ASSIGNMENT 2 FRONT SHEET Qualification BTEC LEVEL 5 HND diploma computing Unit number and title Computing fundamental Submission date Date received 1st submission Re-submission date Date received 2nd submission Student name Class CAN DUC CHUNG CF02.03 Student ID Assessor name BH00814 DO QUOC BINH Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Chung Trang 1 Summative feedback: Grade: resubmission feedback: Assessor signature: Date: Lecturer signature: Trang 2 Table of Contents I. introduction ................................................................................................................................ 4 II. content ...................................................................................................................................... 5 1. what is IP? why divide internet address into classes?. ........................................................ 6 a. what is IP?. .......................................................................................................................... 7 b. Why divide Internet address into classes? ........................................................................ 7 2. Convert the following 8-bit binary values into their denary (base 10) equivalent. You must show your working out? ................................................................................................... 8 a. 00110111............................................................................................................................... 9 b. 10101111 .............................................................................................................................. 9 c. 11010110............................................................................................................................. 10 3. Convert the following denary (base 10) values into their 8-bit binary equivalent. You must show you’re working out ................................................................................................ 10 a. 31.........................................................................................................................................11 b. 104 ...................................................................................................................................... 11 c. 210....................................................................................................................................... 12 4. write an essay “are computers good or bad for today’s youth” ....................................... 14 III. conclusion .............................................................................................................................. 16 Table offigure Figure1: Private IP is the address used for the internal computer network .................................................. 4 Figure2: IP is an address that helps computers recognize connections to each other ...................... 4 Figure3: why divide internet address into classes? ....................................................................... 12 Trang 3 I. introduction IP has a data direction data. Used by source and destination hosts to transmit data in computer networks. Configure an IP address that is similar to home or business addresses so that others can be identified. So when you visit an email or a website, even if the IP provided is not directly tied to the device, these numbers still reveal some information about you. IP will help devices on the Internet be able to distinguish, share and communicate with each other. It will provide an identity to devices when they connect to a network similar to a business address with a specific location. For example, when I want to send a handwritten letter to a friend abroad. At this point, I will need their exact address and phone number to look up and retrieve. This is also the general procedure when sending data over the Internet, but it will be completely automated. Instead of using a phone number, the computer will use DNS Server to look up the destination and IP. When I search the Keyword “how to check IP” on Google, this request is directed to the DNS Server. Then, it will search for Websites containing the results with the corresponding IP address. So if I don't have an IP, the computer won't know what I'm looking for. Trang 4 II.content 1. what is IP a. (Anon., 2023)IP is a smart connection protocol that makes accessing the internet easier. At the same time, IP makes managing the user's network simpler. Each computer and device has a unique IP address. IP has many advantages, but also has disadvantages. In particular, users will easily be exploited for personal information through IP addresses if hacked by hackers. In addition, all user access activities will be left with an IP address. Figure1: Private IP is the address used for the internal computer network addresses are divided into 5 distinct classes (classes): Class A: This class includes IP addresses with the first octet with the value 1-126. Class A will be reserved for addresses of major organizations in the world. Class A has addresses from 1.0.0.1 to 126.0.0. Class B: This class includes IP addresses with the first octet from 128-191. Class B will be for the middle class organization in the world. Class B has addresses from 128.1.0.0 to 191.254.0.0 Trang 5 • Class C: This class includes IP addresses whose first octet is 192-23. Class C is used in small organizations. Including personal computers. Class C has addresses from 192.0.1.0 to 223.255.254.0 • Class D: This class includes IP addresses whose first octet is 224-239. Class D has the first 4 bits always 1110. Class D in particular is intended for broadcasting (multicast/broadcast) information. This class will have addresses from 224.0.0.0 to 239.255.255.255 • Class E: This class includes IP addresses with the first octet from 240-255. Class E has the first 4 bits always 1111. Class E is reserved for research. It will have addresses from 240.0.0.0 to 254.255.255.255 • Loopback: This class will have the address 127.x.x.x and is used exclusively for loopback testing. Trang 6 Figure2: IP is an address that helps computers recognize connections to each other Trang 7 b. Why divide Internet address into classes? Dividing IP space into layers is a concept that defines what part of the IP belongs to the network and which part belongs to the host. Class A (subnet of 255.0.0.0) has the first octet belonging to the network and the rest to the host. It can support 255^3 number of servers. This split goes like this for the remaining classes: B=255.255.0.0, C=255.255.255.0, D=multicast-specific. There's a concept of CIDR-layer-less inter-domain routing that allows your video network to be broken down into smaller (or even larger) subnets than the subnets defined by the layers. Please note that you can subnet your private IP space any way you see fit. For public IP spaces, you can subnet only that portion of the IP space that you own. Network address and broadcast address. The network is identified by the network's iPad address and the network's subnet. Large networks experience performance issues and large broadcast domains. Breaking down into smaller networks helps us to implement security measures for them and to group servers that belong to the same network. (Anon., 2023) Trang 8 2. Convert the following 8-bit binary values into their denary (base 10) equivalent. You must show your working out? The whole number part of 31.000 is 31 Divide this number repeatedly by 2 until the quotient becomes 0. Divide the number repeatedly by 2 until the quotient becomes 0. • When 31 is divided by 2, the quotient is 15 and the remainder is 1. • When 15 is divided by 2, the quotient is 7 and the remainder is 1. • When7isdividedby2,thequotientis3andtheremainderis1. • When3isdividedby2,thequotientis1andtheremainderis1. • When1isdividedby2,thequotientis0andtheremainderis1. Write theremainders frombottomto top. (31)10 = (11111)2 Trang 9 a. 00110111 (00110111)2 = (0 × 2^7) + (0 × 2^6) + (1 × 2^5) + (1 × 2^4) + (0 × 2^3) + (1 × 2^2) + (1 × 2^1) + (1 × 2^0) = 32 + 16 + 4 + 2 + 1= (55)10 b. 10101111 (10101111)2 = (1 × 2^7) + (0 × 2^6) + (1 × 2^5) + (0 × 2^4) + (1 × 2^3) + (1 × 2^2) + (1 × 2^1) + (1 × 2^0) = 128 + 32 + 8 + 4 + 2 + 1 = (175)10 Trang 8 c. 11010110 (11010110)2 = (1 × 2^7) + (1 × 2^6) + (0 × 2^5) + (1 × 2^4) + (0 × 2^3) + (1 × 2^2) + (1 × 2^1) + (0 × 2^0) = 128 + 64 + 16 + 4 + 2 = (214)10 3. Convert the following denary (base 10) values into their 8bit binary equivalent. You must show you’re working out Trang 10 a. 31 • When 31 is divided by 2, the quotient is 15 and the remainder is 1. • When 15 is divided by 2, the quotient is 7 and the remainder is 1. • When7isdividedby2,thequotientis3andtheremainderis1. • When3isdividedby2,thequotientis1andtheremainderis1. • When1isdividedby2,thequotientis0andtheremainderis1. Write theremaindersfrombottomtotop. (31)10 = (11111)2 b. 104 Trang 11 • When 104 is divided by 2, the quotient is 52 and the remainder is 0. • When 52 is divided by 2, the quotientis 26 and the remainder is 0. • When 26 is divided by 2, the quotient is 13 and the remainder is 0. • When 13 is divided by 2, the quotient is 6 and the remainder is 1. • When6isdividedby2,thequotientis3andtheremainderis0. • When3isdividedby2,thequotientis1andtheremainderis1. • When1isdividedby2,thequotientis0andtheremainderis1. Write theremainders frombottomtotop. (104)10 = (1101000)2 c. 210 Trang 12 • When 210 is divided by 2, the quotient is 105 and the remainder is 0. • When 105 is divided by 2, the quotient is 52 and the remainder is 1. • When 52 is divided by 2, the quotient is 26 and the remainder is 0. • When 26 is divided by 2, the quotient is 13 and the remainder is 0. • When 13 is divided by 2, the quotient is 6 and the remainder is 1. • When6isdividedby2,thequotientis3andtheremainderis0. • When3isdividedby2,thequotientis1andtheremainderis1. • When1isdividedby2,thequotientis0andtheremainderis1. Write theremainders frombottomtotop. (210)10 = (11010010)2 Trang 13 4. write an essay “are computers good or bad for today’s youth” “Don’t text my heart,” these word of wisdom were spoken to me by the Christian writer Chad Estham, but what do these words mean? The youth today are becoming more and more attached to their technology. Relationships are being built online or through phones. Keyboards and keypads are becoming the keys to our heart. Technology provides a way of communication but is becoming the only way to communicate with today’s youth because it has made one on one interaction less frequent and has made a negative effect on the social abilities of the youth. Technology is a great way to stay entertained but it is disconnecting people. Today’s Internet users have many ways to be occupied online. These days we have the ability to communicate on websites like facebook, ways to watch TV shows and clips mostly on YouTube, and play entertaining games like on addictinggames, all while on the computer. And we wonder why we have no in person friendships and dysfunctional families. Non-internet users spend 12.6 more minutes on average doing social activities, such as parties, sporting events, and personto-person conversations (Nie and Hillygus). Internet users spend 34.3 minutes less than noninternet users with family and friends (Nie and Hilygus). Those who don’t switch off the computer, switches off all personal relationships with family and friends. Technology like iPods and cell phones make a personal bubble and make it portable. Cell phones create a distraction from real life experiences and because of their ability to be taken anywhere, I see teens texting anywhere they can. Teens text while talking to someone else, at the dinner table, in the car if driving or not,at he movies, and worst of all in church. This tiny piece of plastic is distracting teens from the most important message of all. The message of God. iPods also create the distraction but it also sends a signal “visible from a good distance away, white earphones signal one thing to most people: don’t bother trying to talk to me” (Song). This action irritates people. I have a friend and whenever we get in the car she sticks her headphones in and I endure the rest of the car ride in silence. I find it rude. These bubbles are growing around so many people and someone just needs to pop them. As you can tell, I am very much against technology but there are ways that is helps. It helps many people stay in touch with friends that might have moved away, “the internet can make it easier to keep in touch with old friends” (Coget and Ytaka). In my life, I will move on from all my friends and I will still want to stay in touch with them all, but it can be just as easy to look them up and ask if they would like to do something in person. Staying in touch can be done in person as much as over technology. Some people have trouble making new friends and the internet provides ways to Trang 15 meet new people through chat rooms. I believe relationships built online can be a little eccentric but, “one study suggests that online relationships simply take longer to develop than those face-to-face and eventually can become as rich” (Coget and Yutaka). Online relationships can be dangerous because you never know who’s on the other side of the chat.. You can become more open over the internet if you don’t have a chance to meet others in real life. Meeting people online can give you confidence in who you are, but I believe it also tears you down. Knowing that you din’t have real frinds and resorting to making them online can make you feel worthless. Online relationships will either build you up or break you down. “Data showed that as people in this sample used the internet more, theyreported keeping up with fewer friends,” so keep your friends (Affonso). Don’t be sucked into the internet and leave others behind. Most importantly, don’t let keypads and keyboards be the key to your heart. (Anon., 2023) Trang 15 III. Conclusion https://wiki.matbao.net/ip-la-gi-tong-hop-moi-kien-thuc-can-biet-ve-dia-chi-ip/ https://www.quora.com/Why-do-we-need-to-divide-IP-addresses-into-classes https://www.teenink.com/opinion/pop_culture_trends/article/169088/Technology-Good-orBad-for-Todays-Youth Bibliography Anon., 2023. [Online] Available at: https://wiki.matbao.net/ip-la-gi-tong-hop-moi-kien-thuc-can-biet-ve-dia-chi-ip/ Anon., 2023. [Online] Available at: https://www.quora.com/Why-do-we-need-to-divide-IP-addresses-into-classes Anon., 2023. [Online] Available at: https://www.quora.com/Why-do-we-need-to-divide-IP-addresses-into-classes Anon., 2023. [Online] Available at: https://www.teenink.com/opinion/pop_culture_trends/article/169088/Technology-Good-or- Badfor-Todays-Youth trang 16