100% found this document useful (1 vote)
55 views68 pages

U5 Studentguide

This document serves as a student guide for a 1st-grade Information Technology course for the 2024-2025 academic year, focusing on computer networks. It outlines the goals and outcomes for various units, including definitions of networking terms, types of networks, topologies, and the roles of different network devices. Additionally, it covers practical skills such as configuring devices and designing network layouts.

Uploaded by

waled9090mohamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
55 views68 pages

U5 Studentguide

This document serves as a student guide for a 1st-grade Information Technology course for the 2024-2025 academic year, focusing on computer networks. It outlines the goals and outcomes for various units, including definitions of networking terms, types of networks, topologies, and the roles of different network devices. Additionally, it covers practical skills such as configuring devices and designing network layouts.

Uploaded by

waled9090mohamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

‫تكنولوجيا المعلومات‬

‫الصف االول‬

Information Technology
STUDENT GUIDE 1st.
2024- 2025
‫تكنولوجيا المعلومات‬
‫الصف االول‬

‫‪2‬‬
Unit 5
Name Introduction to Computer Networks
Goals / By the end of this unit student should be able to:
Outcomes ➢ Remembering
Define basic networking terms and components
➢ Understanding
Explain how networks, devices, and addressing work
➢ Applying
Classify and configure network types, topologies, and devices
➢ Analyzing
Compare networking concepts, devices, and addressing schemes
➢ Evaluating
Assess the best tools, devices, or methods for specific networking
needs.
➢ Creating
Design network layouts, configurations, and IP addressing schemes
Code Description
Knowledge TPK06 Basic principles of data and IT (Hardware - software).
TPK08 Basic principles of types, components, to build networks.
Code Description
TPC2.2 Determines the prober tools needed for operations.
TPC2.6 Identifies related devices needed for operations
Skill
TPC2.8 Configure devices to communicate on a network and virtual
private network
TPC2.9 install, and configure different network devices

3
Unit Preface

4
Lesson 1
Name Introduction to Network Types, Topologies, and Cable
Infrastructure
Goals / By the end of this unit student should be able to:
Outcomes ➢ Remembering
Students will be able to define key networking terms, such as "LAN," "WAN,"
"Bus Topology," "Star Topology," and "Twisted Pair Cable."
➢ Understanding
Students will be able to explain how different network topologies
affect data transmission efficiency and the role of network cables in
establishing these topologies.
➢ Applying
Students will be able to classify networks based on size and purpose,
identifying them as either LAN or WAN.
➢ Analyzing
Students will be able to compare the effectiveness of Star Topology
and Bus Topology in different network setups.
➢ Evaluating
Students will be able to evaluate the pros and cons of using fiber optic
cables versus twisted pair cables in a business environment.
➢ Creating
Students will be able to design a basic LAN setup using appropriate
topologies and cables for a small office, considering cost and data
transmission needs.
Code Description
Knowledge TPK06 Basic principles of data and IT (Hardware - software).
TPK08 Basic principles of types, components, to build networks.
Code Description
TPC2.2 Determines the prober tools needed for operations.
TPC2.6 Identifies related devices needed for operations
Skill
TPC2.8 Configure devices to communicate on a network and virtual
private network
TPC2.9 install, and configure different network devices

5
Section 1: Introduction
Welcome to Computer Networking! Have you ever sent a message or watched a
video online? That’s all possible because of networks! A computer network is a group
of computers connected to share information.

Networks make it easy for us to send messages, play games, or even do schoolwork
online. In this manual, you’ll learn how networks work and why they are so important
in our everyday lives.

A computer network helps connect computers to share things. For example, not every
computer needs its own printer. Imagine this: you can connect one printer to a single
computer or directly to the network, and then all the other computers can use that
printer too.

6
Section 2: Network Types
Some networks are very small, like when your phone connects to Bluetooth
headphones. Other networks are huge, like the internet, which connects people all over
the world.
Section 2.1: Local Area Network (LAN)

A Local Area Network (LAN) is a small network that connects computers and devices
in one location, like a building or a school.

Section 2.2: Wide Area Network (WAN)


A Wide Area Network (WAN) is a network that covers a much bigger area than a
Local Area Network (LAN).

7
Section 3: Network Topologies
Network topology is like a map that shows how computers and devices are connected.
It's similar to how roads connect houses. There are two main kinds of network
topology:

➢ Physical Topology: This shows how devices are linked with wires or wireless
connections.
➢ Logical Topology: This shows how information moves from one device to
another, even if the physical setup is different.

For example, your home internet might use cables (like a straight line, called a "bus")
or work in a circle (called a "ring"). Below, we’ll look at some common types of
network topologies.

8
Section 3.1: Bus Topology

Section 3.2: Star Topology


In a star topology, every device is connected to a central point (like a hub or switch).
This makes it easier to fix problems, as if one connection fails, the rest of the network
keeps working.
9
Section 3.3: Ring Topology

10
Section 3.4: Mesh Topology

11
Section 4: Common Methods of Data Transmission
Computers and networks work using bits, which are tiny units of data that can either
be 0 or 1, like a light switch being off (0) or on (1).

Bits are the small pieces of information that computers use to store and send data.
Devices like keyboards and mice change what we type or click into bits. Then, other
devices like monitors and speakers turn these bits back into things we can see or hear.
One way we can show letters and symbols on a computer is by using a code called
ASCII. In this code, each letter or symbol is made of 8 bits.
When computers need to send data across a network, these bits are turned into signals
that travel through different types of media. the three main ways this happens:

12
Section 5: Cables infrastructure
Network cables are like the paths that connect computers, routers, and other devices.
These cables help them talk to each other and share information. There are different
kinds of cables for different jobs. In places like offices, copper cables called twisted
pair cables are often used. For faster data over long distances, fiber optic cables are
used.
Section 5.1: Twisted pair cable

Twisted pair cables are the most popular type of cable used in local networks, such as
Ethernet. Inside, there are four pairs of small wires twisted together. This twisting
helps stop interference from other cables and electronic devices around them.
It also reduces noise, making sure that data can travel smoothly and without problems.

13
Twisted pair cables come in different categories (Cat5e, Cat6, Cat7, and Cat8) based
on how well they handle data. The main types of twisted pair cables are:

Section 5.1.1: UTP (Unshielded Twisted Pair)

14
Section 5.1.2: STP (Shielded Twisted Pair)

Section 5.2.: Fiber Optics Cables


Fiber optics are super thin threads made of glass or plastic.
They are as thin as a strand of hair! Many of these tiny threads are put together to
make a cable.
This special cable is used to send information very quickly over long distances.

15
Section 5.3: Connecting STP/UTP cables
Ethernet cables can be set up in two simple ways: straight-through or crossover. The
most common type is the straight-through cable, which is often called a "patch cable"
in stores. You will see these cables in most places where computers are sold.
Crossover cables are not as common and can be harder to find, but they are used for
special purposes.

Section 5.3.1: Straight through cable

A straight-through cable is a type of wire that helps connect a computer to a hub,


router, or switch in a local network. It’s also called a patch cable and is often used
instead of Wi-Fi connections. Both ends of this cable are wired in the same way,
following one of two standards: T568A or T568B.

16
You use a straight-through cable when connecting different devices, like a computer to
a router. This cable has a special connector called RJ-45, which holds 8 small wires
inside. It's similar to the RJ-11 connector used for phones, but the phone cable only
has 4 wires.

Section 5.3.2: Crossover Cable


A crossover cable is a special kind of Ethernet cable. It is used to connect two devices
that are the same, like two computers or two switches, directly to each other.

A regular Ethernet cable, called a straight-through cable, cannot do this. But a


crossover cable is different. It switches the wires inside so the two devices can send
and receive information. This way, they can talk to each other without using a hub or
router.

So, if you want to connect two computers or two switches, you need to use a crossover
cable.

17
18
19
20
21
Lesson 2
Name Introduction to Network devices and understand how computers
communicate
Goals / By the end of this unit student should be able to:
Outcomes ➢ Remembering
Students will be able to identify different network devices, including routers,
switches, hubs, and firewalls.
➢ Understanding
Students will be able to describe the role of intermediary devices like
routers and switches in managing data flow within a network.
➢ Applying
Students will be able to demonstrate how devices communicate within
a network using hubs, switches, and routers.
➢ Analyzing
Students will be able to distinguish the differences in data handling
between a hub and a switch, explaining how switches improve network
efficiency.
➢ Evaluating
Students will be able to assess the security advantages of implementing
a firewall in a small business network.
➢ Creating
Students will be able to build a simple network using appropriate end
devices and intermediary devices, ensuring proper communication
between them.
Code Description
Knowledge TPK06 Basic principles of data and IT (Hardware - software).
TPK08 Basic principles of types, components, to build networks.
Code Description
TPC2.2 Determines the prober tools needed for operations.
TPC2.6 Identifies related devices needed for operations
Skill
TPC2.8 Configure devices to communicate on a network and virtual
private network
TPC2.9 install, and configure different network devices

22
Section 1: Introduction
When we send messages from one computer to another, it can be as simple as a cable
connecting two computers. But sometimes, it’s more complicated, like a whole group
of computers working together. The system that makes all this possible is called the
network infrastructure. It helps create a safe and strong connection so we can send
messages easily.
The network infrastructure includes three main parts:
• Network devices (like routers and switches)
• End devices (like computers, phones, or printers)
• Network media (like cables and Wi-Fi signals)

Section 2: Network devices


Network devices are special tools that help connect computers, printers, and other
machines so they can talk to each other and share information. These devices make
sure data moves quickly, safely, and correctly between all parts of the network. Some
of these tools are found inside computers, like a NIC card or an RJ45 connector, while
others are outside the computer, like a router or a switch that are part of the network
itself.

23
Section 2.1: Intermediary Devices

i. Routers
A router is like a guide for the internet(WAN). Think of data as tiny packages. Each
package has a label that shows where it’s coming from and where it’s going. The
router reads these labels and chooses the best route for the package to follow. This
way, the package can reach its destination quickly and without getting lost.

Routers can even send packages through different routes if needed, helping to avoid
traffic or problems on the way. In short, routers guide data across the internet, making
sure everything gets to the right place

24
ii. Switches

Switches allow devices to communicate inside the same LAN (local network).
While switches may seem similar to hubs, they are much smarter.
A hub sends data to all connected devices, which can slow down the network. On the
other hand, a switch reads the data, checks where it should go, and sends it only to the
correct device. This makes the network faster and more efficient.

One downside of switches is that they send "broadcasts" to all devices. Broadcasts are
messages meant to be received by everyone.

25
26
iii. Hub
A hub is a simple tool that helps connect many computers together. You can think of it
like a messenger that shares everything with everyone. When a message (or signal)
comes into one of its ports, the hub makes a copy and sends it to all the other
connected computers. This is called broadcasting. Since the hub doesn't decide where
to send the message, people often call it a "multiport repeater."

iv. Firewall
A firewall is a tool that helps protect a computer network. It checks all the information
(called data) that comes in or goes out of the network. Based on a set of safety rules, it
allows good data to pass and blocks bad data.

27
Firewalls use something called an Access Control List (ACL). This is a list of rules
that decide if the data should be accepted or blocked to keep the network safe.

v. Wireless Access Points


A Wireless Access Point (WAP) helps connect wireless devices, like your phone or
laptop, to the internet through a wired network. It creates a Wireless Local Area
Network (WLAN), so many devices (usually up to 30) can connect and share the same
network at the same time.

The WAP has one port, which connects to the wired network, like a router, using a
network cable (not a phone cable). This lets wireless devices send and receive data and
talk to other devices in the network.

28
Section 2.2: End Devices

End devices are the starting and ending points of communication in a network. These
devices can send or receive information. With new technology, some devices can be
both a client (asking for services) and a server (giving services).
The rest of the network is built to connect these devices, allowing them to talk to each
other. What a device does in the network depends on the software it has.

29
Section 3: How Devices Communicate
When devices share data in a network, they use different methods of communication.
These methods decide how and where the information is sent.

30
31
32
33
Lesson 3
Name Understanding Home Routers and Setting up wireless routers
Goals / By the end of this unit student should be able to:
Outcomes ➢ Remembering
Students will be able to define the key components of a SOHO network, such as
routers and wireless access points (WAPs).
➢ Understanding
Students will be able to explain how an ISP provides internet access
and the function of a router in connecting home devices to the internet.
➢ Applying
Students will be able to configure a wireless router for a home or small
office network, setting up basic security and connection protocols.
➢ Analyzing
Students will be able to examine the differences between DSL and
cable internet connections and determine the best fit for different home
network needs.
➢ Evaluating
Students will be able to evaluate the strengths and weaknesses of
different ISP connection types (DSL, cable, satellite) for small
office/home office environments.
➢ Creating
Students will be able to design a wireless network layout, considering
the placement of routers, access points, and security settings.
Code Description
Knowledge TPK06 Basic principles of data and IT (Hardware - software).
TPK08 Basic principles of types, components, to build networks.
Code Description
TPC2.2 Determines the prober tools needed for operations.
TPC2.6 Identifies related devices needed for operations
Skill
TPC2.8 Configure devices to communicate on a network and virtual
private network
TPC2.9 install, and configure different network devices

34
Section 1: Introduction

Many homes and small offices today use computer networks to connect devices like
computers, printers, and phones. If you are training to become a technician, you might
need to help set up or fix these networks. These are called SOHO networks, which
stands for Small Office/Home Office.

Computers need to connect to each other to share information, such as files or printers.
This can be done in two ways:

Wired connections – using cables.


Wireless connections – using Wi-Fi.
To access the internet, you must sign up with an Internet Service Provider (ISP). The
ISP gives your network the connection needed to go online.

Section 2: Home Modem (Integrated Router)


Routers, like the ones used at home or in small businesses, have two main types of
ports:

➢ Ethernet Ports
These ports connect to the router's internal network. You’ll usually see them labeled
“Ethernet” or “LAN.” All devices connected to these ports are part of the same local
network, meaning they can share files and communicate with each other easily.

35
➢ Internet Port
This port is used to connect the router to another network, like the internet. This port is
often used to connect to the cable or DSL modem in order to access the internet.

In addition to the wired ports, many routers also have a wireless antenna built in.
Wireless devices, like your phone or laptop, connect to the same local network as the
wired devices. The internet port is the only one that connects to a different network
(like the internet).

Section 2.1: ISP connection


An Internet Service Provider (ISP) is a company that gives you access to the internet.
It’s like a bridge that connects your home or school to the internet, just like how a
phone company connects you to people. Some ISPs also offer extra services like
email, online storage, or help with tech problems.

Section 2.1.1: Types of ISP Connections


There are different ways to connect to your ISP. The most common ones are cable and
DSL (Digital Subscriber Line). You can also connect by satellite or cellular, but these
are less common.

36
➢ DSL (Digital Subscriber Line)
DSL uses regular phone lines to give you internet. To connect, you need a device
called a DSL modem, which the ISP can give you or you can buy on your own. DSL is
much faster than old dial-up internet, so you can browse websites easily.

➢ ADSL (Asymmetric Digital Subscriber Line)


ADSL means that the download speed (getting information) is faster than the upload
speed (sending information). This is what most homes use.

➢ SDSL (Symmetric Digital Subscriber Line)


SDSL offers equal speeds for both downloading and uploading. This is usually for
businesses that need to send and receive large amounts of data, like banks or
companies handling many online transactions.

➢ VDSL (Very High Bitrate Digital Subscriber Line)


VDSL is a faster version of DSL. It can provide speeds up to five times quicker than
ADSL, both for downloading and uploading.

37
Section 2.2: Home Integrated Router (Modem)

Wireless devices need to follow certain rules to talk to each other. These rules decide
things like which radio waves they use, how fast they send data, and how information
is shared. The IEEE (Institute of Electrical and Electronics Engineers) is the main
group that makes these rules for wireless networks.

One important rule is the IEEE 802.11 standard. This standard controls how wireless
networks, or Wi-Fi, work.
Some parts of the IEEE 802.11 standard change depending on the type of Wi-Fi.
Wi-Fi networks mostly use the 2.4 GHz and 5 GHz frequency bands to send signals.
2.4 GHz is good for longer distances, but 5 GHz can offer faster speeds over shorter
distances.

There’s another group called the Wi-Fi Alliance. They check if Wi-Fi devices from
different companies can work together. If your device has a Wi-Fi logo, it means it
follows these rules and should work with other Wi-Fi devices.

Wi-Fi technology keeps getting better, with faster speeds and better connections. It's
good to keep track of new Wi-Fi standards because companies quickly use them in
their new products.

38
Section 3: Configuring Wireless Routers

When setting up a wireless router, there are a few important things to know. Here are
the key settings:

➢ Network Name (SSID):


This is the name of your wireless network. All devices that want to connect must use
the same name (SSID).

➢ Wi-Fi Password:
This is the password that keeps your network safe. Only people who know the
password can connect to your Wi-Fi.

➢ Channel (2.4 GHz or 5 GHz):


Wireless routers can use two types of channels: 2.4 GHz or 5 GHz.
2.4 GHz has a longer range, but it’s slower.
5 GHz is faster but works best when you are close to the router.
You can choose which one to use or set it to "Auto" to let the router decide the best
one for you.

➢ SSID Broadcast:
This controls whether your network’s name is visible to everyone nearby. Most routers
have this turned on by default, so everyone can see your network name.

39
40
41
42
Lesson 4
Name OSI Model and TCP/IP
Goals / By the end of this unit student should be able to:
Outcomes ➢ Remembering
Students will be able to list the layers of the OSI model and the corresponding
layers of the TCP/IP model.
➢ Understanding
Students will be able to explain the purpose of each layer in the OSI
model and how it facilitates data transmission in a network.
➢ Applying
Students will be able to identify which OSI or TCP/IP layer a particular
networking device (e.g., router, switch) operates within.
➢ Analyzing
Students will be able to compare the OSI and TCP/IP models,
identifying key similarities and differences in their structure and use.
➢ Evaluating
Students will be able to evaluate why the TCP/IP model is more widely
used for internet communication than the OSI model, despite the OSI
model’s detailed layers.
➢ Creating
Students will be able to construct a visual diagram that maps the
TCP/IP model to real-world devices and network functions.
Code Description
Knowledge TPK06 Basic principles of data and IT (Hardware - software).
TPK08 Basic principles of types, components, to build networks.
Code Description
TPC2.2 Determines the prober tools needed for operations.
TPC2.6 Identifies related devices needed for operations
Skill
TPC2.8 Configure devices to communicate on a network and virtual
private network
TPC2.9 install, and configure different network devices

43
Section 1: Introduction
A standard is like a set of rules that everyone follows to make sure things work
properly. For networks and the internet, these standards make sure all devices, no
matter where they come from, can communicate in the same way.

For example, when you send an email, it follows a specific set of rules or
standards for how the email should be formatted and sent. This way, even if the
person you’re emailing is using a completely different type of device, like a
smartphone, they can still receive and read the email without any problems, as
long as their device follows the same standards.

44
Section 2: OSI Model (Open Systems Interconnection)

The OSI Model is a way to understand how data moves across networks, like the
internet. It was created by a group called the International Organization for
Standardization (ISO).
People use this model to help design, manage, and fix problems in networks.
It’s often called the "OSI Model" and is very important in understanding how
computers and devices communicate.

45
46
47
Section 3: TCP/IP model
The TCP/IP model helps computers talk to each other by defining many rules and
protocols.
To define these rules, it uses documents called Requests For Comments (RFCs),
which can be found using the internet.
The TCP/IP model also doesn’t repeat the work done by other groups(OSI model).
Instead, it refers to their standards. TCP/IP simply refers to their work instead of
creating new rules.

48
The TCP/IP model is divided into layers as the OSI model. Each layer has different
functions, and each layer contains specific protocols and standards.

The OSI model is another model like TCP/IP, which also uses layers to explain how
networks work.

Today, we mainly use TCP/IP, but the OSI model is still useful for comparing with
other networking models. Both models have similar functions in their lower layers. In
fact, the bottom four layers of TCP/IP match the OSI layers in name and function.

Even though TCP/IP is used more, people still use the OSI layer numbers when
talking about networks. For example, even in a TCP/IP network, the application layer

49
is still called “Layer 7,” which is the same as in OSI. The main difference is that OSI
splits the application layer into three parts: session, presentation, and application
layers. However, this difference isn’t usually important, so sometimes people call
them Layer 5-7 protocols.

50
51
52
53
Lesson 5
Name Understanding IPv4 Addressing
Goals / By the end of this unit student should be able to:
Outcomes ➢ Remembering
Students will be able to define key terms related to IP addressing, such as "IPv4,"
"subnet mask," "public IP," and "private IP."
➢ Understanding
Students will be able to describe the hierarchical structure of IPv4
addresses, including how addresses are divided into network and host
portions.
➢ Applying
Students will be able to apply IP addressing concepts to assign
appropriate IP addresses and subnet masks to devices in a small
network.
➢ Analyzing
Students will be able to compare the OSI and TCP/IP models,
identifying key similarities and differences in their structure and use.
➢ Evaluating
Students will be able to evaluate why the TCP/IP model is more widely
used for internet communication than the OSI model, despite the OSI
model’s detailed layers.
➢ Creating
Students will be able to construct a visual diagram that maps the
TCP/IP model to real-world devices and network functions.
Code Description
Knowledge TPK06 Basic principles of data and IT (Hardware - software).
TPK08 Basic principles of types, components, to build networks.
Code Description
TPC2.2 Determines the prober tools needed for operations.
TPC2.6 Identifies related devices needed for operations
Skill
TPC2.8 Configure devices to communicate on a network and virtual
private network
TPC2.9 install, and configure different network devices

54
55
Section 1: Basics of IPv4
An IP address is like a special number given to a device by software so it can connect
to the internet. This number can change over time. It’s different from a hardware
address, which is built into the network card (NIC) and stays the same. The hardware
address helps devices communicate on the same local network.

An IP address is made up of 32 tiny parts, called bits. These bits are split into four
groups, called octets, and each octet has 8 bits. These bits work like little switches:
they can be either on (1) or off (0). When you put the four octets together, you get a
full IP address.

For example, an IP address in binary looks like this:


11010001101001011100100000000001

But reading long strings like that can be confusing. So, to make it easier, we divide the
32 bits into four parts, like this: 11010001.10100101.11001000.00000001

This is still hard to read, so we turn each group into decimal numbers. Now, the IP
address looks like this: 209.165.200.1

56
Section 2: Network Addressing
In computer networks, we use an IP address to identify both the network and the
individual devices, like computers or phones, on that network. You can think of an IP
address like a phone number, with different parts telling us about the network and the
specific device.

1. Network Address: This is like the area code of a phone number. It tells us
which network the device belongs to.

2. Host Address: This is like the specific number for each device on the network.
It helps to locate a particular device, just like the last part of a phone number
points to a person.

57
3. IP Address Sections: An IP address has two parts—the network address and
the host address. One identifies the network, and the other points to the device
within that network.

4. IP Address Classes: How these sections are split depends on something called
IP classes, which organize addresses based on certain rules. It's like sorting
letters into different mailboxes.

58
a. Class A
In a Class A network, the first part of the IP address is used for the network, while the
remaining three parts are used for the devices (hosts) on that network.

A Class A network uses 1 byte (8 bits) for the network address. The first bit is reserved,
and the other 7 bits are used for network addresses. Since these 7 bits can be either 0 or
1, there are 128 possible combinations (2^7 = 128). This is why the first part of a Class
A network address is always between 0 and 127.

b. Class B
the IP address is divided differently than in Class A. The first two parts of the IP address
represent the network, and the last two parts represent the devices (hosts) on that
network.

The designers of the internet decided that every Class B address must start with 1 and
then 0 in binary. This leaves us with 14 bits to use for different network addresses,
meaning there are 16,384 possible Class B networks (2^14 = 16,384).

59
Class B addresses fall in the range 128 to 191 in the first part of the address. For the
devices (hosts) part, 2 bytes are used, allowing up to 65,534 devices on each Class B
network.
c. Class C
In a Class C network, the first 3 parts of the IP address are for the network, and only
the last part is for the device (host).
A Class C address always starts with the binary numbers 110 in the first part. This
leaves 21 bits for different networks, giving us a total of 2,097,152 Class C networks
(2^21). These addresses fall within the range 192 to 223 in the first part of the IP
address.
So, if you see an IP address starting with a number between 192 and 223, it belongs to
a Class C network, and it’s used for smaller networks with fewer devices.

60
Section 3: Public and Private IP addresses

A private IP address is used in your home or local network to connect things like
phones, computers, or printers to your router. This address is only used inside your
home and cannot be seen on the internet.
For example, when you send a document to a wireless printer, your phone or computer
talks to the printer using its private IP address. But if someone outside your Wi-Fi
network tries to connect, they can't, because the printer’s private IP is not available on
the internet.

Each device in your home has its own private IP, which your router gives to them.
This helps your router know which device is which and makes sure no two devices use
the same address.

On the other hand, a public IP address is like your home’s address on the internet. It’s
a unique number that your router uses to connect to the internet. Your internet
provider gives this number to you.
This public IP allows your devices to go online and receive information, like when
you search for something on your phone. After that, your router organizes the traffic
using the private IPs of your devices.

You can find your public IP address by searching "what is my IP address" online. It
will also show information like your internet provider and where you are, such as your
country or city.

61
Section 3.1: Differences between public and private IP addresses

62
Section 3.2: Public IP ranges vs. private IP ranges

The Internet Assigned Numbers Authority (IANA) has set aside specific ranges of
IPv4 addresses for private use.

Private IP addresses are great for small networks, like the ones at home or in school,
because they don’t mix with other private networks. These addresses are reused
everywhere—in homes and businesses all over the world. On the other hand, public IP
addresses are special and need to be unique across the entire internet. Your Internet
Service Provider (ISP) gives you a public IP address, and they come from a much
larger pool of numbers. Any IP address that isn’t reserved for private use can be a
public one.

63
Section 4: Subnet Mask
As we've learned, an IP address has two main parts:
1. Network Address: Identifies the network.
2. Host Address: Identifies the specific device (computer, phone, etc.) on that
network.
A Subnet Mask is a special number made up of 32 bits (small parts) that helps us split
an IP address into two parts: one part is for the network, and the other part is for the
device. This number is written using only 0s and 1s.

A 1 shows which part of the IP address is for the network.


A 0 shows which part is for the device (or host) on the network.
It’s like a way of telling which part belongs to the whole group (network) and which
part belongs to each device in that group.
We must know that not all networks need to be subdivided, so they use the default
netmask. The following are the default network masks categorized in Classes:

64
To find out the subnet mask for your device, you can follow the following
steps:
- To find your subnet mask press Windows key and "R" at the same time to open
Command Prompt, type "cmd", then hit Enter.
- Then type the command. ip config / all.

65
66
67
68

You might also like