Computer communications

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Chapter 3 CCNA Discovery Encapsulation - Explanations and Clarifications CCNA Discovery Encapsulation - Explanations and Clarifications.
BTT 101 / 2O1 Lesson 10 Dundas Valley Secondary Mr. Young.
Network Layer and Transport Layer.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Networks. ProtocolMeaningApplication DNSDomain Name System (Server)Translates domain names such as ocr.org.uk into IP Addresses TLS/SSLTransport Layer.
The Structure of the Internet. In this lesson we will… Examine the difference between the Internet, the Web and the Intranet. Cover packet switching and.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Connecting one computer to another computer creates a network.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
Networks QUME 185 Introduction to Computer Applications.
1 CSC111H Client-Server: An Introduction Dennis Burford
How Does the Internet Work? Protocols Protocols are rules that describe how computers communicate and exchange data. The Internet has a series of these.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Chapter 12 - Packet Switching Introduction Sharing Saves Money –Arranging for multiple devices to share a single transmission path lowers cost because.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
How Information Flows via the Internet By: Lee Farrell.
Network media, protocols and networking standards, networking hardware.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Week-3 (Lecture-1). Some Important internet terms: Archie : A program used to search files at FTP sites. There are currently 30 Archie servers in the.
Ethernet, WiFi & Protocols
Networks – Network Fundamentals
Module 1: Understanding Local Area Networks
Chapter 4 Computer Networks – Part 2
CISC103 Web Development Basics: Web site:
Chapter 5 Network and Transport Layers
The OSI Model and the TCP/IP Protocol Suite
Using MIS 2e Chapter 6 Appendix
Some bits on how it works
How does IT enable our business?
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Computer Networks Lesson 3.
Web Development & Design Chapter 1, Sections 4, 5 & 6
How Data Flows through the Internet
The OSI Model and the TCP/IP Protocol Suite
Topologies, Protocols and Layers
Unit Network Topologies, protocols and layers Lesson 2
Topic 5: Communication and the Internet
I. Basic Network Concepts
TCP/IP Networking An Example
Network Protocol Layers
Web Design & Development
Topologies, Protocols and Layers
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Protocols 1 Key Revision Points.
TCP/IP Protocol Suite: Review
© OCR NETWORK TOPOLOGIES, PROTOCOLS AND LAYERS 2.
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Protocols 2 Key Revision Points.
Protocols & Packet Switching
The internet AOU University Dr Radwan-Associate Lecturer
How Our Customers Communicate With Us
Computer Networks Lesson 3.
Protocol Application TCP/IP Layer Model
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
Kyle Broussard, Alexandra Mikolai,
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Computer communications How computers communicate on a network

How computers communicate Each computer on a network needs to be uniquely identified so that data can be sent and received from it. There are many different ways of doing this. Protocols are used to help control network communication. Protocols are a set of rules that all the devices on a network must follow if they are to be able to communicate with each other. When connected to a network or the Internet each computer will have an Internet Protocol address or IP address. This is made up of 4 bytes. We often see this as a series of 4 numbers ranging from 0-255 separated by full stops. So 10.1.128.240 is an example of an IP address. Computers use these addresses to communicate with each other in the same way we use phone numbers. As well as IP addresses, each network interface in a computer (ethernet card or wifi card) also has a unique Media Access Control address or MAC address. Again these addresses help a network identify each device, making sure that data travels to the correct destination.

How to send DATA effectively Imagine you are an author and you have written a 500 page manuscript which must be sent by post. The problem is that due to the postal charges, you can only send 50 pages at a time. How do you get the manuscript to your publishers, so they can assemble it correctly? Firstly you would split your document into 50 page sections, putting each into an envelope. On the envelope you would put the publisher’s address as well as your own address, so they know who sent it. You would also need to label each envelope so that the publisher know which set of pages were in each. So the first one would be labelled packet 1/10 pages 1-50, the second packet 2/10 pages 51-100 etc. Then the envelopes could be posted and the publisher knows from the envelopes how to reassemble to manuscript. It does not matter if the envelopes do not arrive in order. If one goes missing, the publisher can figure out which one it is and ask for a replacement. This is how data gets sent around networks.

How to send DATA effectively Firstly you would split your document into 50 page sections, putting each into an envelope. On the envelope you would put the publisher’s address as well as your own address, so they know who sent it. You would also need to label each envelope so that the publisher know which set of pages were in each. So the first one would be labelled packet 1/10 pages 1-50, the second packet 2/10 pages 51-100 etc. Then the envelopes could be posted and the publisher knows from the envelopes how to reassemble to manuscript. It does not matter if the envelopes do not arrive in order. If one goes missing, the publisher can figure out which one it is and ask for a replacement. This is how data gets sent around networks.

Sending Data Across a Network An application such as an email client wishes to send some data (e.g. an email). This is broken down into smaller packets for transport on the network. The packet has the destination IP address attached to it as well as the host IP address so communication can be returned. The IP addresses are unique on the Internet and are used by computers and switches to make sure that the data gets to its destination. The application uses a protocol to send the data. The protocol is a set of rules to follow to enable the data to be sent on the network in a form that can be read by all the computers involved. To send an email simple mail transfer protocol (SMTP) is used. If it was a web page then hypertext transfer protocol (HTTP) would be used.

Sending Data Across a Network The data packets leave the computer either through a wired or wireless connection. It travels through specialised units called Switches. These analyse the packets that pass through it and use the destination IP address to forward on the packet to its destination. When the packets arrive at their destination they are unpacked from their address labels and reassembled to create the original data sent. The computer usually sends back data in the same way to confirm the packet has arrived.