What Is Communication Protocols
What Is Communication Protocols
1. Syntax
The term syntax refers to the structure or format of the data, meaning the order in which they are presented.
For example, a simple protocol might expect the first 8 bits of data to be the address of the sender, the second
8 bits to be the address of the receiver and the rest of the stream to be the message itself.
2. Semantics
The word semantics refers to the meaning of each section of bits. How is a particular pattern to be interpreted,
and what action is to be taken based on that interpretation? For example, does an address identify the route to
be taken or the final destination of the message?
3. Timing
The term timing refers to two characteristics. First when data should be sent and second, how fast they can be
sent. For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps, the
transmission will overload the receiver and some data will be lost.
Ethernet
The Ethernet protocol is by far the most widely used one.
Ethernet uses an access method called CSMA/CD (Carrier
Sense Multiple Access/Collision Detection). This is a system
where each computer listens to the cable before sending anything through the network. If the network is clear, the
computer will transmit. If some other nodes have already transmitted on the cable, the computer will wait and try
again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. A collision occurs
when this happens. Each computer then backs off and waits a random amount of time before attempting to
retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and
retransmitting is very small and does not normally effect the speed of transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access
points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.
Fast Ethernet
To allow for an increased speed of transmission, the Ethernet protocol has developed a new standard that supports
100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet requires the application of different, more
expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber
optic cable is necessary. Fast Ethernet is becoming common in schools that have been recently wired.
Gigabit Ethernet
The most latest development in the Ethernet standard is a protocol that has a transmission speed of 1 Gbps. Gigabit
Ethernet is primarily used for backbones on a network at this time. In the future, it will probably also be used for
workstation and server connections. It can be used with both fiber optic cabling and copper. The 1000BaseTX, the
copper cable used for Gigabit Ethernet, became the formal standard in 1999.
Local Talk
Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The
method used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is
similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. Local Talk
adapters and special twisted pair cable can be used to connect a series of computers through the serial port. The
Macintosh operating system allows the establishment of a peer-to-peer network without the need for additional
software. With the addition of the server version of AppleShare software, a client/server network can be
established.
The Local Talk protocol allows for linear bus, star, or tree topologies using twisted pair cable. A primary
disadvantage of Local Talk is low speed. Its speed of transmission is only 230 Kbps.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-
passing. In Token Ring, the computers are connected so that the signal travels around the network from one
computer to another in a logical ring. A single electronic token moves around the ring from one computer to the
next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. If
a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds
around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the
receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It