Search Header Logo
ICT CSS 10 Introduction to Internet Protocol Module 14

ICT CSS 10 Introduction to Internet Protocol Module 14

Assessment

Presentation

Other

10th Grade

Practice Problem

Hard

Created by

Jerome Suelto

Used 3+ times

FREE Resource

20 Slides • 27 Questions

1

media

Introduction to Internet Protocol

2

After completing this lesson, you should be able to:

1. Understand Internet Protocol;

2. Enumerate and explain different OSI layers;

3. appreciate the importance of the OSI layers.

3

Multiple Choice

1. This layer does not only define how data is sent, but also provides validation and firewall security.

1

a. Application Layer

2

b. Transport Layer

3

c. Presentation Layer

4

d. Network Layer

4

Multiple Choice

2. It is a layer that ensures that a transmission occurs without any errors.

1

a. Application Layer

2

b. Transport Layer

3

c. Presentation Layer

4

d. Network Layer

5

Multiple Choice

3. It is also known as the physical address of a computer 48-bit address burnt onto the network interface card (nic).

1

a. MAC Address

2

b. IP Address

3

c. TCP/IP

4

d. HTTP

6

Multiple Choice

4. It consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables.

1

a. Application Layer

2

b. Physical Layer

3

c. Presentation Layer

4

d. Network Layer

7

Multiple Choice

5. It is an abstract description for layered communications and computer network protocol design.

1

a. Open System Interconnection

2

b. Operating System Interconnection

3

c. Open System Interconnect

4

d. Open Systematized Interconnection

8

Multiple Choice

6. It is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.

1

a. Application Layer

2

b. Data Link Layer

3

c. Presentation Layer

4

d. Network Layer

9

Multiple Choice

7. It establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses”.

1

a. Application Layer

2

b. Data Link Layer

3

c. Presentation Layer

4

d. Session Layer

10

Multiple Choice

8. One device transmits at a time until all the information has been completely sent.

1

a. single mode

2

b. half duplex mode

3

c. full-duplex mode

4

d. half and full duplex mode

11

Multiple Choice

9. It seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.

1

a. Application Layer

2

b. Data Link Layer

3

c. Presentation Layer

4

d. Network Layer

12

Multiple Choice

10. When the device can transmit and receive information simultaneously, such as in phone conversation.

1

a. single mode

2

b. half duplex mode

3

c. full-duplex mode

4

d. half and full duplex mode

13

RECAP

You had learned in our last module that a network is a collection of computers and devices connected together so that they can exchange information or share resources.

  • Many home and business users create a network to facilitate communications, share hardware, share data and information, share software and transfer fund.

  • Electronic Fund Transfer is a standard that allows users connected to a network exchange money from one account to another.

  • A value-added network (VAN) provider is a third-party business that provides network services such as EDI services, secure data and

14

RECAP



  • information transfer, storage, or email. A VAN is a closed network, which means only members of the network can access the data. Typical provider of VANs includes the telecommunication companies, industry groups and specialized service providers.



  • A network topology refers to the layout of the computers and devices in a communication network. The three basic network topologies are star, bus and ring. Most networks, including the internet, use the combinations of these basic topologies.

15

INTRODUCTION

Have you ever thought about how messages gets from one place to another each time you are using your email over the Internet?

16

INTRODUCTION

Our language is very different from the language that a computer uses. So the messages that we create need to be translated from an alphabetic text into an electronic signal before they can be sent. This translation is handled in the computer by the separate modules in the communication protocol. These protocols or rules of conduct usually communicate with two or more modules. Therefore, they are best described as layers in a stack of protocols.

17

INTRODUCTION

These layers are the application, presentation, session, transport, network, data-link and physical layers. It is often referred to as the OSI seven-layer model.

All People Seem To Need Data Processing is not only a fact of life, it’s also a mnemonic to help computer network technicians remember the OSI model and help isolate problems when troubleshooting networks.

18

INTRODUCTION

These layers are the application, presentation, session, transport, network, data-link and physical layers. It is often referred to as the OSI seven-layer model.

All People Seem To Need Data Processing is not only a fact of life, it’s also a mnemonic to help computer network technicians remember the OSI model and help isolate problems when troubleshooting networks.

19

INTRODUCTION

The Open System Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design. It was developed as part of the Open Systems Interconnection (OSI) initiative.

20

APPLICATION LAYER

The application layer is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.

Common protocols associated with the application layer: Hypertext Transfer Protocol (TTP), Hypertext Transfer Protocol Secure (HTTPS), Telnet, Secure Shell (SSH), File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Network Time Protocol (NTP).

media

21

PRESENTATION LAYER

The presentation layer translates the commands received from the application layer into universal, well-known networking formats. Think of the presentation layer as a more effective version of Google Translate but for networks. This is the layer where data encryption and character set conversion occur.

Common protocols: Joint Photographic Experts Group (JPEG), Graphics Interchange Format (GIF),(Tagged Image Format File (TIFF), Moving Picture Experts Group (MPEG), American Standards Code for Information Interchange [ASCII], Extended Binary Coded Decimal Interchange Code [EBCDIC], Secure Sockets Layer (SSL), Hyperxt Transfer Protocol (HTTP), HyperText MarkUp Language (HTML), File Transfer Protocol (FTP) AppleTalk Filing Protocols, JAVA

media

22

SESSION LAYER

In order for a packet to reach its destination, the session layer establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses”. The session layer makes it possible to establish an open communication line to send the requested packets.

This layer can be compared to making a phone call and having the other person pick up the phone. Without another party on the line, no food-related or network-related conversation would occur.

media
media

23

TRANSPORT LAYER

The transport layer not only defines how data is sent, but also provides validation and firewall security.


You can think of the transport layer as quality control. Suspicious packets will not make it past a firewall. Similarly, suspicious looking pizzas will not go out for delivery.

media

​Other Functions:

• Flow control
• Error detection
• Correction

Common protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Sequenced Packet Exchange (SPX), Name-Binding Protocol (NBP)

24

NETWORK LAYER

The network layer seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.

In the same way that the network layer determines the best way to route information, our pizza delivery person will rely on a GPS to map out a customer’s location.

media

25

DATA LINK LAYER

The Data Link Layer ensures that a transmission occurs without any errors. The Data Link Layer consists of two sub-layers, Logical Link Control (LLC) and the Media Access Control (MAC), that ensure a successful transmission across different mediums.

One of the major functions of the data link layer is to provide a physical MAC address so that requested information can find its destination. Without a physical address, our pizza delivery man would not be able to complete his delivery.


Preparing network layer packets for delivery:

media

​Common protocols: Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and Point-to-Point Protocol (PPP), Frame Relay, and Carrier Sense Multiple Access/Collision Detect (CSMA/CD)

26

PHYSICAL LAYER

The physical layer consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables. Cabling issues in the physical layer sometimes emerge due to the wrong types of cables (straight through vs. cross over cables) used or faulty cables.

The physical layer comprises of the physical hardware components in a network. In this final step, our now starving customer will receive her delivery.

Common protocols: Fast Ethernet, RS232, and ATM

media
media

27

Multiple Choice

_________1. The transport layer not only defines how data is sent, but also provides validation and firewall security.

>Physical >Half-Duplex >Operating System Interconnection

>Data Link >Application >Full-Duplex

1

True

2

False

3

Physical

28

Multiple Choice

_________2. The network layer seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.

>Physical >Half-Duplex >Operating System Interconnection

>Data Link >Application >Full-Duplex

1

True

2

False

3

transport

29

Multiple Choice

_________3. We call it single mode when device takes turns transmitting such as occurs when speaking through walkie talkie.

>Physical >Half-Duplex >Operating System Interconnection

>Data Link >Application >Full-Duplex

1

True

2

False

3

Half-Duplex

30

Multiple Choice

_________4. The session layer is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.

>Physical >Half-Duplex >Operating System Interconnection

>Data Link >Application >Full-Duplex

1

True

2

False

3

Application

31

Multiple Choice

_________5. The Open System Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.

>Physical >Half-Duplex >Operating System Interconnection

>Data Link >Application >Full-Duplex

1

True

2

False

3

Physical

32

WRAP-UP

33

The application layer is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.



The presentation layer translates the commands received from the application layer into universal, well-known networking formats.



The session layer makes it possible to establish an open communication line to send the requested packets.


The transport layer not only defines how data is sent, but also provides validation and firewall security.


The network layer seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.


The Data Link Layer ensures that a transmission occurs without any errors and lastly physical layer consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables.

34

VALUING

35

Open Ended

1. What is the importance of knowing the OSI layers?

36

Open Ended

2. Cite a situation in which you can apply the knowledge of the different OSI layers.

37

POST TEST

38

Multiple Choice

1. This layer does not only define how data is sent, but also provides validation and firewall security.

1

a. Application Layer

2

b. Transport Layer

3

c. Presentation Layer

4

d. Network Layer

39

Multiple Choice

2. It is a layer that ensures that a transmission occurs without any errors.

1

a. Application Layer

2

b. Transport Layer

3

c. Presentation Layer

4

d. Network Layer

40

Multiple Choice

3. It is also known as the physical address of a computer 48-bit address burnt onto the network interface card (nic).

1

a. MAC Address

2

b. IP Address

3

c. TCP/IP

4

d. HTTP

41

Multiple Choice

4. It consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables.

1

a. Application Layer

2

b. Physical Layer

3

c. Presentation Layer

4

d. Network Layer

42

Multiple Choice

5. It is an abstract description for layered communications and computer network protocol design.

1

a. Open System Interconnection

2

b. Operating System Interconnection

3

c. Open System Interconnect

4

d. Open Systematized Interconnection

43

Multiple Choice

6. It is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.

1

a. Application Layer

2

b. Data Link Layer

3

c. Presentation Layer

4

d. Network Layer

44

Multiple Choice

7. It establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses”.

1

a. Application Layer

2

b. Data Link Layer

3

c. Presentation Layer

4

d. Session Layer

45

Multiple Choice

8. One device transmits at a time until all the information has been completely sent.

1

a. single mode

2

b. half duplex mode

3

c. full-duplex mode

4

d. half and full duplex mode

46

Multiple Choice

9. It seeks for the best-known path to route information to reach its destination similar to searching for an address on a GPS.

1

a. Application Layer

2

b. Data Link Layer

3

c. Presentation Layer

4

d. Network Layer

47

Multiple Choice

10. When the device can transmit and receive information simultaneously, such as in phone conversation.

1

a. single mode

2

b. half duplex mode

3

c. full-duplex mode

4

d. half and full duplex mode

media

Introduction to Internet Protocol

Show answer

Auto Play

Slide 1 / 47

SLIDE