1.5 Network topologies, protocols and layers 2

Slides:



Advertisements
Similar presentations
1 The 7 layer OSI model Sending an . 2 The seven layers.
Advertisements

Communicating over the Network
Data Communications and Networks
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Characteristics of Communication Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
TCP/IP Transport and Application (Topic 6)
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
How Information Flows via the Internet By: Lee Farrell.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Component 1 Network Protocols.
Ethernet, WiFi & Protocols
1.5 Network topologies, protocols and layers 1
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks.
Unit 2.5 Translators and Facilities of Languages – Lesson 1
The OSI Model and the TCP/IP Protocol Suite
Layered Architectures
Watch this video clip taken from Futurama
Networking for Home and Small Businesses – Chapter 6
Lecture 6: TCP/IP Networking By: Adal Alashban
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Mr C Johnston ICT Teacher
Unit 1.4 Wired and Wireless Networks Lesson 2
Unit Network Topologies, protocols and layers Lesson 3
Teaching Computing to GCSE
Computer Networks Lesson 3.
Networking for Home and Small Businesses – Chapter 6
Unit 1.4 Wired and Wireless Networks Lesson 1
How Data Flows through the Internet
The OSI Model and the TCP/IP Protocol Suite
Unit 1.6 Systems security Lesson 3
Topologies, Protocols and Layers
Packet Sniffing.
Unit Network Topologies, protocols and layers Lesson 2
Topic 5: Communication and the Internet
Unit Network Topologies, protocols and layers Lesson 1
Packetizing Error Detection
Packetizing Error Detection
Topologies, Protocols and Layers
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Unit 1.4 Wired and Wireless Networks Lesson 3
Unit 1.3 Storage Lesson 2: Storing Data
Computer communications
TCP/IP Protocol Suite: Review
Packetizing Error Detection
© OCR NETWORK TOPOLOGIES, PROTOCOLS AND LAYERS 2.
Protocols 2 Key Revision Points.
TCP/IP routing simulation
Protocols & Packet Switching
Unit 1.3 Storage Lesson 1: Storage Devices
Unit 1.3 Storage Lesson 1: Storage Devices
How Our Customers Communicate With Us
Computer Networks Lesson 3.
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Who… What… Why… When… Where… How… Could… Should….
The OSI Model and the TCP/IP Protocol Suite
Who… What… Why… When… Where… How… Could… Should….
What evidence is there to suggest climate change is a natural process?
WJEC GCSE Computer Science
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

1.5 Network topologies, protocols and layers 2

Thought for the day – Networks transfer and receive a lot of data!! The amount of traffic on the internet is incredible! http://visual.ly/internet-real-time In May 2011, officers at South Yorkshire Police were informed by colleagues in Hertfordshire that they had identified an IP address from which more than 100 indecent images of children had been shared in April that year. The IP address passed on corresponded to an internet account held by Nigel's partner. But it had been typed incorrectly, with an extra digit added by mistake. When Nigel was arrested, all he could do was to repeatedly assure himself the police would discover the truth. "You say to yourself, 'Well they're going to find nothing and I haven't done anything, so I'll be alright.’ After three weeks, police returned Nigel's computers to him, and he had been found completely innocent. But the events had caused a deep psychological effect. "Because of what happened I felt unable to go back into the field of work I was working in," he says. His role as a drug recovery worker had involved helping teenagers. "It was the best job I'd had in my life, and I felt I was really good at it. "But I became fearful of working with young females in case any of them said I tried any sexual advances. It made me paranoid." 'Shouting my innocence' Eleven months after his arrest, and still without knowledge of why his home had been raided, Nigel began the search for answers - filing a complaint against South Yorkshire Police on grounds of racism and sexism Nigel decided to ask his solicitor to look deeper. The lawyer contacted Hertfordshire Police and discovered the truth of the incorrect IP address. Nigel received an apology, in writing, from Hertfordshire Police in 2014, which accepted responsibility for the error. 'Six years of fighting' Following Hertfordshire Police's admission, Nigel sought compensation for a breach of the Data Protection Act 1998, false imprisonment, police assault/battery, and trespass by police. In October 2016, Hertfordshire Police settled out of court. Nigel received damages of £60,000, plus legal costs.

The Big Picture: Network topologies, protocols and layers Star and mesh network topologies Networks using wifi and ethernet Wi-fi : frequency and channels Encryption The uses of IP addressing, MAC addressing, and commonly used protocols The concept of layers Packet switching

Learning Objectives Know what layers are and their role By the end of today’s lesson, you will understand: Know what layers are and their role Be able to explain the role of each layer Understand the concept of Packet Switching

Starter: Do you know your Protocols? TCP/IP HTTP HTTPS FTP POP IMAP SMTP

Do you know your Protocols? - Answers TCP/IP (Transmission Control Protocol/Internet Protocol) HTTP (Hyper Text Transfer Protocol) HTTPS (Hyper Text Transfer Protocol Secure) FTP (File Transfer Protocol) POP (Post Office Protocol) IMAP (Internet Message Access Protocol) SMTP (Simple Mail Transfer Protocol)

What is Internet anyway? https://www.youtube.com/watch?v=95-yZ-31j9A

Quick recap: How DNS works 1. 2. The URL is sent to your ISP and they look up the URL in their DNS ‘address book’. They find it and send back to you the website’s URL address or passes it on to another DNS server to see if that can find it. www.bbc.co.uk 1. You can’t remember the IP address of the computer which hosts the BBC website, so you type in the URL into the browser. 2. 3. 3. Now you can communicate with the computer which hosts the website on the internet, directly. 322. 55.24.12 123.45.67.89 174.25.46.77

Packet Switching Imagine that you have a large LEGO model to post through a letter box but, it does not fit. What could you do? What if you could take the model apart and then post it through the letter box and then reassemble it? This is packet switching

Packet Switching Now image you want to email a photo, first it is broken down into small packets of data Each packet is then given a header which contains the IP address of the network and device that it is being sent to. It also contains the IP address of the network that it was sent from

Packet Switching The header also contains the packet number as well as the total number of packets, for example packet 4 of 60, packet 45 of 60. When the packets arrive at the destination this information is used to reassemble the data. Packets can be lost so sometimes the computer request the packet to be sent again, if a packet never arrives then it is deleted by the router.

Data Packets Data Packet Header When files are sent over the internet they are split into millions of data packets. Packets get sent by different routes according to availability. When you send a file online, the parts of the file might travel one way around the world and the other parts may go in the opposite direction! Packets are reassembled at receiving end. Typical packet structure: Data Packet Header Error Check Sequence No. Return Address Destination Address

Data Packets Data Packet Header Sequence No. Return Address An error check is an important aspect of a data packet. This aspect of the packet is a ‘checksum number’. A checksum made up of a calculation and its correct answer. Once the packet has been received by the destination computer, If the calculation is run and still produces the correct answer, then we know the data hasn’t been corrupted on its journey. The Header contains 3 pieces of information: Sequence Number Return Address Destination Address. This this the data itself. Data Packet Header Error Check Sequence No. Return Address Destination Address As data is split into packets, the sequence number allows the file to be rebuilt by putting the packets back together in the correct order. When data arrives, the computer which sent the data can be notified that it arrived safely. And if a packet arrives corrupted, the computer which sent the data can be asked to send it again. Obviously a data packet needs a destination address so that it can be routed to the correct location.

The amazing way that data is sent across the internet!

Packets Header Body Footer Contains instructions about the data being carried. These instructions may include: the length of the packet; packet number; position of this packet; protocol address; originating IP address. Body This is the actual data that the packet is delivering to the destination. Also called the payload Footer Contains a parity bit/checksum to error check and ensure that the complete packet has been delivered intact, and couple of bits that tell the receiving device that the end of the packet has been reached.

Which protocol …? An internationally agreed protocol. It starts by establishing a ‘handshake’ to set up a connection between two devices. The data is then transferred as packets between the two devices. It specifies exactly how data must be transmitted.

Understanding a Packet Research one of the parts of the packets that you do not know. Explain it to another students.

Video https://www.youtube.com/watch?v=ewrBalT_eBM https://youtu.be/ewrBalT_eBM

Play packet switching game Resources from http://code-it.co.uk/netintsearch

Layers When we write an email and send it, we have no idea what device it will be read on, what operating system, which software etc. It is an extremely complex process that is easier to deal with if broken down into layers of smaller more manageable parts. As a packet is prepared the data travels through layers where protocols manage it, adding or removing extra information as required so the packet can continue its journey. The layers must be able to work together exchanging information. Each layer performs specific tasks and interacts with adjacent layers – this is essential – that the layers can communicate with each other. Layering: rules organised into a distinct order in which they need to be applied

Why have layers? The benefits are: Simplifies things by dividing into parts Different layers can be combined in different ways as required One layer can be develop or changed without affecting others Makes it easier t identify networking errors and problems Is a universal standard for manufacturers to follow so all devices can communicate with each other For example, software for an Ethernet system can easily be adapted to a fibre-optic network by changing only the network layer – other layers are not affected

Layers and Protocols TCP/IP is an example of a layered protocol – it defines how data is transferred through a network for example over the internet or over a private network. The TCP/IP stack is a complete set of protocols covering the movement of data across the network. These include how the data should be formatted, addressed, routed and received. You need to know the protocols to be able to link them to the layers

Also called Network Access Layer or Data Link Layer Also called Network Layer Also called Network Access Layer or Data Link Layer TCP/Ip is set of protocols arranged in 4 layers, the names sometimes vary a little. Data to be transmitted or received must pass through the layers where packaging data is added or read.

Layers https://www.youtube.com/watch?v=zyL1Fud1Z1c https://youtu.be/_CXFFqPbOXU?list=PLCiOXwirraUCzDEOPQiBSLlPTkDfFBiOO Craig and Dave 1.30

Internet Protocols and Layers All of the protocols which enable the internet to function correctly can be divided into ‘Layers of the Internet’. Each layer has a particular function and each layer provides a base for the layer above it – in other words, each layer does all the hard work for the layer above it! For example, if you are accessing a website (HTTP ), it requires data to be split into packets and sent across the internet (TCP / IP), which in turns requires the physical transport of data via cables (cables / Wi-Fi ) Layer Example Protocols Layer Purpose Application Layer FTP, HTTP, SMTP Provides user access to applications websites, files, email. Transport Layer TCP Provides transport of data between devices by splitting files into data packets and checking that they have been sent and received correctly. Network Layer Internet Layer IP Provides the routing of data across the network by making use of addressing. Data Link Layer & Physical Layer Ethernet Provides the physical transport of data through electrical signals etc.

I want to send a picture to my friend so I take it to the posting people. Application Layer

They cut the picture up into post cards and number each one. Application Layer Transport Layer 3 4 1 2

They then write the address which each card has to go to. Application Layer Transport Layer 3 4 1 2 Internet Layer

The post cards are loaded into the post van and the van driver sets off. Application Layer 1 2 3 4 Transport Layer Internet Layer Network Interface (Link) Layer

The van driver uses the addresses on the post cards to drive to the destination specified. Application Layer Transport Layer Internet Layer Network Interface (Link) Layer

At the destination the post cards are removed and the address used to check they are in the right place. Unfortunately the van driver dropped card 3 which got washed down a drain. Application Layer Transport Layer 1 2 3 Internet Layer 4 Network Interface (Link) Layer

The delivered cards are checked and the missing number 3 is redelivered. The cards are passed in order to the delivery office. Application Layer Transport Layer 3 4 1 2 Internet Layer Network Interface (Link) Layer

Application Layer Transport Layer Internet Layer 3 4 1 2 Internet Layer The cards are reassembled in order and given to my friend. They now have the original picture. Network Interface (Link) Layer

You need to remember the layers! Example Protocols Layer Purpose Application Layer FTP, HTTP, SMTP Provides user access to applications websites, files, email. Transport Layer TCP Provides transport of data between devices by splitting files into data packets and checking that they have been sent and received correctly. Network Layer Internet Layer IP Provides the routing of data across the network by making use of addressing. Data Link Layer & Physical Layer Ethernet Provides the physical transport of data through electrical signals etc.

Show your understanding Log into Moodle ICT & Computing > GCSE Computer Science > Computer Systems Scroll down to 1.5 5. 2 Folder Download, save and complete Layers, Protocols, Packets.docx

Plenary BBC Online test: http://www.bbc.co.uk/education/guides/zp9jpv4/test

https://sites.google.com/site/tcpipanimation/ https://ea25f758-a-62cb3a1a-s-sites.googlegroups.com/site/tcpipanimation/download/Animace17.swf?attachauth=ANoY7cpmQtdJziEKbnLVImNBsiIVD5HDUwD4EYMQzWu7g-Fgf8u5oWK_2pBWBhPLgXuPwGwLxUrYLHN8R4EwUhAueQsZlQMzHnv0CP_u49_AspD8bIZTKef_vsZ9Cx6TOkYy141gIijwbkjr79rE8n8pCX3ajWrQC1hH34-9mQW1f8NSgHscO7lTR5_Uh7bvADUL-ajIUFFAZMlxw3K4PtlYqJ4mNNYDFVajNzepbbAzFA2KOi6HVN0%3D&attredirects=1 https://sites.google.com/site/tcpipanimation/ OCR Resources: the small print OCR’s resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources. © OCR 2016 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work. OCR acknowledges the use of the following content: n/a Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk