Networking Project:
Research and Planning
Chosen Topics:
-Transmission Control Protocol/ Internet Protocol(TCP/IP)
– UDP/TCP
-Radio Frequency Identification(RFID)
Table of contents
Transmission Control Protocol/ Internet Protocol(TCP/IP)…………………………Pg 2
What is it? ……………..……………………………………………….Pg 2
LAYERS WITH DEFINITION …………….………………………….Pg 2
Critiques of TCP/IP and OSI Models…..……………..………………..Pg 4
Purpose/History……………………………………………….…………Pg 4
UDP………………….…………………………………………………………Pg 5
Transport layer ……………………………..…………………………. Pg 5
What is TCP and UDP..…..……………………………………………..Pg 5
Comparison TCP/ UDP…..……………………………………………..Pg 5
RFID………………………………………………………………………….Pg 6
What is it ?………………………………………………………………………………….Pg 6
Types of RFID………………………………………………………….Pg 6
Security…………………………………………………………………Pg 7
Conclusion……………………………………………………………..Pg 8
Transmission Control Protocol/Internet Protocol (TCP/IP)
What is it ?
Is the set of protocols that devices follow in order to communicate(send or receive data(such as emails, videos/pic , documents, phone calls )) with each other. They are able to communicate even if part of the network was damaged.
Examples:
Real Example: You want to send an email to a Professor because you can’t make it to class since you were at the hospital.
First: Your computer is connected to the internet which is part of a network.
Second: Your computer takes your email and converts follows a process in order to converter it into data that it can send
Third: The Professors Computer receives this data it then has to check if it received it correctly if so then it will be converted into a email response and now the Professor can read it.
LAYER WITH DEFINITION
7 layer OSI Model
Application: Provides network services directly to users and applications, such as email, web
browsing, and file transfer.
Presentation: Translates, encrypts, and compresses data for exchange between applications.
Session: Establishes, maintains, and terminates communication sessions between applications.
Transport: Provides reliable end-to-end communication between devices, managing data segmentation and error recovery.
Network: Routes data packets between different networks, determining the best path for transmission.
Data link: Manages data transfer between devices on the same network, ensuring error-free communication.
Physical: Handles the actual transmission of data over physical mediums like cables or wireless signals.
4 Layer TCP/IP
Application: It contains all the higher-level protocols specific to application.Domain Name System (DNS): Used for mapping hostnames onto their network addresses. Hypertext Transfer Protocol (HTTP): Used for fetching pages on the World Wide Web Real-Time Transport Protocol (RTP): Used for delivering real-time media such as voice or movies.
Transport : There are 2 main protocols are TCP & UDP depending on needs and choices but they also handle transport but they rely on the fact that lower levels will handle more basic functions such as IP.
Network : It uses the Internet Protocol (IP) to send packets and ensures they
reach their destination. There’s also the Internet Control Message Protocol (ICMP), which helps with the functioning of IP. addressing and outing
Link : is the layer not in a traditional way but rather a point btw the
computer and physical connection
Comparison of layers:
For the presentation there will have diagrams so this section will be much clearer
-Session Layer, presentation Layer, and Application Layer in the OSI model is combined together in just the Application Layer in for the TCP/IP model
-There is not physical layer in the TCP/IP model like there is in the OSI model
Critiques of TCP/IP and OSI Models
Critiques of TCP/IP
– Doesn’t clearly separate different parts like services, interfaces, and protocols, making it confusing for designing new networks.
– The link layer isn’t really a layer but more of an interface, which makes it hard to understand the model’s structure.
Critiques of OSI MODEL
· Flawed design: including political decisions in its seven-layer structure, where some layers like session and presentation were almost empty while others like data link and network were too full.
· Inefficient :as flow control, and error control were repeated making it redundant
Purpose/ History
Both models were created to help connect different types of networks.
TCP came from the government program ARPANET. TCP is generally used in practice
OSI created by ISO international organization of standardization. It is a conceptual framework to standardize networks. It is used more for understanding rather than in practice.
User Datagram Protocol(UDP)
Transport Layer
This is mainly discussed in the transport layer along with TCP
Transport Layer is between the application and network layer. It makes sure that data arrives accurately and reliably. It does this through TCP and UDP.
What is UDP and TCP?
TCP and UDP are both end to end protocols(Pg 47) -which basically means it is a protocol that completely handles the communication from one end to another.
TCP VS UDP
TCP
1. TCP divides data streams into chunks and adds a TCP header.
2. It also handles flow control so that the receiver doesn’t get overwhelmed.
3. Tcp is reliable connection oriented. There is a official start and end pre established connection
4. Presestablismed connection
5. 3 way syn syn-ack ack
6. Has sequence numbers so it can be in order
7. Waits for delivery confirmation
8. More over head , 12 fields in header, 20 bytes
Used by : http telenet smtp
Used when reliability is priority
Example: Email, file transfer
UDP
1. Speed and efficiency
2. No delivery confirmation
3. Transmit fast as it can – no flow control
4. Less overhead, 4 fields, 8 bytes
5. Broadcasting or multicasting
Used by : DNS OHCP VOIP
Used when speed and efficiency is priority
Example: Real time connection, Online games, Video conference
Radio Frequency Identification(RFID)
What is it ?
RFID has 2 main components, RFID tag and a RFID reader, which use radio waves to be able to track objects or people.(source 1)
Tags:Tag can be placed and Can be track object- Small Microchip(has a unique id), and antenna(receive radio transmission)
RFID:RFID readers – are installed a certain point and when tags come in range of the readers then they are questioned
Energy sources
Passive RFID: Most of them are this kind which is what makes RFID unique. It has no battery or plugs energy from radio wave RFID readersLess common
Active RFID:powerful power source on tag
Types of RFID
The type of RFID that is used is based on distance.
UHF RFID (Ultra-High Frequency RFID):
Used for: A distance of couple meters
Way of operating: BACKSCATTER
Backscatter: is a way of operating, when the tags change the readers signal and the readers pick up the changed signal
They can be used or found in Shipping pallets and some drivers license
HF RFID (High Frequency RFID):
Used for: Short range a meter or less
Way of operating:INDUCTION
Induction: Electromagnetic induction: The RFID reader emits a magnetic field induces a current in the antenna of the RFID tag. Which allows for the tag to power up. In turn the RFID can now send messages / communicate with the RFID reader.
Frequency is 13.56 MHz
Better performance than LF -data transfer rate , efficiency
Examples:passport, credit cards, books, and noncontact payment systems.
LF RFID ( Low Frequency RFID):
Way of operating:induction
Frequency is 125 kHz
Shorter reading range
Used for animal tracking invented before HF – can be found inside pet
Security
They lack security due to the lack of computation and communication power. The security they do have is rather weak protection like passwords They used to be simple but now have more storing capabilities however with these newer capabilities the potential for malware and virus has also become more of an issue
Conclusion
RFID is related to TCP/IP. As RFID can be connected to a network and therefore can use the TCP/IP model protocol in order to send information to other devices.
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO ChatGPT.NO PLAGIARISM – CUSTOM PAPER
Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.
We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.
Why Choose AcademicWritersBay.com?
- Our papers are 100% original, custom-written from scratch.
- We’re here to support you around the clock, any day of the year.
- You’ll find our prices competitive and reasonable.
- We handle papers across all subjects, regardless of urgency or difficulty.
- Need a paper urgently? We can deliver within 6 hours!
- Relax with our on-time delivery commitment.
- We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
- Benefit from unlimited amendments upon request to get the paper you envisioned.
- We pledge our dedication to meeting your expectations and achieving the grade you deserve.
Our Process: Getting started with us is as simple as can be. Here’s how to do it:
- Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
- Provide the specifics of your paper in the “PAPER DETAILS” section.
- Select your academic level, the deadline, and the required number of pages.
- Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
- Follow the simple payment instructions and soon, our writers will be hard at work on your paper.
AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.