Professional Documents
Culture Documents
CSS10-1ST Quarter - Week 6
CSS10-1ST Quarter - Week 6
QUARTER 1
CONCEPT NOTES:
In this lesson the student will learn the different types of internet protocol and what are the
uses it. It also include what is the importance of IP address to our computer and into
network. The students will also learn on how to assign IP address to their computer.
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also uses protocols.
Part of the protocol specifies where on the envelope the delivery address needs to be written.
If the delivery address is written in the wrong place, the letter cannot be delivered. Internet
protocol works in a similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications define the format of the
messages to be exchanged.
Page 1 of 19
Common Internet Protocol
1.TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) represents a set of
public standards that specify how packets of information are exchanged between computers
over one or more networks.
5. HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
video are exchanged on the World Wide Web (WWW).
6. FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP
allows multiple simultaneous connections to remote file systems.
9. POP3: Post Office Protocol is used to download e-mail from a remote mail server.
11. SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
Page 2 of 19
IP Addressing
An IP address is a number that is used to identify a device on the network. Each device on a
network must have a unique IP address to communicate with other network devices. Network
devices are those that move data across the network, including hubs, switches, and routers.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for
humans to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit
bytes called octets. An IP address, even in this grouped format, is hard for humans to read,
write, and remember. Therefore, each octet is presented as its decimal value, separated by a
decimal point or period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such as 192.168.1.5.
IP Classes Purpose
Class A Used for large networks, implemented by large companies and some
countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP address, the
subnet mask is a dotted-decimal number.
255.0.0.0: Class A, which indicates that the first octet of the IP address is the network
portion
255.255.0.0: Class B, which indicates that the first two octets of the IP address are the
network portion
255.255.255.0: Class C, which indicates that the first three octets of the IP address are
the network portion
Page 3 of 19
IpConfig
Ipconfig is a command used to find out the IP address of a certain network you are
connected to.
Page 4 of 19
4. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog box
appears.
5. Type the IP address for your computer. Enter the appropriate IP Address in the IP
address section.
6. Type a subnet mask. The value used on a local network is
commonly 255.255.255.0, but it can be different, such as 255.255.255.127.
7. Type the default gateway address. The default gateway is the router, so type the
router’s address. Figure 54 shows an example of assigning an IP Address, Subnet
mask and default gateway.
Page 5 of 19
8. Type the address for the preferred DNS server. The address should be obtained from
your Internet Service Protocol. It is used to help your computer find web pages and
other addresses on the internet.
9. Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is something that your
ISP provides.
10. Click OK to confirm the settings.
Page 6 of 19
Task no. 1
Instruction: Give the 5 Main Function of an internet protocol and write it on the provided
box.
1. 2. 3.
4. 5.
Task no. 2
Instruction: Choose the correct answer in the box and write it in the space provided.
Classes of IP Address
____________1. Used for small networks, implemented by ISPs for customer subscriptions
____________2. Used for large networks, implemented by large companies and some
countries.
Page 7 of 19
Task no. 3
Instruction: Matching Type: Match Column A with Column B. Write the letter of your
answer in the space provided.
A B
A.
A. POP3
_____1. Is a set of rules or command
B. protocol
_____2. Is a command used to find out the IP address of a certain
network C. Ipconfig
_____3. A. protocol used to download e-mail from a remote mail server. D. IP Address
Task no. 4
Instruction: ACRONYMS: Give the complete meaning of the following acronyms of the
different types of internet protocol. Write your answer on the space provided.
1. IP ___________________________________________________________
3. HTTP ____________________________________________________________
4. FTP ____________________________________________________________
5. SSH ____________________________________________________________
Page 8 of 19
Task no. 5
Instruction: Fill in the Blank: Write the correct answer on the space provided.
1. File __________ Protocol provides services for file transfer and manipulation.
Task no. 6
Instruction: Modified True or False: Write True If the statement Is True and Underlined
the Wrong Word that makes the statement false and Write the correct Answer .
__________1. Ipconfig is a command used to find out the IP address of a certain network you
are connected.
__________3. Internet protocols are sets of rules governing communication within and
between computers on a network.
__________4. The Static IP Address indicates the network portion of an IP address. Like the
IP address, the subnet mask is a dotted-decimal number.
Page 9 of 19
Task No. 7
Adherence to the
Procedures (40%)
-Followed the procedures
systematically
Quality of the
work(40%)
-Functionality of the IP
address
Task no. 8
Instruction: Perform the procedures and steps on how to use the Ipconfig command to find
out what is the Dynamic IP address and subnet mask of your Computer. You
will be rated according to Performance rubrics.
Page 10 of 19
Adherence to the
Procedures (70%)
-Followed the procedures
systematically
Task no. 9
Task no. 10
Instruction: To deepen your understanding with regard to the Internet Protocols, IP Address
and subneting, utilize the Internet and the website www.professormesser.com,
watch and learn from the video presentations. Use the URLs below:
http://www.professormesser.com/n10-005/ip-classes/
Task no. 11
Page 11 of 19
http://www.professormesser.com/n10-005/networkingprotocols/
Task no. 12
http://www.professormesser.com/n10-005/subnetting/
Page 12 of 19
LEARNING ACTIVITY SHEET
QUARTER 1 / WEEK 7-8
Summative Test
I: Instruction: Matching Type: Match Column A with Column B. Write the letter of your
answer in the space provided.
B
A.
A. POP3
_____1. Is a set of rules or command
B. protocol
_____2. Is a command used to find out the IP address of a certain
network C. Ipconfig
_____3. A. protocol used to download e-mail from a remote mail server.
D. IP Address
_____4.It indicates the network portion of an IP address.
E. Subnet
_____5. It is a number that is used to identify a device on the network mask
Page 13 of 19
II: Instruction: ACRONYMS: Give the complete meaning of the following acronyms of
the different types of internet protocol. Write your answer on the space provided.
6. IP ___________________________________________________________
8. HTTP ____________________________________________________________
9. FTP ____________________________________________________________
13.Telnet
___________________________________________________________________________
__________________________________________________________________
Page 14 of 19
VII: Teachers Note:
Read carefully the Instructions on the given task
Finish the activity within a week and it will be collected
Based your performance task on the given rubrics
Task 7 Rubrics
Performance Rubrics for
Assigning Static IP Address
Adherence to the
Procedures (40%)
-Followed the procedures
systematically
Quality of the
work(40%)
-Functionality of the IP
address
Page 15 of 19
Task 8 Rubrics
Task No.1
1. Identifying errors
2. Compressing the data
Page 16 of 19
3. Deciding the data should be sent
4. Addressing the data
5. Deciding how to announce sent and received data
Task No.2
1. Class C
2. Class A
3. Class D
4. Class E
5. Class B
Task No.3
1. B
2. C
3. A
4. E
5. D
Task No.4
1. Internet Protocol
2. Transmission Control Protocol
3. Hyper Text Transfer Protocol
4. File Transfer Protocol
5. Secure Shell
Task No.5
1. Transfer
2. Network
3. Command
4. Subnet Mask
5. Apple Talk
Task No.6
1. True
2. Word- number
3. True
4. Static IP Address- Subnet Mask
5. Class A- Class B
Task No.7
Task No.8
Page 17 of 19
Performance task with rubrics
Task No.9
1. File Transfer Protocol provides services for file transfer and manipulation. FTP
allows multiple simultaneous connections to remote file systems.
2. Secure Shell is used to securely connect to a remote computer.
3. It is an application used to connect to a remote computer that lacks security
features.
4. Post Office Protocol is used to download e-mail from a remote mail server.
5. Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
video are exchanged on the World Wide Web (WWW).
Task No.10
Task No.11
Task No.12
Summative Test
I
1. B
2. C
3. A
4. E
5. D
II
6. Internet Protocol
7. Transmission Control Protocol
8. Hyper Text Transfer Protocol
9. File Transfer Protocol
10 .Secure Shell
III
Page 18 of 19
11. File Transfer Protocol provides services for file transfer and manipulation. FTP
allows multiple simultaneous connections to remote file systems.
12. Secure Shell is used to securely connect to a remote computer.
13. It is an application used to connect to a remote computer that lacks security features.
14. Post Office Protocol is used to download e-mail from a remote mail server.
15. Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
video are exchanged on the World Wide Web (WWW).
Page 19 of 19