LEARNING OBJECTIVES
-
Understand the use of IP addresses, MAC addresses and protocols.
SUCCESS CRITERIA
Success Criteria:
-
Create an animated presentation to explain to the year 9's the different protocols.
1.5 Network topologies, protocols and layers
Learners should have studied the following:
-
star and mesh network topologies
-
WiFi:
-
frequency and channels
-
encryption
-
-
ethernet
-
LO3 - the uses of IP addressing, MAC addressing, and protocols including:
-
TCP/IP (Transmission Control Protocol/Internet Protocol
-
HTTP (Hyper Text Transfer Protocol)
-
HTTPS (Hyper Text Transfer Protocol Secure)
-
FTP ( File Transfer Protocol
-
POP ( Post Office Protocol)
-
IMAP (Internet Message Access Protocol)
-
SMTP (Simple Mail Transfer Protocol)
-
-
the concept of layers
-
packet switching
KEYWORDS
Protocol - A set of rules/ standards that govern network transmission/operations
key points
-
Protocols are communication standards. They are needed so that devices can talk to each other.
Networks - LESSON 7
Network topologies and protocols
STARTER
Click on the link to access the worksheet for this task.
Network communications are governed by protocols. These are rules and standards that are agreed in order to make it possible for different devices to talk to each other.
Protocols exist for most aspects of large networks and of course or the internet. They cover the sending and receiving of messages,the technicalities of the hardware and also the file formats used by different types of message.
If protocols didn't exist it would be like a group of people trying to communicate with each other and share resources that are all in a different language. This would make the process very difficult. A protocol makes it possible for all devices to effectively be speaking the same language when communicating with each other on a network.
lo3- The use of ip addressing,mac addressing and protocols
lo3-Network addressing
For a message to get from one node to another on any network, there must be an indication of where it is to go, just as a letter must have an address on the envelope.
There are various ways to address a message. The main ones involve IP (internet protocol) addressing and MAC (media access control) addressing.
With IP addressing, each node on a network is assigned a unique numerical IP address. An IP address is composed of a series of binary numbers, normally displayed in decimal or hex.
IPVersion 4 (IPv4) uses four octets (that is, 32 bits), for example 194.83.249.5. This arrangement give a possible 4 294 967 296 IP addresses.
IPVersion 6 (IPv6) uses 128 bits, allowing addresses such as:
2001:db8:0:1234:10:567:12:11
This provides about 340 trillion trillion trillion IP addresses.
IP addresses can be static, that is they are permanently
assigned by an administrator but this ties up addresses
even when the device is not in use.
To conserve IP addresses, they are often assigned
dynamically, to allow reuse.
This is called DHCP (dynamic host configuration protocol).
Networks often have their own subnet addresses, again to conserve addresses. The router connecting to the outside world has one address and the clients inside the LAN have their own.
MAC addresses are uniquely assigned to devices connected to a network. These are stored in the NIC of the device's hardware by the manufacturer. If a network node has multiple hardware items attached to it, each one will have its own MAC address.
lo3-Protocols and standards
Different protocols are used for different applications on a network. Some common protocols and standards used on the internet are given in the table below.
taSK 1
You have been asked to create a presentation that will explain to the Year 9's how and why protocols are important. Using www.powtoon.com you are required to create an animated presentation to explain at least 5 of the protocols you have learnt about today.
Focus:
-
Name of the protocol (Abbreviation and full name)
-
What is the role of the protocol?
-
Why is the protocol important?