2. • Check Attendance (Huwag mo kaming
iiwan kahit ikaw ay iniwan)
• Pls. maintain cleanliness (Mahiya kayo
kay sa di tumatakas na cleaners)
• Avoid eating and drinking inside the
Computer Lab (Hindi ito sinehan)
3. • Objectives:
• At the end of the lesson, learners are expected to:
• Familiarize, on Internet Protocols
• Prepare materials and tools for configuration;
• Check and adhere to the standard operating
procedures and requirements in Configuration of
Internet Protocols
• Identify the procedures in using the tools for
configuration
5. • Internet Protocols
• A protocol is a set of rules. A letter sent through the postal
system also uses protocols. Part of the protocol specifies
where on the envelope the delivery address needs to be
written. If the delivery address is written in the wrong
place, the letter cannot be delivered. Internet protocol
works in a similar way. Internet protocols are sets of rules
governing communication within and between computers
on a network. Protocol specifications define the format of
the messages to be exchanged.
6.
7. Many protocols consist of a suite of
other protocols that are stacked
in layers. These layers depend
on the operation of the other layers
in the suite to function properly.
8. The main functions of protocols are:
Identifying errors
Compressing the data
Deciding how the data should be sent
Addressing the data
Deciding how to announce sent and
received data
9. To understand how networks
and the Internet work, you must
be familiar with the commonly
used protocols. These protocols
are used to browse the web,
send and receive e-mail, and
transfer data files.
10.
11. TCP/IP: The Transmission Control Protocol /Internet Protocol
(TCP/IP) suite of protocols has become the dominant standard
for internetworking. TCP/IP represents a set of public standards
that specify how packets of information are exchanged between
computers over one or more networks.
IPX/SPX: Internetwork Packet Exchange/Sequenced Packet
Exchange is the protocol suite originally employed by Novell
Corporation’s (1980-2014) network operating system, NetWare.
12. NetBEUI: NetBIOS Extended User Interface is a
protocol used primarily on small Windows NT
networks.
AppleTalk: AppleTalk is a protocol suite used to
network Macintosh computers.
HTTP: Hypertext Transfer Protocol governs how
files such as text, graphics, sound, and video are
exchanged on the World Wide Web (WWW). The
Internet Engineering Task Force (IETF) developed
the standards for HTTP.
13. FTP: File Transfer Protocol provides services for
file transfer and manipulation. FTP allows
multiple simultaneous connections to remote file
systems.
SSH: Secure Shell is used to securely connect
to a remote computer.
Telnet: It is an application used to connect to a
remote computer that lacks security features.
POP3: Post Office Protocol is used to download
e-mail from a remote mail server.
14. IMAP: Internet Message Access Protocol is also
used to download e-mail from a remote mail
server.
SMTP: Simple Mail Transfer Protocol is used to
send e-mail to a remote e-mail server.
The more you understand about each of these
protocols, the more you will understand how
networks and the Internet work.
15. IP Addressing
An IP address is a number that is used to
identify a device on the network. Each device
on a network must have a unique IP address
to communicate with other network devices.
Network devices are those that move data
across the network, including hubs, switches,
and routers.
16. Five Classes of IP
Address IP Classes
Purpose
Class A Used for large networks,
implemented by large companies
and some countries
Class B Used for medium-sized networks,
implemented by universities
Class C Used for small networks,
implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
17.
18. Subnet Mask
The subnet mask indicates the network
portion of an IP address. Like the IP address,
the subnet mask is a dotted-decimal number.
Usually all hosts within a LAN use the same
subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are
mapped to the first three classes of IP
addresses:
19. 255.0.0.0: Class A, which indicates that the first
octet of the IP address is the network portion
255.255.0.0: Class B, which indicates that the
first two octets of the IP address are the network
portion
255.255.255.0: Class C, which indicates that
the first three octets of the IP address are the
network portion
Octet – Decimal in an IP Address
23. Identification. Identify what is being
asked.
1. It is a set of rules.
2. It indicates the network portion of an IP address.
3. is a number that is used to identify a device on
the network.
4. It is a decimal in an IP Address.
5. Are those that move data across the network,
including hubs, switches, and routers.
24. Directions: Write the meaning
of each Abbreviated protocols
6. IMAP
7. SMTP
8. HTTP
9. POP3
10. TCP
25. IP Address Subnet Mask IP Address
Class
10.0.0.0 255.0.0.0 A
192.168.1.3
153.128.0.1
102.3.192.18
70.128.192.2
172.168.1.22
Directions: In this worksheet, your teacher will write
several IP addresses with their appropriate subnet
masks.
26.
27. 1. Protocol
2. Subnet Mask
3. IP Address
4. Octet
5. Network devices
6. Internet Message Access Protocol
7. Simple Mail Transfer Protocol
8. Hyper Text Transfer Protocol
9. Post Office Protocol 3
10. Transmission Control Protocol
28. IP Address Subnet Mask IP Address
Class
10.0.0.0 255.0.0.0 A
192.168.1.3
153.128.0.1
102.3.192.18
70.128.192.2
172.168.1.22
Editor's Notes
To successfully protect computers and the network, a technician must understand both of the following