Вы находитесь на странице: 1из 3

Name: Rei Sanchez

Communication Protocols
Bluetooth
Bluetooth is technology thats used for short ranged communication between Bluetooth compatible
devices such as mobile phones, digital cameras and desktop computers. The only drawback of
Bluetooth is that, because of its high
frequency, its range is limited to 30 feet.
Throughout all devices, when using Bluetooth
internet, the connection can sometimes run
very slow so Bluetooth internet is not highly
suggested for all cases. Furthermore, hackers
can exploit Bluetooth technology to hack into
other peoples phones therefore gaining
access to it in which they can steal private
information.

Protocols:
An example of a Bluetooth protocol would be hands-free profile or HFP. HFP is used in the handsfree audio systems built into cars. It implements a few features on top of those in HSP to allow for
common phone interactions (accepting/rejecting calls, hanging up, etc.) to occur while the phone
remains in your pocket.
Another example is Advanced Audio Distribution Profile or A2DP.

Wi-Fi
Wi-Fi is a wireless network that is used by smartphones,
televisions and radios. Wi-Fi uses radio waves to send
information which in turn provides high speed internet
connection. A common misconception is that the term Wi-Fi
is short for "wireless fidelity," however this is not the case.
Wi-Fi is simply a trademarked phrase that means IEEE
802.11x.

Protocols:
Being a wireless protocol, Wi-Fi standard uses the ISM (Industrial, Scientific and Medical) band of
frequency which is free to use and require no licensing. Launched in 2.4GHz with transmission rates
of 1-2mbps, Wi-Fi now works at 5GHz frequency also with astounding data transmission rates
reaching up to 54mbps at both frequencies.

Wireless Security
Wireless security is important because cyber hackers can quickly gain access to an unguarded

internet connection and have the ability to cause chaos within your network, all without

Name: Rei Sanchez

stepping inside your house. But thankfully, there are ways of deterring these hackers which
are simple to employ.
Protocols

Wired Equivalent Privacy (WEP): The original encryption protocol developed for wireless
networks. As its name implies, WEP was designed to provide the same level of security as
wired networks. However, WEP has many well-known security flaws, is difficult to configure,
and is easily broken.
Wi-Fi Protected Access (WPA): Introduced as an interim security enhancement over WEP
while the 802.11i wireless security standard was being developed. Most current WPA
implementations use a preshared key (PSK), commonly referred to as WPA Personal, and the
Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption. WPA Enterprise
uses an authentication server to generate keys or certificates

http://www.dummies.com/how-to/content/wireless-security-protocols-wep-wpa-andwpa2.html
TCP/IP
TCP/IP stands for Transmission Control Protocol / Internet Protocol. It defines how electronic devices
(like computers) should be connected over the Internet, and how data should be transmitted
between them.
TCP - Transmission Control Protocol
TCP is responsible for breaking data down into small packets before they can be sent over a network,
and for assembling the packets again when they arrive.
IP - Internet Protocol
IP takes care of the communication between computers. It is responsible for addressing, sending and
receiving the data packets over the Internet.
http://www.w3schools.com/website/web_tcpip.asp

Protocols
Serial Line
Internet
Protocol
(SLIP)

SLIP

Provides basic TCP/IP functionality by creating a layer-two


connection between two devices over a serial line.

Point-to-Point
Protocol

Provides layer-two connectivity like SLIP, but is much more


sophisticated and capable. PPP is itself a suite of protocols (subPPP protocols if you will) that allow for functions such as authentication,
data encapsulation, encryption and aggregation, facilitating TCP/IP
operation over WAN links.

Address

ARP Used to map layer three IP addresses to layer two physical network

Name: Rei Sanchez

Resolution
Protocol

addresses.

http://www.tcpipguide.com/free/t_TCPIPProtocols-2.htm
WAP
WAP (Wireless Application Protocol) is a specification for a set of communication protocols to
standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be
used for Internet access, including e-mail
http://searchmobilecomputing.techtarget.com/definition/WAP

Protocols
Application Layer (WAE and WTA)
The environment for wireless applications (Wireless Application Environment WAE) and the
application for wireless phones (Wireless Telephony Application WTA) are the highest layer in the
hierarchy of WAP architechture. These two are the main interface to the client device, which gives
and controls the description language, the script language of any application and the specifics of the
telephony. WAE and WTA have only a few easy functions on the client device, like the maintenance
of a history list, for example.
Session Layer (Wireless Session Protocol WSP)
The Wireless Session Protocol (WSP) has all the specifications for a session. It is the interface
between the application layer and the transfer layer and delivers all functions that are needed for
wireless connections. A session mainly consists of 3 phases: start of the session, transfering
information back and forth and the end of the session. Additionally, a session can be interrupted and
started again (from the point where it was interrupted.)
http://www.protocols.com/pbook/wap.htm

Вам также может понравиться