{"id":2135,"date":"2016-07-11T08:56:14","date_gmt":"2016-07-11T07:56:14","guid":{"rendered":"http:\/\/blogacabdx.ac-bordeaux.fr\/ressii\/?page_id=2135"},"modified":"2019-04-06T10:11:24","modified_gmt":"2019-04-06T08:11:24","slug":"ip-1-fe1-composants-dun-reseau-architecture-dun-reseau-local-moyens-de-connexion-dun-moyen-informatique","status":"publish","type":"page","link":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/ip-1-fe1-composants-dun-reseau-architecture-dun-reseau-local-moyens-de-connexion-dun-moyen-informatique\/","title":{"rendered":"IP-1-FE2 &#8211; Notion de protocole, d\u2019organisation de protocoles en couche, d\u2019algorithme de routage"},"content":{"rendered":"<hr \/>\n<h2><\/h2>\n<h3><span style=\"text-decoration: underline;color: #000000\">R\u00e9f\u00e9rence au texte officiel<\/span><\/h3>\n<h2 style=\"text-align: center\"><strong>THEME : L&#8217;INFORMATIQUE ET LA PROGRAMMATION<\/strong><\/h2>\n<table style=\"width: 100%\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><strong>Connaissances et comp\u00e9tences associ\u00e9es<\/strong><\/td>\n<td><strong>Exemples de situations, d\u2019activit\u00e9s et de ressources pour l\u2019\u00e9l\u00e8ve<\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Comprendre le fonctionnement d\u2019un r\u00e9seau informatique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;text-align: left\">\n<p style=\"text-align: left\"><strong>IP-1-FE1\u00a0<\/strong>\u00bb Composants d\u2019un r\u00e9seau, architecture d\u2019un\u00a0r\u00e9seau local, moyens de connexion d\u2019un moyen informatique<br \/>\n<strong>IP-1-FE2\u00a0<\/strong>\u00bb Notion de protocole, d\u2019organisation de\u00a0protocoles en couche, d\u2019algorithme de routage,<br \/>\n<strong>IP-1-FE3\u00a0<\/strong>\u00bb Internet<\/p>\n<\/td>\n<td style=\"text-align: justify\">Observer et d\u00e9crire sommairement la structure\u00a0du r\u00e9seau informatique d\u2019un coll\u00e8ge, se rep\u00e9rer\u00a0dans ce r\u00e9seau. Exploiter un moyen informatique\u00a0diversit\u00e9 dans diff\u00e9rents points du coll\u00e8ge.<br \/>\nSimuler un protocole de routage dans une\u00a0activit\u00e9 d\u00e9connect\u00e9e.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h3><span style=\"text-decoration: underline\"><span style=\"color: #000000;text-decoration: underline\">Exemple de structuration de connaissances<\/span><\/span><\/h3>\n<p><a href=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/07\/IP-1-FE2a-Notion-de-protocole.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2170 size-full\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/07\/IP-1-FE2a-Notion-de-protocole.jpg\" width=\"1600\" height=\"900\" \/><\/a><\/p>\n<table border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/07\/IP-1-FE2a-Notion-de-protocole.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1491\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/06\/jpg.png\" alt=\"\" width=\"51\" height=\"51\" \/><\/a><br \/>\n<a href=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/07\/IP-1-FE2a-Notion-de-protocole.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><u><span style=\"color: #0066cc\">Fiche \u00e9l\u00e8ve format\u00a0image<\/span><\/u><\/a><\/td>\n<td><u><span style=\"color: #0066cc\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-38\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2015\/03\/logoVideo2.jpg\" alt=\"logoVideo2\" width=\"50\" height=\"51\" \/><br \/>\n<\/span><\/u> Format vid\u00e9o Mp4<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-296\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2015\/03\/logoWebM2.jpg\" alt=\"logoWebM2\" width=\"50\" height=\"51\" \/><br \/>\nFormat vid\u00e9o Web-M<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-34\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2015\/03\/logoPdf2.jpg\" alt=\"logoPdf2\" width=\"50\" height=\"51\" \/><br \/>\nFiche professeur PDF<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: right\"><a href=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/09\/IP-1-FE2b-Notion-de-protocole.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3345\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/09\/IP-1-FE2b-Notion-de-protocole.jpg\" alt=\"ip-1-fe2b-notion-de-protocole\" width=\"1321\" height=\"750\" \/><\/a><\/p>\n<p style=\"text-align: right\"><em>Modifi\u00e9e 19\/09\/2016<\/em><\/p>\n<table border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/09\/IP-1-FE2b-Notion-de-protocole.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1491\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/06\/jpg.png\" alt=\"\" width=\"51\" height=\"51\" \/><\/a><br \/>\n<a href=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2016\/09\/IP-1-FE2b-Notion-de-protocole.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><u><span style=\"color: #0066cc\">Fiche \u00e9l\u00e8ve format\u00a0image<\/span><\/u><\/a><\/td>\n<td><u><span style=\"color: #0066cc\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-38\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2015\/03\/logoVideo2.jpg\" alt=\"logoVideo2\" width=\"50\" height=\"51\" \/><br \/>\n<\/span><\/u> Format vid\u00e9o Mp4<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-296\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2015\/03\/logoWebM2.jpg\" alt=\"logoWebM2\" width=\"50\" height=\"51\" \/><br \/>\nFormat vid\u00e9o Web-M<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-34\" src=\"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/stidev\/wp-content\/uploads\/sites\/62\/2015\/03\/logoPdf2.jpg\" alt=\"logoPdf2\" width=\"50\" height=\"51\" \/><br \/>\nFiche professeur PDF<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h3><\/h3>\n<h3><span style=\"color: #000000\"><span style=\"text-decoration: underline\">Exemple d&#8217;exploitation p\u00e9dagogique &#8211; 5\u00e8me<\/span><\/span><\/h3>\n<table style=\"width: 100%\" border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes de situations d\u00e9clenchantes<\/strong><\/td>\n<td style=\"text-align: justify\">\n<ul>\n<li><span style=\"font-weight: 400\">Toutes les situations ou les \u00e9l\u00e8ves vont utiliser le r\u00e9seau internet ou du coll\u00e8ge.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes probl\u00e8mes<\/strong> <strong>technologiques<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Qu\u2019est ce qu\u2019un protocole de communication ?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comment une page web peut-elle s\u2019ouvrir sur un ordinateur ?<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Ressources Outils \u00e0 exploiter<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ordinateur, navigateurs internet.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes d\u2019activit\u00e9s<\/strong><\/td>\n<td style=\"text-align: left\"><span style=\"font-weight: 400\">Demander aux \u00e9l\u00e8ves de :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Utiliser un ordinateur pour visualiser des pages web.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Exemples d\u2019objets<\/strong> <strong>supports<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ordinateurs, tablettes, smartphones.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Serveurs, switchs, routeurs, calbes RJ45.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><span style=\"color: #000000\"><span style=\"text-decoration: underline\">Exemple d&#8217;exploitation p\u00e9dagogique &#8211; 4\u00e8me<\/span><\/span><\/h3>\n<table style=\"width: 100%\" border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes de situations d\u00e9clenchantes<\/strong><\/td>\n<td style=\"text-align: justify\">\n<ul>\n<li><span style=\"font-weight: 400\">Toutes les situations ou les \u00e9l\u00e8ves vont utiliser le r\u00e9seau internet ou du coll\u00e8ge.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes probl\u00e8mes<\/strong> <strong>technologiques<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Qu\u2019est ce qu\u2019un protocole de communication ?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comment une page web peut-elle s\u2019ouvrir sur un ordinateur ?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comment transf\u00e9rer des fichiers sur internet ?<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Ressources Outils \u00e0 exploiter<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ordinateur, navigateurs internet.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Client FTP<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Forum de discusion, outils de tchat.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Logiciels de messagerie webmails.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes d\u2019activit\u00e9s<\/strong><\/td>\n<td style=\"text-align: left\"><span style=\"font-weight: 400\">Demander aux \u00e9l\u00e8ves de :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Pr\u00e9senter les protocoles utilis\u00e9s sur le r\u00e9seau p\u00e9dagogique et sur internet<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Exemples d\u2019objets<\/strong> <strong>supports<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ordinateurs, tablettes, smartphones.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Serveurs, switchs, routeurs, calbes RJ45<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><span style=\"color: #000000\"><span style=\"text-decoration: underline\">Exemple d&#8217;exploitation p\u00e9dagogique &#8211; 3\u00e8me<\/span><\/span><\/h3>\n<table style=\"width: 100%\" border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes de situations d\u00e9clenchantes<\/strong><\/td>\n<td style=\"text-align: justify\">\n<ul>\n<li><span style=\"font-weight: 400\">Toutes les situations ou les \u00e9l\u00e8ves vont utiliser le r\u00e9seau internet ou du coll\u00e8ge.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes probl\u00e8mes<\/strong> <strong>technologiques<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Qu\u2019est ce qu\u2019un protocole de communication ?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comment une page web peut-elle s\u2019ouvrir sur un ordinateur ?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comment transf\u00e9rer des fichiers sur internet ?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comment fonctionne un algorithme de routage ?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comment fonctionne un protocole en couche ?<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Ressources Outils \u00e0 exploiter<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ordinateur, navigateurs internet.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Client FTP<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Forum de discusion, outils de tchat.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Logiciels de messagerie webmails.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Outils de visualisations du parcours de l\u2019information sur internet. <\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Pistes d\u2019activit\u00e9s<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Configurer diff\u00e9rents moyens de connexion d&#8217;un moyen informatique sur un r\u00e9seau<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Simuler un protocole de routage dans une activit\u00e9 d\u00e9connect\u00e9e<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\"><strong>Exemples d\u2019objets<\/strong><\/td>\n<td style=\"text-align: left\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ordinateurs, tablettes, smartphones.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Serveurs, switchs, routeurs, calbes RJ45.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<hr \/>\n<h3><span style=\"text-decoration: underline;color: #000000\">Pour aller plus loin<\/span><\/h3>\n<ul>\n<li>https:\/\/fr.wikipedia.org\/wiki\/Protocole_r\u00e9seau<\/li>\n<li>https:\/\/fr.wikipedia.org\/wiki\/Histoire_d%27Internet<\/li>\n<li>https:\/\/fr.wikipedia.org\/wiki\/Adresse_MAC<\/li>\n<li>https:\/\/fr.wikipedia.org\/wiki\/Adresse_IP<\/li>\n<li>http:\/\/www.commentcamarche.net\/contents\/<\/li>\n<li>http:\/\/www.dictionnaireduweb.com\/protocole-informatique\/<\/li>\n<\/ul>\n<hr \/>\n<p><span style=\"color: #ff0000\">NB : Ces propositions sont mises \u00e0 disposition pour aider chacun dans sa r\u00e9flexion mais elles n&#8217;ont pas pu \u00eatre\u00a0finalis\u00e9es par manque de temps.\u00a0Ces fiches\u00a0seront donc am\u00e9lior\u00e9es au cours du d\u00e9but d&#8217;ann\u00e9e.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>R\u00e9f\u00e9rence au texte officiel THEME : L&#8217;INFORMATIQUE ET LA PROGRAMMATION Connaissances et comp\u00e9tences associ\u00e9es Exemples de situations, d\u2019activit\u00e9s et de ressources pour l\u2019\u00e9l\u00e8ve Comprendre le fonctionnement d\u2019un r\u00e9seau informatique IP-1-FE1\u00a0\u00bb &#8230;<\/p>\n","protected":false},"author":211,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2135","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/pages\/2135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/users\/211"}],"replies":[{"embeddable":true,"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/comments?post=2135"}],"version-history":[{"count":1,"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/pages\/2135\/revisions"}],"predecessor-version":[{"id":7023,"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/pages\/2135\/revisions\/7023"}],"wp:attachment":[{"href":"https:\/\/ent2d.ac-bordeaux.fr\/disciplines\/sti\/wp-json\/wp\/v2\/media?parent=2135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}