You are on page 1of 8

NET 202 MWF 4:00 – 5:00 PM

NETWORKING 1

Module 2. Introducing to Binary and Hexadecimal

LEARNING TARGET/S: At the end of the unit, the students CAN:

1. Understand what Binary/Hexadecimal number system is.

2. Describe how computer machine read and translate IP Address to Binary codes.

3. Illustrate the importance of IP Subnetting.

Week: 4-6

Activating Prior Knowledge (APK): Think and Reflect!

Why do we care about binary and hexadecimal?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 1


NET 202 MWF 4:00 – 5:00 PM

I. ESSENTIAL IDEAS
A. Binary Number
Binary is a base-2 number system invented by Gottfried Leibniz that is
made up of only two numbers: 0 and 1. This number system is the basis for
all binary code, which is used to write data such as the computer
processor instructions used every day.

How does binary work?


The 0s and 1s in binary represent OFF or ON, respectively. In a transistor, a
"0" represents no flow of electricity, and "1" represents electricity being
allowed to flow. In this way, numbers are represented physically inside the
computing device, permitting calculation. This concept is further explained
in our section on how to read binary numbers.

Why do computers use binary?


Binary is still the primary language for computers for the following reasons.
 It is a simple and elegant design,
 Binary’s 0 and 1 method is quick to detect an electrical signal’s off
and on state.
 The positive and negative poles of magnet media are quickly
translated into binary.
 Binary is the most efficient way to control logic circuits.
Binary Explained!
See our google class for Binary Explained:
https://classroom.google.com/c/MjYyMDMwOTUxMzgw?cjc=lic6ncu
Note: Make sure to complete the video lectures before you proceed.
B. Hexadecimal Number

Hexadecimal Number System is one the type of Number Representation


techniques, in which there value of base is 16. That means there are only 16
symbols or possible digit values, there are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C,
D, E, F. Where A, B, C, D, E and F are single bit representations of decimal
value 10, 11, 12, 13, 14 and 15 respectively. It requires only 4 bits to

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 2


NET 202 MWF 4:00 – 5:00 PM

represent value of any digit. Hexadecimal numbers are indicated by the


addition of either an 0x prefix or an h suffix.
Position of every digit has a weight which is a power of 16. Each position
in the Hexadecimal system is 16 times more significant than the previous
position, that means numeric value of an hexadecimal number is determined
by multiplying each digit of the number by the value of the position in
which the digit appears and then adding the products. So, it is also a
positional (or weighted) number system.
Applications of Hexadecimal Number System
Hexadecimal Number System is commonly used in Computer programming
and Microprocessors. It is also helpful to describe colors on web pages.
Each of the three primary colors (i.e., red, green and blue) is represented by
two hexadecimal digits to create 255 possible values, thus resulting in more
than 16 million possible colors. Hexadecimal number system is used to
describe locations in memory for every byte. These hexadecimal numbers
are also easier to read and write than binary or decimal numbers for
Computer Professionals.
Hexadecimal Explained!
See our google class for Hexadecimal Explained:
https://classroom.google.com/c/MjYyMDMwOTUxMzgw?cjc=lic6ncu
Note: Make sure to complete the video lectures before you proceed

C. IP Addressing
IP Addressing Explained!
See our google class for IP Addressing Explained:
https://classroom.google.com/c/MjYyMDMwOTUxMzgw?cjc=lic6ncu

Note: Make sure to complete the video lectures before you proceed

D. IP Subnetting
IP Subnetting Explained!
See our google class for IP Subnetting Explained:
https://classroom.google.com/c/MjYyMDMwOTUxMzgw?cjc=lic6ncu

Note: Make sure to complete the video lectures before you proceed

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 3


NET 202 MWF 4:00 – 5:00 PM

II. LEARNING EXPERIENCES

A. Clarifying Understanding: I GET IT!

D i r e c t
Give at least five penetration tools that is not listed above, also include each uses and
benefits.

1. What Class of IP Addresses with the subnet of /8?


2. What Class of IP Addresses with the subnet of /24?
3. What Class of IP Addresses with the subnet of /16?
4. What is subnet /32?
5. What is RFC1918 Addressing?
6. What is CIDR notation?
7. What is the broadcast IP Address in IPv4?
8. What is the IP of the Loopback Address?
9. What is Loopback Address?
10. What is subnet mask?

________________________________________________________________________

B. Processing Questions: I CAN EXPLAIN!

1. Explain what is IP Subnetting?


2. Explain what is IP Addressing?
3. Explain what is Binary number system?

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 4


NET 202 MWF 4:00 – 5:00 PM

4. Explain what is Hexadecimal number system?

C. Lifelong Learning: MAKE IT REAL!

How important Subnetting in IPv4 and why it is important to learn the basics of
Binary to Hex conversion?

Answer:
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 5


NET 202 MWF 4:00 – 5:00 PM

D. Framing Concepts: NOW I KNOW!

Direction: Fill-in the correct value!

Binary Hexadecimal

1110 1101

A0

0011 0000

0111 1100

1001 1110

FF

F0

0100 0010

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 6


NET 202 MWF 4:00 – 5:00 PM

0A

00

08

8F

1111 1110

1110 0001

0000 1101

1001 1001

1100 0011

1110 0110

F6

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 7


NET 202 MWF 4:00 – 5:00 PM

81

Sources
https://www.udemy.com/
https://www.computerhope.com/jargon/b/binary.htm#work
https://davidbombal.com/
https://en.wikipedia.org/wiki/Main_Page
https://fcit.usf.edu/

Cybersecurity Emerging Challenges | 8

You might also like