SlideShare a Scribd company logo
1 of 16
NETWORK PROTOCOLS
FOR KS4
OCR GCSE COMPUTER SCIENCE (J277)
MRS KNIGHT
STARTER
NETWORKS . . .
How much can you recall?
Networks, LANs & WANs Quiz
(Google Form)
QUICK RECAP OF LAST LESSON
IP Address
Internet Protocol address
Unique address for each device on a
network.
Each address has 4 sets of up to 3 digits
(IPv4), each with a maximum value of 255.
Used to route packets on a WAN.
MAC Address
Media Access Control
Every individual device in the
world has a unique MAC Address. Used to
route frames on a LAN, directed by the switch.
TCP / IP
Transfer Control Protocol / Internet Protocol
TCP - Rules for communicating over the internet.
IP - Rules for communicating over the internet
LEARNINGOBJECTIVES
•Define network protocols and why they are needed.
•Identify and explain standard internet protocols in the
application layer, e.g. HTTP, HTTPS, FTP, SMTP, POP, and IMAP.
KEY WORDS:
Protocol, DNS, HTTP, HTTPS, FTP, POP, IMAP,
SMTP, TCP/IP, MAC addresses, layers.
SUCCESS CRITERIA
ALL will have a basic understanding of why protocols are used.
ALL will be aware of some protocols and what they are used for.
MOST should be able to explain why protocols are used.
MOST should be able to identify and explain specific protocols.
SOME could give detailed explanations with examples of why
protocols are used. SOME could give detailed explanations for
most protocols.
WHAT ARE NETWORK PROTOCOLS?
1. A network PROTOCOL is set of RULES for communication
over a network.
2. This STANDARDISATION allows interoperability between
systems locally and across the globe.
3. Protocols describe HOW the standards work.
QUESTION: Why do we need these standards?
10-MINUTE TASK
CREATE A PROTOCOL
 Get into groups of 3-4
 Create a protocol for
sending simple text messages
across a network.
 Write out the steps that
your protocol will follow to
send the message.
 Test your protocol by
sending a message across your
group.
REQUIREMENTS
1. Send a message of at least 80 characters including
spaces.
2. Split your message into ‘chunks’.
3. Each ‘chunk’ can contain a maximum of 8 characters.
4. ‘Chunks’ might not reach the other computer in order.
5. Both the sender and the receiver of the message must be
confident that the full message has been received.
TCP/IP – 4 LAYER PROTOCOL STACK
APPLICATION
LAYER
TRANSPORT
LAYER
INTERNET
LAYER
LINK
LAYER
PROVIDES END-TO-END COMMUNICATION
BETWEEN 2 HOSTS. DETERMINES
LANGUAGE, PACKET SIZE, ETC.
ADDRESSES AND PACKAGES DATA
READY FOR TRANSMISSION.
ROUTES PACKETS ACROSS THE NETWORK.
PHYSICAL HARDWARE, I.E. ROUTERS,
CABLES, NETWORK INTERFACE CARDS (NIC).
DHCP, DNS, HTTP, HTTPS,
FTP, SMTP, POP, IMAP
TCP, UDP
IP4 OR IP6
TWISTED PAIR, WI-FI,
FIBRE.
PROVIDES USER INTERFACE, I.E. WEB
BROWSERS AND EMAIL PROGRAMS.
Hypertext Transfer Protocol Hypertext Transfer Protocol
Transfers non-secure web
pages between web servers
and web browsers
(client) across the internet.
The data is not private.
Securely transfers encrypted
web pages between web
servers and web browsers
(client) across the internet.
The data remains private.
HTTP HTTP
VERSUS
HTTP Image courtesy of Rahul Kumar Mandal at medium.com 2021.
HTTP/HTTPS is mainly used to access web pages but is also the
protocol used for various apps too.
 Enables sending, receiving and sharing of files across the internet.
 FTP is not encrypted and therefore insecure.
Image courtesy of EDUCBA.COM 2021.
File Transfer Protocol
FTP
SMTP
SIMPLE
MAIL
TRANSFER
PROTOCOL
 Used by email client application to send email.
 SMTP server listens for SMTP request from email client.
 SMTP relays emails via email servers throughout the internet.
Image courtesy of GEEKFLARE.COM 2021.
Image courtesy of Tech4Law.co.za 2021.
INTERNET
MESSAGE
ACCESS
PROTOCOL
POST
OFFICE
PROTOCOL
IMAP creates a COPY of the email on the device.
IMAP leaves a COPY on the mail server.
After opening the email, it CAN be viewed on
other devices too (unless it is deleted).
POP does NOT create a client copy of the email.
POP does NOT leave a copy on the mail server.
After opening the email, it CANNOT be viewed
on other devices.
VERSUS
POP controls the
fetching/download of
emails from the mail
server to the client.
IMAP controls the
download/upload of
emails to and from the
mail server.
SUMMARY - WHY TCP/IP ?
APPLICATION
LAYER
TRANSPORT
LAYER
INTERNET
LAYER
LINK
LAYER
PROVIDES END-TO-END COMMUNICATION
BETWEEN 2 HOSTS. DETERMINES
LANGUAGE, PACKET SIZE, ETC.
ADDRESSES AND PACKAGES DATA
READY FOR TRANSMISSION.
ROUTES PACKETS ACROSS THE NETWORK.
PHYSICAL HARDWARE, E.G. ROUTERS,
CABLES, NETWORK INTERFACE CARDS (NIC).
DHCP, DNS, HTTP, HTTPS,
FTP, SMTP, POP, IMAP
TCP, UDP
IP4 OR IP6
TWISTED PAIR, WI-FI,
FIBRE.
PROVIDES USER INTERFACE, I.E. WEB
BROWSERS AND EMAIL PROGRAMS.
RETRIEVAL GRID (PLENARY)
HTTP DNS IMAP
FTP SMTP HTTPS
IP TCP POP
RETRIEVAL GRID ANSWERS
HYPERTEXT
TRANSFER
PROTOCOL
DOMAIN NAME
SERVER
INTERNET MESSAGE
ACCESS PROTOCOL
FILE TRANSFER
PROTOCOL
SIMPLE MAIL
TRANSFER
PROTOCOL
HYPERTEXT
TRANSFER
PROTOCOL
(SECURE)
INTERNET
PROTOCOL
TRANSFER CONTROL
PROTOCOL
POST OFFICE
PROTOCOL
CONFIDENCE LEVEL?
VERY CONFIDENT
Understood ALL of
it, very confident.
FAIRLY CONFIDENT
Understood MOST of
it, fairly confident.
OKAY
Understood SOME of it
and need some support.
NEXT LESSON: Threats to computer systems and networks.
HOME WORK: Watch video: Threats to Networks (Research threats – google doc).

More Related Content

What's hot

Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Methods of connecting internet
Methods of connecting internetMethods of connecting internet
Methods of connecting internetTittu Anna
 
Internet connectivity
Internet connectivity Internet connectivity
Internet connectivity Shibin S B
 
Domain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPDomain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPsaurav kumar
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsUMA MAHESWARI
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer routerrishi ram khanal
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocolsRaja Waseem Akhtar
 
Internet architecture
Internet architectureInternet architecture
Internet architectureNaman Rastogi
 
What is internet
What is internetWhat is internet
What is internetcramars
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJAvtunotesbysree
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

What's hot (20)

Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Methods of connecting internet
Methods of connecting internetMethods of connecting internet
Methods of connecting internet
 
Internet connectivity
Internet connectivity Internet connectivity
Internet connectivity
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Ethernet
EthernetEthernet
Ethernet
 
Isp
IspIsp
Isp
 
Domain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPDomain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTP
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
What is internet
What is internetWhat is internet
What is internet
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Cn ppt
Cn  pptCn  ppt
Cn ppt
 
DNS Record
DNS RecordDNS Record
DNS Record
 

Similar to Network Protocols KS4

Internet Protocol
Internet ProtocolInternet Protocol
Internet ProtocolAvikGhara
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based pptIMEI
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.pptImXaib
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in detailsapel7
 
六合彩
六合彩六合彩
六合彩adxegd
 
六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideShare六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideSharexmatnmqu
 
香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideSharecckiawfm
 
六合彩|香港六合彩
六合彩|香港六合彩六合彩|香港六合彩
六合彩|香港六合彩wnevsi
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharelfftxajv
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharerylpwodc
 

Similar to Network Protocols KS4 (20)

Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.ppt
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Protocols and its standards
Protocols and its standardsProtocols and its standards
Protocols and its standards
 
Bt0076
Bt0076Bt0076
Bt0076
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
六合彩
六合彩六合彩
六合彩
 
六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideShare六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideShare
 
香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare
 
umveyhl
umveyhlumveyhl
umveyhl
 
六合彩|香港六合彩
六合彩|香港六合彩六合彩|香港六合彩
六合彩|香港六合彩
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Network Protocols KS4

  • 1. NETWORK PROTOCOLS FOR KS4 OCR GCSE COMPUTER SCIENCE (J277) MRS KNIGHT
  • 2. STARTER NETWORKS . . . How much can you recall? Networks, LANs & WANs Quiz (Google Form)
  • 3. QUICK RECAP OF LAST LESSON IP Address Internet Protocol address Unique address for each device on a network. Each address has 4 sets of up to 3 digits (IPv4), each with a maximum value of 255. Used to route packets on a WAN. MAC Address Media Access Control Every individual device in the world has a unique MAC Address. Used to route frames on a LAN, directed by the switch. TCP / IP Transfer Control Protocol / Internet Protocol TCP - Rules for communicating over the internet. IP - Rules for communicating over the internet
  • 4. LEARNINGOBJECTIVES •Define network protocols and why they are needed. •Identify and explain standard internet protocols in the application layer, e.g. HTTP, HTTPS, FTP, SMTP, POP, and IMAP. KEY WORDS: Protocol, DNS, HTTP, HTTPS, FTP, POP, IMAP, SMTP, TCP/IP, MAC addresses, layers.
  • 5. SUCCESS CRITERIA ALL will have a basic understanding of why protocols are used. ALL will be aware of some protocols and what they are used for. MOST should be able to explain why protocols are used. MOST should be able to identify and explain specific protocols. SOME could give detailed explanations with examples of why protocols are used. SOME could give detailed explanations for most protocols.
  • 6. WHAT ARE NETWORK PROTOCOLS? 1. A network PROTOCOL is set of RULES for communication over a network. 2. This STANDARDISATION allows interoperability between systems locally and across the globe. 3. Protocols describe HOW the standards work. QUESTION: Why do we need these standards?
  • 7. 10-MINUTE TASK CREATE A PROTOCOL  Get into groups of 3-4  Create a protocol for sending simple text messages across a network.  Write out the steps that your protocol will follow to send the message.  Test your protocol by sending a message across your group. REQUIREMENTS 1. Send a message of at least 80 characters including spaces. 2. Split your message into ‘chunks’. 3. Each ‘chunk’ can contain a maximum of 8 characters. 4. ‘Chunks’ might not reach the other computer in order. 5. Both the sender and the receiver of the message must be confident that the full message has been received.
  • 8. TCP/IP – 4 LAYER PROTOCOL STACK APPLICATION LAYER TRANSPORT LAYER INTERNET LAYER LINK LAYER PROVIDES END-TO-END COMMUNICATION BETWEEN 2 HOSTS. DETERMINES LANGUAGE, PACKET SIZE, ETC. ADDRESSES AND PACKAGES DATA READY FOR TRANSMISSION. ROUTES PACKETS ACROSS THE NETWORK. PHYSICAL HARDWARE, I.E. ROUTERS, CABLES, NETWORK INTERFACE CARDS (NIC). DHCP, DNS, HTTP, HTTPS, FTP, SMTP, POP, IMAP TCP, UDP IP4 OR IP6 TWISTED PAIR, WI-FI, FIBRE. PROVIDES USER INTERFACE, I.E. WEB BROWSERS AND EMAIL PROGRAMS.
  • 9. Hypertext Transfer Protocol Hypertext Transfer Protocol Transfers non-secure web pages between web servers and web browsers (client) across the internet. The data is not private. Securely transfers encrypted web pages between web servers and web browsers (client) across the internet. The data remains private. HTTP HTTP VERSUS HTTP Image courtesy of Rahul Kumar Mandal at medium.com 2021. HTTP/HTTPS is mainly used to access web pages but is also the protocol used for various apps too.
  • 10.  Enables sending, receiving and sharing of files across the internet.  FTP is not encrypted and therefore insecure. Image courtesy of EDUCBA.COM 2021. File Transfer Protocol FTP
  • 11. SMTP SIMPLE MAIL TRANSFER PROTOCOL  Used by email client application to send email.  SMTP server listens for SMTP request from email client.  SMTP relays emails via email servers throughout the internet. Image courtesy of GEEKFLARE.COM 2021.
  • 12. Image courtesy of Tech4Law.co.za 2021. INTERNET MESSAGE ACCESS PROTOCOL POST OFFICE PROTOCOL IMAP creates a COPY of the email on the device. IMAP leaves a COPY on the mail server. After opening the email, it CAN be viewed on other devices too (unless it is deleted). POP does NOT create a client copy of the email. POP does NOT leave a copy on the mail server. After opening the email, it CANNOT be viewed on other devices. VERSUS POP controls the fetching/download of emails from the mail server to the client. IMAP controls the download/upload of emails to and from the mail server.
  • 13. SUMMARY - WHY TCP/IP ? APPLICATION LAYER TRANSPORT LAYER INTERNET LAYER LINK LAYER PROVIDES END-TO-END COMMUNICATION BETWEEN 2 HOSTS. DETERMINES LANGUAGE, PACKET SIZE, ETC. ADDRESSES AND PACKAGES DATA READY FOR TRANSMISSION. ROUTES PACKETS ACROSS THE NETWORK. PHYSICAL HARDWARE, E.G. ROUTERS, CABLES, NETWORK INTERFACE CARDS (NIC). DHCP, DNS, HTTP, HTTPS, FTP, SMTP, POP, IMAP TCP, UDP IP4 OR IP6 TWISTED PAIR, WI-FI, FIBRE. PROVIDES USER INTERFACE, I.E. WEB BROWSERS AND EMAIL PROGRAMS.
  • 14. RETRIEVAL GRID (PLENARY) HTTP DNS IMAP FTP SMTP HTTPS IP TCP POP
  • 15. RETRIEVAL GRID ANSWERS HYPERTEXT TRANSFER PROTOCOL DOMAIN NAME SERVER INTERNET MESSAGE ACCESS PROTOCOL FILE TRANSFER PROTOCOL SIMPLE MAIL TRANSFER PROTOCOL HYPERTEXT TRANSFER PROTOCOL (SECURE) INTERNET PROTOCOL TRANSFER CONTROL PROTOCOL POST OFFICE PROTOCOL
  • 16. CONFIDENCE LEVEL? VERY CONFIDENT Understood ALL of it, very confident. FAIRLY CONFIDENT Understood MOST of it, fairly confident. OKAY Understood SOME of it and need some support. NEXT LESSON: Threats to computer systems and networks. HOME WORK: Watch video: Threats to Networks (Research threats – google doc).

Editor's Notes

  1. All communication requires rules to determine how the communication is made. Rules that govern communication are known as protocols. There are many types of protocol but the ones that govern addressing are: Internet Protocol (IP) When connected to a network each device is given a unique IP address. Address consists of 4 sets of up to 3 digits, each with max value of 255 (separated by dots). Dynamic IP addressing allows more devices to connect than there are available addresses. When a device disconnects from the network, its address is freed up for another device to use. When the first device reconnects it is assigned any free address. This method is called IPv4, which when devised, was deemed to be enough. Massive increase in internet devices mean IPv4 run out of addresses. IPv6 includes 6 sets of 3 digits, greatly increases the number of possible addresses to trillions. Media Access Control (MAC) Unique serial number assigned to each network interface controller (NIC). Allows network to identify any device, even when a dynamic IP address is assigned using DHCP, each time the device connects to a network. Device’s IP address changes depending on network & MAC address is unique to device. A MAC address consists of a string of hexadecimal numbers, e.g. 1A:5B:6H:98:78:35 MAC address is assigned by manufacturer of NIC & cannot be changed. If device has more than one NIC, e.g. a wired NIC & a wireless NIC, each NIC has its own MAC address.
  2. Ask students to write these objectives down in their books.
  3. OCR definitions is “A network PROTOCOL is set of RULES for communication over a network.” This and only this will receive the exam mark.
  4. Group activity: 10-Minute Task (NB. Students to be grouped as per covid seating plan to maintain minimal contact.) 5 minutes to complete task  5 minutes to present the task How will the receiver know what order to reassemble the chunks in? What information needs to be with their chunks to make this possible? What does this mean will happen to the number of chunks sent? Many? Lost? Different routes?   How will the sender AND receiver know that the message has been fully received? Could we send some information at the start of the protocol so that the receiver knows how much to expect? How can we ensure that any confirmation messages are received at both ends? Responses from 5 randomly picked groups; 1 person per group nominated to report back (1 minute per team). How successful was their protocol? Did they follow all the steps as described? Did they find any problems? What would improve the protocol?
  5. Impress the importance of the Transmission Control Protocol/Internet Protocol (TCP/IP) model layers and how it breaks the sending of messages into smaller, separate tasks/chunks. Each component handles a different part of the communication. 4 TCP/IP Layers: Application: Encodes/decodes message in the format understood by the sender and the recipient. Transport: Breaks message into small chunks (packets). Network: Adds the sender and recipients IP addresses. The network then knows where to send the message, and where it came from. Data Link: Transfers packets between nodes on a network, and between one network and another. Layering allows standards to be developed, but also allows scope to be adapted for new hardware and software over time. For example, different software packages (applications) may use the same transport, network and link layers but have their own application layer. The way the program encodes the message changes - the rest of communication method remains the same. This allows interoperability. Changing from IPv4 to IPv6 addressing only affects the network layer, yet other layers remain unaffected. This allows improvements to be made without having to redefine whole communication methods.
  6. Hypertext Transfer Protocol - governs communication between a webserver and a client. HTTP Transfers non-secure web pages between web servers & web browsers (client) across the internet. The data is not private. HTTPS (secure) includes secure encryption to allow transactions to be made over the internet. HTTPS Securely transfers encrypted web pages between web servers & web browsers (client) across the internet. The data remains private.
  7. FTP: Enables sending, receiving and sharing of files across the internet. FTP is not encrypted & therefore insecure.
  8. SMTP: Used by email client application to send email. SMTP server listens for SMTP request from email client. SMTP relays emails via email servers throughout the internet.
  9. POP is an older implementation, largely replaced by IMAP. POP: Fetching/downloading emails from mail server to client. Does NOT create client copy. Does NOT leave a copy. After opening, email CANNOT be viewed elsewhere. IMAP: Download/upload emails to & from mail server. IMAP creates device COPY. IMAP leaves COPY on mail server. After opening, email, CAN be viewed elsewhere (unless deleted).
  10. Reiterate the importance of the Transmission Control Protocol/Internet Protocol (TCP/IP) model.  Layers break up the sending of messages into separate components and tasks.  Each component handles a different part of the communication.  Allows for easier error fixes. 4 TCP/IP Layers: Application: Encodes/decodes message in the format understood by the sender and the recipient. Transport: Breaks message into small chunks (packets). Network: Adds the sender and recipients IP addresses. The network then knows where to send the message, and where it came from. Data Link: Transfers packets between nodes on a network, and between one network and another. Layering allows standards to be developed, but also allows scope to be adapted for new hardware and software over time. For example, different software packages (applications) may use the same transport, network and link layers but have their own application layer. The way the program encodes the message changes - the rest of communication method remains the same. This allows interoperability. Changing from IPv4 to IPv6 addressing only affects the network layer, yet other layers remain unaffected. This allows improvements to be made without having to redefine whole communication methods.
  11. HTTP: Transfers non-secure web pages between web servers & web browsers (client) across the internet. The data is not private. HTTPS: Securely transfers encrypted web pages between web servers & web browsers (client) across the internet. The data remains private. FTP: Enables sending, receiving and sharing of files across the internet. FTP is not encrypted & therefore insecure. SMTP: Used by email client application to send email. SMTP server listens for SMTP request from email client. SMTP relays emails via email servers throughout the internet. POP: Fetching/downloading emails from mail server to client. Does NOT create client copy. Does NOT leave a copy. After opening, email CANNOT be viewed elsewhere. IMAP: Download/upload emails to & from mail server. IMAP creates device COPY. IMAP leaves COPY on mail server. After opening, email, CAN be viewed elsewhere (unless deleted).
  12. HTTP: Transfers non-secure web pages between web servers & web browsers (client) across the internet. The data is not private. HTTPS: Securely transfers encrypted web pages between web servers & web browsers (client) across the internet. The data remains private. FTP: Enables sending, receiving and sharing of files across the internet. FTP is not encrypted & therefore insecure. SMTP: Used by email client application to send email. SMTP server listens for SMTP request from email client. SMTP relays emails via email servers throughout the internet. POP: Fetching/downloading emails from mail server to client. Does NOT create client copy. Does NOT leave a copy. After opening, email CANNOT be viewed elsewhere. IMAP: Download/upload emails to & from mail server. IMAP creates device COPY. IMAP leaves COPY on mail server. After opening, email, CAN be viewed elsewhere (unless deleted).
  13. We learned about network protocols today. Next lesson, we will learn about threats to computer systems and networks. Assessment Snapshot: Pull example emoji faces and ask them to copy as per their own feelings about the topic. For the ‘Starter’ at the beginning of the next lesson, ask learners what they can recall from the last lesson on network protocols. Ask different learners to come out “Be Mrs Knight” and give 1 minute mini teach on the different protocols.