August 2023 to June 2024

Internet TeamTeach • 30 min read

Internet History Fun Facts

  • A catalyst in the formation of the Internet was the heating up of the Cold War. The Soviet Union’s launch of the Sputnik satellite spurred the U.S. Defense Department to consider ways information could still be disseminated even after a nuclear attack.
  • ARPANET was created in 1969 and provided the foundation for what came to be known as the Internet
  • January 1, 1983 is the official birthday of the modern internet

OSI Model

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers. Each layer in the OSI model performs specific functions, and together they facilitate communication between different systems. Here’s a brief overview of what each layer does:

1. Physical Layer (Layer 1):

  • Manages the physical connection and transmission of raw data bits. (basically connection from personal computer to internet)

2. Data Link Layer (Layer 2):

  • Ensures reliable communication over a physical layer, handling framing and addressing. (individual devices have their own address)

3. Network Layer (Layer 3):

  • Focuses on logical addressing and routing data between different networks.

4. Transport Layer (Layer 4):

  • Manages end-to-end communication, ensuring reliable and ordered data delivery. (take data packets and transfer it from one computer to another)

OSI Model in a network

1. Physical Layer (Layer 1):
Layer 1

Layer 1 is how devices transmit information to each other (ethernet, network adaptors)

When we send information, we send it “physically” hence the name physical layer

2. Data Link Layer (Layer 2):

When we send information, we send it in binary, frames are the units of binary data, they are the information we send from one device to another (in the same network network)

For example, if i want to send the message “Hello” to my brother on the same network, the frame will be sent within the network to the corresponding MAC address(Media Access Control) address, sometimes referred to as a hardware or physical address, is a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.

Frames can only be sent on the same network

A switch is a fundamental networking device that operates at the Data Link Layer (Layer 2) of the OSI model. Its primary function is to connect devices within the same local area network (LAN) and facilitate communication between them. Here’s how switches work and why they are crucial in network setups:

Layer 2

3. Network Layer (Layer 3):

Layer 3

If I wanted to play Valorant with a friend, I would need to connect to the WiFi, why?

Unlike frames, my friend is not on the same network as me, which means MAC Addresses aren’t enough to locate the device so they cannot communicate with eachother

So we need to identify Hanlun Li on a specific network, how do we do that? IP addresses

IP Addresses are supposedly a unique identifier for each device on the network, to access a seperate device on the network, we must give a destination IP address.

Packets are basically just frames, but with an IP address included in them

4. Transport Layer (Layer 4):
Layer 4 Layer 4

Layer 4 has two protocols UDP and TCP, you can think of it as UDP you just spam packets to the other network without acknowledgement whereas TCP you need to acknowledge everything sent to the other network.

In other words, TCP is slower but more reliable, while UDP is faster but less reliable

For example:

If I’m sending an important email to my boss, I would use TCP because I wouldn’t want the data to be corrupted or lost.

But, If I’m playing a FPS game, I would use UDP because I need speed to load in whats happening within the game

Application Layer (Layer 7) The Application Layer is the topmost layer in the OSI (Open Systems Interconnection) model, which is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers. The Application Layer (Layer 7) is the layer closest to end-users and provides network services directly to applications.

  1. HTTP (Hypertext Transfer Protocol):
    • Used for transmitting hypertext (web pages) on the World Wide Web.
    • Supports the communication between web browsers and web servers.
      Layer 7
  2. HTTPS (Hypertext Transfer Protocol Secure):
    • Similar to HTTP but uses a secure SSL/TLS connection for encrypted communication.
    • Used for secure online transactions, login pages, and sensitive data transfer.
  3. FTP (File Transfer Protocol):
    • Facilitates the transfer of files between computers on a network.
    • Allows for the upload and download of files.
  4. DNS (Domain Name System):
    • Resolves domain names to IP addresses.
    • Essential for translating human-readable domain names to machine-readable IP addresses.
      DNS
  5. SSH (Secure Shell):
    • Provides a secure, encrypted channel for remote access to devices.
    • A more secure alternative to Telnet.

1. Physical Layer (Layer 1) Example:

  • Scenario: Transmitting data over an Ethernet cable.
  • Functionality:
    • Manages the physical connection between devices.
    • Handles the transmission of raw data bits over the Ethernet cable.
    • Deals with aspects like cable types, connectors, and signal modulation.

Key Terms: Ethernet

Data Link Layer (Layer 2) Example:

  • Scenario: Communication between two computers over an Ethernet network.
  • Functionality:
    • Breaks data into frames with start and stop bits for accurate transmission.
    • Manages MAC addresses for unique identification of devices.
    • Regulates frame flow to prevent network congestion.
    • Implements error-checking mechanisms like checksums or CRC for data integrity.

Switches

Network Layer (Layer 3) Example:

  • Scenario: Routing data between two networks.
  • Functionality:
    • Focuses on logical addressing to uniquely identify devices on different networks.
    • Determines optimal paths for data to travel from the source to the destination.
    • Manages communication between networks using routers.
    • Provides a foundation for end-to-end communication across interconnected networks.

Routers - How frames are encapsulated into packets IPV4 Addresses/IPV6 Addresses - Unique Identifiers on Internet

Transport Layer (Layer 4) Example:

  • Scenario: Ensuring reliable communication between two applications.
  • Functionality:
    • Manages end-to-end communication, ensuring data arrives reliably and in the correct order.
    • Provides error detection and recovery mechanisms for data integrity.
    • Uses protocols like TCP for connection-oriented and reliable communication.
    • Supports protocols like UDP for connectionless and faster communication when some data loss is acceptable.

Transport Layer (Layer 4) - TCP vs. UDP

TCP (Transmission Control Protocol)

  • Scenario: Reliable communication requiring guaranteed data delivery.
  • Functionality:
    • Establishes a connection between sender and receiver before data transfer.
    • Ensures reliable and ordered delivery of data.
    • Implements error detection and correction mechanisms.
    • Well-suited for applications where data integrity is crucial, such as file transfers and web browsing.

UDP (User Datagram Protocol)

  • Scenario: Faster communication with acceptable data loss.
  • Functionality:
    • Connectionless protocol without establishing a connection before data transfer.
    • Does not guarantee reliable or ordered delivery of data.
    • Suitable for real-time applications like video streaming and online gaming, where speed is prioritized over perfect data transmission.
    • Minimal overhead, making it more lightweight than TCP.

TCP and UDP are two different approaches to data transport, each suited to specific application requirements. The choice between them depends on the priorities of the application: reliability (TCP) or speed (UDP).


Multiple-Choice Questions (MCQs):

  1. What does the Data Link Layer (Layer 2) focus on in a network?
    • a. Logical addressing
    • b. Physical addressing
    • c. Network routing
    • d. Transport protocols

Answer: Physical addressing Explanation: Layer 2 focuses on the reliable transmission of data frames. In this layer, devices are identified using physical addresses (like MAC addresses) to facilitate the delivery of data frames to the correct destination on local networks.

  1. Which device operates at the Data Link Layer and uses MAC addresses for forwarding frames?
    • a. Router
    • b. Hub
    • c. Switch
    • d. Repeater

Answer: Switch Explanation: Swtiches utilize MAC addresses to make forwarding decisions in local networks. They are better than hubs because they efficiently direct data to only the specific device that the frame is intedned for.

  1. In networking, what does a MAC address uniquely identify?
    • a. Devices on the same network
    • b. Devices on different networks
    • c. IP addresses
    • d. Subnets

Answer: Devices on the same network Explanation: Frames can only be sent if they are from the same network. MAC addresses uniquely identify in local networks because they work in Data Link Layer 2

  1. What is the main function of switches in a network?
    • a. Logical addressing
    • b. Frame forwarding
    • c. IP addressing
    • d. Network routing

Answer: Frame forwarding Explanation: Switches mainly connect devices within the same LAN and oversee its communications. They focus on framing and addressing to ensure reliable communication within the first layer

  1. Which layer of the OSI model deals with physical transmission, like Ethernet and network adaptors?
    • a. Network Layer (Layer 3)
    • b. Physical Layer (Layer 1)
    • c. Data Link Layer (Layer 2)
    • d. Transport Layer (Layer 4)

Answer: Physical Layer Explanation: Layer 1, because it focuses on basic communication between the computer and the internet. It is responsible for the actual transmission and reception of raw binary data over the physical network, defining characteristics such as cables, connectors, and electrical signals.

  1. What does Layer 3 (Network Layer) use for unique device identification between different networks?
    • a. IP addresses
    • b. MAC addresses
    • c. Port numbers
    • d. Subnet masks

Answer: IP address Explanation: MAC addresses can only communicate on the same network so to identify other computers requires IP addresses. IP addresses

  1. Which protocol operates at Layer 4 and ensures reliable communication by acknowledging data receipt?
    • a. UDP (User Datagram Protocol)
    • b. HTTP (Hypertext Transfer Protocol)
    • c. TCP (Transmission Control Protocol)
    • d. DNS (Domain Name System)

Answer: TCP (Transmission Control Protocol) Explanation: TCP has error detection and correction mechanisms. It is slow, but more reliable than UDP.

  1. What is the main difference between UDP and TCP in Layer 4?
    • a. TCP is faster but less reliable.
    • b. UDP is slower but more reliable.
    • c. TCP acknowledges data receipt, while UDP doesn’t.
    • d. UDP is used for emails, and TCP for gaming.

Answer: TCP acknowledges data receipt, while UDP doesn’t. Explanation: TCP ensures reliable and ordered delivery of data. UDP does not have TCP’s acknowledgment mechnaisms which makes it faster but less reliable.

  1. In a network, what does the Transport Layer manage?
    • a. Physical transmission
    • b. MAC addresses
    • c. Traffic flow between networks
    • d. Framing of data

Answer: Traffic flow between networks Explanation: The Transport Layer focuses on taking data packets and transferring them from one computer to another. The Transport layer includes TCP and UDP to ensure fast delivery and lessin traffic flow between networks.

  1. Why would you choose UDP over TCP for a real-time application like online gaming?
    • a. UDP is more reliable.
    • b. TCP is faster.
    • c. UDP provides faster communication.
    • d. TCP ensures every message is acknowledged.

Answer: UDP provides faster communication Explanation: UDP is faster than TCP but less reliable. In online gaming, being faster is the preferred choice for transmitting data because quick responsiveness is crucial.

ANSWER KEY ƃuᴉssǝɹppɐ ʅɐɔᴉsʎɥԀ .q :ɹǝʍsu∀ ɥɔʇᴉʍS .ɔ :ɹǝʍsu∀ ʞɹoʍʇǝu ǝɯɐs ǝɥʇ uo sǝɔᴉʌǝᗡ .ɐ :ɹǝʍsu∀ ƃuᴉpɹɐʍɹoⅎ ǝɯɐɹᖵ .q :ɹǝʍsu∀ (⇂ ɹǝʎɐ⅂) ɹǝʎɐ⅂ ʅɐɔᴉsʎɥԀ .q :ɹǝʍsu∀ sǝssǝɹppɐ ԀI .ɐ :ɹǝʍsu∀ (ʅoɔoʇoɹԀ ʅoɹʇuoϽ uoᴉssᴉɯsuɐɹꓕ) ԀϽꓕ .ɔ :ɹǝʍsu∀ .ʇ╻usǝop ԀᗡՈ ǝʅᴉɥʍ ʻʇdᴉǝɔǝɹ ɐʇɐp sǝƃpǝʅʍouʞɔɐ ԀϽꓕ .ɔ :ɹǝʍsu∀ sʞɹoʍʇǝu uǝǝʍʇǝq ʍoʅⅎ ɔᴉⅎⅎɐɹꓕ .ɔ :ɹǝʍsu∀ .uoᴉʇɐɔᴉunɯɯoɔ ɹǝʇsɐⅎ sǝpᴉʌoɹd ԀᗡՈ .ɔ :ɹǝʍsu∀

HW: Answer all HW questions with a line of reasoning WILL BE GRADED ON ACCURACY AND REASONING

Scroll to top