You are on page 1of 41

Quarter 3 :

Introduction
to Internet
Protocol
1. Understand Internet Protocol;
2. Enumerate and explain
different OSI layers;
3. appreciate the importance of
the OSI layers.
Have you ever thought
about how messages
gets from one place to
another each time you
are using your email
over the Internet?
Our language is very different
from the language that a
computer uses. So the messages
that we create need to be
translated from an alphabetic
text into an electronic signal
before they can be sent. This
translation is handled in the
computer by the separate
modules in the communication
protocol.
These protocols or
rules of conduct
usually communicate
with two or more
modules. Therefore,
they are best
described as layers in
a stack of protocols.
These layers are the application,
presentation, session, transport,
network, data-link and physical
layers. It is often referred to as
the OSI seven-layer model.
All People Seem To
Need Data Processing
is not only a fact of life,
it’s also a mnemonic to
help computer network
technicians remember
the OSI model and help
isolate problems when
troubleshooting
networks.
Even though the OSI
model utilizes the TCP/IP
protocol, the model was
originally designed by the
Open Systems
Interconnection group to
promote the OSI protocol in
its attempt to create a
standardized network
architecture for network
communications.
Unfortunately, though the OSI
protocol supported more virtual
addresses, its complexity made
the TCP/IP protocol the more
popular choice among network
technicians. Ironically, the
simplicity of the TCP/IP protocol
has led to IPv4 address
exhaustion and its newer IPv6
protocol very much resembles
the original OSI protocol in
complexity.
The Open System Interconnection
Reference Model (OSI Reference Model
or OSI Model) is an abstract description
for layered communications and
computer network protocol design. It
was developed as part of the Open
Systems Interconnection (OSI) initiative
APPLICATION LAYER
The application layer is the user interface that internet users interact with
to send or receive data through email, online games, peer to peer file
transfer, and other applications.

Common protocols associated with the application layer:


❖Hypertext Transfer Protocol (HTTP),
❖Hypertext Transfer Protocol Secure (HTTPS),
❖Telnet,
❖Secure Shell (SSH),
❖File Transfer Protocol (FTP),
❖ Trivial File Transfer Protocol (TFTP),
❖ Simple Mail Transfer Protocol (SMTP),
❖ Post Office Protocol 3 (POP3),
❖Dynamic Host Configuration Protocol (DHCP),
❖ Domain Name System (DNS), Network Time Protocol (NTP)
PRESENTATION LAYER
The presentation layer translates the commands received
from the application layer into universal, well-known
networking formats. Think of the presentation layer as a
more effective version of Google Translate but for
networks. This is the layer where data encryption and
character set conversion occur.

Common protocols: Joint Photographic Experts Group


(JPEG), Graphics Interchange Format (GIF),(Tagged
Image Format File (TIFF), Moving Picture Experts Group
(MPEG), American Standards Code for Information
Interchange [ASCII], Extended Binary Coded Decimal
Interchange Code [EBCDIC], Secure Sockets Layer (SSL),
Hyperxt Transfer Protocol (HTTP), HyperText MarkUp
Language (HTML), File Transfer Protocol (FTP) AppleTalk
Filing Protocols, JAVA
SESSION LAYER
In order for a packet to reach its
destination, the session layer
establishes a “mechanism for
opening, closing and managing a
session between end-user application
processes and responses”. The session
layer makes it possible to establish an
open communication line to send the
requested packets.

This layer can be compared to


making a phone call and having the
other person pick up the phone.
Without another party on the line, no
food-related or network-related
conversation would occur.
TRANSPORT
LAYER
The transport layer not only
defines how data is sent, but
also provides validation and
firewall security.

You can think of the transport


layer as quality control.
Suspicious packets will not make
it past a firewall. Similarly,
suspicious looking pizzas will not
go out for delivery.
Other Functions:
• Flow control
• Error detection
• Correction

Common protocols:
❑ Transmission Control Protocol (TCP),
❑ User Datagram Protocol (UDP),
❑ Sequenced Packet Exchange (SPX),
❑ Name-Binding Protocol (NBP)
NETWORK LAYER
The network layer seeks for the
best-known path to route
information to reach its
destination similar to searching
for an address on a GPS.

In the same way that the


network layer determines the
best way to route information,
our pizza delivery person will rely
on a GPS to map out a
customer’s location.
DATA LINK LAYER

The Data Link Layer ensures


that a transmission occurs
without any errors. The Data
Link Layer consists of two sub-
layers, Logical Link Control
(LLC) and the Media Access
Control (MAC), that ensure a
successful transmission across
different mediums.
One of the major functions of the
data link layer is to provide a physical
MAC address so that requested
information can find its destination.
Without a physical address, our pizza
delivery man would not be able to
complete his delivery.
Common protocols:
• Ethernet,
• Token Ring,
• Fiber Distributed Data Interface (FDDI), and
• Point-to-Point Protocol (PPP),
• Frame Relay, and
• Carrier Sense Multiple Access/Collision
Detect (CSMA/CD)
PHYSICAL LAYER
The physical layer consists of the physical
components in a Local Area Network (LAN)
such as networking hardware and Ethernet
cables. Cabling issues in the physical layer
sometimes emerge due to the wrong types
of cables (straight through vs. cross over
cables) used or faulty cables.

The physical layer comprises of the physical


hardware components in a network. In this
final step, our now starving customer will
receive her delivery.
Common protocols: Fast Ethernet, RS232,
and ATM
❑The application layer is the user interface that
internet users interact with to send or receive
data through email, online games, peer to peer
file transfer, and other applications.
❑The presentation layer translates the commands
received from the application layer into
universal, well-known networking formats.
❑The session layer makes it possible to establish
an open communication line to send the
requested packets.
❑The transport layer not only defines how data is
sent, but also provides validation and firewall
security.
❑The network layer seeks for the best-known path
to route information to reach its destination similar
to searching for an address on a GPS.
❑The Data Link Layer ensures that a transmission
occurs without any errors and lastly physical layer
consists of the physical components in a Local
Area Network (LAN) such as networking
hardware and Ethernet cables.
DIRECTION: Read the
following statement
carefully. Choose the best
answer by writing the
letters only.
1. This layer does not only define how
data is sent, but also provides
validation
and firewall security.

a. Application Layer c. Presentation Layer


b. Transport Layer d. Network Layer
2. It is a layer that ensures that a
transmission occurs without any
errors.

a. Application Layer c. Presentation Layer


b. Data Link Layer d. Network Layer
3. These are rules of conduct
usually communicate with two or
more modules.

a. MAC Address c. TCP/IP


b. IP Address d. Protocols
4. It consists of the physical
components in a Local Area Network
(LAN) such as networking hardware
and Ethernet cables.

a. Application Layer c. Presentation Layer


b. Physical Layer d. Network Layer
5. It is an abstract description for
layered communications and computer
network protocol design.

a. Open System Interconnection


b. Operating System Interconnection
c. Open System Interconnect
d. Open Systematized Interconnection
6. It is the user interface that
internet users interact with to send
or receive data through email,
online games, peer to peer file
transfer, and other
applications.

a. Application Layer c. Presentation Layer


b. Data Link Layer d. Network Layer
7) It establishes a “mechanism for opening,
closing and managing a session
between end-user application processes and
responses”.

a. Application Layer c. Presentation Layer


b. Data Link Layer d. Session Layer
8. One device transmits at a time until
all the information has been
completely sent.

a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode
9. It seeks for the best-known path to
route information to reach its
destination similar to searching for an
address on a GPS.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
10. When the device can transmit and
receive information simultaneously,
such as in phone conversation.

a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode
1)HTTP
2)SMTP
3)DHCP
4)DNS
5)JPEG
6) GIF
7) MPEG
8) TCP
9) PPP
10) TIFF
21 -27 ) 7 OSI LAYER MODEL
28 -30) WHY DO BUSINESSMEN
CREATE THEIR OWN NETWORK?

You might also like