0% found this document useful (0 votes)
414 views13 pages

TVL CSS11 Q4 M4

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 13

Computer Systems Servicing NCII – Grade 11

Quarter 4 – Module4: Classless Inter Domain Routing


First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall
subsist in any work of the Government of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand
names, trademarks, etc.) included in this module are owned by their
respective copyright holders. Every effort has been exerted to locate and seek
permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.

Published by the Department of Education Division of Pasig City

Development Team of the Module


Writer : Romar R. Sy
Editors :
Reviewer : Alfredo R. Aram Jr.
Illustrator :
Layout Artist :
Management Team : Ma. Evalou Concepcion A. Agustin
OIC-Schools Division Superintendent
Aurelio G. Alfonso EdD
OIC-Assistant Schools Division Superintendent
Victor M. Javeña EdD
Chief, School Governance and Operations
Division and OIC-Chief, Curriculum
Implementation Division

Education Program Supervisors

Librada L. Agon EdD (EPP/TLE/TVL/TVE)


Liza A. Alvarez (Science/STEM/SSP)
Bernard R. Balitao (AP/HUMSS)
Joselito E. Calios (English/SPFL/GAS)
Norlyn D. Conde EdD (MAPEH/SPA/SPS/HOPE/A&D/Sports)
Wilma Q. Del Rosario (LRMS/ADM)
Ma. Teresita E. Herrera EdD (Filipino/GAS/Piling Larang)
Perlita M. Ignacio PhD (EsP)
Dulce O. Santos PhD (Kindergarten/MTB-MLE)
Teresita P. Tagulao EdD (Mathematics/ABM)

Printed in the Philippines by Department of Education – Schools


Division of Pasig City
Introductory Message
For the facilitator:

Welcome to the Computer Systems Servicing NCII G11 module on


Classless Inter Domain Routing.

This Self-Learning Module was collaboratively designed, developed and


reviewed by educators from the Schools Division Office of Pasig City headed
by its Officer-in-Charge Schools Division Superintendent, Ma. Evalou
Concepcion A. Agustin, in partnership with the City Government of Pasig
through its mayor, Honorable Victor Ma. Regis N. Sotto. The writers utilized
the standards set by the K to 12 Curriculum using the Most Essential
Learning Competencies (MELC) in developing this instructional resource.

This learning material hopes to engage the learners in guided and


independent learning activities at their own pace and time. Further, this also
aims to help learners acquire the needed 21st century skills especially the 5
Cs, namely: Communication, Collaboration, Creativity, Critical Thinking, and
Character while taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box
in the body of the module:

Notes to the Teacher

As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them
to manage their own learning. Moreover, you are expected to encourage and assist
the learners as they do the tasks included in the module.
For the learner:

Welcome to Computer Systems Servicing NCII Module on Classless Inter


Domain Routing. The hand is one of the most symbolized part of the human
body. It is often used to depict skill, action and purpose. Through our hands
we may learn, create and accomplish. Hence, the hand in this learning
resource signifies that you as a learner is capable and empowered to
successfully achieve the relevant competencies and skills at your own pace
and time. Your academic success lies in your own hands!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and
time. You will be enabled to process the contents of the learning material
while being an active learner.

This module has the following parts and corresponding icons:

Expectation – This points to the set of knowledge and skills that you will
learn after completing the module.

Pretest – This measures your prior knowledge about the lesson at hand.

Recap – This part of the module provides a review of concepts and skills
that you already know about a previous lesson.

Lesson – This section discusses the topic in the module.

Activities – This is a set of activities that you need to perform.

Wrap-Up – This section summarizes the concepts and application of the


lesson.

Valuing – This part integrates a desirable moral value in the lesson.

Posttest – This measures how much you have learned from the entire
module.
After completing this lesson, you should be able to:
1. Define classless inter domain routing;
2. Apply the method in subnetting according to network requirement;
3. Appreciate the importance of classless inter domain
routing.

DIRECTION: Read the following statement carefully. Write true if the statement is
correct and false if the statement is incorrect. Write your answer on the space
provided for each number.

__________1. CIDR was only a temporary solution to extend the number of addresses.
available for the ever-growing population of computer network before.
But now it has been active for over 20 years even with the arrival of IPv6
addresses which provides a much bigger space for IP addressing.
__________2. To reduce the wastage of IP addresses in a block, we use subnetting.
__________3. The original subnet mask of the given 172.16.28.1 is 255.255.255.0 or
/24.
__________4. The number of bits when there are 50 networks requirement in
subnetting an address of 172.16.28.50 is 6.
__________5. The increment is the binary value of the last 1 to the left of our new
subnet mask.

• On our last module, we have learned that CIDR stands for Classless Inner
Domain Routing
• We calculate the number of networks and host using the following formulas.

𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑛𝑒𝑡𝑤𝑜𝑟𝑘𝑠 = 2𝑛𝑒𝑡𝑤𝑜𝑟𝑘𝑏𝑖𝑡𝑠

𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 ℎ𝑜𝑠𝑡𝑠 = 2ℎ𝑜𝑠𝑡𝑏𝑖𝑡𝑠 − 2


INTRODUCTION
The internet is huge, but even in this vast global network, there is a lack of
space. The system of IP addresses as we are currently using it (IPv4), has been
long exhausted. All possible addresses (at least 4,294,967,296) have already been
assigned. A solution had to be thought up a few decades ago to solve the problem.
CIDR or classless inter domain routing helps extend the number of available
addresses in a 32-bit address or IPV4.
CIDR was only a temporary solution to extend the number of addresses
available for the ever-growing population of computer network before. But now it
has been active for over 20 years even with the arrival of IPv6 addresses which
provides a much bigger space for IP addressing. Since the widespread introduction
of IPv6 is still a long time coming, CIDR will probably still be around for years to
come. Thus, a sufficient reason to learn more about class inter-domain routing.

Why was CIDR developed?


Way back on the year of 1993, it was clear that the internet was growing
quicker than had initially been anticipated. So, a solution was needed, which
meant abandoning the network classes. The IP addresses were originally divided
into five classes. If a company wanted to be connected to the internet, it had to
choose an IP address from the appropriate class. For each class, different numbers
of octets (the four numerical blocks of IP addresses) were used to identify the
networks. The remaining octets determined the number of hosts in a network.

For example, a class A network could accommodate over 16 million hosts,


but only 128 (0-127) of these networks were available. In class B, on the other
hand, slightly more than 16,000 networks were possible, but each network could
contain 65,534 hosts. The networks in class C only had an octet left and could
only accommodate 254 (1-254, since 0 and 255 are always reserved) hosts.
This shows that the classification is not practical in most cases. For many
companies, a network with only 254 participants was far too small, but several
thousands of hosts need the fewest networks. This ultimately led to a lot of waste,
since companies inevitably had to collect unused addresses. To meet the needs of
internet users, it was decided that the network sizes must be more flexible to
reduce the amount of routing tables in internet routers and to slow down the
decrease in the number of available IP addresses.
CIDR is based on the idea of subnet masks. A mask is placed over an IP
address and creates a sub network: a network that is subordinate to the internet.
The subnet mask signals to the router which part of the IP address is assigned to
the hosts (the individual participants of the network) and which determines the
network.

The CIDR notation


An IP address made it possible in the past to determine which class it
belonged to. For example, the class C networks were located between the
addresses 192.0.0.0 and 223.255.255.255. A subnet mask (e.g. 255.255.255.0) is
like a mask on top of the IP address and specifies the hosts. In CIDR format, this
information is stored as a suffix in the IP address itself. However, the basic
principle remains the same: the suffix specifies which places (bits) of the IP
address represent the network ID and therefore which bits automatically make up
the range of the host ID.

In CIDR notation, this class C subnet mask would be /24, since the first 24
bits determine the network component of the IP address. It is possible not only to
fill octets completely with ones or zeros, but also to create more flexible subnets
using VLSM or Variable Length Subnet Mask. For example, the mask /25
corresponds to the binary value 11111111 11111111 11111111 10000000, which
in turn (in dot-decimal notation) corresponds to 255.255.255.128.

Classless Addressing
To reduce the wastage of IP addresses in a block, we use subnetting. What
we do is that we use the host bits as network bits of a classful IP address. We give
the IP address and define the number of bits for mask along with it like
192.168.1.1/28. Here, subnet mask is found by putting the given number of bits
out of 32 as 1, like, in the given address, we need to put 28 out of 32 bits as 1 and
the rest as 0, and so, the subnet mask would be 255.255.255.240.

Subnetting Meth od in a Classless Addressing


according to Netw ork Requirem ent
There are a lot of methods that you may consider when subnetting a
network. Here is one method that might be useful for you. Let say we want to
subnet the IP address 192.168.1.165 into 10 networks. To subnet this IP address
here are the steps that you need to follow.
1. Get the number of bits.
2. Get the new subnet mask.
3. Get Increment
4. Get Network Ran ge
Get the number of bits
To get the number of bits, identify first the number of networks required in
the problem. So, in our problem, we are required to subnet the given address into
10 networks. Then convert 10 to binary.

128 64 32 16 8 4 2 1
0 0 0 0 1 0 1 0
Now, to get the number of bits, we need to omit all the leading zeros and
count what remains.

128 64 32 16 8 4 2 1
0 0 0 0 1 0 1 0
Therefore, we have 4 bits.

Get the new subnet mask


The original subnet mask of the given 192.168.1.165 is 255.255.255.0 or
/24. It is based on the traditional method of IP classes where there are fix number
of networks and host for each class. Since we are doing a classless subnetting, we
will be needing our new subnet mask.
To do that, we need first to convert our original subnet mask to binary. There
for we have,

Now, to get the new subnet mask, just add the number of bits we have a
while ago which is 4.

Then convert it back to decimal form. Therefore we have the new subnet
mask which is 255.255.255.240 or /28.

Get increment
Using the binary form of our new subnet mask 255.255.255.240 or /28, we
are going to get the increment. The increment is the binary value of the last 1 to
the left of our new subnet mask.
Whatever the value of that 1 will be our increment when converted. So, in
our case, we will now get the value of that 1.

128 64 32 16 8 4 2 1
1 1 1 1 0 0 0 0
Therefore, our increment is 16.

Get the network range


To get the network range, we need first to get our classful or classbased
network address from the given. So in our given IP address, we know that
192.168.1.165 is a class C and has a classbased network address of 192.168.1.0.
Using this classbased network address, we will be using our increment value to
get all of the network range value that we need. Therefore, we have,

192.168.1.0 192.168.1.80
192.168.1.16 192.168.1.96
192.168.1.32 192.168.1.112
192.168.1.48 192.168.1.128
192.168.1.64 192.168.1.144

Since the problem only required us to subnet 10 networks, we already stop


the increment in 192.168.1.144. But the actual subnetworks that we can use here
is until 192.168.1.240.

192.168.1.0 192.168.1.128
192.168.1.16 192.168.1.144
192.168.1.32 192.168.1.160
192.168.1.48 192.168.1.176
192.168.1.64 192.168.1.192
192.168.1.80 192.168.1.208
192.168.1.96 192.168.1.224
192.168.1.112 192.168.1.240
It is very easy to count the actual subnetworks when that range is small.
Therefore, when the range is too large to be written down on a paper and to be
counted, you may use the formula for the actual subnetworks below.

Actual Net = 2𝑛𝑠𝑚−𝑜𝑠𝑚

Where: nsm = new subnet mask bit


Osm = original subnet mask bit

Actual Net = 228−24

Actual Net = 24

Actual Net = 16

DIRECTION: Subnet the following IP addresses according to the network


requirement. Find the number of bits, new subnet mask in decimal or CIDR notation,
increment and network range according to network requirement.

1. 192.50.100.50 Network Requirement = 30

2. 10.0.0.1 Network Requirement = 15


CIDR was only a temporary solution to extend the number of addresses
available for the ever-growing population of computer network before. But now it
has been active for over 20 years even with the arrival of IPv6 addresses which
provides a much bigger space for IP addressing. Since the widespread introduction
of IPv6 is still a long time coming, CIDR will probably still be around for years to
come. Thus, a sufficient reason to learn more about class inter-domain routing.
To reduce the wastage of IP addresses in a block, we use subnetting. What we
do is that we use the host bits as network bits of a classful IP address. We give the
IP address and define the number of bits for mask along with it like
192.168.1.1/28. Here, subnet mask is found by putting the given number of bits
out of 32 as 1, like, in the given address, we need to put 28 out of 32 bits as 1 and
the rest as 0, and so, the subnet mask would be 255.255.255.240.

DIRECTION: Read the following statement carefully. Write your answer in two to
three sentences each number.

1. List down the steps in subnetting by network requirement.


_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

2. Cite a situation in which you can apply the knowledge about subnetting.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

DIRECTION: Read the following statement carefully. Write true if the statement is
correct and false if the statement is incorrect. Write your answer on the space
provided for each number.

__________1. CIDR was only a temporary solution to extend the number of addresses.
available for the ever-growing population of computer network before.
But now it has been active for over 20 years even with the arrival of IPv6
addresses which provides a much bigger space for IP addressing.
__________2. To reduce the wastage of IP addresses in a block, we use subnetting.
__________3. The original subnet mask of the given 172.16.28.1 is 255.255.255.0 or
/24.
__________4. The number of bits when there are 50 networks requirement in
subnetting an address of 172.16.28.50 is 6.
__________5. The increment is the binary value of the last 1 to the left of our new
subnet mask.
REFERENCES

https://www.keycdn.com/support/what-is-cidr

https://www.ionos.com/digitalguide/server/know-how/cidr-classless-
inter-domain-routing/

https://courses.mnet-it.com/learn/home/MasterCCNASubnetting/
section/76820/ lesson/395490

You might also like