software free, • Accessibility from remote locations, all
expense additional technology is day, every day
• Real-time and face-to-face not expensive, • Can be cheaper for both customer
discussion recipients don’t need and provider
computer
Disadvantages • May require IT specialist to • If the Internet pathway • Can be subject to fraudsters, affecting
set up connections is busy, some data customer trust and loyalty
• Low speed Internet packets may be lost • Power failures prevent to system
connection may compromise causing poor quality being available
quality of video audio • User must have computer and
• Technology not Internet connection for banking and
available in power shopping
failure, bad for • Can impact on local shops and banks
emergencies in remote communities
Twisted Pair • pairs of wires twisted LANs, 100 metres • Up to gigabits per
together telephone from computer second
• sometimes shielded with connections, to switch • Has only some
metal sheeting ADSL protection from
• Some coppah in there interference
Fibre Optic • consists of many optic • Major comm. • Repeaters • Supports high data
fibres and several protective links between are required to transfer rates over
layers continents and boost the large distances (in
• light travels down the fibre under sea. signal every the order of gigabits
with little loss (refraction) • Backbones ~100 kms per sec)
• thin strands of glass fibre of LANs • The most • Interference does
• Aircraft, high Expensive not affect signal
security • Very secure against
networks tapping
Wireless
Microwave Point to point at Direct line of sight required. Affected • Low security
ground level by interference • Low speeds, but can transmit across difficult
and to terrain and into space
satellites • Hardware devices that transmit and receive
data can be mobile
- Microwave, Radio and Infrared - These are all frequencies in the em spectrum and
signals are transmitted through the atmosphere and/or vacuum
● Microwave – widely used for long-distance data transmission. Antennae on high towers
can transmit across lines of sight but can be affected by interference (bad weather).
Needs repeated stations every 50km because of the curvature of earth. Carries high
bandwidth and uses repeater to amplify/retransmit signal along signal path
● Infrared – Infrared waves occur above microwaves and below visible light. They travel in
a straight line hence a direct line of sight is required between source and destination.
Used only over short distances. Traditionally, TV remote controls use infrared
● Wireless LANs (Radio) – Do not need cables to connect devices to LAN. Uses radio
frequency technology, transmit and receive data over the air. Mobile, adjustable and
provide security using WEP (wire encryption protocol). Can expand to allow internet
access, provided the user is within a range of phone connection. Quality of transmission
using Wi-Fi is not as high as other systems
● Satellite – a geostationary object that functions as a repeater. Maintains the same
position relative to earth. Very expensive but efficient and cost-effective over long
distances. High bandwidth and need to be replaced every 15-20 or if damaged
● Wireless Communications (3G and 4G) –
Communication Protocols
http – Hypertext Transfer Protocol For web pages, to establish connection with an html server
smtp – Simple Mail Transfer Protocol For e-mails, to allow connection to the e-mail server, simple –
because most e-mails and their attachments are sent as text
ftp – File Transfer Protocol For direct file transfer from one computer to another, regardless
of operating system being used or whether the devices are
clients or servers. Most recent browsers can connect to ftp
servers
SSL – Secure Sockets Layer For transmitting data safely (usually e-commerce), it applies
encryption of data and digital certificates using a public key to
ensure that the message cannot be read or tampered with by
unauthorised agents.
Communication Control and Addressing Level Protocol determined by the operating system
(both TCP and IP are used in internet communications)
TCP – Transmission Control Protocol Error checking and data flow control, to ensure that the
messages are actually delivered correctly. Also works with IP,
cannot work alone. Responsible for transmission of most data
across the internet.
IP – Internet Protocol Routes the data packets over the most efficient pathway for their
destination, using routers and IP addresses (4-byte number that
uniquely identifies each device on a network that uses Internet
Protocol. Always includes Host and Network ID). CAN work with
TCP.
Causes data packets (“datagrams”) to move from sender to
receiver. Does not check to see if data packets have arrived, it
just sends them off and TCP does all the error checking –
Connectionless protocol. ARIP (Address Resolution Protocol)
helps it determine next hop for each datagram
Used for LAN (WAN uses Sonnet protocol instead). Uses CRC
(Cyclic Redundancy Checks) for error checking. Replaced Token
Ring (one of the original protocols used at Transmission Level)
Token Ring protocol Receives and transmits data packets to the next node on the
ring topology networks ONLY when it has received the ‘token’, to
which it attaches the data packet.
Baud rate • The number of signal events (baud) occurring each second along a
section of the transmission medium (e.g. change in voltage on a wire)
• If there are 4 possible types of baud, then 2 bits could be transmitted on
each baud, meaning an increase in rate of data transfer (negates the
change)
• Equivalent to the number of symbols per second.
Mesh Topologies
● More than one physical path between pairs of nodes
● The primary topology of the Internet
● Routers direct packets over a particular path (there’s
so many options!)
● Excellent fault tolerance as packets are
automatically routed around faults
Wireless Network Topologies
● A wireless access point provides the signal to
devices on the network
● Devices join the network with a password
● The wireless network will only have a limited area
which devices will receive the signal
● Devices can be moved around easily within the
network and can be easily added when needed.
Functions of Hardware
Gateways Does the same between sections of a network that are using
different protocols
Network Interface Cards (NIC) NIC is a device that links a computer processor to the
network. Often expansion cards that slot into the
motherboard and connect to the network using cable. But
they can also be built into the motherboard and function by
‘reading’ a link using infrared waves in the atmosphere
Mobile phones Connect using radio waves and require cellular stations to
access the network. Stations must be within a specified
distance of the phone for the network to function. Stations
link to telephone networks. Portable and offer a range of
services (Voice mail, text messaging) expensive compared
to standard telephone networks.
Wireless Access Points Central node on wireless LANs, broadcast all data packets
to all wireless nodes within the local area. To avoid security
issues, encryption system should be used
Main purpose is to share information Main purpose is to share information Main purpose is to share information
Not owned by anyone particular body Privately owned network Privately owned network that may be
hosted by external agent
A world-wide network of computers, Can be created by designating one Can be created by designating one
servers and LANs computer to act as a server to other computer to act as a server to other
(client) computers or LANs) (client) computers or LANs)
Can be accessed by the public, via Can only be accessed by specific users Can be accessed by specific users,
an ISP (Internet Service Provider) within Intranet including specified external bodies.
Very little protection from Viruses Can be protected from intruders and Can be protected from intruders and
viruses by use of security and software viruses by use of security and software
- Intranet and Extranet may include virtual private networks that use the Internet
infrastructure
Collecting (and Displaying) - Telephone, EFTPOS terminal and computer can be input
(collection) and output (display) devices
● Telephone
○ Phone is display device, leave or listen to a message on voicemail
○ Use in automated bill paying – input of payers’ details and transactions,
authorisation, then receiving transaction receipt number
○ Use in product-ordering systems - input requirement details then receiving order
number and transaction details
● EFTPOS terminal
○A display device for electronic banking
○Customer will input PIN and transaction amount
○Then receive output receipt or money to pay, to make cash withdrawal, or
transfer funds from one account to another
● Computer
○ Uses browser or e-mail application to collect and receive data at each end of a
communication system
Processing
Encoding
- Terminal devices can decide to encode data from analog to digital form (digitisation, like
scanning image), which involves sampling of analog data by ADC (analog to digital
converter) or a DAC on receiver’s end
- This is transmitting and receiving
Formation of data packets
- Protocols installed in the system will encode digital data into data packets ready for
transmission across the network/Internet. Each protocol will add a header and trailer in
the data packet which includes
● Type of application that created it, address of sender and receiver, and an error
detection code
Routing or the Actual Process
● Some layers break data packet into segments, each requiring the things above
● Transmission layer of protocol stack changes data into physical signal (voltage or light
signal) hat can be transmitted on cable or other medium
● Receiver needs to process the data segments at levels of protocol in reverse order so
that the original message can be displayed properly.
Encryption and Decryption
● May occur within the encoding process to ensure data is secure. Data will be calculated
for error checking purposes and included in the data packet.
● Routing and Encryption occur at several levels in the protocol stack
Error checking methods
● The internet may have congestion whilst routers direct data bits from server to user
● Congestion results in loss of bits, so we need to re-transmit data and discard old one
● Process of detecting errors during transmission/storage of digital data and correcting
○ Usually involves sending or storing extra data bits according to algorithm
Cyclic Redundancy Check (CRC) Uses the remainder after • The most accurate • Ethernet
dividing the value of the • Better at detecting errors protocol
data packet by a than checksums (and • Secondary
predetermined (complex) parity check) storage
number or expression. hardware
devices
Treats the message as an
enormous binary number
Security Protecting data and intellectual property from accidental or deliberate abuse.
Procedures acknowledge this issue (back-up or lock-up)
Globalisation Companies can benefit by associating with overseas partners but smaller Magents and
communities may be disempowered
Changing Nature of Work Easy trading and communication over the Internet for individuals, businesses can be
kickstarted from home but isolation can be a problem
Interpersonal People can communicate easier but choosing different modes of communication (email
Relationships vs phone call) can affect people. Relationships at home and work can be affected by
access to information which was not foreseen, like e-mail and data files
E-crime Individuals are made vulnerable to scams who use Internet anonymity to hide.
Government allocated considerable resources to fight this. Identity fraud, spam and
phishing are concerns.
Legal Issues Often individuals do not understand legal obligations (copyright and ownership of
material)
Virtual Communities Forming groups with individuals across the world is nice. But on-line dating and
media-sharing activities can result in breach of privacy.
Internet Fraud ● Fraud involves some kind of deception that includes false statements that
● Security intentionally aims to cause another person to suffer loss – eg, financial.
● E-crime ● Spam messages trying to convince users to purchase goods, reveal passwords,
or other personal details
● Identity theft
● Phishing – email that asks for personal details
Power and Control ● internet filtering – schools, parents, countries blocking access to Internet
● Security ● monitoring data – collection of metadata, eavesdropping on phone calls or emails
● infringing on privacy – who else can see my emails
● Globalisation ● who is allowed to store data about other people and who has access to it – who
makes the decision about who will have access, eg, politicians, police, etc
● if our data is stolen by another someone in another country – can our country's
laws prosecute that person
Removal of physical ● if our data is stolen by another someone in another country – can our country's
boundaries laws prosecute that person
● Globalisation ● determining if a website/business is legitimate – can be difficult to tell online
● Legalities ● shopping online – purchasing from other countries can raise issues of where tax is
paid, damage to business in Australia
● other countries can interfere in elections
Work and employment ● Can work from home – collaborate with people in different locations (overseas!)
issues ● Can take away other forms of employment – data scientists, traditional forms of
● Changing nature of reporting, photographers that work for newspapers
work ● Online shopping – don’t need an actual shop front anymore, for example, etsy
● Mobile phones and emails mean that we can be contacted anytime anywhere –
being expected to respond to issues when on holidays/break
● People can feel isolated using technology to communicate and not working with
actual people
Emerging Trends:
● Blogs: A blog is a web page that serves as a publicly accessible personal journal for an
individual. Entries are usually displayed in data order or updated daily. Blogs reflect
personality of author, (an individual) who does not let visitors edit or change originally
posted material, only to interact and add comments
● Wiki: Collaborative website that shows collective work of multiple authors. Wiki allows
people to edit, delete, modify content that has been previously placed.
● RSS (Really Simple Syndication): describes syndication (sharing) of content/information
on the web. RSS is an XML-based format: like in distributing news headlines and
podcasts on the web. A website that wants to allow other sites to publish some of its
content creates the document as an RSS feed and registers the document with an RSS
publisher. A user that can read (subscribe to) the feed can use the content on a different
site. Author does not know who has subscribed to the feed. Syndicated content includes
data such as event listings, project updates and excerpts from discussion forums/videos
and corporate info
● Podcasts: Collection of mp3 files that deliver audio files in compressed format, used for
communication. Distributed as RSS feeds and a reader software application (aggregator)
will store a set of subscriptions that are checked regularly for updates. Users can read
the feeds on their computer screens and listen to downloaded content (images or video)
on their audio player or similar device
● On-line/Internet radio: used by traditional/new radio broadcasters to deliver their
programs over the Internet. Streaming software is used to transmit and receive data and
programs can be listened to whenever (live or not). Wireless connectivity can feed
Internet broadcasts to many devices, so it has no geographic limitations. These
broadcasts can include photos, graphics, texts, links and interactive message
boards/chat rooms. Cost of getting on the air is small for new Internet broadcasters so
Internet radio can appeal to micro-communities of listeners of niche interests.
● Online TV or IPTV (Internet protocol TV): Allows digital television service to be delivered
using Internet Protocol over network infrastructure, like delivery by broadband
connection. This is television content that is received by the viewer through technologies
used for computer networks.
● Video on Demand (VOD): Is a system that allows users to watch video and clip content
over a network in an interactive television system. They stream content or download it,
where the program is bought in its entirety before viewing starts. User selects or buys a
movie or television program and just watches it.
● 3G Technologies for Mobile Communications: 3rd generation of mobile phone
technology. Offers a wider range of advanced services (greater network capacity and
improved efficiency). Services include most Internet applications including web browsing,
video calls, in a mobile environment at 5-10Mbps using wide area cellular telephone
networks