Uploaded by canchung17

chungbh00814cf02.03

advertisement
ASSIGNMENT 2 FRONT SHEET
Qualification
BTEC LEVEL 5 HND diploma computing
Unit number and title
Computing fundamental
Submission date
Date received 1st submission
Re-submission date
Date received 2nd submission
Student name
Class
CAN DUC CHUNG
CF02.03
Student ID
Assessor name
BH00814
DO QUOC BINH
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Chung
Trang 1
Summative feedback:
Grade:
resubmission feedback:
Assessor signature:
Date:
Lecturer signature:
Trang 2
Table of Contents
I.
introduction ................................................................................................................................ 4
II.
content ...................................................................................................................................... 5
1. what is IP? why divide internet address into classes?. ........................................................ 6
a. what is IP?. .......................................................................................................................... 7
b. Why divide Internet address into classes? ........................................................................ 7
2. Convert the following 8-bit binary values into their denary (base 10) equivalent. You
must show your working out? ................................................................................................... 8
a. 00110111............................................................................................................................... 9
b. 10101111 .............................................................................................................................. 9
c. 11010110............................................................................................................................. 10
3. Convert the following denary (base 10) values into their 8-bit binary equivalent. You
must show you’re working out ................................................................................................ 10
a. 31.........................................................................................................................................11
b. 104 ...................................................................................................................................... 11
c. 210....................................................................................................................................... 12
4. write an essay “are computers good or bad for today’s youth” ....................................... 14
III. conclusion .............................................................................................................................. 16
Table offigure
Figure1: Private IP is the address used for the internal computer network .................................................. 4
Figure2: IP is an address that helps computers recognize connections to each other ...................... 4
Figure3: why divide internet address into classes? ....................................................................... 12
Trang 3
I. introduction
IP has a data direction data. Used by source and destination hosts to transmit data in
computer networks. Configure an IP address that is similar to home or business
addresses so that others can be identified. So when you visit an email or a website,
even if the IP provided is not directly tied to the device, these numbers still reveal
some information about you.
IP will help devices on the Internet be able to distinguish, share and communicate with
each other. It will provide an identity to devices when they connect to a network
similar to a business address with a specific location.
For example, when I want to send a handwritten letter to a friend abroad. At this point,
I will need their exact address and phone number to look up and retrieve. This is also
the general procedure when sending data over the Internet, but it will be completely
automated. Instead of using a phone number, the computer will use DNS Server to
look up the destination and IP.
When I search the Keyword “how to check IP” on Google, this request is directed to
the DNS Server. Then, it will search for Websites containing the results with the
corresponding IP address. So if I don't have an IP, the computer won't know what I'm
looking for.
Trang 4
II.content
1. what is IP
a. (Anon., 2023)IP is a smart connection protocol that makes accessing the
internet easier. At the same time, IP makes managing the user's network simpler.
Each computer and device has a unique IP address. IP has many advantages, but
also has disadvantages. In particular, users will easily be exploited for personal
information through IP addresses if hacked by hackers. In addition, all user access
activities will be left with an IP address.
Figure1: Private IP is the address used for the internal
computer network
addresses are divided into 5 distinct classes (classes):
Class A: This class includes IP addresses with the first octet with the value 1-126.
Class A will be reserved for addresses of major organizations in the world. Class A
has addresses from 1.0.0.1 to 126.0.0.
Class B: This class includes IP addresses with the first octet from 128-191. Class
B will be for the middle class organization in the world. Class B has addresses
from 128.1.0.0 to 191.254.0.0
Trang 5
•
Class C: This class includes IP addresses whose first octet is 192-23. Class C is
used in small organizations. Including personal computers. Class C has addresses
from 192.0.1.0 to 223.255.254.0
•
Class D: This class includes IP addresses whose first octet is 224-239. Class D has
the first 4 bits always 1110. Class D in particular is intended for broadcasting
(multicast/broadcast) information. This class will have addresses from 224.0.0.0 to
239.255.255.255
•
Class E: This class includes IP addresses with the first octet from 240-255. Class E
has the first 4 bits always 1111. Class E is reserved for research. It will have
addresses from 240.0.0.0 to 254.255.255.255
•
Loopback: This class will have the address 127.x.x.x and is used exclusively for
loopback testing.
Trang 6
Figure2: IP is an address that helps computers recognize connections to each other
Trang 7
b. Why divide Internet address into classes?
Dividing IP space into layers is a concept that defines what part of the IP belongs to the
network and which part belongs to the host.
Class A (subnet of 255.0.0.0) has the first octet belonging to the network and the rest to
the host. It can support 255^3 number of servers. This split goes like this for the
remaining classes: B=255.255.0.0, C=255.255.255.0, D=multicast-specific.
There's a concept of CIDR-layer-less inter-domain routing that allows your video network
to be broken down into smaller (or even larger) subnets than the subnets defined by the
layers. Please note that you can subnet your private IP space any way you see fit. For
public IP spaces, you can subnet only that portion of the IP space that you own. Network
address and broadcast address.
The network is identified by the network's iPad address and the network's subnet. Large
networks experience performance issues and large broadcast domains.
Breaking down into smaller networks helps us to implement security measures for them
and to group servers that belong to the same network. (Anon., 2023)
Trang 8
2. Convert the following 8-bit binary values into their denary
(base 10) equivalent. You must show your working out?
The whole number part of 31.000 is 31 Divide this number repeatedly by 2
until the quotient becomes 0.
Divide the number repeatedly by 2 until the quotient becomes 0.
•
When 31 is divided by 2, the quotient is 15 and the remainder is 1.
•
When 15 is divided by 2, the quotient is 7 and the remainder is 1.
•
When7isdividedby2,thequotientis3andtheremainderis1.
•
When3isdividedby2,thequotientis1andtheremainderis1.
•
When1isdividedby2,thequotientis0andtheremainderis1.
Write theremainders frombottomto top.
(31)10 = (11111)2
Trang 9
a. 00110111
(00110111)2 = (0 × 2^7) + (0 × 2^6) + (1 × 2^5) + (1 × 2^4) + (0 × 2^3) + (1 × 2^2) +
(1 × 2^1)
+ (1 × 2^0) = 32 + 16 + 4 + 2 + 1= (55)10
b. 10101111
(10101111)2 = (1 × 2^7) + (0 × 2^6) + (1 × 2^5) + (0 × 2^4) + (1 × 2^3) + (1 × 2^2)
+ (1 × 2^1) + (1 × 2^0) = 128 + 32 + 8 + 4 + 2 + 1 = (175)10
Trang 8
c. 11010110
(11010110)2 = (1 × 2^7) + (1 × 2^6) + (0 × 2^5) + (1 × 2^4) + (0 × 2^3) + (1 × 2^2)
+ (1 × 2^1) + (0 × 2^0) = 128 + 64 + 16 + 4 + 2 = (214)10
3. Convert the following denary (base 10) values into their 8bit binary equivalent. You must show you’re working out
Trang 10
a. 31
• When 31 is divided by 2, the quotient is 15 and the remainder is 1.
• When 15 is divided by 2, the quotient is 7 and the remainder is 1.
• When7isdividedby2,thequotientis3andtheremainderis1.
• When3isdividedby2,thequotientis1andtheremainderis1.
• When1isdividedby2,thequotientis0andtheremainderis1.
Write theremaindersfrombottomtotop.
(31)10 = (11111)2
b. 104
Trang 11
• When 104 is divided by 2, the quotient is 52 and the remainder is 0.
• When 52 is divided by 2, the quotientis 26 and the remainder is 0.
• When 26 is divided by 2, the quotient is 13 and the remainder is 0.
• When 13 is divided by 2, the quotient is 6 and the remainder is 1.
• When6isdividedby2,thequotientis3andtheremainderis0.
• When3isdividedby2,thequotientis1andtheremainderis1.
• When1isdividedby2,thequotientis0andtheremainderis1.
Write theremainders frombottomtotop.
(104)10 = (1101000)2
c. 210
Trang 12
• When 210 is divided by 2, the quotient is 105 and the remainder is 0.
• When 105 is divided by 2, the quotient is 52 and the remainder is 1.
• When 52 is divided by 2, the quotient is 26 and the remainder is 0.
• When 26 is divided by 2, the quotient is 13 and the remainder is 0.
• When 13 is divided by 2, the quotient is 6 and the remainder is 1.
• When6isdividedby2,thequotientis3andtheremainderis0.
• When3isdividedby2,thequotientis1andtheremainderis1.
• When1isdividedby2,thequotientis0andtheremainderis1.
Write theremainders frombottomtotop.
(210)10 = (11010010)2
Trang 13
4. write an essay “are computers good or bad for today’s youth”
“Don’t text my heart,” these word of wisdom were spoken to me by the Christian writer
Chad Estham, but what do these words mean? The youth today are becoming more and
more attached to their technology. Relationships are being built online or through phones.
Keyboards and keypads are becoming the keys to our heart.
Technology provides a way of communication but is becoming the only way to
communicate with today’s youth because it has made one on one interaction less
frequent and has made a negative effect on the social abilities of the youth.
Technology is a great way to stay entertained but it is disconnecting people. Today’s Internet
users have many ways to be occupied online. These days we have the ability to communicate
on websites like facebook, ways to watch TV shows and clips mostly on YouTube, and play
entertaining games like on addictinggames, all while on the computer. And we wonder why
we have no in person friendships and dysfunctional families. Non-internet users spend 12.6
more minutes on average doing social activities, such as parties, sporting events, and personto-person conversations (Nie and Hillygus). Internet users spend 34.3 minutes less than noninternet users with
family and friends (Nie and Hilygus). Those who don’t switch off the computer,
switches off all personal relationships with family and friends.
Technology like iPods and cell phones make a personal bubble and make it portable. Cell
phones create a distraction from real life experiences and because of their ability to be taken
anywhere, I see teens texting anywhere they can. Teens text while talking to someone else, at
the dinner table, in the car if driving or not,at he movies, and worst of all in church. This tiny
piece of plastic is distracting teens from the most important message of all. The message of
God. iPods also create the distraction but it also sends a signal “visible from a good distance
away, white earphones signal one
thing to most people: don’t bother trying to talk to me” (Song). This action irritates people.
I have a friend and whenever we get in the car she sticks her headphones in and I endure
the rest of the car ride in silence. I find it rude. These bubbles are growing around so many
people and someone just needs to pop them.
As you can tell, I am very much against technology but there are ways that is helps. It helps
many people stay in touch with friends that might have moved away, “the
internet can make it easier to keep in touch with old friends” (Coget and Ytaka). In my life, I
will move on from all my friends and I will still want to stay in touch with them all, but it can
be just as easy to look them up and ask if they would like to do something in person. Staying
in touch can be done in person as much as over technology.
Some people have trouble making new friends and the internet provides ways to
Trang 15
meet new people through chat rooms. I believe relationships built online can be a little
eccentric but, “one study suggests that online relationships simply take longer to develop
than those face-to-face and eventually can become as rich” (Coget and Yutaka). Online
relationships can be dangerous because you never know who’s on the other side of the chat..
You can become more open over the internet if you don’t have a chance to meet others in
real life. Meeting people online can give you confidence in who you are, but I believe it also
tears you down. Knowing that you din’t have real frinds and resorting to making them online
can make you feel worthless. Online relationships will either build you up or break you
down.
“Data showed that as people in this sample used the internet more, theyreported keeping up
with fewer friends,” so keep your friends (Affonso). Don’t be sucked into the internet and
leave others behind. Most importantly, don’t let keypads and keyboards be the key to your
heart.
(Anon., 2023)
Trang 15
III. Conclusion
https://wiki.matbao.net/ip-la-gi-tong-hop-moi-kien-thuc-can-biet-ve-dia-chi-ip/
https://www.quora.com/Why-do-we-need-to-divide-IP-addresses-into-classes
https://www.teenink.com/opinion/pop_culture_trends/article/169088/Technology-Good-orBad-for-Todays-Youth
Bibliography
Anon., 2023. [Online]
Available at: https://wiki.matbao.net/ip-la-gi-tong-hop-moi-kien-thuc-can-biet-ve-dia-chi-ip/
Anon., 2023. [Online]
Available at: https://www.quora.com/Why-do-we-need-to-divide-IP-addresses-into-classes
Anon., 2023. [Online]
Available at: https://www.quora.com/Why-do-we-need-to-divide-IP-addresses-into-classes
Anon., 2023. [Online]
Available at: https://www.teenink.com/opinion/pop_culture_trends/article/169088/Technology-Good-or- Badfor-Todays-Youth
trang 16
Download