Presentation is loading. Please wait.

Presentation is loading. Please wait.

Component 1 Network Protocols.

Similar presentations


Presentation on theme: "Component 1 Network Protocols."— Presentation transcript:

1 Component 1 Network Protocols

2 Starter: Pre-Reading recap
What is a protocol? What is handshaking? What does the term ‘protocol stack’ mean? What is IP? What does it do? What is TCP? What are the 5 layers of the TCP/IP 5-Layer stack? What is HTTP? What is FTP?

3 Learning Intentions Learning Intention
To develop an understanding of the importance of contemporary network protocols and the importance of layers in the TCP/IP 5-layer model

4 Learning Outcomes Grade 4 Define the term protocol
Explain what handshaking is in terms of computer network communications Grade 5 Explain the advantages and disadvantages of having protocols Explain how protocols are used to send a file over a network Grade 6 Explain the importance and the use of a range of contemporary network protocols, including Ethernet, Wi-Fi, TCP/IP, HTTP, HTTPS, FTP and protocols. Explain the importance of layers and the TCP/IP 5- layer model. Grade 7 Analyse the importance of protocols in a network and explain how different hardware devices interact with different layers of the TCP/IP 5-layer model

5 Protocols A protocol is an agreed format, which allows two devices to communicate. The protocol, put simply, is a set of rules. These rules can include the following: handshaking, where two devices establish their readiness to communicate how the sending device will indicate that it has finished sending a message how the receiving device will indicate that it has received a message the type of error checking to be used agreement on the data compression method to be used

6 Common Protocols Protocol Description
TCP/IP (Transmission Control Protocol/Internet Protocol) Two protocols that combine to allow communication between computer systems on a network. IP is a protocol that sets out the format of packets and an addressing system. TCP is a protocol that allows packets to be sent and received between computer systems HTTP (Hypertext Transfer Protocol) HTTP is a protocol than can be used to transfer multimedia web pages over the Internet. FTP (File Transfer Protocol) FTP is a protocol that can be used when copying a file from one location to another via a network or the Internet. It is typically used for the transfer of large files, as it allows broken communications to resume transferring a file rather than having to restart.

7 Handshaking When a computer communicates with another device like a modem, printer, or network server, it needs to handshake with it to establish a connection. A simple handshaking protocol might only involve the receiver sending a message meaning "I received your last message and I am ready for you to send me another one." A more complex handshaking protocol might allow the sender to ask the receiver if he is ready to receive or for the receiver to reply e.g. "I did not receive your last message correctly, please resend it" (if the data was corrupted en route). Establishing a normal TCP connection requires three separate steps: The first computer (Phil) sends the second computer (Eric) a "synchronize" (SYN) message, which Eric receives. Eric replies with a synchronize-acknowledgment (SYN-ACK) message, which Phil receives. Phil replies with an acknowledgment message, which Eric receives, and doesn't need to reply to. Phil is then ready to send messages to Eric, the handshake has been completed.

8 Handshaking Phil Eric The first computer (Phil) sends the second computer (Eric) a "synchronize" (SYN) message, which Eric receives. Eric replies with a synchronize- acknowledgment (SYN-ACK) message, which Phil receives. Phil replies with an acknowledgment message, which Eric receives, and doesn't need to reply to. Phil is then ready to send messages to Eric, the handshake has been completed.

9 Graded Exercises Complete Questions 1-2 of the graded exercises.
You should write both the question and the answer in your book Extension Can you explain why protocols are important? What are the advantages of protocols?

10 IP – Internet Protocol IP is a protocol that sets out the format of packets and an addressing system. The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet: source - which computer the message came from destination - where the message should go packet sequence - the order the message data should be re-assembled data - the data of the message

11 TCP – Transmission Control Protocol
TCP is a protocol that allows packets to be sent and received between computer systems. error check - the check to see that the message has been sent correctly

12 HTTP – Hypertext Transfer Protocol
HTTP is a protocol than can be used to transfer multimedia web pages over the Internet. For copying files from one host to another.

13 FTP – File Transfer Protocol
FTP is a protocol that can be used when copying a file from one location to another via a network or the Internet. It is typically used for the transfer of large files, as it allows broken communications to resume transferring a file rather than having to restart.

14 Graded Exercises Complete Question 4 of the Graded Exercises Extension
Find out why TCP and IP protocols are often referred to as TCP/IP – How are they similar, how are they different?

15 Protocol Stacks A protocol stack is a set of protocols that work together to provide networking capabilities. It is called a stack because it is designed as a hierarchy of layers, each supporting the one above it and using those below it. The use of a layered approach enables different protocols to be substituted for each other to allow for e.g. new protocols and different network architectures. The number of layers varies according to the particular protocol stack. However, the lowest layer will deal with physical interaction of the hardware, with each higher layer adding additional features, and user applications interacting with the top layer.

16 Protocol Layers Protocols are organised into “layers” which link into each other. This means it is possible to “tweak” individual layers without affecting the whole network standard. Protocols can be divide into 2 parts: logically based and physically based. What might these 2 parts consist of? As you will see the logical rules that can be applied depend on the physical rules (or infrastructure) that is already in place. Physical Logical Wired or Wireless? Concerns the data itself? If wired, what cable to use?? Serial or parallel transmission? Fibre optic, cat 5 e, coaxial etc What mode to be used? Simplex etc If wireless, what frequency, channel etc? Bit rate to send the data at and how much to send at a time. Error checking method, parity, echo e

17 THE 5 Layer TCP/IP Stack

18 TCP/IP – Physical Layer
The physical layer transmits the raw data. It consists of hardware such as switches and routers. The layer deals with all aspects of setting up and maintaining a link between the communicating computers.

19 TCP/IP – Data Link Layer
The data link layer sends data from the network layer to the physical layer. It divides the data to be sent into data frames. A data frame consists of a link layer header followed by a packet. The data link layer handles the acknowledgements sent from the receiver and ensures that incoming data has been received correctly by analysing bit patterns in the frames.

20 TCP/IP – Network Layer The network layer is responsible for the addressing and routing of data. Routers belong to the network layer as they use logical addresses to direct the data from the sender to the receiver. A router determines the path the data should take based on network conditions. Routers manage traffic problems on the network such as the routing of packets to minimise congestion of data.

21 TCP/IP – Transport Layer
The transport layer ensures that data is transferred form one point to another reliably and without errors. The transport layer is responsible for making sure that data is sent and received in the correct order. The transport layer is implemented in the sending and receiving computers but not in the routers on the path between them. It acts as an interface between the communicating computers and the network.

22 TCP/IP – Application Layer
The application layer provides interfaces to the software to allow it to use the network. Examples of software include , file transfer protocol (FTP) and the World Wide Web (WWW) – Think about the applications you use… Outlook, chrome, File Sharing, etc..

23 Graded Exercises Complete Questions 5-8 of the Grade D Recall questions Extension Research the 7 Layer TCP/IP model and explain the difference between this and the 5-layer model.

24 Sending Data between ‘hosts’
The diagram shows Host 1 sending a message to Host 2. From Host 1 the data flows down through the 5 layers of protocols and then to Router 1. Router 1 is the gateway to the operating area of Host 1 and therefore only the network, data link and physical layers are involved. Similarly, with Router 2 only the three layers are involved as the data is passed into the operating region of Host 2. Finally the data passes up through the layers to Host 2.

25 Connection protocols Wi-Fi Protocol Ethernet Protocol
Wi-Fi is a term for certain types of wireless networks that use wireless protocols for transmitting data using electromagnetic waves in place of cables wireless networks use security protocols, such as Wi-Fi Protected Access (WPA), to provide a level of security and privacy comparable to that of a wired network. Bluetooth is another example of a wireless protocol and WAP (Wireless Application Protocol) are protocols to standardise the way that wireless devices can be used for Internet access. At the data link layer Ethernet protocols describe how network devices can format data for transmission using frames and packets. Ethernet protocols are also used to define standards for types of network cabling used at the physical layer and the corresponding transmission speeds.

26 Email Protocols IMAP POP3
To use you must have an client on your computer that has access to a mail server. Your Internet Service Provider (ISP) often supplies this server. The mail client and the mail server exchange information with each other using protocols to transmit information. Protocols IMAP POP3 Internet Messaging Access Protocol (IMAP) is an protocol that stores messages on a mail server. It allows the user to read and handle messages as though they were stored locally on their own computer. The user can manage their with facilities such as the ability to create folders to organise their messages, store draft messages in the server and delete unwanted messages. Post Office Protocol 3 (POP3) is the third version of a protocol for receiving POP3 receives for a client and stores it in a single file on the mail server. When the client logs onto the mail server the is transfer to the users computer. There are no copies of the stored permanently on the server after they have been downloaded.

27 Protocols SMTP The Simple Mail Transfer Protocol (SMTP) is used to deliver from the sender to an server or when is delivered from one server to another. SMTP can only be used to send s but not to receive them.

28 Graded Exercises Complete Questions 9-10 of the Grade D Exercises.
These will be peer-assessed in 7 minutes. Extension Continue to the Grade 5 – Applying questions before the Grade 6 and 7 Exam Questions.

29 Crib Sheet – What I must remember about _______
Starting Point: Read the learning outcomes from the exam board Record the key facts that you need to remember about Network Protocols, the 5- Layer TCP/IP Stack, and Protocols. Think about what you have learnt today, what questions you have been asked, definitions of words, or anything else you think is important!

30 Homework Question Sheets: Q41 – Network Protocols Revision:
For revision this time you are going to create ‘Crib’ Sheets. These should cover the following topics: LANs and WANs Topologies Circuit and Packet Switching IP Addresses, MAC Addresses, and DNS Servers Network Protocols and the 5-Layer TCP/IP Stack These should be made in your small A5 Crib books and there should be a maximum of 1 page each. If you do not have your A5 Crib book then each section should be a maximum of ½ page in your A4 books.


Download ppt "Component 1 Network Protocols."

Similar presentations


Ads by Google