{"id":513,"date":"2018-03-19T07:56:58","date_gmt":"2018-03-19T07:56:58","guid":{"rendered":"http:\/\/learnlearn.uk\/gcsecs\/?page_id=513"},"modified":"2019-01-31T08:51:23","modified_gmt":"2019-01-31T08:51:23","slug":"network-layers-protocols","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/","title":{"rendered":"Network Layers and Protocols"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">OSI Model<\/h2>\n<div class=\"tabcontent\">\n\n<h1>Network Layers and Protocols<\/h1>\n<h2>OSI Model<\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"150\"><strong>Layer Name<\/strong><\/td>\n<td width=\"237\"><strong>Purpose<\/strong><\/td>\n<td width=\"113\"><strong>Protocols<\/strong><\/td>\n<td width=\"101\"><strong>mnemonic<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"150\">Application<\/td>\n<td width=\"237\">Human Machine Interface \u2013 Where data is entered, Connects application to network<\/td>\n<td width=\"113\">DNS,HTTP,SMTP,POP3,FTP<\/td>\n<td width=\"101\">All<\/td>\n<\/tr>\n<tr>\n<td width=\"150\">Presentation<\/td>\n<td width=\"237\">Data coded into 1s and 0s, or decoded, depending on file format<\/td>\n<td width=\"113\">JPEG,MIDI,TIFF,SSL,SSH<\/td>\n<td width=\"101\">People<\/td>\n<\/tr>\n<tr>\n<td width=\"150\">Session<\/td>\n<td width=\"237\">Where secure sessions created, authentication takes place<\/td>\n<td width=\"113\">NetBIOS,<\/td>\n<td width=\"101\">Seem<\/td>\n<\/tr>\n<tr>\n<td width=\"150\">Transport<\/td>\n<td width=\"237\">Error checking it conducted here. Chooses which transport protocol to use<\/td>\n<td width=\"113\">TCP,UDP,End-toEnd<\/td>\n<td width=\"101\">To<\/td>\n<\/tr>\n<tr>\n<td width=\"150\">Network<\/td>\n<td width=\"237\">\u00a0Addressing and Routing<\/td>\n<td width=\"113\">IPV4,IPV6,IPSec<\/td>\n<td width=\"101\">Need<\/td>\n<\/tr>\n<tr>\n<td width=\"150\">Data-Link<\/td>\n<td width=\"237\">This layer is where the data is prepared for sending<\/td>\n<td width=\"113\">Ethernet,PPP,ATM<\/td>\n<td width=\"101\">Data<\/td>\n<\/tr>\n<tr>\n<td width=\"150\">Physical<\/td>\n<td width=\"237\">\u00a0Data is physically sent along a wire, fiber optic cable or radio waves.<\/td>\n<td width=\"113\">Ethernet, USB, Bluetooth,IEEE802.11<\/td>\n<td width=\"101\">Processing<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Activity &#8211;\u00a0<\/strong>Watch the video below and fill out the worksheet (in the resources section) as you go through.<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=Cbqsm23zgMQ\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"OSI model Actual Presentation.\" title=\"Play video &quot;OSI model Actual Presentation.&quot;\">https:\/\/www.youtube.com\/watch?v=Cbqsm23zgMQ<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=Cbqsm23zgMQ\" title=\"OSI model Actual Presentation.\">OSI model Actual Presentation. (https:\/\/www.youtube.com\/watch?v=Cbqsm23zgMQ)<\/a><\/noscript><\/div>\n<\/div>\n\n<\/div><h2 class=\"tabtitle\">Protocols<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Protocols<\/h3>\n<p>There are billions of network connected devices on the planet, each made at different times by different companies. In order for all these devices to communicate successfully with each other they all need to send, receive and process data in an agreed manner &#8211; a protocol.<\/p>\n<p>Common Networking Protocols<\/p>\n<p><strong>IP \/ TCP &#8211; Internet Protocol\u00a0 \/ Transfer Control Protocol<\/strong><\/p>\n<p>This protocol defines how packets are send over IP based networks.<\/p>\n<p><strong>IPV4 vs IPV6<\/strong> &#8211; When Internet Protocol was designed very few institutions had networks or computers and so an address system of 32 bits was chosen as it was thought there would be enough addresses. (4,2 Billion addresses).<\/p>\n<p>With the exponential growth of the internet and internet enabled devices, we are now running out of addresses available. A new system (IPV6) is being introduced that contains far more available addresses.\u00a03.4\u00d710<sup>38<\/sup><\/p>\n<p>&nbsp;<\/p>\n<p><strong>HTTP \/ HTTPS &#8211; Hyper Text Transfer Protocol \/ Hyper Text Transfer Protocol Secure<\/strong><\/p>\n<p>This protocol defines how servers handle web request from users. This includes how to handle get\/ post requests, as well as how to format error messages (such as 404 not found messages)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>SMTP &#8211; Simple Mail Transfer Protocol<\/strong><\/p>\n<p>This is the protocol used when sending emails across the internet.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>POP \/ POP3 &#8211; Post Office Protocol<\/strong><\/p>\n<p>This is the protocol used when retrieving emails<\/p>\n<p>&nbsp;<\/p>\n<p><strong>IMAP<\/strong><\/p>\n<p>This is a protocol used for both sending and receiving email<\/p>\n<p>&nbsp;<\/p>\n<p><strong>FTP \/ FTP &#8211; File Transfer Protocol \/ File Transfer Protocol Secure<\/strong><\/p>\n<p>This protocol is used when sending and receiving files over the internet.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Packet Switching<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Packet Switching<\/h3>\n<p>When large packets of data are send over the internet, they are split down in to smaller packets, with each packet being given a packet order number, and sent over the internet independently. The packets travel separately over the network, sometimes taking separate paths, and the packets are then reassembled at the other end. This allows for faster data transfer.<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=vSlcoQowe9I\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Packet Switching - How It Works\" title=\"Play video &quot;Packet Switching - How It Works&quot;\">https:\/\/www.youtube.com\/watch?v=vSlcoQowe9I<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=vSlcoQowe9I\" title=\"Packet Switching - How It Works\">Packet Switching &#8211; How It Works (https:\/\/www.youtube.com\/watch?v=vSlcoQowe9I)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Resources<\/h3>\n<p><a href=\"https:\/\/create.kahoot.it\/details\/networks-protocols\/151d382f-9ec2-4605-b11b-de4b2b79721a\">Network Protocols Kahoot (easy)<\/a><\/p>\n<p><a href=\"https:\/\/create.kahoot.it\/k\/8732127e-4f1e-4618-b2b0-38d5e3fac9f9\">Network Protocols Kahoot (hard)<\/a><\/p>\n<p><a href=\"https:\/\/docs.google.com\/drawings\/d\/1uh3V6XS8skWWXInXZJ_DNhMkfmQ8TOSywseekwTk8vk\/edit?usp=sharing\">OSI Model Worksheet<\/a><\/p>\n<p>&nbsp;<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=MVihcigDlbA\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Network Protocols and the 4 Layer Model\" title=\"Play video &quot;Network Protocols and the 4 Layer Model&quot;\">https:\/\/www.youtube.com\/watch?v=MVihcigDlbA<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=MVihcigDlbA\" title=\"Network Protocols and the 4 Layer Model\">Network Protocols and the 4 Layer Model (https:\/\/www.youtube.com\/watch?v=MVihcigDlbA)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Network Layers and Protocols OSI Model Layer Name Purpose Protocols mnemonic Application Human Machine Interface \u2013 Where data is entered, Connects application to network DNS,HTTP,SMTP,POP3,FTP All Presentation Data coded into 1s and 0s, or decoded, depending on file format JPEG,MIDI,TIFF,SSL,SSH People Session Where secure sessions created, authentication takes place NetBIOS, Seem Transport Error checking it&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Network Layers and Protocols<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Layers and Protocols - GCSE Computer Science Theory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Layers and Protocols - GCSE Computer Science Theory\" \/>\n<meta property=\"og:description\" content=\"Network Layers and Protocols OSI Model Layer Name Purpose Protocols mnemonic Application Human Machine Interface \u2013 Where data is entered, Connects application to network DNS,HTTP,SMTP,POP3,FTP All Presentation Data coded into 1s and 0s, or decoded, depending on file format JPEG,MIDI,TIFF,SSL,SSH People Session Where secure sessions created, authentication takes place NetBIOS, Seem Transport Error checking it&hellip;&nbsp;Read More &raquo;Network Layers and Protocols\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/\" \/>\n<meta property=\"og:site_name\" content=\"GCSE Computer Science Theory\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-31T08:51:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/\",\"name\":\"Network Layers and Protocols - GCSE Computer Science Theory\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\"},\"datePublished\":\"2018-03-19T07:56:58+00:00\",\"dateModified\":\"2019-01-31T08:51:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"OCR GCSE Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/gcsecs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Layers and Protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"name\":\"GCSE Computer Science Theory\",\"description\":\"Just another My Blog site\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\",\"name\":\"GCSE Computer Science Theory\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"GCSE Computer Science Theory\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Layers and Protocols - GCSE Computer Science Theory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/","og_locale":"en_GB","og_type":"article","og_title":"Network Layers and Protocols - GCSE Computer Science Theory","og_description":"Network Layers and Protocols OSI Model Layer Name Purpose Protocols mnemonic Application Human Machine Interface \u2013 Where data is entered, Connects application to network DNS,HTTP,SMTP,POP3,FTP All Presentation Data coded into 1s and 0s, or decoded, depending on file format JPEG,MIDI,TIFF,SSL,SSH People Session Where secure sessions created, authentication takes place NetBIOS, Seem Transport Error checking it&hellip;&nbsp;Read More &raquo;Network Layers and Protocols","og_url":"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/","og_site_name":"GCSE Computer Science Theory","article_modified_time":"2019-01-31T08:51:23+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/","url":"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/","name":"Network Layers and Protocols - GCSE Computer Science Theory","isPartOf":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#website"},"datePublished":"2018-03-19T07:56:58+00:00","dateModified":"2019-01-31T08:51:23+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"OCR GCSE Computer Science Home","item":"https:\/\/learnlearn.uk\/gcsecs\/"},{"@type":"ListItem","position":2,"name":"Network Layers and Protocols"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/gcsecs\/#website","url":"https:\/\/learnlearn.uk\/gcsecs\/","name":"GCSE Computer Science Theory","description":"Just another My Blog site","publisher":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization","name":"GCSE Computer Science Theory","url":"https:\/\/learnlearn.uk\/gcsecs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"GCSE Computer Science Theory"},"image":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/gcsecs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Network Layers and Protocols OSI Model Layer Name Purpose Protocols mnemonic Application Human Machine Interface \u2013 Where data is entered, Connects application to network DNS,HTTP,SMTP,POP3,FTP All Presentation Data coded into 1s and 0s, or decoded, depending on file format JPEG,MIDI,TIFF,SSL,SSH People Session Where secure sessions created, authentication takes place NetBIOS, Seem Transport Error checking it&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/513"}],"collection":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/comments?post=513"}],"version-history":[{"count":12,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/513\/revisions"}],"predecessor-version":[{"id":866,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/513\/revisions\/866"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/media?parent=513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}