Communications Protocol

Authors Avatar

Communications Technology Assignment 2

5 June 2003

Communications Protocol

  A communications protocol is similar to a data link protocol. An example is the ‘token ring’ topology as shown below;

  This is where each computer listens to the data cable before sending anything through the network. If the network is clear of any involvement from other computers, then the computer will transmit. However if another node is already transmitting data on to the network, the computer will wait until the cable becomes available.

  Within a ‘token ring’ network, individual hosts are arranged in a ring and a special data token circulates around this ring. When a host wants to transmit, it retrieves and holds the token, transmits the data and then places the token back within the ring. When back in the ring it is able to be taken by another host, which will take the same actions as before.

  There is a risk that two or more computers attempt to transmit at the same time, causing a ‘collision’! It is seen as quite normal these occur and when this happens all of the computers involved pause for a moment and attempt to send again. The delay in which this all happens is very small and does not normally affect the speed of transmission of data over the network.

  Another access method that allows this type of sharing between computers is the IEEE 802.5, which is nearly identical but differs in a few aspects, so this counts as another method! In addition, Ethernet and FDDI are also common LAN Technologies

Components of a Local Area Network

  • Cable – Coaxial, twisted, fiber etc.
  • Servers – File, web and/or email service
  • Hubs/Switches
  • Workstations – Individual computers on the network
  • Local/Shared Peripherals – Printers, fax, remote CD’s, backup devices etc.
  • Shared Peripherals – Connected on the servers and shared over the network
  • Interface Cards – Individual card for networks cards etc.
  • Network Protocol(s) – Language that it will use

Networks are used for the following ways;

  1. File Sharing
  2. Application Sharing
  3. Peripheral Sharing – Shared Printers
  4. Client/Server Applications;
  • Email
  • Internet

5.  Multimedia Applications – Network games!

As with all other communications protocol, TCP/IP is composed of layers:

TCP – This is used for verifying the correct delivery of data from client to server. Data can be lost in the network, but TCP adds support to detect errors and to trigger retransmission until the data is correctly and completely received at the other end

Join now!

Internet Protocol (IP) – This term refers to the movement of packets of data from node to node. The IP forwards each ‘packet’ to a destination address and this can be a certain web site. The Internet authorities like the ISP’s, assign ranges of numbers to different organizations and users. The IP is known as the unique identification code in which a particular computer is using in order to access the World Wide Web.

The Internet Protocol was developed to create a Network of Networks, the Internet.

Sockets – This is the name given to the package of subroutines ...

This is a preview of the whole essay