0% found this document useful (0 votes)
30 views41 pages

5 Internet Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views41 pages

5 Internet Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Quarter 3 :

Introductio
n to
Internet
1. Understand Internet Protocol;
2. Enumerate and explain
different OSI layers;
3. appreciate the importance of
the OSI layers.
Have you ever thought
about how messages
gets from one place to
another each time you
are using your email
over the Internet?
Our language is very different
from the language that a
computer uses. So the
messages that we create need
to be translated from an
alphabetic text into an
electronic signal before they can
be sent. This translation is
handled in the computer by the
separate modules in the
communication protocol.
These protocols or
rules of conduct
usually
communicate with
two or more
modules. Therefore,
they are best
described as layers
in a stack of
These layers are the
application, presentation,
session, transport, network,
data-link and physical
layers. It is often referred to as
the OSI seven-layer model.
All People Seem To
Need Data
Processing is not
only a fact of life, it’s
also a mnemonic to
help computer
network technicians
remember the OSI
model and help isolate
problems when
troubleshooting
networks.
Even though the OSI
model utilizes the TCP/IP
protocol, the model was
originally designed by the
Open Systems
Interconnection group to
promote the OSI protocol in
its attempt to create a
standardized network
architecture for network
communications.
Unfortunately, though the
OSI protocol supported more
virtual addresses, its complexity
made the TCP/IP protocol the
more popular choice among
network technicians. Ironically,
the simplicity of the TCP/IP
protocol has led to IPv4 address
exhaustion and its newer IPv6
protocol very much resembles
the original OSI protocol in
complexity.
The Open System Interconnection
Reference Model (OSI Reference Model
or OSI Model) is an abstract description
for layered communications and
computer network protocol design. It
was developed as part of the Open
Systems Interconnection (OSI) initiative
APPLICATION LAYER
The application layer is the user interface that internet users interact
with to send or receive data through email, online games, peer to peer
file transfer, and other applications.

Common protocols associated with the application layer:


Hypertext Transfer Protocol (HTTP),
Hypertext Transfer Protocol Secure (HTTPS),
Telnet,
Secure Shell (SSH),
File Transfer Protocol (FTP),
 Trivial File Transfer Protocol (TFTP),
 Simple Mail Transfer Protocol (SMTP),
 Post Office Protocol 3 (POP3),
Dynamic Host Configuration Protocol (DHCP),
 Domain Name System (DNS), Network Time Protocol (NTP)
PRESENTATION LAYER
The presentation layer translates the commands
received from the application layer into universal, well-
known networking formats. Think of the presentation
layer as a more effective version of Google Translate
but for networks. This is the layer where data
encryption and character set conversion occur.

Common protocols: Joint Photographic Experts Group


(JPEG), Graphics Interchange Format (GIF),(Tagged
Image Format File (TIFF), Moving Picture Experts Group
(MPEG), American Standards Code for Information
Interchange [ASCII], Extended Binary Coded Decimal
Interchange Code [EBCDIC], Secure Sockets Layer
(SSL), Hyperxt Transfer Protocol (HTTP), HyperText
MarkUp Language (HTML), File Transfer Protocol (FTP)
AppleTalk Filing Protocols, JAVA
SESSION
LAYER
In order for a packet to reach its
destination, the session layer
establishes a “mechanism for
opening, closing and managing a
session between end-user
application processes and
responses”. The session layer makes
it possible to establish an open
communication line to send the
requested packets.

This layer can be compared to


making a phone call and having the
other person pick up the phone.
Without another party on the line,
TRANSPORT
LAYER
The transport layer not only
defines how data is sent, but
also provides validation and
firewall security.

You can think of the transport


layer as quality control.
Suspicious packets will not
make it past a firewall.
Similarly, suspicious looking
pizzas will not go out for
delivery.
Other Functions:
• Flow control
• Error detection
• Correction

Common protocols:
 Transmission Control Protocol (TCP),
 User Datagram Protocol (UDP),
 Sequenced Packet Exchange (SPX),
 Name-Binding Protocol (NBP)
NETWORK
LAYER
The network layer seeks for
the best-known path to route
information to reach its
destination similar to searching
for an address on a GPS.

In the same way that the


network layer determines the
best way to route information,
our pizza delivery person will
rely on a GPS to map out a
customer’s location.
DATA LINK LAYER

The Data Link Layer ensures


that a transmission occurs
without any errors. The Data
Link Layer consists of two
sub-layers, Logical Link
Control (LLC) and the Media
Access Control (MAC), that
ensure a successful
transmission across different
mediums.
One of the major functions of the
data link layer is to provide a
physical MAC address so that
requested information can find its
destination. Without a physical
address, our pizza delivery man
would not be able to complete his
delivery.
Common protocols:
• Ethernet,
• Token Ring,
• Fiber Distributed Data Interface
(FDDI), and
• Point-to-Point Protocol (PPP),
• Frame Relay, and
• Carrier Sense Multiple
Access/Collision Detect (CSMA/CD)
PHYSICAL
LAYER
The physical layer consists of the physical
components in a Local Area Network (LAN)
such as networking hardware and Ethernet
cables. Cabling issues in the physical layer
sometimes emerge due to the wrong types
of cables (straight through vs. cross over
cables) used or faulty cables.

The physical layer comprises of the


physical hardware components in a
network. In this final step, our now starving
customer will receive her delivery.
Wrap up
The application layer is the user interface
that internet users interact with to send or
receive data through email, online games,
peer to peer file transfer, and other
applications.
The presentation layer translates the
commands received from the application layer
into universal, well-known networking formats.
The session layer makes it possible to
establish an open communication line to send
Wrap up
The transport layer not only defines how
data is sent, but also provides validation and
firewall security.
The network layer seeks for the best-known
path to route information to reach its
destination similar to searching for an address
on a GPS.
The Data Link Layer ensures that a
transmission occurs without any errors and
lastly physical layer consists of the physical
components in a Local Area Network (LAN) such
DIRECTION: Read the
following statement
carefully. Choose the best
answer by writing the
letters only.
1. This layer does not only
define how data is sent, but
also provides validation
and firewall security.

a. Application Layer c. Presentation Layer


b. Transport Layer d. Network Layer
2. It is a layer that ensures
that a transmission occurs
without any errors.

a. Application Layer c. Presentation


Layer
b. Data Link Layer d. Network
Layer
3. These are rules of conduct
usually communicate with
two or more modules.

a. MAC Address c. TCP/IP


b. IP Address d. Protocols
4. It consists of the physical components
in a Local Area Network (LAN) such as
networking hardware and Ethernet
cables.

a. Application Layer c. Presentation Layer


b. Physical Layer d. Network Layer
5. It is an abstract description for layered
communications and computer network
protocol design.

a. Open System Interconnection


b. Operating System Interconnection
c. Open System Interconnect
d. Open Systematized Interconnection
6. It is the user interface that internet
users interact with to send or receive
data through email, online games,
peer to peer file transfer, and other
applications.

a. Application Layer c. Presentation Layer


b. Data Link Layer d. Network Layer
7) It establishes a “mechanism for
opening, closing and managing a
session
between end-user application
processes and responses”.

a. Application Layer c. Presentation Layer


b. Data Link Layer d. Session
Layer
8. One device transmits at a
time until all the information
has been completely sent.

a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode
9. It seeks for the best-known
path to route information to
reach its destination similar to
searching for an address on a
GPS.
a. Application Layer c. Presentation
Layer
b. Data Link Layer d. Network
Layer
10. When the device can transmit and
receive information simultaneously,
such as in phone conversation.

a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode
CRONYMS
GIVE THE MEANING OF THE FF:
1)HTTP
2)SMTP
3)DHCP
4)DNS
5)JPEG
CRONYMS
GIVE THE MEANING OF THE FF:
6) GIF
7) MPEG
8) TCP
9) PPP
10) TIFF
ENUMERATIONS:
Enumerate the following:
21 -27 ) 7 OSI LAYER MODEL
28 -30) WHY DO
BUSINESSMEN CREATE
THEIR OWN NETWORK?

You might also like