You are on page 1of 10

COMPUTER SYSTEMS

SERVICING

Quarter 3
Self-Learning Module 10
Introduction to Internet Protocol
After completing this lesson, you should be able to:
1. Understand Internet Protocol;
2. Enumerate and explain different OSI layers;
3. appreciate the importance of the OSI layers.

DIRECTION: Read the following statement carefully. Choose the best answer by
encircling your answer.

1. This layer does not only define how data is sent, but also provides validation
and firewall security.
a. Application Layer c. Presentation Layer
b. Transport Layer d. Network Layer
2. It is a layer that ensures that a transmission occurs without any errors.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
3. It is also known as the physical address of a computer 48-bit address burnt
onto the network interface card (nic).
a. MAC Address c. TCP/IP
b. IP Address d. HTTP
4. It consists of the physical components in a Local Area Network (LAN) such
as networking hardware and Ethernet cables.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
5. It is an abstract description for layered communications and computer
network protocol design.
a. Open System Interconnection
b. Operating System Interconnection
c. Open System Interconnect
d. Open Systematized Interconnection
6. It is the user interface that internet users interact with to send or receive
data through email, online games, peer to peer file transfer, and other
applications.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
7. It establishes a “mechanism for opening, closing and managing a session
between end-user application processes and responses”.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
8. One device transmits at a time until all the information has been completely
sent.
a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode
9. It seeks for the best-known path to route information to reach its destination
similar to searching for an address on a GPS.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
10. When the device can transmit and receive information simultaneously,
such as in phone conversation.
a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode

• You had learned in our last module that a network is a collection of


computers and devices connected together so that they can exchange
information or share resources.
• Many home and business users create a network to facilitate
communications, share hardware, share data and information, share
software and transfer fund.
• Electronic Fund Transfer is a standard that allows users connected to a
network exchange money from one account to another.
• A value-added network (VAN) provider is a third-party business that
provides network services such as EDI services, secure data and
information transfer, storage, or email. A VAN is a closed network, which
means only members of the network can access the data. Typical provider
of VANs includes the telecommunication companies, industry groups and
specialized service providers.
• A network topology refers to the layout of the computers and devices in a
communication network. The three basic network topologies are star, bus
and ring. Most networks, including the internet, use the combinations of
these basic topologies.

INTRODUCTION
Have you ever thought about how messages gets from one place to another
each time you are using your email over the Internet?
Our language is very different from the language that a computer uses. So
the messages that we create need to be translated from an alphabetic text into an
electronic signal before they can be sent. This translation is handled in t he
computer by the separate modules in the communication protocol. These
protocols or rules of conduct usually communicate with two or more modules.
Therefore, they are best described as layers in a stack of protocols.
These layers are the application, presentation, session, transport, network,
data-link and physical layers. It is often referred to as the OSI seven-layer model.
All People Seem To Need Data Processing is not only a fact of life, it’s also a
mnemonic to help computer network technicians remember the OSI model and
help isolate problems when troubleshooting networks.
Even though the OSI model utilizes the TCP/IP protocol, the model was
originally designed by the Open Systems Interconnection group to promote the
OSI protocol in its attempt to create a standardized network architecture for
network communications. Unfortunately, though the OSI protocol supported more
virtual addresses, its complexity made the TCP/IP protocol the more popular
choice among network technicians. Ironically, the simplicity of the TCP/IP protocol
has led to IPv4 address exhaustion and its newer IPv6 protocol very much
resembles the original OSI protocol in complexity.
The Open System Interconnection Reference Model (OSI Reference Model or
OSI Model) is an abstract description for layered communications and computer
network protocol design. It was developed as part of the Open Systems
Interconnection (OSI) initiative.

APPLICATION LAYER
The application layer is the user interface that internet users interact with
to send or receive data through email, online games, peer to peer file transfer, and
other applications.
Common protocols associated with the application layer: Hypertext Transfer
Protocol (TTP), Hypertext Transfer Protocol Secure (HTTPS), Telnet, Secure Shell
(SSH), File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), Simple
Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Dynamic Host
Configuration Protocol (DHCP), Domain Name System (DNS), Network Time
Protocol (NTP).

PRESENTATIO N LAYER
The presentation layer translates the commands received from the
application layer into universal, well-known networking formats. Think of the
presentation layer as a more effective version of Google Translate but for networks.
This is the layer where data encryption and character set conversion occur.
Common protocols: Joint Photographic Experts Group (JPEG), Graphics
Interchange Format (GIF),(Tagged Image Format File (TIFF), Moving Picture
Experts Group (MPEG), American Standards Code for Information Interchange
[ASCII], Extended Binary Coded Decimal Interchange Code [EBCDIC], Secure
Sockets Layer (SSL), Hyperxt Transfer Protocol (HTTP), HyperText MarkUp
Language (HTML), File Transfer Protocol (FTP) AppleTalk Filing Protocols, JAVA

SESSION LAYER
In order for a packet to reach its destination, the session layer establishes
a “mechanism for opening, closing and managing a session between end-user
application processes and responses”. The session layer makes it possible to
establish an open communication line to send the requested packets.
This layer can be compared to making a phone call and having the other
person pick up the phone. Without another party on the line, no food-related or
network-related conversation would occur.
SINGLE MODE HALF DUPLEX MODE FULL-DUPLEX
One device transmits at Device takes turns When the device can
a time until all the transmitting such as transmit and receive
information has been occurs when speaking information
completely sent through walkie talkies simultaneously, such as
in a phone conversation

TRANSPORT LAYER
The transport layer not only defines how data is sent, but also provides
validation and firewall security.
You can think of the transport layer as quality control. Suspicious packets
will not make it past a firewall. Similarly, suspicious looking pizzas will not go out
for delivery.
TRANSMISSION CONTROL
USER DATAGRAM PROTOCOL
PROTOCOL
Connection Oriented Connectionless Oriented
During an unreliable session, lost
3 way Handshake packets will not be resent so as to
avoid disrupting live communication
During a reliable session, lost packets Examples: VoIP, (TFTP) and online
will be re-sent multi player games
Examples: E-mail (SMTP) and File
Transfer Protocol (FTP)

Other Functions:
• Flow control
• Error detection
• Correction
Common protocols: Transmission Control Protocol (TCP), User Datagram
Protocol (UDP), Sequenced Packet Exchange (SPX), Name-Binding Protocol (NBP)

NETWORK LAYER
The network layer seeks for the best-known path to route information to
reach its destination similar to searching for an address on a GPS.
In the same way that the network layer determines the best way to route
information, our pizza delivery person will rely on a GPS to map out a customer’s
location.
LOGICAL DATA FRAGMENTATION AND
ADDRESSING ENCAPSULATION RE-ASSEMBLY
These virtual IP The router encapsulates When packets are too
addresses help packets data with a header with a large, the layer is
navigate a network to source and destination IP responsible for
reach their destination address. defragmenting
using IPv4 or IPv6 information into sizable
protocols chunks for the Data Link
Layer

DATA LINK LAYER


The Data Link Layer ensures that a transmission occurs without any errors.
The Data Link Layer consists of two sub-layers, Logical Link Control (LLC) and the
Media Access Control (MAC), that ensure a successful transmission across
different mediums.
One of the major functions of the data link layer is to provide a physical
MAC address so that requested information can find its destination. Without a
physical address, our pizza delivery man would not be able to complete his
delivery.
Preparing network layer packets for delivery:
LOGICAL LINK CONTROL (LLC) MEDIA ACCESS CONTROL (MAC)
The LLC subplayer frames bits and The MAC address, also known as the
bytes and encapsulates data with a physical address is a 48-bit address
header and trailer as shown below. burnt onto the Network Interface Card
(NIC).
Common protocols: Ethernet, Token Ring, Fiber Distributed Data Interface
(FDDI), and Point-to-Point Protocol (PPP), Frame Relay, and Carrier Sense Multiple
Access/Collision Detect (CSMA/CD)

PHYSICAL LAYER
The physical layer consists of the physical components in a Local Area
Network (LAN) such as networking hardware and Ethernet cables. Cabling issues
in the physical layer sometimes emerge due to the wrong types of cables (straight
through vs. cross over cables) used or faulty cables.
The physical layer comprises of the physical hardware components in a
network. In this final step, our now starving customer will receive her delivery.
Common protocols: Fast Ethernet, RS232, and ATM

DIRECTION: Read each statement below carefully. Write T if the statement is true.
Supply the correct word for the underlined word if the statement is false. Use the
group of words below for your answer.
_________1. The transport layer not only defines how data is sent, but also provides
validation and firewall security.
_________2. The network layer seeks for the best-known path to route information
to reach its destination similar to searching for an address on a GPS.
_________3. We call it single mode when device takes turns transmitting such as
occurs when speaking through walkie talkie.
_________4. The session layer is the user interface that internet users interact with
to send or receive data through email, online games, peer to peer file transfer, and
other applications.
_________5. The Open System Interconnection Reference Model (OSI Reference
Model or OSI Model) is an abstract description for layered communications and
computer network protocol design.
>Physical >Half-Duplex >Operating System Interconnection
>Data Link >Application >Full-Duplex

The application layer is the user interface that internet users interact with to
send or receive data through email, online games, peer to peer file transfer, and
other applications.
The presentation layer translates the commands received from the application
layer into universal, well-known networking formats.
The session layer makes it possible to establish an open communication line
to send the requested packets.
The transport layer not only defines how data is sent, but also provides
validation and firewall security.
The network layer seeks for the best-known path to route information to reach
its destination similar to searching for an address on a GPS.
The Data Link Layer ensures that a transmission occurs without any errors
and lastly physical layer consists of the physical components in a Local Area Network
(LAN) such as networking hardware and Ethernet cables.

DIRECTION: Read the following statement carefully. Write your answer in two to
three sentences each number.

1. What is the importance of knowing the OSI layers?


_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

2. Cite a situation in which you can apply the knowledge of the different OSI layers.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
DIRECTION: Read the following statement carefully. Choose the best answer by
encircling your answer.

1. This layer does not only define how data is sent, but also provides validation
and firewall security.
a. Application Layer c. Presentation Layer
b. Transport Layer d. Network Layer
2. It is a layer that ensures that a transmission occurs without any errors.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
3. It is also known as the physical address of a computer 48-bit address burnt
onto the network interface card (nic).
a. MAC Address c. TCP/IP
b. IP Address d. HTTP
4. It consists of the physical components in a Local Area Network (LAN) such
as networking hardware and Ethernet cables.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
5. It is an abstract description for layered communications and computer
network protocol design.
a. Open System Interconnection
b. Operating System Interconnection
c. Open System Interconnect
d. Open Systematized Interconnection
6. It is the user interface that internet users interact with to send or receive
data through email, online games, peer to peer file transfer, and other
applications.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
7. It establishes a “mechanism for opening, closing and managing a session
between end-user application processes and responses”.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
8. One device transmits at a time until all the information has been completely
sent.
a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode
9. It seeks for the best-known path to route information to reach its destination
similar to searching for an address on a GPS.
a. Application Layer c. Presentation Layer
b. Data Link Layer d. Network Layer
10. When the device can transmit and receive information simultaneously,
such as in phone conversation.
a. single mode
b. half duplex mode
c. full-duplex mode
d. half and full duplex mode

You might also like