The document discusses IP addressing and subnetting. It defines IP address and subnet mask, and explains their importance for proper network communication. It covers classes of IP addresses and examples of subnet masks. The document also demonstrates how to identify network classes, perform IP addressing and subnetting, and troubleshoot issues like IP address conflicts. Key learning points are defining IP addresses and subnet masks, understanding basic IP addressing concepts, and correctly applying subnetting. Exercises are included to help with skills like assigning IP addresses and solving network problems.
CSS L16 - IP ADDRESSING
Learning Competencies
After this learning module the students will be able to . . .
◦○Learn and discuss network addressing, switching and routing.
◦○Identify and understand the IP Addressing format
◦○Understand the explain the Network address translation and IPv6
CSS LO7 - PREPARING THE INSTALLER
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1. Prepare their usb bootable drive installer according to the manufacturer procedure.
2. Prepare their usb drive containing drivers and application software.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
CSS L12 STRUCTURE OF COMPUTER NETWORK
At the end of this learning module the students will be able to . . .
○ Discuss the client and servers functions in computer networking.
○ Understand the concept of Network Protocol
○ Enumerate and classify computer networking topologies.
CSS L16 - IP ADDRESSING
Learning Competencies
After this learning module the students will be able to . . .
◦○Learn and discuss network addressing, switching and routing.
◦○Identify and understand the IP Addressing format
◦○Understand the explain the Network address translation and IPv6
CSS LO7 - PREPARING THE INSTALLER
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1. Prepare their usb bootable drive installer according to the manufacturer procedure.
2. Prepare their usb drive containing drivers and application software.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
CSS L12 STRUCTURE OF COMPUTER NETWORK
At the end of this learning module the students will be able to . . .
○ Discuss the client and servers functions in computer networking.
○ Understand the concept of Network Protocol
○ Enumerate and classify computer networking topologies.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMMarvin Bronoso
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1.Understand the function of Operating System
2. Learn the Minimum requirement for Windows 7 operating system.
3. Learn the procedure in creating and preparing the OS.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGMarvin Bronoso
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
After this lesson module the student will be able to . . .
○ Understand the function of computer network.
○ Discuss how the computer network works.
○ Enumerate and explain the different devices use in computer networking.
○ Differentiate the types of computer network
Computer Hardware Servicing Learner's Material Grade 10Bogs De Castro
This material is for CHS learners only. It can be used as a resource materials.
It is owned by DepEd. All copyright is from the publishers, creators, and owners.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMMarvin Bronoso
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1.Understand the function of Operating System
2. Learn the Minimum requirement for Windows 7 operating system.
3. Learn the procedure in creating and preparing the OS.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGMarvin Bronoso
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
After this lesson module the student will be able to . . .
○ Understand the function of computer network.
○ Discuss how the computer network works.
○ Enumerate and explain the different devices use in computer networking.
○ Differentiate the types of computer network
Computer Hardware Servicing Learner's Material Grade 10Bogs De Castro
This material is for CHS learners only. It can be used as a resource materials.
It is owned by DepEd. All copyright is from the publishers, creators, and owners.
A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.
Subnetting
Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
3. Lesson Objectives
• 1. Define and give example of IP address and subnet mask
• 2. Demonstrate IP addressing and subnetting
• 3. Explain basic concepts IP addressing and subnetting
At the end of the lesson you should be able to:
6. Like sending mail in Philpost, how important is
a correct IP address and subnet mask?
In reality IP addressing and subnetting…
1. Improve network performance and speed
2. Reduce network congestion
3. Boost network security
4. Control network growth
5. Ease administration
Importance
Source: https://www.networkcomputing.com/data-centers/5-subnetting-benefits
Correct IP address and
subnet mask ensures the
fast and secure delivery
of your message.
7. IP Addressing basic concepts
• An IP address is a number that is used to identify a device on the
network.
• The IP address of each device in a network is unique (no duplication).
• The IP address that is entered in configuring a device is a dotted-decimal
number, such as 192.168.1.5
(Duplicated IP address will lead to IP address Conflict.)
8. Classes of IP address and Subnet Mask
Classes
IP Address
(Example only)
Subnet Mask
(Default value)
Usage
Class A 192.1.0.0 255.0.0.0
Used for large networks, implemented by
large companies and some countries.
Class B 192.168.1.0 255.255.0.0
Used for medium-sized networks,
implemented by universities
Class C 192.168.8.0 255.255.255.0
Used for small networks, implemented by
ISPs for customer subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
9. * An IP Address has two parts
-Servers
- Clients
10.
11. Subnet Mask basic concept
• The subnet mask indicates the network portion of an IP
address.
• Like the IP address, the subnet mask is a dotted-decimal
number.
• Usually all hosts within a LAN use the same subnet mask.
12. IP: 192.168.1.1
Subnet Mask: 255.0.0.0 IP: 192.169.1.1
Subnet Mask: 255.0.0.0
IP: 192.170.1.1
Subnet Mask: 255.0.0.0
Minimum IP 192.168.1.1
Max IP 192.254.254.254
13. IP: 192.168.1.1
Subnet Mask: 255.255.0.0 IP: 192.168.2.1
Subnet Mask : 255.255.0.0
IP: 192.168.3.1
Subnet Mask : 255.255.0.0
Minimum IP 192.168.1.1
Max IP 192.168.254.254
14. IP: 192.168.1.25
Subnet Mask: 255.255.255.0
IP: 192.168.1.26
Subnet Mask: 255.255.255.0
IP: 192.168.1.27
Subnet Mask: 255.255.255.0
Minimum IP 192.168.1.1
Max IP 192.168.1.254
15. Exercise 1: Identifying Classes
Mind Clearing:
What are the classes of IP address and subnet mask again?
16. IP: 190.27.0.0
Subnet Mask: 255.0.0.0
IP: 190.25.0.0
Subnet Mask: 255.0.0.0
IP: 190.28.0.0
Subnet Mask: 255.0.0.0
IP: 190.26.0.0
Subnet Mask: 255.0.0.0
1
2
3
Router
Internet
What class does the IP address and subnet mask belong?
Ans.:Class A IP address and subnet mask
17. IP: 192.168.8.3
Subnet Mask: 255.255.255.0
IP: 192.168.8.1
Subnet Mask: 255.255.255.0
IP: 192.168.8.4
Subnet Mask: 255.255.255.0
IP: 192.168.8.2
Subnet Mask: 255.255.255.0
1
2
3
Router
Internet
What class does the IP address and subnet mask belong?
Ans.:Class C IP address and subnet mask
18. IP: 192.168.12.0
Subnet Mask: 255.255.0.0
IP: 192.168.10.0
Subnet Mask: 255.255.0.0
IP: 192.168.13.0
Subnet Mask: 255.255.0.0
IP: 192.168.11.0
Subnet Mask: 255.255.0.0
1
2
3
Router
Internet
What class does the IP address and subnet mask belong?
Ans.:Class B IP address and subnet mask
19. Exercise 2: IP addressing and Subnetting
Mind Clearing:
Which part of the IP address are we going to
increase?
26. What did you learn in our lesson today?
Image source: https://www.grandmapepper.com/join-early-adopters-program/
What is an IP address?1
What is a subnet mask?2
What are the basic concepts of IP addressing?3
What are the basic concepts of subnetting?4
How important is IP addressing and subnetting
as a future technician?
6
How important is a correct IP address and subnet mask?5
27. Assignment/Project
• Enumerate the steps in creating network cable with pics.
• Portrait position for the illustration board.
• By pair
• Deadline: Monday Next week
28.
29. Instruction: On your quiz notebook answer the
ff:
1. What is an IP address?
2. What is a subnet mask?
3. Give an example of IP address. (Any class)
4. Give an example of subnet mask. (Any class)
30. Dad’s PC2
7. IP:
8. Subnet Mask:
IP: 185.150.4.3
Subnet Mask: 255.255.255.0
Kid’s PC3
9. IP:
10. Subnet Mask:
Mom’s PC1
5. IP:
6. Subnet Mask:
Instruction: Study the network set-up below and then assign IP address and subnet mask on each personal computer.
Internet
31. 11-15 Explain
11-12. What will happen if you entered the same IP address in 2 computers
over the same network?
13.-15. How will you solve the problem on question 11-12?
33. Instruction: On a ½ sheet of paper answer the
ff:
1. An IP address is a number that is used to identify a device on the network.
2. The subnet mask indicates the network portion of an IP address.
3. 192.168.1.0 (Answers may vary)
4. 255.255.255.0 (Answers may vary but within the three classes)
34. Dad’s PC
3. IP: 185.150.4.5
4. Subnet Mask: 255.255.255.0
IP: 185.150.4.3
Subnet Mask: 255.255.255.0
Kid’s PC
5. IP: 185.150.4.6
Subnet Mask: 255.255.255.0
Mom’s PC
1. IP: 185.150.4.4
2. Subnet Mask: 255.255.255.0
Instruction: Study the network set-up below and then assign IP address and subnet mask on each personal computer.
Internet
35. 11-15 Explain
11-12. What will happen if you entered the same IP address in 2 computers
over the same network?
Answer: There will be an IP address conflict.
(Answers may vary but should have the same thought.)
13-15. How will you solve the problem on question 11-12?
Answer: Remove the duplicated entry by changing one of the IP address.
(Answers may vary but should have the same thought.)
38. Instruction: On your quiz notebook answer the
ff:
1. What is an IP address?
2. What is a subnet mask?
3. Give an example of IP address. (Any class)
4. Give an example of subnet mask. (Any class)
39. Dad’s PC2
7. IP:
8. Subnet Mask:
IP: 185.150.4.3
Subnet Mask: 255.0.0.0
Kid’s PC3
9. IP:
10. Subnet Mask:
Mom’s PC1
5. IP:
6. Subnet Mask:
Instruction: Study the network set-up below and then assign IP address and subnet mask on each personal computer.
Internet
40. 11-15 Explain
11-12. What is the importance of a correct IP address and subnet mask?
13.-15. What is IP address conflict and how will you solve it?
42. 1. An IP address is a number that is used to identify a device on the network.
2. The subnet mask indicates the network portion of an IP address.
3. 192.168.1.0 (Answers may vary)
4. 255.255.255.0 (Answers may vary but within the three classes)
43. Dad’s PC2
IP: 185.152.4.3
Subnet Mask: 255.0.0.0
:
IP: 185.150.4.3
Subnet Mask: 255.0.0.0
Kid’s PC3
IP: 185.153.4.3
Subnet Mask: 255.0.0.0
Mom’s PC1
IP: 185.151.4.3
Subnet Mask: 255.0.0.0
Instruction: Study the network set-up below and then assign IP address and subnet mask on each personal computer.
Internet
44. 11-15 Explain
11-12. What is the importance of a correct IP address and subnet mask?
Correct IP address and subnet mask ensures the fast and secure delivery of
your message.
13.-15. What is IP address conflict and how will you solve it?
IP address conflict is a network problem caused by duplicated IP address. To
solve this problem you have change one of the duplicated IP address.