πŸ“‘ A Level Β· Chapter 14

Communication & Internet Technologies

Protocols Β· TCP/IP Β· Circuit vs Packet Switching


πŸ“‹ 14.1 Protocols
What is a protocol?
A protocol is an agreed set of rules that governs how data is formatted, transmitted, received and acknowledged between devices. Without protocols, two computers from different manufacturers could never communicate β€” it’s like agreeing on a language before holding a conversation.
Why are protocols essential?
  • Devices are made by different manufacturers
  • Ensures data is sent/received in a compatible format
  • Defines error checking, flow control, addressing
  • Allows interoperability across the entire internet
TCP/IP Protocol Suite β€” The Four-Layer Stack

Protocol implementations are modelled as layers. Each layer has specific responsibilities and only communicates with the layers directly above and below it.

4
Application Layer
Closest to the user. Provides the interface for network-aware apps. Handles data formatting and presentation.
HTTP/HTTPS FTP SMTP POP3 IMAP BitTorrent
3
Transport Layer
Breaks data into segments. Manages end-to-end communication, error checking, flow control. TCP provides reliability; UDP is faster but unreliable.
TCP UDP
2
Internet / Network Layer
Handles logical addressing (IP addresses) and routing of packets across multiple networks. Determines the best path.
IP (IPv4/IPv6) ICMP
1
Link Layer (Network Access)
Physical transmission of data on the local network. Converts data to signals for the medium (copper, fibre, wireless).
Ethernet Wi-Fi (802.11) MAC
How layers work together
When you send an email: Application (SMTP formats email) β†’ Transport (TCP segments it) β†’ Internet (IP adds source/dest addresses) β†’ Link (Ethernet converts to electrical signals). On the other end, each layer unwraps its header in reverse.
Key Application Layer Protocols

HTTP (HyperText Transfer Protocol) β€” transfers web pages from server to browser. Stateless: each request is independent.

HTTPS adds TLS/SSL encryption β€” all data is encrypted in transit. Used wherever security matters (banking, login pages).

Client β†’ Server: GET /index.html HTTP/1.1 Server β†’ Client: 200 OK (sends HTML page)

FTP (File Transfer Protocol) β€” transfers files between a client and server. Uses two separate connections: one for control commands, one for data. Supports authentication (username/password).

Note
FTP sends credentials in plain text β€” SFTP or FTPS adds encryption for secure file transfer.
ProtocolPurposeDirection
SMTPSimple Mail Transfer Protocol β€” sends email from client to server, or between serversOutgoing
POP3Post Office Protocol 3 β€” downloads email to device and (by default) deletes from serverIncoming
IMAPInternet Message Access Protocol β€” accesses email on server; stays synced across multiple devicesIncoming
POP3 vs IMAP
POP3: emails live on your device. IMAP: emails live on the server, accessible from anywhere. Most modern apps (Gmail, Outlook) use IMAP.

BitTorrent is a peer-to-peer (P2P) protocol β€” files are distributed across many users rather than downloaded from one central server.

  • File is split into many small chunks/pieces
  • Each downloader simultaneously uploads pieces they already have
  • A tracker coordinates who has which pieces
  • As more people download, the network gets faster (not slower)
Analogy
Instead of one person handing you a full textbook, 50 classmates each give you a different chapter simultaneously β€” and you share pages you already have while receiving others.

πŸ”€ 14.2 Circuit Switching vs Packet Switching

There are two fundamental approaches to routing data across a network:

πŸ”Œ Circuit Switching

  • Dedicated physical path established before transmission
  • Path reserved for entire duration
  • Guaranteed bandwidth
  • No routing delays mid-call
  • Inefficient β€” line idle during silence
  • If path fails β†’ connection drops
Telephone PSTN ISDN
VS

πŸ“¦ Packet Switching

  • Data split into independent packets
  • Each packet routed independently
  • Packets may take different routes
  • Reassembled at destination
  • Efficient β€” bandwidth shared dynamically
  • Resilient β€” packets reroute around failures
Internet TCP/IP
Anatomy of a Packet

Every packet contains a header with routing info, the data payload, and error-checking bits:

Source
IP
Dest.
IP
Seq.
No.
DATA PAYLOAD
Check-
sum
FieldPurpose
Source IPWhere the packet came from
Destination IPWhere the packet is going
Sequence numberAllows reassembly in correct order
Data payloadThe actual content (fragment of the original message)
ChecksumError detection β€” receiver checks if data was corrupted in transit
The Role of a Router in Packet Switching
Router’s job
A router reads the destination IP address in each packet’s header, consults its routing table, and forwards the packet to the next best hop toward the destination. Routers don’t care about the full path β€” they just decide the next step, and the packet finds its own way.
  1. Segmentation: Sending computer splits message into numbered packets
  2. Header added: Each packet gets source IP, dest IP, sequence number, checksum
  3. Routing: Each router reads destination IP and forwards to next router (packets may take different routes)
  4. Arrival: Packets arrive at destination, possibly out of order
  5. Reassembly: TCP uses sequence numbers to reassemble packets in correct order
  6. Error checking: If checksum fails or packet lost β†’ TCP requests retransmission
Analogy
Imagine sending a 5-part letter in separate envelopes via different postal routes. Some arrive out of order, one gets delayed. The recipient reassembles them using the numbered pages. That’s packet switching.
⚑ Exam Essentials
  • Know all 4 TCP/IP layers and their protocols by name
  • Be able to describe the journey of a message from one host to another
  • Compare circuit vs packet switching β€” benefits, drawbacks, use cases
  • Explain the role of a router: reading headers and using routing tables
  • Know what each field in a packet header is for
  • BitTorrent = P2P, not client-server β€” know why it scales well

πŸ““ Other Notes:

Chapter 13: Data Representation Chapter 15: Hardware & Virtual Machines Chapter 16: System Software Chapter 17: Security Chapter 18: Artificial Intelligence

πŸ“‹ 9618/4 Detailed Exam Guide β†’

Scroll to Top