1 / 7

Session Objectives #16

Session Objectives #16. Key Words. Peer to Peer. Client Server. IP & MAC Address. Protocol. MAC Address. HTTP. Data Packets.

armand-bean
Download Presentation

Session Objectives #16

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Session Objectives#16

  2. Key Words Peer to Peer Client Server IP & MAC Address Protocol MAC Address HTTP

  3. Data Packets When data is sent from one machine to another over a network, either through the internet or over a LAN, it needs to be collected together in bundles called packets. Packets – bundles of data ready to be transmitted. The size of the ‘message’ doesn’t matter as packages are a standard size, the bigger the message the more packets sent. A data packet consists of several parts or labels Ensuring it is the same as original and not corrupted Where it is going to Where the file Is coming from The data itself Which part of the file it is

  4. Protocols The word protocol means ‘a set of rules’. Therefore Network Protocol – a set of rules or standards that control the transmission of data between devices. These rules will include that method of transmission, the bit rate, transmission modes and error checking.

  5. Protocol Layers Protocols are organised into “layers” which link into each other. This means it is possible to “tweak” individual layers without affecting the whole network standard. Protocols can be divide into 2 parts: logically based and physically based. What might these 2 parts consist of? As you will see the logical rules that can be applied depend on the physical rules (or infrastructure) that is already in place.

  6. Examples of Protocols There are many protocols that have been developed over the years. TASK: Create a table and research the meaning and application Of the following protocols.

  7. Practical Investigation TASK: Follow the ‘making a network connection’ tutorials and attempt to create a direct network connection to the internet using a laptop (with wifi) and a raspberry pi. Answer the following questions: 1.What is the IP address of your raspberry pi 2.Explain what an IP address is? 3.Discuss why you cannot connect a raspberry directly to a network?

More Related