Chat with us, powered by LiveChat Transmission Control Protocol/ Internet Protocol(TCP/IP) – UDP/TCP -Radio Frequency Identification(RFID) - Very-Good Essays

Transmission Control Protocol/ Internet Protocol(TCP/IP) – UDP/TCP -Radio Frequency Identification(RFID)

Networking Project: 

 

Research and Planning

 

Chosen Topics: 

 

           -Transmission Control Protocol/ Internet Protocol(TCP/IP)

 

– UDP/TCP

 

-Radio Frequency  Identification(RFID)

 

Table of contents 

 

Transmission Control Protocol/ Internet Protocol(TCP/IP)…………………………Pg 2

 

What is it? ……………..……………………………………………….Pg 2

 

LAYERS WITH DEFINITION …………….………………………….Pg 2

 

Critiques of TCP/IP and OSI Models…..……………..………………..Pg 4

 

Purpose/History……………………………………………….…………Pg 4 

 

UDP………………….…………………………………………………………Pg 5

 

Transport layer ……………………………..…………………………. Pg 5

 

What is TCP and UDP..…..……………………………………………..Pg 5

 

Comparison TCP/ UDP…..……………………………………………..Pg 5

 

RFID………………………………………………………………………….Pg 6

 

What is it ?………………………………………………………………………………….Pg 6

 

Types of RFID………………………………………………………….Pg 6

 

Security…………………………………………………………………Pg 7

 

          Conclusion……………………………………………………………..Pg 8

 

 Transmission Control Protocol/Internet Protocol (TCP/IP)

 

What is it ?

 

Is the set of protocols that devices follow in order to communicate(send or receive data(such as emails, videos/pic , documents, phone calls )) with each other. They are able to communicate even if part of the network was damaged.  

 

Examples: 

 

Real Example: You want to send an email to a Professor because you can’t make it to class since you were at the hospital. 

 

First: Your computer is connected to the internet which is part of a network. 

 

Second: Your computer takes your email and converts follows a process in order to converter it into data that it can send 

 

Third: The Professors Computer receives this data it then has to check if it received it correctly if so then it will be converted into a email response and now the Professor can read it.

 

LAYER WITH DEFINITION

 

7 layer  OSI Model  

 

Application: Provides network services directly to users and applications, such as email, web 

 

browsing, and file transfer.

 

Presentation: Translates, encrypts, and compresses data for exchange between applications.       

 

Session: Establishes, maintains, and terminates communication sessions between applications.

 

Transport: Provides reliable end-to-end communication between devices, managing data segmentation and error recovery.

 

Network: Routes data packets between different networks, determining the best path for transmission.

 

Data link:  Manages data transfer between devices on the same network, ensuring error-free communication.

 

Physical: Handles the actual transmission of data over physical mediums like cables or wireless signals.                  

 

4 Layer  TCP/IP

 

  Application: It contains all the higher-level protocols specific to application.Domain Name System (DNS): Used for mapping hostnames onto their  network addresses.  Hypertext Transfer Protocol (HTTP): Used for fetching pages on the  World Wide Web  Real-Time Transport Protocol (RTP): Used for delivering real-time media such as voice or movies.

 

 Transport :  There are 2 main protocols are TCP & UDP depending on needs and choices but  they also handle transport but they rely on the fact that lower levels will handle more basic functions such as IP.

 

Network :    It uses the Internet Protocol (IP) to send packets and ensures they   

 

  reach their destination. There’s also the Internet Control Message    Protocol (ICMP), which helps with the functioning of IP.  addressing and outing 

 

Link : is the layer not in a traditional way but rather a point btw the                                                                  

 

 computer and physical connection

 

Comparison of layers: 

 

For the presentation there will have diagrams so this section will be much clearer

 

-Session Layer,  presentation Layer,  and Application Layer in the OSI model is combined together in just the Application Layer in for the TCP/IP model  

 

-There is not physical layer in the TCP/IP model like there is in the OSI model

 

Critiques of TCP/IP and OSI Models

 

Critiques of  TCP/IP

 

– Doesn’t clearly separate different parts like services, interfaces, and protocols, making it confusing for designing new networks.

 

– The link layer isn’t really a layer but more of an interface, which makes it hard to understand the model’s structure.

 

Critiques of OSI MODEL

 

· Flawed design: including political decisions in its seven-layer structure, where some layers like session and presentation were almost empty while others like data link and network were too full. 

 

· Inefficient :as  flow control, and error control  were repeated  making it redundant

 

Purpose/ History 

 

Both models were created to help connect different types of networks. 

 

TCP came from the government program ARPANET. TCP is generally used in practice 

 

OSI created by ISO  international organization of  standardization. It is a conceptual framework to standardize networks. It is used more for understanding rather than in practice.

 

User Datagram Protocol(UDP)

 

Transport Layer

 

This is mainly discussed in the transport layer along with TCP

 

Transport Layer is between the application and network layer. It makes sure that data arrives accurately and reliably. It does this through TCP and UDP.

 

What is UDP and TCP? 

 

TCP and UDP are both end to end protocols(Pg 47) -which basically means it is a protocol that completely handles the communication from one end to another.

 

TCP VS UDP 

 

TCP 

 

1. TCP divides data streams into chunks and adds a TCP header.

 

2.  It also handles flow control so that the receiver doesn’t get overwhelmed. 

 

3. Tcp is  reliable connection oriented. There is a official start and end  pre established connection

 

4. Presestablismed connection

 

5. 3 way syn syn-ack ack

 

6.  Has sequence numbers so it can be in order 

 

7. Waits for delivery confirmation

 

8. More over head , 12 fields in header, 20 bytes 

 

Used by : http  telenet smtp

 

Used when reliability is priority 

 

Example:  Email, file transfer 

 

UDP

 

1. Speed and efficiency 

 

2. No delivery confirmation

 

3. Transmit fast as it can – no flow control

 

4. Less overhead, 4 fields, 8 bytes 

 

5. Broadcasting or multicasting 

 

Used by : DNS OHCP VOIP

 

Used when speed and efficiency is priority 

 

Example: Real time connection, Online games, Video conference

 

Radio Frequency  Identification(RFID)

 

 What is it ?

 

RFID has 2 main components, RFID tag and a RFID reader, which use radio waves  to be able to track objects or people.(source 1)

 

Tags:Tag can be placed and Can be track object- Small Microchip(has a unique id), and antenna(receive radio transmission)

 

RFID:RFID readers – are installed a certain point and when tags come in range of the readers then they are questioned

 

Energy sources

 

Passive RFID: Most of them are this kind which is what makes RFID unique. It has no battery or plugs energy from radio wave RFID readersLess common 

 

  Active RFID:powerful power source on tag 

 

Types of RFID 

 

The type of RFID that is used is based on distance. 

 

UHF RFID (Ultra-High Frequency RFID):

 

Used for: A distance of couple meters

 

Way of operating: BACKSCATTER 

 

Backscatter: is a way of operating, when the tags change the readers signal and the readers pick up the changed signal

 

They can be used or found in Shipping pallets and some drivers license 

 

HF RFID (High Frequency RFID):

 

Used for: Short range a meter or less

 

Way of operating:INDUCTION

 

Induction: Electromagnetic induction: The RFID reader emits a magnetic field induces a current in the antenna of the RFID tag. Which allows for the tag to power up. In turn the RFID  can now send  messages / communicate with the RFID reader.

 

Frequency is 13.56 MHz 

 

Better performance than LF  -data transfer rate , efficiency 

 

Examples:passport, credit cards, books, and noncontact payment systems.

 

LF RFID ( Low Frequency RFID):

 

Way of operating:induction 

 

Frequency is 125 kHz 

 

Shorter reading range 

 

Used for animal tracking invented before HF  – can be found inside pet

 

Security

 

 They lack security due to the lack of computation and communication power. The security they do have is rather weak protection like passwords  They used to be simple but now have more storing capabilities however with these newer capabilities the potential for malware and virus has also become more of an issue

 

Conclusion 

 

RFID is related to TCP/IP. As RFID can be connected to a network and therefore can use the TCP/IP model protocol in order to send information to other devices.

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered straight to your email.

Place Order Now