SlideShare una empresa de Scribd logo
1 de 7
© GCSE Computing
Candidates should be able to:
 explain the terms:
 IP addressing
 MAC addressing
 Network packets
 Network protocols
Slide 1
GCSE Computing - 1.6 Computer
communications and networking (3)
© GCSE Computing
 An Internet Protocol (IP) address is a unique reference number that is
allocated to devices on a computer network that uses the Internet
Protocol.
 It is used to identify the device that sends data over the network AND
the device that is to receive the data.
 An IP address can be private, (for use on a LAN) or public (for use on
the Internet or another WAN).
 The IP address allocated to a device on a network can be static
(assigned by a system administrator) or dynamic, (assigned by another
device on the network and different each time the connection is made).
Slide 2
What is IP addressing?
© GCSE Computing
 Using IPv4, IP addresses are stored as 32-bit numbers, although for our
convenience they are usually displayed as a series of 4 decimal
numbers, each one representing 8 bits of the original binary address.
 Binary version (32-bit):
11001001 0100000 010110100 11111111
 Decimal version:
201.64.182.255
 The new IPv6 IP address system uses 128-bit numbers but for our
convenience they are usually displayed as a series of 8 hexadecimal
numbers, each one representing 16 bits of the original binary address.
 Binary version (128-bit):
001000011101101000000000110100110000000000000000
001011110011101100000010101010100000000011111111
11111110001010001001110001011010
 Hexadecimal version:
21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A
Slide 3
What do IP address look like?
© GCSE Computing
 In computer networking, a Media Access Control address (MAC
address) is a unique 48-bit number assigned to a network interface
card (NIC) to identify it on a LAN.
 Because they are so long, MAC addresses are usually displayed in
hexadecimal, for example 00-0C-E7-5D-A8-AD.
 MAC addresses are limited to being used on a LAN but IP addresses can
be used on multiple types of networks including the Internet.
 On a LAN, data packets that use a protocol such as TCP/IP will be
packaged inside data packets that use the MAC address to deliver them
correctly.
 Another use for the MAC address is as a security feature on cabled and
wireless systems, only allowing computers with authorised MAC
addresses to have access to the network.
 This works by inspecting the data packet that is sent from a computer to
see if its MAC address matches one of the approved ones in a a pre-
defined table.
Slide 4
What is MAC addressing?
© GCSE Computing
Modern computer networks, including the Internet, carry data by breaking it
down into a series of distinct units called packets, rather than sending it
as a continuous stream of data.
A typical packet might contain 1,000 to 1,500 bytes and has two parts:
 Payload
 This is the user data that is to be delivered and is located between the packet
headers and footers.
 Control information
 This provides the data that the network needs to deliver the payload, for
example the source and destination addresses.
 It will also have error checking data such as checksums and the number of
the packet so they can be reassembled in the correct order.
 The control information is found
in the packet headers
Slide 5
What is a Data Packet?
© GCSE Computing
 In complex networks such as the Internet, a series of packets sent from
one computer to another may follow different routes to reach the same
destination.
 This technology is called packet switching and makes the network
more efficient because the network can balance the load across various
pieces of equipment and if there is a problem with one piece of
equipment in the network then packets can be routed around it.
 Data packets can be nested inside each other, for example on a LAN, IP
packets are held inside Ethernet packets (that use the MAC address) to
route the packet to the correct destination computer.
 If a packet is destined for the Internet then the Ethernet packet is
discarded when it leaves the LAN.
 When the IP packet returns to the LAN from the Internet then it is placed
inside another Ethernet packet for final delivery to the computer with the
MAC address that requested the information.
Slide 6
What is a Data Packet?
© GCSE Computing
 A protocol is a formal description of the format that data has to be in and the
rules for exchanging this data.
 There may also be rules for error checking and error correction. As long as
different computers on a network are using the same protocol then they will be
able to exchange data correctly.
 The Internet Protocol Suite is the set of communications protocols used for the
Internet and other similar networks. It is commonly also known as TCP/IP, named
from two of the most important protocols in it:
 the Transmission Control Protocol (TCP)
 the Internet Protocol (IP).
 The TCP provides the service of exchanging data directly between two
networked computers while the IP is used to route data packets between
networks and over the Internet.
 Some other common Internet Protocols:
 HTTP (HyperText transfer Protocol): used on the World Wide Web for transferring web
pages and files contained in web pages such as images.
 FTP (File Transfer protocol): employed for transferring files between computers.
 SMTP (Simple Mail Transport Protocol): used for email.
Slide 7
What is a Protocol?

Más contenido relacionado

La actualidad más candente

Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1Prosanta Mazumder
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALASaikiran Panjala
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsMohamed Daif
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IPToufiqueAhmed13
 
Internet protocol
Internet protocol Internet protocol
Internet protocol Bint Javed
 
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803ArtistMuso
 

La actualidad más candente (20)

Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Network layers
Network layersNetwork layers
Network layers
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Rarp
RarpRarp
Rarp
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
internet protocol
internet protocolinternet protocol
internet protocol
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Protocols
ProtocolsProtocols
Protocols
 
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
 

Similar a Computer Networks 3

Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfGandhibabu8
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modifiedrajesh531
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Serious_SamSoul
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addressesAmandeep Kaur
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inalRaja pirian
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 

Similar a Computer Networks 3 (20)

Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
IP Address
IP AddressIP Address
IP Address
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
matdid018951.ppt
matdid018951.pptmatdid018951.ppt
matdid018951.ppt
 

Último

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Último (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Computer Networks 3

  • 1. © GCSE Computing Candidates should be able to:  explain the terms:  IP addressing  MAC addressing  Network packets  Network protocols Slide 1 GCSE Computing - 1.6 Computer communications and networking (3)
  • 2. © GCSE Computing  An Internet Protocol (IP) address is a unique reference number that is allocated to devices on a computer network that uses the Internet Protocol.  It is used to identify the device that sends data over the network AND the device that is to receive the data.  An IP address can be private, (for use on a LAN) or public (for use on the Internet or another WAN).  The IP address allocated to a device on a network can be static (assigned by a system administrator) or dynamic, (assigned by another device on the network and different each time the connection is made). Slide 2 What is IP addressing?
  • 3. © GCSE Computing  Using IPv4, IP addresses are stored as 32-bit numbers, although for our convenience they are usually displayed as a series of 4 decimal numbers, each one representing 8 bits of the original binary address.  Binary version (32-bit): 11001001 0100000 010110100 11111111  Decimal version: 201.64.182.255  The new IPv6 IP address system uses 128-bit numbers but for our convenience they are usually displayed as a series of 8 hexadecimal numbers, each one representing 16 bits of the original binary address.  Binary version (128-bit): 001000011101101000000000110100110000000000000000 001011110011101100000010101010100000000011111111 11111110001010001001110001011010  Hexadecimal version: 21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A Slide 3 What do IP address look like?
  • 4. © GCSE Computing  In computer networking, a Media Access Control address (MAC address) is a unique 48-bit number assigned to a network interface card (NIC) to identify it on a LAN.  Because they are so long, MAC addresses are usually displayed in hexadecimal, for example 00-0C-E7-5D-A8-AD.  MAC addresses are limited to being used on a LAN but IP addresses can be used on multiple types of networks including the Internet.  On a LAN, data packets that use a protocol such as TCP/IP will be packaged inside data packets that use the MAC address to deliver them correctly.  Another use for the MAC address is as a security feature on cabled and wireless systems, only allowing computers with authorised MAC addresses to have access to the network.  This works by inspecting the data packet that is sent from a computer to see if its MAC address matches one of the approved ones in a a pre- defined table. Slide 4 What is MAC addressing?
  • 5. © GCSE Computing Modern computer networks, including the Internet, carry data by breaking it down into a series of distinct units called packets, rather than sending it as a continuous stream of data. A typical packet might contain 1,000 to 1,500 bytes and has two parts:  Payload  This is the user data that is to be delivered and is located between the packet headers and footers.  Control information  This provides the data that the network needs to deliver the payload, for example the source and destination addresses.  It will also have error checking data such as checksums and the number of the packet so they can be reassembled in the correct order.  The control information is found in the packet headers Slide 5 What is a Data Packet?
  • 6. © GCSE Computing  In complex networks such as the Internet, a series of packets sent from one computer to another may follow different routes to reach the same destination.  This technology is called packet switching and makes the network more efficient because the network can balance the load across various pieces of equipment and if there is a problem with one piece of equipment in the network then packets can be routed around it.  Data packets can be nested inside each other, for example on a LAN, IP packets are held inside Ethernet packets (that use the MAC address) to route the packet to the correct destination computer.  If a packet is destined for the Internet then the Ethernet packet is discarded when it leaves the LAN.  When the IP packet returns to the LAN from the Internet then it is placed inside another Ethernet packet for final delivery to the computer with the MAC address that requested the information. Slide 6 What is a Data Packet?
  • 7. © GCSE Computing  A protocol is a formal description of the format that data has to be in and the rules for exchanging this data.  There may also be rules for error checking and error correction. As long as different computers on a network are using the same protocol then they will be able to exchange data correctly.  The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known as TCP/IP, named from two of the most important protocols in it:  the Transmission Control Protocol (TCP)  the Internet Protocol (IP).  The TCP provides the service of exchanging data directly between two networked computers while the IP is used to route data packets between networks and over the Internet.  Some other common Internet Protocols:  HTTP (HyperText transfer Protocol): used on the World Wide Web for transferring web pages and files contained in web pages such as images.  FTP (File Transfer protocol): employed for transferring files between computers.  SMTP (Simple Mail Transport Protocol): used for email. Slide 7 What is a Protocol?