Internet Communications - TEAMS
Internet Communications - TEAMS
Internet Communications
Data Packets
We have already learnt how the Internet is a massive network of networks, but how does
data travel around the ginormous network? Data packets are the answer!
When files are sent over the internet they are split into millions of data packets. Packets
get sent by different routes according to availability. When you send a file online, the
parts of the file might travel one way around the world and the other parts may go in the
opposite direction! Packets are reassembled at receiving end.
.
1
A-Level Computer Science
Just like humans have postal addresses, every network card in the world has a MAC
address (MAC - Media Access Control). A MAC address is hard coded into each and
every network device and cannot change. It is a 12-digit hexadecimal number (e.g.
56:b3:8f:90:64:ef). It is there so that data being sent over a network can be sent to the
correct network card. It is known as a PHYSICAL ADDRESS
IP Addresses
Just like each network card will have a MAC address, every computer on a network will
have an IP address. They are usually a 32bit number written as 4 decimal numbers (e.g.:
129.168.1.101). They are required for the same reason…so that data being sent over a
network can be sent to the correct node. The main difference is that an IP address is not
hard coded into the computer. It can change and is therefore said to be dynamic. The
reason for this is so that on a network, similar types of hardware can be grouped by being
assigned similar IP addresses. For example, computers could all be given an IP address
starting 190, printers could be given an IP address staring 200 and so on. This means that
different types of device can be more easily managed on a network.
The TCP/IP Protocol
This is probably the most important protocol as it determines how all data is sent over the
internet. Actually it is made up of two protocols:
We saw earlier how data is split into packets before being sent across the internet. The
TCP defines the rules for this.
It ensures all data is split up into data packets in the same way.
It ensures that these data packets are put back together when received by the
destination device.
It also ensures that any data received is the same as that sent.
IP – Internet Protocol
This rule is in place to ensure that data packets are directed towards their destination in
the most appropriate way (which may not be the shortest way).
This is called ‘Packet Switching’ and we will now look at this in more detail.
Packet Switching
Circuit
Switching – an
alternative to
packet
switching
Packet switching is a great way of enabling two or more devices to connect on
communication lines that are shared by a vast number of other devices.
Circuit switching is another way to connect two devices, but this method is actually
inferior (when compared to packet switching) in many ways.
Circuit switching is when two devices are connected together on a dedicated
communication channel. This is the case when people phone one another. The
switchboard route calls from one person to another. This does bring the advantage of the
.
3
A-Level Computer Science
data being sent in order meaning that there is no delay in receiving the data (voice call).
However, this massively wastes bandwidth as others cannot use the same communication
channels. Furthermore, it can only be used by two devices which send and receive data
at the same rate.
Nevertheless, circuit witching is another way that data can be sent from one device to
the other, even if it is a less efficient in certain ways.
If you have your documents / files stored on a file server, the way you access them will be
governed by the File Transfer Protocol. This standard (FTP) ensure that all clients
(computers) on a network can access files from a server in the same way.
Email Protocols
POP – Post Office Protocol
This is the protocol which governs how emails are accessed from a server. Email clients will
use this protocol to access emails from a server in the same way.
IMAP – Internet Message Access Protocol
This is similar to POP but with one important difference. With IMAP, the email will remain on
the server once it has been downloaded by a mail client. This allows other devices to also
.
4
A-Level Computer Science
access the emails which is important for users with multiple devices – they can synchronise
their emails across all devices.
All these protocols which enable the internet to function correctly can be divided into
‘Layers of the Internet’. Each layer has similar functions, and each layer provides a base
for the layer above it – in other words, each layer does all the hard work for the layer
above it!
For example, if you are accessing a website (HTTP - layer 4), it requires data to be split into
packets and sent across the internet (TCP – layer 3 / IP – layer 2), which in turns requires
the physical transport of data via cables (cables / Wi-Fi – layer 1).
.
5
A-Level Computer Science
Logical protocols are rules which govern the data being sent, for example, packet size or
routing.
Handshaking
When two devices communicate over the internet they need to decide on certain
protocols and this process is known as handshaking. It is simply carried out by one device
sending a list of protocols to use to another device and receiving an acknowledgement
back in return. If the devices fail to agree with the choice of protocols, another set must
be chosen, or they will fail to communicate.
.
6