Computing
Computer Science LearnITWithMrC ⛯ Year 7 Year 8 Year 9 GCSE
Responsive image

Lesson Video

67

Lesson Tasks

  • Watch the Lesson video
    Make notes if needed.
  • Open your Learning Journal
    Complete Task 1 in your Learning Journal
  • Complete the learning activities
    Make sure you complete the book tasks in your Unit Booklet
  • Complete End of Task Assessment
    Update your learning objectives

What do I need to Learn?

0 results forGuest
I need to learn how to define the term ‘network protocol’
I need to learn how to explain the purpose and use of common network protocols Ethernet and Wi-Fi
I need to learn how to explain the purpose and use of common network protocols UDP and IP
I need to learn how to explain the purpose and use of common network protocols HTTP,HTTPS and FTP
I need to learn how to explain the purpose and use of email protocols SMTP and IMAP

Key Terms

Protocol Ethernet TCP UDP IP DNS TLS/SSL HTTP/HTTPS SMTP IMAP FTP/SFTP

Task 1 - Network Protocols - Internet Protocol (IP) Click to see more



Good notes will help you organise and process data and information

Internet Protocol (IP)

Imagine a gigantic worldwide Ethernet network of interconnected switches. For each switch to be able to switch incoming data frames to the correct port, the switch would need to have some sort of list where it can look up the physical address of every connected device in the network.

A switch with a long list of devices

This list would be huge, and it would take a lot of memory storage and processor time to use it and keep it updated. And how would the system cope if a device moved? What about technologies that don’t use Ethernet addresses? It just wouldn’t work!

Internet Protocol (IP) addresses are logical addresses

This is why a new addressing scheme was invented: the IP address system. Like postal addresses, IP addresses are logical addresses: they have a logical structure and provide a set of instructions for reaching a destination.

Take this postal address as an example:

  • 12, Clooney Hill
  • Birmingham
  • UK

It can be read from the bottom up, so a letter with this address would be first sent to the UK, then to Birmingham, and then to the right street and house number.

When IP addresses were invented, in the 1970s, it was decided to make them 32 bits long. 32 bits allow for 4 billion unique addresses, enough so that each person on Earth at the time could have one. We didn’t know how big the interconnected network — or internet — we were building would become!

This 32-bit IP address is usually not written in binary. Instead, it is split into four 8-bit chunks (bytes), and each chunk is converted to decimal. The address is then written in dotted decimal notation, with the four decimal values separated by dots.

So the IP address 11000000101010000000111000010111 becomes:

11000000 10101000 00001110 00010111 = 192.168.14.23

IP addresses for mobile devices

Mobile devices (including laptops) are automatically given a different IP address each time they join a different network, because the network bits of their address need to identify the new network. Later in the course, you will learn how IP addresses are automatically allocated.

A laptop moves between a house and a cafe. In the middle, its IP address changes as it moves between networks.

The IP packet

Sending data using IP addresses is very similar to sending data using MAC addresses and Ethernet frames:

The source and destination IP addresses are sent first (together with some additional fields you will learn about later). Then follows the actual data to be transmitted. This structure is called an IP packet, and it looks different to an Ethernet frame.

A simplified IP packet, consisiting of "Other header fields", a 4-byte long "Source IP address", a 4-byte long "Destination IP address", and up to 65,553 bytes of Data.


Task 2 - Ethernet and Wifi Protocols Click to see more


Hypertext Transfer Protocol (HTTP)

HTTP is the protocol most internet users have heard of, since it’s a common prefix to the URL you see in a web browser’s address field.

HTTP requests web pages from a web server and can send information when a user fills in a form. The web pages that get sent back are formatted using Hypertext Markup Language (HTML).

HTTP is gradually being replaced with Hypertext Transfer Protocol Secure (HTTPS). HTTPS encrypts the traffic between the application and the server to protect user’s data. Many browsers denote HTTPS with a padlock symbol to show the link is secure. You should only enter personal information into websites that support HTTPS.


Task 3 - File Transfer Protocol Click to see more


File Transfer Protocol (FTP)

As the name suggests, FTP moves files from a client device to a file server. The FTP application may be a dedicated application on the client device or built into a web browser or other software.

Some examples where FTP would be used are:

  • A website developer designing a website on a local device and then transferring all the files to the web server
  • Downloading software
  • Downloading a music file

Generally, if you end up with an actual file in a folder on your device, you probably used FTP to get that file.


Task 4 - Mail Protocols Click to see more


SMTP and IMAP


Simple Mail Transfer Protocol (SMTP)

Email was initially one of the main uses of the internet and still accounts for a significant number of data transactions.

Users have email addresses such as jsmith@raspberrypi.org. A specific email server manages all the accounts with the same address after the @.

When a user sends a message, using an email client, an app, or a webmail page, the message sent to the mail server using a protocol called SMTP.

Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)

Once an email arrives at the destination mail server, it is stored in the recipient’s ‘mail box’ until they connect to read it.

If a user connected using the Post Office Protocol, or POP, then the actual email is transferred to the client’s device and deleted from the server.

This used to cause problems when groups of people were sharing an email account, e.g. a specific company account that people message when they need support (such as support@abc.com).

To combat this and give additional functionality, the Internet Message Access Protocol, or IMAP was developed. IMAP allows messages to be retrieved while a copy is maintained on the server; a specific request to delete an email is sent when the email is no longer needed.


Task 5 - Ethernet and WiFi Protocols Click to see more


The Ethernet and WiFi Protocols

width="100%" />

The structure of the da


Ethernet protocol, MAC addresses and frames

A set of conventions and rules that govern the communications between devices is called a protocol.

The 1500 byte limit, the CSMA/CD rules, and the need to send destination and recipient addresses are all part of the Ethernet protocol.

frame. An Ethernet frame has five different sections, called fields, for the pieces of information necessary for transmission.

  • One field is for the data that is being transmitted.
  • Two fields contain the destination and source addresses, which are called MAC addresses (for ‘Media Access Control’) . They are 48 bits long, and are usually referred to in hexadecimal notation, e.g. cd:f1:24:e4:89:a1.
  • The Type field is used to indicate what type of data the frame is carrying. You will learn more about this in a later step.
  • The Frame Check Sequence (FCS) is used to detect whether errors have occurred during transmission.

The four non-data fields together ‘wrap around’ the data as the Ethernet Frame, in what is called encapsulation.



Task 6 - Book Task Click to see more

Task:

Open your student workbook at page 15 Complete the tasks in your book.
  1. Task 6 - 8

  • When you are finished screenshot your answer into your Learning Journal

  • Task 7 - End of Task Assessment - Homework 3 Click to see more