SlideShare a Scribd company logo
1 of 29
CONFIGURING COMPUTER
SYSTEMS AND NETWORKS
• Check Attendance (Huwag mo kaming
iiwan kahit ikaw ay iniwan)
• Pls. maintain cleanliness (Mahiya kayo
kay sa di tumatakas na cleaners)
• Avoid eating and drinking inside the
Computer Lab (Hindi ito sinehan)
• Objectives:
• At the end of the lesson, learners are expected to:
• Familiarize, on Internet Protocols
• Prepare materials and tools for configuration;
• Check and adhere to the standard operating
procedures and requirements in Configuration of
Internet Protocols
• Identify the procedures in using the tools for
configuration
Color Coding
• Internet Protocols
• A protocol is a set of rules. A letter sent through the postal
system also uses protocols. Part of the protocol specifies
where on the envelope the delivery address needs to be
written. If the delivery address is written in the wrong
place, the letter cannot be delivered. Internet protocol
works in a similar way. Internet protocols are sets of rules
governing communication within and between computers
on a network. Protocol specifications define the format of
the messages to be exchanged.
Many protocols consist of a suite of
other protocols that are stacked
in layers. These layers depend
on the operation of the other layers
in the suite to function properly.
The main functions of protocols are:
Identifying errors
Compressing the data
Deciding how the data should be sent
Addressing the data
Deciding how to announce sent and
received data
To understand how networks
and the Internet work, you must
be familiar with the commonly
used protocols. These protocols
are used to browse the web,
send and receive e-mail, and
transfer data files.
TCP/IP: The Transmission Control Protocol /Internet Protocol
(TCP/IP) suite of protocols has become the dominant standard
for internetworking. TCP/IP represents a set of public standards
that specify how packets of information are exchanged between
computers over one or more networks.
IPX/SPX: Internetwork Packet Exchange/Sequenced Packet
Exchange is the protocol suite originally employed by Novell
Corporation’s (1980-2014) network operating system, NetWare.
NetBEUI: NetBIOS Extended User Interface is a
protocol used primarily on small Windows NT
networks.
AppleTalk: AppleTalk is a protocol suite used to
network Macintosh computers.
HTTP: Hypertext Transfer Protocol governs how
files such as text, graphics, sound, and video are
exchanged on the World Wide Web (WWW). The
Internet Engineering Task Force (IETF) developed
the standards for HTTP.
FTP: File Transfer Protocol provides services for
file transfer and manipulation. FTP allows
multiple simultaneous connections to remote file
systems.
SSH: Secure Shell is used to securely connect
to a remote computer.
Telnet: It is an application used to connect to a
remote computer that lacks security features.
POP3: Post Office Protocol is used to download
e-mail from a remote mail server.
IMAP: Internet Message Access Protocol is also
used to download e-mail from a remote mail
server.
SMTP: Simple Mail Transfer Protocol is used to
send e-mail to a remote e-mail server.
The more you understand about each of these
protocols, the more you will understand how
networks and the Internet work.
IP Addressing
An IP address is a number that is used to
identify a device on the network. Each device
on a network must have a unique IP address
to communicate with other network devices.
Network devices are those that move data
across the network, including hubs, switches,
and routers.
Five Classes of IP
Address IP Classes
Purpose
Class A Used for large networks,
implemented by large companies
and some countries
Class B Used for medium-sized networks,
implemented by universities
Class C Used for small networks,
implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Subnet Mask
The subnet mask indicates the network
portion of an IP address. Like the IP address,
the subnet mask is a dotted-decimal number.
Usually all hosts within a LAN use the same
subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are
mapped to the first three classes of IP
addresses:
255.0.0.0: Class A, which indicates that the first
octet of the IP address is the network portion
255.255.0.0: Class B, which indicates that the
first two octets of the IP address are the network
portion
255.255.255.0: Class C, which indicates that
the first three octets of the IP address are the
network portion
Octet – Decimal in an IP Address
Default Subnet Masks for Usable IP Addresses
Identification. Identify what is being
asked.
1. It is a set of rules.
2. It indicates the network portion of an IP address.
3. is a number that is used to identify a device on
the network.
4. It is a decimal in an IP Address.
5. Are those that move data across the network,
including hubs, switches, and routers.
Directions: Write the meaning
of each Abbreviated protocols
6. IMAP
7. SMTP
8. HTTP
9. POP3
10. TCP
IP Address Subnet Mask IP Address
Class
10.0.0.0 255.0.0.0 A
192.168.1.3
153.128.0.1
102.3.192.18
70.128.192.2
172.168.1.22
Directions: In this worksheet, your teacher will write
several IP addresses with their appropriate subnet
masks.
1. Protocol
2. Subnet Mask
3. IP Address
4. Octet
5. Network devices
6. Internet Message Access Protocol
7. Simple Mail Transfer Protocol
8. Hyper Text Transfer Protocol
9. Post Office Protocol 3
10. Transmission Control Protocol
IP Address Subnet Mask IP Address
Class
10.0.0.0 255.0.0.0 A
192.168.1.3
153.128.0.1
102.3.192.18
70.128.192.2
172.168.1.22
Configuring-Computer-Systems-and-Networks.pptx

More Related Content

Similar to Configuring-Computer-Systems-and-Networks.pptx

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocolsshahin raj
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxEdJulleza
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
Assigning A Static IP Address
Assigning A Static IP AddressAssigning A Static IP Address
Assigning A Static IP AddressAurelio Eslawan
 
Grade 10 ICT
Grade 10 ICTGrade 10 ICT
Grade 10 ICTLJ Menson
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 

Similar to Configuring-Computer-Systems-and-Networks.pptx (20)

Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocols
 
ICT Assigning a static IP Address
ICT Assigning a static IP AddressICT Assigning a static IP Address
ICT Assigning a static IP Address
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Assigning A Static IP Address
Assigning A Static IP AddressAssigning A Static IP Address
Assigning A Static IP Address
 
Grade 10 ICT
Grade 10 ICTGrade 10 ICT
Grade 10 ICT
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Ccna report
Ccna reportCcna report
Ccna report
 
Network architecture (protocols) by lanz lowen jay o. bognot
Network architecture (protocols) by lanz lowen jay o. bognotNetwork architecture (protocols) by lanz lowen jay o. bognot
Network architecture (protocols) by lanz lowen jay o. bognot
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Configuring-Computer-Systems-and-Networks.pptx

  • 2. • Check Attendance (Huwag mo kaming iiwan kahit ikaw ay iniwan) • Pls. maintain cleanliness (Mahiya kayo kay sa di tumatakas na cleaners) • Avoid eating and drinking inside the Computer Lab (Hindi ito sinehan)
  • 3. • Objectives: • At the end of the lesson, learners are expected to: • Familiarize, on Internet Protocols • Prepare materials and tools for configuration; • Check and adhere to the standard operating procedures and requirements in Configuration of Internet Protocols • Identify the procedures in using the tools for configuration
  • 5. • Internet Protocols • A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part of the protocol specifies where on the envelope the delivery address needs to be written. If the delivery address is written in the wrong place, the letter cannot be delivered. Internet protocol works in a similar way. Internet protocols are sets of rules governing communication within and between computers on a network. Protocol specifications define the format of the messages to be exchanged.
  • 6.
  • 7. Many protocols consist of a suite of other protocols that are stacked in layers. These layers depend on the operation of the other layers in the suite to function properly.
  • 8. The main functions of protocols are: Identifying errors Compressing the data Deciding how the data should be sent Addressing the data Deciding how to announce sent and received data
  • 9. To understand how networks and the Internet work, you must be familiar with the commonly used protocols. These protocols are used to browse the web, send and receive e-mail, and transfer data files.
  • 10.
  • 11. TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s (1980-2014) network operating system, NetWare.
  • 12. NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers. HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW). The Internet Engineering Task Force (IETF) developed the standards for HTTP.
  • 13. FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP allows multiple simultaneous connections to remote file systems. SSH: Secure Shell is used to securely connect to a remote computer. Telnet: It is an application used to connect to a remote computer that lacks security features. POP3: Post Office Protocol is used to download e-mail from a remote mail server.
  • 14. IMAP: Internet Message Access Protocol is also used to download e-mail from a remote mail server. SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server. The more you understand about each of these protocols, the more you will understand how networks and the Internet work.
  • 15. IP Addressing An IP address is a number that is used to identify a device on the network. Each device on a network must have a unique IP address to communicate with other network devices. Network devices are those that move data across the network, including hubs, switches, and routers.
  • 16. Five Classes of IP Address IP Classes Purpose Class A Used for large networks, implemented by large companies and some countries Class B Used for medium-sized networks, implemented by universities Class C Used for small networks, implemented by ISPs for customer subscriptions Class D Used for special use for multicasting
  • 17.
  • 18. Subnet Mask The subnet mask indicates the network portion of an IP address. Like the IP address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same subnet mask. Table 3 shows default subnet masks for usable IP addresses that are mapped to the first three classes of IP addresses:
  • 19. 255.0.0.0: Class A, which indicates that the first octet of the IP address is the network portion 255.255.0.0: Class B, which indicates that the first two octets of the IP address are the network portion 255.255.255.0: Class C, which indicates that the first three octets of the IP address are the network portion Octet – Decimal in an IP Address
  • 20. Default Subnet Masks for Usable IP Addresses
  • 21.
  • 22.
  • 23. Identification. Identify what is being asked. 1. It is a set of rules. 2. It indicates the network portion of an IP address. 3. is a number that is used to identify a device on the network. 4. It is a decimal in an IP Address. 5. Are those that move data across the network, including hubs, switches, and routers.
  • 24. Directions: Write the meaning of each Abbreviated protocols 6. IMAP 7. SMTP 8. HTTP 9. POP3 10. TCP
  • 25. IP Address Subnet Mask IP Address Class 10.0.0.0 255.0.0.0 A 192.168.1.3 153.128.0.1 102.3.192.18 70.128.192.2 172.168.1.22 Directions: In this worksheet, your teacher will write several IP addresses with their appropriate subnet masks.
  • 26.
  • 27. 1. Protocol 2. Subnet Mask 3. IP Address 4. Octet 5. Network devices 6. Internet Message Access Protocol 7. Simple Mail Transfer Protocol 8. Hyper Text Transfer Protocol 9. Post Office Protocol 3 10. Transmission Control Protocol
  • 28. IP Address Subnet Mask IP Address Class 10.0.0.0 255.0.0.0 A 192.168.1.3 153.128.0.1 102.3.192.18 70.128.192.2 172.168.1.22

Editor's Notes

  1. To successfully protect computers and the network, a technician must understand both of the following
  2. Answer on your note book for 5 minutes.