SlideShare a Scribd company logo
1 of 9
More Networking…
Learning Outcomes
• Explain the meaning of the term inter-
  networking.
• Define routers, bridges and gateways and
  consider where and why they are used.
• Consider how a subnet mask is used to
  identify the network identifier part of an IP
  address.
• Distinguish between routable and non-
  routable IP addresses.
Inter-Networking
• Internetworking is formed when computers
  from one network communicate with
  computers from other networks.
• These networks communicate via gateways
• An example of inter-networking is the
  internet, which has now become important
  and widely used in everyday life

   Key           Explain the meaning of the term inter-
Learning         networking.
  Point
Routers
• Routers and Bridges allow communication
  between computers on different segments
• A Router is a device that receives packets
  from a router or a host and uses the
  destination IP address the packets contain
  to pass them to another router or host
Bridges
• A bridge holds a table of addresses for
  each connected machine.
• Data packets received from one segment
  are only forwarded if they have a valid
  destination address on the other segment.
• This helps to reduce overall traffic.
Gateways
• A device used to connect networks using
  different protocols so that information can be
  passed from one system to another
• Gateways are used to connect LANs through
  the internet
• In order to do this, they must translate the
  LANs frame into equivalent WAN frame, vice
  versa. This is because the LANs uses a
  protocol that is different from the protocols
  used on the internet which is WAN.
IP Address
• The subnet mask is
  used by the TCP/IP
  protocol to determine
  whether a host is on the
  local subnet or on a
  remote network.
• Which class are these
  addresses?
   a)   10.52.165.23
   b)   192.168.17.3
   c)   150.266.193.1
   d)   1.1.1.1
   e)   128.255.243.19
Routable vs. Non-Routable
• A routable IP address is one that can be
  reached (or routed) by anyone on the
  internet.
• A non routable IP address means internet
  people can't reach you (reserved by the
  business)
  – class A reserved space 10.0.0.0/8
  – class B reserved space 172.16.0.0/12
  – class C reserved space 192.168.0.0/16
Your Task
• Using the iPad you need to make a video to
  show your understanding of the learning
  outcomes.
• Once finished sync to DropBox.

  – Explain the meaning of the term inter-networking.
  – Define routers, bridges and gateways and consider
    where and why they are used.
  – Consider how a subnet mask is used to identify the
    network identifier part of an IP address.
  – Distinguish between routable and non-routable IP
    addresses.

More Related Content

What's hot

Wireless local area netwok slide
Wireless local area netwok slideWireless local area netwok slide
Wireless local area netwok slideFʑɭ Rɘʜɱʌŋ
 
Bridges and gateways 52
Bridges and gateways 52Bridges and gateways 52
Bridges and gateways 52myrajendra
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologiesmc aa
 
Networking device
Networking deviceNetworking device
Networking devicePrem Sahu
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking DevicesShubham Bathe
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Clinton Dsouza
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgCCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgEric Vanderburg
 
Popular network devices
Popular network devicesPopular network devices
Popular network devicesMahesh_Naidu
 

What's hot (20)

Network devices
Network devicesNetwork devices
Network devices
 
Wireless local area netwok slide
Wireless local area netwok slideWireless local area netwok slide
Wireless local area netwok slide
 
Bridges and gateways 52
Bridges and gateways 52Bridges and gateways 52
Bridges and gateways 52
 
Network Devices
Network  DevicesNetwork  Devices
Network Devices
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Networking device
Networking deviceNetworking device
Networking device
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Network devices
Network devicesNetwork devices
Network devices
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network
NetworkNetwork
Network
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
Network devices
Network devicesNetwork devices
Network devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Network devices
Network devicesNetwork devices
Network devices
 
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgCCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 

Viewers also liked

Planning Your Code
Planning Your CodePlanning Your Code
Planning Your Codelistergc
 
Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.Danuta W-Piwko
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basicslistergc
 
Normalisation
NormalisationNormalisation
Normalisationlistergc
 
Anne frank vocab. 1
Anne frank vocab. 1Anne frank vocab. 1
Anne frank vocab. 1Hank Maine
 
Introduction to operating systems
Introduction to operating systemsIntroduction to operating systems
Introduction to operating systemslistergc
 
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interfacelistergc
 
Term 1 - C&B Stars
Term 1 - C&B StarsTerm 1 - C&B Stars
Term 1 - C&B Starslistergc
 
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interfacelistergc
 

Viewers also liked (20)

L3
L3L3
L3
 
L5
L5L5
L5
 
L5
L5L5
L5
 
L3
L3L3
L3
 
Planning Your Code
Planning Your CodePlanning Your Code
Planning Your Code
 
L4
L4L4
L4
 
L1
L1L1
L1
 
Pp t3
Pp t3Pp t3
Pp t3
 
Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
 
Normalisation
NormalisationNormalisation
Normalisation
 
Anne frank vocab. 1
Anne frank vocab. 1Anne frank vocab. 1
Anne frank vocab. 1
 
Introduction to operating systems
Introduction to operating systemsIntroduction to operating systems
Introduction to operating systems
 
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interface
 
L1
L1L1
L1
 
Fire of london_questions
Fire of london_questionsFire of london_questions
Fire of london_questions
 
Term 1 - C&B Stars
Term 1 - C&B StarsTerm 1 - C&B Stars
Term 1 - C&B Stars
 
L2
L2L2
L2
 
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interface
 
L7
L7L7
L7
 

Similar to L3 more networking

Similar to L3 more networking (20)

Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Networking
Networking Networking
Networking
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Computer networks
Computer networksComputer networks
Computer networks
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 

More from listergc

Validation, verification, output and backup
Validation, verification, output and backupValidation, verification, output and backup
Validation, verification, output and backuplistergc
 
L4 internet security
L4   internet securityL4   internet security
L4 internet securitylistergc
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basicslistergc
 
L2 communication methods
L2   communication methodsL2   communication methods
L2 communication methodslistergc
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals listergc
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals listergc
 
L3 how do images work
L3   how do images workL3   how do images work
L3 how do images worklistergc
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inclistergc
 
Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packageslistergc
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemlistergc
 
Key database terms
Key database termsKey database terms
Key database termslistergc
 
Normalisation
NormalisationNormalisation
Normalisationlistergc
 

More from listergc (20)

L2
L2L2
L2
 
Validation, verification, output and backup
Validation, verification, output and backupValidation, verification, output and backup
Validation, verification, output and backup
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
 
L2 communication methods
L2   communication methodsL2   communication methods
L2 communication methods
 
L6
L6L6
L6
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
 
L3 how do images work
L3   how do images workL3   how do images work
L3 how do images work
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inc
 
L9
L9L9
L9
 
L8
L8L8
L8
 
L7
L7L7
L7
 
L6
L6L6
L6
 
Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packages
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Key database terms
Key database termsKey database terms
Key database terms
 
Normalisation
NormalisationNormalisation
Normalisation
 
L2
L2L2
L2
 
L1
L1L1
L1
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

L3 more networking

  • 2. Learning Outcomes • Explain the meaning of the term inter- networking. • Define routers, bridges and gateways and consider where and why they are used. • Consider how a subnet mask is used to identify the network identifier part of an IP address. • Distinguish between routable and non- routable IP addresses.
  • 3. Inter-Networking • Internetworking is formed when computers from one network communicate with computers from other networks. • These networks communicate via gateways • An example of inter-networking is the internet, which has now become important and widely used in everyday life Key Explain the meaning of the term inter- Learning networking. Point
  • 4. Routers • Routers and Bridges allow communication between computers on different segments • A Router is a device that receives packets from a router or a host and uses the destination IP address the packets contain to pass them to another router or host
  • 5. Bridges • A bridge holds a table of addresses for each connected machine. • Data packets received from one segment are only forwarded if they have a valid destination address on the other segment. • This helps to reduce overall traffic.
  • 6. Gateways • A device used to connect networks using different protocols so that information can be passed from one system to another • Gateways are used to connect LANs through the internet • In order to do this, they must translate the LANs frame into equivalent WAN frame, vice versa. This is because the LANs uses a protocol that is different from the protocols used on the internet which is WAN.
  • 7. IP Address • The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network. • Which class are these addresses? a) 10.52.165.23 b) 192.168.17.3 c) 150.266.193.1 d) 1.1.1.1 e) 128.255.243.19
  • 8. Routable vs. Non-Routable • A routable IP address is one that can be reached (or routed) by anyone on the internet. • A non routable IP address means internet people can't reach you (reserved by the business) – class A reserved space 10.0.0.0/8 – class B reserved space 172.16.0.0/12 – class C reserved space 192.168.0.0/16
  • 9. Your Task • Using the iPad you need to make a video to show your understanding of the learning outcomes. • Once finished sync to DropBox. – Explain the meaning of the term inter-networking. – Define routers, bridges and gateways and consider where and why they are used. – Consider how a subnet mask is used to identify the network identifier part of an IP address. – Distinguish between routable and non-routable IP addresses.