Communication protocols are formats used within devices that allows two or more devices to communicate with each other.Types of communication models or protocols include Bluetooth, Wi-Fi, Infrared Data Association (IrDA), cellular radio, GSM/UMTS, Wireless Application Protocol (WAP), Wireless Mark-up Language (WML), 802.11 standards, Transmission Control Protocol and Internet Protocol (TCP/IP) and wireless security protocols.
Why are Communication Protocols important?
Communication protocols are important because they are used to give instructions and provide a set of rules for how devices communicate with each other. Without protocols, hardware and software devices would not be able to effectively communicate with one another. Devices must have protocols and rules to follow so that data can travel from one device to another easily.
Examples of Communication Protocols
Bluetooth
Bluetooth is a form of wireless communication, used mainly within mobile phone devices and headsets. Bluetooth communication is only effective over short distances, so long distance communication would not be ideal for this method of communication. Bluetooth is used to transfer data and files from one device to another using its own set of standards. Advanced Audio Distribution Protocol (A2DP):This protocol allows audio transmission from the sender to the receiver. The sender is usually a phone or other device, and the receiver could be Bluetooth headphones. Audio/Video Remote Control Protocol (AVRCP):This protocol helps with controlling playback of media on Bluetooth devices. The features of this protocol is that it allows the device to perform actions when playing media such as next/previous track selection and pause/play selection. Hands-free Profile (HFP): The Hands Free Profile (HFP) allows the user to use their device without needing to hold the device in their hand. Object Push Profile (OPP):The OPP is a protocol that allows any device with Bluetooth to push (or transfer) an object (file) to another Bluetooth device easily. Phone Book Access Profile (PBAP): This protocol is used in Bluetooth devices to allow them to access the phonebook from one device on another. For example, the most common PBAP would be used in cars. The user can connect their mobile phone to their car using the Bluetooth profile. This means the user can import their phonebook using this protocol, and their contacts will all be logged in the car system. By doing this, the user is able to call people from their car (via the radio) and see the caller ID on the radio whilst in the car. They can answer the call using the radio (with the call coming through the car speakers.
Wi-Fi
Wi-Fi allows devices such as computers, laptops, smartphones, etc. to connect to the internet wirelessly if the device being used is in the same area as the Wi-Fi is located, for example, if a device is connected to the Wi-Fi access in a restaurant, the Wi-Fi can only be used while the device is still being used within that restaurant. Wi-Fi uses the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.
Infrared Data Association (IrDA)
IrDA has a set of rules or protocols in place used in wireless infrared communications. It allows for wireless data transfer over different infrared communication devices. "IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links" Infrared is used in communication devices using a ray of light to transmit a signal to a receiver over a short distance. A common example of this is a television remote control using infrared to transmit the data the user sends to the receiver, which is the television itself, for example, if the user pressed button '1' then they are sending a signal to the television to change the channel to channel 1.
IrDA has a number of different specifications and protocols. These are;
The different Wireless Security Protocols (WSP) include WEP, WPA and WPA2. WEP: WEP stands for Wired Equivalent Privacy and is an encryption security method, used to encrypt transmitted data, however it has many flaws and is not the most secure of the security protocols and is therefore, not recommended. It is not as secure as the newer security protocols as it is easier to crack. WPA: This protocol stands for Wi-Fi Protected Access, and it uses the message integrity check (MIC) and the Temporal Key Integrity Protocol (TKIP) in an attempt to enhance data encryption. However, hackers soon found ways of cracking this security protocol and therefore, a newer, better WPA (called WPA2) is now much more efficient. WPA2: WPA2 is the advanced version of WPA. It is a data protection protocol that is a lot stronger than WPA, as it was modified to help users keep their information protected online. As it is the best security protocol, it assures its users that only authorised people can access their wireless networks.