B3 - Transmission Flashcards
What is TCP/IP
Transmission Control Protocol and Internet Protocol are used together as the basic communication language of the internet
Data sent over the internet is broken up into โpacketsโ to enable it to be sent more efficiently. Each packet is sent individually and then reassembled at destination
- TCP is used to create packets and reassemble at the end
- IP is used to route packets to the intended computer using IP
12 steps of TCP/IP communication
- Transmission Control Protocol
- Internet Protocol
- Application โ> Transport โ> Internet โ> Network
- Web browser
- HTTP and SMTP
- HTTP: Websites, SMTP: Checking emails
- TCP and UDP
- UDP
- Through the use of ports
- It gives instructions on how to reconstruct the data packet into the correct order
- IP address
- Packet switching
3 Web Protocols
โซ HTTP - the HyperText Transfer Protocol is used to allow web servers and browsers to transfer files over the internet. it is how we access WWW
โซ HTTPS - the secure version of the standers HTTP. it uses public key cryptography to encrypt communications between a web browser and server
โซ FTP - The File Transfer Protocol is used to transfer files over the network. It is the technology used to upload files to a server as well as to download large files
How does HTTPS keep data secure during transmissions
โซ It incorporates/uses Transport Layer Security protocol (TLS), (allow SSL) (1) which provides extra layers of protection/encryption (1)
โซ When a browser connects to a site, it checks that the siteโs (TSL/SSL) certificate is valid (1) if the site fails the check the browser displays a warning / alerting the user that the site is not secure (1)
โซ When a browser connects to a site it asks for a public key (1) it uses the public key to produce a session/new key for the connection (1)
โซ The browser/client negotiates keys with the server (1) creating a shared (symmetric) key for the connection (1)
3 Email Protocols
โซ POP3 - the Post Office Protocol 3 is used to retrieve emails from the mail server. It allows us to download messages to our client software for office reading
โซ IMAP (Internet Message Access Protocol) - used for receiving emails/ incoming emails (1) stores emails on server (1) allowing access from multiple devices/synchronises email across devices (1)
โซ SMTP (Simple Mail Transfer Protocol) โ manages outgoing emails / used for sending emails (1) from server to server (1) until it reaches its recipients (mail) server (1)
3 Voice and Video Call Protocols
โซ RTP - the Real-Time Transport protocol is designed to transfer audio and video over IP-based networks
โซ H.323 - this was one of the first successful VOIP protocols and is recommended by the ITU it defines the rules for communication audio and video packet switched networks
โซ SIP - the Session Initiation protocol is used to create, control and end VOIP connections
what is Codecs
- A Codecs is a program used to compress and decompress video and audio files this reduces the space they take up on a adisk and allows fast transfer over a network, such as the internet for VOIP calls and online streaming.
- this leads to a loss of quality in the video or audio
Use of Codecs when VoIP
Uses algorithms (1)
The codec digitises an analogue signal/ encodes (1)
This is compressed (1)
Splits into internet packets (1)
These are transmitted/transferred (1)
When received they are uncompressed (1)
Decodes (1)
User and receiver need to have the same codec (1)
Determines quality (1)
Encrypting for security (1)
Implications of Codecs, using video in digital format
โซ Codec is a file/piece of software (1)
โซ Codec is needed to view the video (1)
โซ Video files are very large (1)
โซ Codec reduce the size/compress the video file (1)
โซ Will improve viewing when using a slow connection/ bandwidth (1)
โซ Affects the quality of the video (1)
โซ (Lossy) codec save larger amounts of space compared to (lossless) (1)
โซ Software compatibility (1)
Security Protocols
โซ Networks must have protocols (or rules) in place for security. These are needed in order to maintain the integrity and security of the data being transferred โ it usually does this by encrypting the data using cryptography.
โซ ๐๐๐ (Secure Sockets Layers) and ๐๐๐ (Transport Layer Security)
are used to ensure that transactions over networks are kept safe
what is Lossy Compression
- Lossy Compression reduces the size of a file but it does this by losing some of the information;
- When compressed files are decompressed they do not give back the original data, because data was lost during compression;
- Because Lossy Compression cannot be decompressed to yield the exact original data, it is not a good method of compression for critical data, such as textual data, we would use Lossless Compression for this;
- Lossy Compression is most useful for digitally sampled analogue data, such as sound, video, graphics or images;
- Some examples of Lossy Compression algorithms are JPEG, MPEG, and MP3.
what is bandwidth and Latency
๐๐๐ง๐๐ฐ๐ข๐๐ญ๐ก
- Amount of data transferred/transmitted (1)
- (From one point to another) in a period of time (1)
- Measured in mega/bits per second (1)
๐๐๐ญ๐๐ง๐๐ฒ
- Time delay / lag experienced (1)
- Before a component responds to an instruction (1)
- Measured in milliseconds (1)
Implications of Bandwidth and Latency
- Browsing the internet doesnโt need an instant response so latency isnโt a big factor. Bandwidth is an important factor as it affects how long files takes to download
-Online gaming needs very low latency as players need a fast response for real-time updates of character movement
-video calls need low latency and high bandwidth as you need to transfer a lot of data
Factors that affect Bandwidth & Latency
โซ ๐๐ฆ๐จ๐ฎ๐ง๐ญ ๐จ๐ ๐๐จ๐ง๐ญ๐๐ง๐ญ๐ข๐จ๐ง / ๐ง๐ฎ๐ฆ๐๐๐ซ ๐จ๐ ๐จ๐ญ๐ก๐๐ซ ๐ฎ๐ฌ๐๐ซ๐ฌ (๐)
Bandwidth:
At peak times such as early morning when many users are logging on to check emails (1)
Latency:
Network devices may have to queue users/resend packets due to collisions/may not be able to respond to all the connection requests (1)
โซ ๐๐ฆ๐จ๐ฎ๐ง๐ญ ๐จ๐ ๐๐๐ญ๐ ๐๐๐ข๐ง๐ ๐ญ๐ซ๐๐ง๐ฌ๐ฆ๐ข๐ญ๐ญ๐๐ ๐จ๐ง ๐ญ๐ก๐ ๐ง๐๐ญ๐ฐ๐จ๐ซ๐ค (๐)
Bandwidth:
More users simultaneously transmitting data will be โsharingโ the connection (1)
Latency:
Network devices may have to resend packets due to collisions/ receiving devices may take longer to process extra requests (1)
โซ ๐๐ฒ๐ฉ๐ ๐จ๐ ๐๐จ๐ง๐ง๐๐๐ญ๐ข๐จ๐ง ๐๐๐ข๐ง๐ ๐ฎ๐ฌ๐๐ (๐)
Bandwidth:
Eg, a wired connection (is generally faster) generally has a higher bandwidth than wireless connection (1)
Latency:
Some connection types require transmissions. e.g., Wi-Fi neds cable - wireless - cable. These changes take time. (1)
โซ ๐๐ข๐ฌ๐ญ๐๐ง๐๐ ๐๐ซ๐จ๐ฆ ๐ญ๐ก๐ ๐ง๐๐๐ซ๐๐ฌ๐ญ ๐ญ๐๐ฅ๐๐๐จ๐ฆ๐ฆ๐ฎ๐ง๐ข๐๐๐ญ๐ข๐จ๐ง ๐๐ฑ๐๐ก๐๐ง๐ ๐ / ๐ง๐๐ญ๐ฐ๐จ๐ซ๐ค ๐ฅ๐ข๐ง๐ค (๐)
Bandwidth:
Bandwidth reduces over distance / gets weaker (1)
Latency:
Signal takes longer to cover a greater distance and must travel at least as far as the nearest network (1)
Security considerations:
What can we put in place to minimize security risks?
โซ User authentication - usernames and passwords authenticate users who have permission to use a network and prevent unauthorized access by hackers
โซ Firewalls - these monitor traffic to prevent unauthorized access and dangerous data packets being passed into the systems and causing harm
โซ Encryption - information can be intercepted while being transmitted using encryption ensures intercepted data cannot be read. HTTPS is a commonly used method for secure data transmission