hw1

Networking Project: 
Research and Planning
Chosen Topics: 
           -Transmission Control Protocol/ Internet Protocol(TCP/IP)
– UDP/TCP
-Radio Frequency  Identification(RFID)
Table of contents 
Transmission Control Protocol/ Internet Protocol(TCP/IP)…………………………Pg 2
What is it? ……………..……………………………………………….Pg 2
LAYERS WITH DEFINITION …………….………………………….Pg 2
Critiques of TCP/IP and OSI Models…..……………..………………..Pg 4
Purpose/History……………………………………………….…………Pg 4 
UDP………………….…………………………………………………………Pg 5
Transport layer ……………………………..…………………………. Pg 5
What is TCP and UDP..…..……………………………………………..Pg 5
Comparison TCP/ UDP…..……………………………………………..Pg 5
RFID………………………………………………………………………….Pg 6
What is it ?………………………………………………………………………………….Pg 6
Types of RFID………………………………………………………….Pg 6
Security…………………………………………………………………Pg 7
          Conclusion……………………………………………………………..Pg 8
 Transmission Control Protocol/Internet Protocol (TCP/IP)
What is it ?
Is the set of protocols that devices follow in order to communicate(send or receive data(such as emails, videos/pic , documents, phone calls )) with each other. They are able to communicate even if part of the network was damaged.  
Examples: 
Real Example: You want to send an email to a Professor because you can’t make it to class since you were at the hospital. 
First: Your computer is connected to the internet which is part of a network. 
Second: Your computer takes your email and converts follows a process in order to converter it into data that it can send 
Third: The Professors Computer receives this data it then has to check if it received it correctly if so then it will be converted into a email response and now the Professor can read it.
LAYER WITH DEFINITION
7 layer  OSI Model  
Application: Provides network services directly to users and applications, such as email, web 
browsing, and file transfer.
Presentation: Translates, encrypts, and compresses data for exchange between applications.       
Session: Establishes, maintains, and terminates communication sessions between applications.
Transport: Provides reliable end-to-end communication between devices, managing data segmentation and error recovery.
Network: Routes data packets between different networks, determining the best path for transmission.
Data link:  Manages data transfer between devices on the same network, ensuring error-free communication.
Physical: Handles the actual transmission of data over physical mediums like cables or wireless signals.                  
4 Layer  TCP/IP
  Application: It contains all the higher-level protocols specific to application.Domain Name System (DNS): Used for mapping hostnames onto their  network addresses.  Hypertext Transfer Protocol (HTTP): Used for fetching pages on the  World Wide Web  Real-Time Transport Protocol (RTP): Used for delivering real-time media such as voice or movies.
 Transport :  There are 2 main protocols are TCP & UDP depending on needs and choices but  they also handle transport but they rely on the fact that lower levels will handle more basic functions such as IP.
Network :    It uses the Internet Protocol (IP) to send packets and ensures they   
  reach their destination. There’s also the Internet Control Message    Protocol (ICMP), which helps with the functioning of IP.  addressing and outing 
Link : is the layer not in a traditional way but rather a point btw the                                                                  
 computer and physical connection
Comparison of layers: 
For the presentation there will have diagrams so this section will be much clearer
-Session Layer,  presentation Layer,  and Application Layer in the OSI model is combined together in just the Application Layer in for the TCP/IP model  
-There is not physical layer in the TCP/IP model like there is in the OSI model
Critiques of TCP/IP and OSI Models
Critiques of  TCP/IP
– Doesn’t clearly separate different parts like services, interfaces, and protocols, making it confusing for designing new networks.
– The link layer isn’t really a layer but more of an interface, which makes it hard to understand the model’s structure.
Critiques of OSI MODEL
· Flawed design: including political decisions in its seven-layer structure, where some layers like session and presentation were almost empty while others like data link and network were too full. 
· Inefficient :as  flow control, and error control  were repeated  making it redundant
Purpose/ History 
Both models were created to help connect different types of networks. 
TCP came from the government program ARPANET. TCP is generally used in practice 
OSI created by ISO  international organization of  standardization. It is a conceptual framework to standardize networks. It is used more for understanding rather than in practice.
User Datagram Protocol(UDP)
Transport Layer
This is mainly discussed in the transport layer along with TCP
Transport Layer is between the application and network layer. It makes sure that data arrives accurately and reliably. It does this through TCP and UDP.
What is UDP and TCP? 
TCP and UDP are both end to end protocols(Pg 47) -which basically means it is a protocol that completely handles the communication from one end to another.
TCP VS UDP 
TCP 
1. TCP divides data streams into chunks and adds a TCP header.
2.  It also handles flow control so that the receiver doesn’t get overwhelmed. 
3. Tcp is  reliable connection oriented. There is a official start and end  pre established connection
4. Presestablismed connection
5. 3 way syn syn-ack ack
6.  Has sequence numbers so it can be in order 
7. Waits for delivery confirmation
8. More over head , 12 fields in header, 20 bytes 
Used by : http  telenet smtp
Used when reliability is priority 
Example:  Email, file transfer 
UDP
1. Speed and efficiency 
2. No delivery confirmation
3. Transmit fast as it can – no flow control
4. Less overhead, 4 fields, 8 bytes 
5. Broadcasting or multicasting 
Used by : DNS OHCP VOIP
Used when speed and efficiency is priority 
Example: Real time connection, Online games, Video conference
Radio Frequency  Identification(RFID)
 What is it ?
RFID has 2 main components, RFID tag and a RFID reader, which use radio waves  to be able to track objects or people.(source 1)
Tags:Tag can be placed and Can be track object- Small Microchip(has a unique id), and antenna(receive radio transmission)
RFID:RFID readers – are installed a certain point and when tags come in range of the readers then they are questioned
Energy sources
Passive RFID: Most of them are this kind which is what makes RFID unique. It has no battery or plugs energy from radio wave RFID readersLess common 
  Active RFID:powerful power source on tag 
Types of RFID 
The type of RFID that is used is based on distance. 
UHF RFID (Ultra-High Frequency RFID):
Used for: A distance of couple meters
Way of operating: BACKSCATTER 
Backscatter: is a way of operating, when the tags change the readers signal and the readers pick up the changed signal
They can be used or found in Shipping pallets and some drivers license 
HF RFID (High Frequency RFID):
Used for: Short range a meter or less
Way of operating:INDUCTION
Induction: Electromagnetic induction: The RFID reader emits a magnetic field induces a current in the antenna of the RFID tag. Which allows for the tag to power up. In turn the RFID  can now send  messages / communicate with the RFID reader.
Frequency is 13.56 MHz 
Better performance than LF  -data transfer rate , efficiency 
Examples:passport, credit cards, books, and noncontact payment systems.
LF RFID ( Low Frequency RFID):
Way of operating:induction 
Frequency is 125 kHz 
Shorter reading range 
Used for animal tracking invented before HF  – can be found inside pet
Security
 They lack security due to the lack of computation and communication power. The security they do have is rather weak protection like passwords  They used to be simple but now have more storing capabilities however with these newer capabilities the potential for malware and virus has also become more of an issue
Conclusion 
RFID is related to TCP/IP. As RFID can be connected to a network and therefore can use the TCP/IP model protocol in order to send information to other devices.

QUALITY: 100% ORIGINAL PAPER NO ChatGPT.NO PLAGIARISMCUSTOM PAPER

Best Custom Essay Writing Services

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.

We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.

Why Choose AcademicWritersBay.com?

  • Our papers are 100% original, custom-written from scratch.
  • We’re here to support you around the clock, any day of the year.
  • You’ll find our prices competitive and reasonable.
  • We handle papers across all subjects, regardless of urgency or difficulty.
  • Need a paper urgently? We can deliver within 6 hours!
  • Relax with our on-time delivery commitment.
  • We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
  • Benefit from unlimited amendments upon request to get the paper you envisioned.
  • We pledge our dedication to meeting your expectations and achieving the grade you deserve.

Our Process: Getting started with us is as simple as can be. Here’s how to do it:

  • Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
  • Provide the specifics of your paper in the “PAPER DETAILS” section.
  • Select your academic level, the deadline, and the required number of pages.
  • Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
  • Follow the simple payment instructions and soon, our writers will be hard at work on your paper.

AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.

ORDER NOW and experience the difference with AcademicWritersBay.com, where excellence meets timely delivery.

NO PLAGIARISM
error: Content is protected !!