Note that your final mark will not be saved in the system.
B3 Issues relating to transmission of data GapFill
You must fill all the gaps before clicking ‘Check Answers!’
A are the rules for a type of communication between two devices. Each type of transmission has different rules. For example, data is broken down onto small pieces called – and the size, format and addressing has to be defined and consistent. Sometimes the data might not be fully received as it travels across the Internet through different routes. Sometimes, this doesn’t matter – for example in a video live stream it is acceptable to lose a few frames.
But when sending webpages and , it is important that every bit is correctly received, so at the start of the transmission, a between your device and the server is established, which checks the type of transmission, that the device is ready to receive data, and that the data arrives as expected – i.e. it is not corrupted.
One set of protocols is email. There are several different ways that email is received. Perhaps the simplest form of email is where the user just reads, sends and receives the email through a browser from anywhere in the world – all of the mail is still stored on the central server. The mail server is owned by a large company such as Google, Microsoft, and ISPs, etc.
Sometimes you will access your email in a desktop or mobile application such as Outlook or the Gmail app on your phone. In most cases, the emails are still stored on the central server and are just copied to your device. This is the protocol. But if the emails are downloaded to the device and deleted from the central server, the protocol is , with version 3 being the most widely used. Another protocol is used to send email – this is the protocol.
Nowadays, we can use the Internet as a replacement for the old analogue that we’ve used for voice calls for well over a hundred years. We use dedicated Internet phones, or can use laptops, desktops and smartphones and tablets to make the calls over Wi-Fi or the mobile data network. The protocol is called . These services can also stream video using a webcam.
The Web is transmitted over the Internet (the Internet uses the protocols. The Web protocol is , however not many websites use the secure (encrypted) version that means that the content of the web traffic cannot be read if intercepted. You will use the secure version when accessing webmail, and doing online banking. When the webpage is delivered to your and its code (e.g. HTML with CSS styling) tells the software how to render (display) the page.
Over the past couple of decades, the growth in online shopping has exploded. With the increase, criminals have become more sophisticated and secure payment systems have been set up. As a result, all payment sites should use the
protocol. Banks are also using
to check that you made the purchase – e.g. sending a code by text to your mobile phone that must be entered into the site for the payment to go through.