Component 1 Network Protocols.

Slides:



Advertisements
Similar presentations
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Advertisements

Communicating over the Network
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OIS Model TCP/IP Model.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Data Communications and Networks
GCSE Computing#BristolMet Session Objectives#16 MUST describe the hardware needed to connect to the Internet and describe the nature of the Internet. SHOULD.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Presentation on Osi & TCP/IP MODEL
Characteristics of Communication Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Network media, protocols and networking standards, networking hardware.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Ethernet, WiFi & Protocols
1.4 wired and wireless networks lesson 2
LAN, WAN, and Network Topologies
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Networking Using the OSI Model.
Protocols and the TCP/IP Suite
Computer Networks.
Chapter 4 Computer Networks – Part 2
Computer Networks.
Click to edit Master subtitle style
Networking for Home and Small Businesses – Chapter 6
Understanding the OSI Reference Model
Teaching Computing to GCSE
Web Development & Design Chapter 1, Sections 4, 5 & 6
Networking for Home and Small Businesses – Chapter 6
Protocols and the TCP/IP Suite
Topic 5: Communication and the Internet
Client-Server and Peer to Peer networks
ECEN “Internet Protocols and Modeling”
Lecture 4 Communication Network Protocols
Networking Theory (part 2)
© OCR NETWORK TOPOLOGIES, PROTOCOLS AND LAYERS 2.
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
OSI Model OSI MODEL.
Protocols 2 Key Revision Points.
Protocols and the TCP/IP Suite
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
OSI Reference Model Unit II
WJEC GCSE Computer Science
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Networking Theory (part 2)
Presentation transcript:

Component 1 Network Protocols

Starter: Pre-Reading recap What is a protocol? What is handshaking? What does the term ‘protocol stack’ mean? What is IP? What does it do? What is TCP? What are the 5 layers of the TCP/IP 5-Layer stack? What is HTTP? What is FTP?

Learning Intentions Learning Intention To develop an understanding of the importance of contemporary network protocols and the importance of layers in the TCP/IP 5-layer model

Learning Outcomes Grade 4 Define the term protocol Explain what handshaking is in terms of computer network communications Grade 5 Explain the advantages and disadvantages of having protocols Explain how protocols are used to send a file over a network Grade 6 Explain the importance and the use of a range of contemporary network protocols, including Ethernet, Wi-Fi, TCP/IP, HTTP, HTTPS, FTP and email protocols. Explain the importance of layers and the TCP/IP 5- layer model. Grade 7 Analyse the importance of protocols in a network and explain how different hardware devices interact with different layers of the TCP/IP 5-layer model

Protocols A protocol is an agreed format, which allows two devices to communicate. The protocol, put simply, is a set of rules. These rules can include the following:   handshaking, where two devices establish their readiness to communicate how the sending device will indicate that it has finished sending a message how the receiving device will indicate that it has received a message the type of error checking to be used agreement on the data compression method to be used

Common Protocols Protocol Description TCP/IP (Transmission Control Protocol/Internet Protocol) Two protocols that combine to allow communication between computer systems on a network. IP is a protocol that sets out the format of packets and an addressing system. TCP is a protocol that allows packets to be sent and received between computer systems HTTP (Hypertext Transfer Protocol) HTTP is a protocol than can be used to transfer multimedia web pages over the Internet. FTP (File Transfer Protocol) FTP is a protocol that can be used when copying a file from one location to another via a network or the Internet. It is typically used for the transfer of large files, as it allows broken communications to resume transferring a file rather than having to restart.

Handshaking When a computer communicates with another device like a modem, printer, or network server, it needs to handshake with it to establish a connection. A simple handshaking protocol might only involve the receiver sending a message meaning "I received your last message and I am ready for you to send me another one." A more complex handshaking protocol might allow the sender to ask the receiver if he is ready to receive or for the receiver to reply e.g. "I did not receive your last message correctly, please resend it" (if the data was corrupted en route). Establishing a normal TCP connection requires three separate steps: The first computer (Phil) sends the second computer (Eric) a "synchronize" (SYN) message, which Eric receives. Eric replies with a synchronize-acknowledgment (SYN-ACK) message, which Phil receives. Phil replies with an acknowledgment message, which Eric receives, and doesn't need to reply to. Phil is then ready to send messages to Eric, the handshake has been completed.

Handshaking Phil Eric The first computer (Phil) sends the second computer (Eric) a "synchronize" (SYN) message, which Eric receives. Eric replies with a synchronize- acknowledgment (SYN-ACK) message, which Phil receives. Phil replies with an acknowledgment message, which Eric receives, and doesn't need to reply to. Phil is then ready to send messages to Eric, the handshake has been completed.

Graded Exercises Complete Questions 1-2 of the graded exercises. You should write both the question and the answer in your book Extension Can you explain why protocols are important? What are the advantages of protocols?

IP – Internet Protocol IP is a protocol that sets out the format of packets and an addressing system. The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet: source - which computer the message came from destination - where the message should go packet sequence - the order the message data should be re-assembled data - the data of the message

TCP – Transmission Control Protocol TCP is a protocol that allows packets to be sent and received between computer systems. error check - the check to see that the message has been sent correctly

HTTP – Hypertext Transfer Protocol HTTP is a protocol than can be used to transfer multimedia web pages over the Internet. For copying files from one host to another.

FTP – File Transfer Protocol FTP is a protocol that can be used when copying a file from one location to another via a network or the Internet. It is typically used for the transfer of large files, as it allows broken communications to resume transferring a file rather than having to restart.

Graded Exercises Complete Question 4 of the Graded Exercises Extension Find out why TCP and IP protocols are often referred to as TCP/IP – How are they similar, how are they different?

Protocol Stacks A protocol stack is a set of protocols that work together to provide networking capabilities. It is called a stack because it is designed as a hierarchy of layers, each supporting the one above it and using those below it. The use of a layered approach enables different protocols to be substituted for each other to allow for e.g. new protocols and different network architectures. The number of layers varies according to the particular protocol stack. However, the lowest layer will deal with physical interaction of the hardware, with each higher layer adding additional features, and user applications interacting with the top layer.

Protocol Layers Protocols are organised into “layers” which link into each other. This means it is possible to “tweak” individual layers without affecting the whole network standard. Protocols can be divide into 2 parts: logically based and physically based. What might these 2 parts consist of? As you will see the logical rules that can be applied depend on the physical rules (or infrastructure) that is already in place. Physical Logical Wired or Wireless? Concerns the data itself? If wired, what cable to use?? Serial or parallel transmission? Fibre optic, cat 5 e, coaxial etc What mode to be used? Simplex etc If wireless, what frequency, channel etc? Bit rate to send the data at and how much to send at a time. Error checking method, parity, echo e

THE 5 Layer TCP/IP Stack

TCP/IP – Physical Layer The physical layer transmits the raw data. It consists of hardware such as switches and routers. The layer deals with all aspects of setting up and maintaining a link between the communicating computers.

TCP/IP – Data Link Layer The data link layer sends data from the network layer to the physical layer. It divides the data to be sent into data frames. A data frame consists of a link layer header followed by a packet. The data link layer handles the acknowledgements sent from the receiver and ensures that incoming data has been received correctly by analysing bit patterns in the frames.

TCP/IP – Network Layer The network layer is responsible for the addressing and routing of data. Routers belong to the network layer as they use logical addresses to direct the data from the sender to the receiver. A router determines the path the data should take based on network conditions. Routers manage traffic problems on the network such as the routing of packets to minimise congestion of data.

TCP/IP – Transport Layer The transport layer ensures that data is transferred form one point to another reliably and without errors. The transport layer is responsible for making sure that data is sent and received in the correct order. The transport layer is implemented in the sending and receiving computers but not in the routers on the path between them. It acts as an interface between the communicating computers and the network.

TCP/IP – Application Layer The application layer provides interfaces to the software to allow it to use the network. Examples of software include email, file transfer protocol (FTP) and the World Wide Web (WWW) – Think about the applications you use… Outlook, chrome, File Sharing, etc..

Graded Exercises Complete Questions 5-8 of the Grade D Recall questions Extension Research the 7 Layer TCP/IP model and explain the difference between this and the 5-layer model. https://www.ischool.utexas.edu/~l38613dw/readings/NotesOnInterconnection.html

Sending Data between ‘hosts’ The diagram shows Host 1 sending a message to Host 2. From Host 1 the data flows down through the 5 layers of protocols and then to Router 1. Router 1 is the gateway to the operating area of Host 1 and therefore only the network, data link and physical layers are involved. Similarly, with Router 2 only the three layers are involved as the data is passed into the operating region of Host 2. Finally the data passes up through the layers to Host 2.

Connection protocols Wi-Fi Protocol Ethernet Protocol Wi-Fi is a term for certain types of wireless networks that use 802.11 wireless protocols for transmitting data using electromagnetic waves in place of cables. 802.11 wireless networks use security protocols, such as Wi-Fi Protected Access (WPA), to provide a level of security and privacy comparable to that of a wired network. Bluetooth is another example of a wireless protocol and WAP (Wireless Application Protocol) are protocols to standardise the way that wireless devices can be used for Internet access. At the data link layer Ethernet protocols describe how network devices can format data for transmission using frames and packets. Ethernet protocols are also used to define standards for types of network cabling used at the physical layer and the corresponding transmission speeds.

Email Protocols IMAP POP3 To use email you must have an email client on your computer that has access to a mail server. Your Internet Service Provider (ISP) often supplies this server. The mail client and the mail server exchange information with each other using email protocols to transmit information. Email Protocols IMAP POP3 Internet Messaging Access Protocol (IMAP) is an email protocol that stores email messages on a mail server. It allows the email user to read and handle email messages as though they were stored locally on their own computer. The user can manage their email with facilities such as the ability to create folders to organise their messages, store draft messages in the server and delete unwanted messages. Post Office Protocol 3 (POP3) is the third version of a protocol for receiving email. POP3 receives email for a client and stores it in a single file on the mail server. When the email client logs onto the mail server the email is transfer to the users computer. There are no copies of the email stored permanently on the server after they have been downloaded.

Email Protocols SMTP The Simple Mail Transfer Protocol (SMTP) is used to deliver email from the sender to an email server or when email is delivered from one email server to another. SMTP can only be used to send emails but not to receive them.

Graded Exercises Complete Questions 9-10 of the Grade D Exercises. These will be peer-assessed in 7 minutes. Extension Continue to the Grade 5 – Applying questions before the Grade 6 and 7 Exam Questions.

Crib Sheet – What I must remember about _______ Starting Point: Read the learning outcomes from the exam board Record the key facts that you need to remember about Network Protocols, the 5- Layer TCP/IP Stack, and Email Protocols. Think about what you have learnt today, what questions you have been asked, definitions of words, or anything else you think is important!

Homework Question Sheets: Q41 – Network Protocols Revision: For revision this time you are going to create ‘Crib’ Sheets. These should cover the following topics: LANs and WANs Topologies Circuit and Packet Switching IP Addresses, MAC Addresses, and DNS Servers Network Protocols and the 5-Layer TCP/IP Stack These should be made in your small A5 Crib books and there should be a maximum of 1 page each. If you do not have your A5 Crib book then each section should be a maximum of ½ page in your A4 books.