top of page

LEARNING OBJECTIVES

  • Understand the use of IP addresses, MAC addresses and protocols.

SUCCESS CRITERIA

Success Criteria:

  • Create an animated presentation to explain to the year 9's the different protocols.

1.5  Network topologies, protocols and layers

Learners should have studied the following:

  • star and mesh network topologies

  • WiFi:

    • frequency and channels

    • encryption 

  • ethernet

  • LO3 - the uses of IP addressing, MAC addressing, and protocols including:

    • TCP/IP (Transmission Control Protocol/Internet Protocol​

    • HTTP (Hyper Text Transfer Protocol)

    • HTTPS (Hyper Text Transfer Protocol Secure)

    • FTP ( File Transfer Protocol

    • POP ( Post Office Protocol)

    • IMAP (Internet Message Access Protocol)

    • SMTP (Simple Mail Transfer Protocol)

  • the concept of layers

  • packet switching

KEYWORDS

Protocol - A set of rules/ standards that govern network transmission/operations

key points

  • Protocols are communication standards. They are needed so that devices can talk to each other.

Networks - LESSON 7

Network topologies and protocols

STARTER​

Click on the link to access the worksheet for this task.

Network communications are governed by protocols. These are rules and standards that are agreed in order to make it possible for different devices to talk to each other.

Protocols exist for most aspects of large networks and of course or the internet. They cover the sending and receiving of messages,the technicalities of the hardware and also the file formats used by different types of message.

If protocols didn't exist it would be like a group of people trying to communicate with each other and share resources that are all in a different language. This would make the process very difficult. A protocol makes it possible for all devices to effectively be speaking the same language when communicating with each other on a network.

lo3- The use of ip addressing,mac addressing and protocols

lo3-Network addressing

For a message to get from one node to another on any network, there must be an indication of where it is to go, just as a letter must have an address on the envelope.

There are various ways to address a message. The main ones involve IP (internet protocol) addressing and MAC (media access control) addressing.

With IP addressing, each node  on a network is assigned a unique numerical IP address. An IP address is composed of a series of binary numbers, normally displayed in decimal or hex.

IPVersion 4 (IPv4) uses four octets (that is, 32 bits), for example 194.83.249.5. This arrangement give a possible 4 294 967 296 IP addresses.

IPVersion 6 (IPv6) uses 128 bits, allowing addresses such as:

2001:db8:0:1234:10:567:12:11

This provides about 340 trillion trillion trillion IP addresses.

IP addresses can be static,  that is they are permanently

assigned by an administrator but this ties up addresses

even when the device is not in use.

To conserve IP addresses, they are often assigned

dynamically, to allow reuse.

This is called DHCP (dynamic host configuration protocol).

Networks often have their own subnet addresses, again to conserve addresses. The router connecting to the outside world has one address and the clients inside the LAN have their own.

MAC addresses are uniquely assigned to devices connected to a network. These are stored in the NIC of the device's hardware by the manufacturer. If a network node has multiple hardware items attached to it, each one will have its own MAC address.

lo3-Protocols and standards

Different protocols are used for different applications on a network. Some common protocols and standards used on the internet are given in the table below.

taSK 1

You have been asked to create a presentation that will explain to the Year 9's how and why protocols are important. Using www.powtoon.com you are required to create an animated presentation to explain at least 5 of the protocols you have learnt about today.

Focus:

  • Name of the protocol (Abbreviation and full name)

  • What is the role of the protocol?

  • Why is the protocol important?

bottom of page