SlideShare a Scribd company logo
1 of 49
The Hierarchical IP Addressing 
Scheme 
IP address consists of 32 bits of information. 
You can depict an IP address using one of three methods: 
Dotted-decimal, as in 172.16.30.56 
Binary, as in 
10101100.00010000.00011110.00111000 
Hexadecimal, as in AC.10.1E.38 
11/11/14 OIT,RMUTT. 1
Octets 
• The 32-bit IP address is broken up into 4 
octets, which are arranged into a dotted-decimal 
notation scheme. 
• An octet is a set of 8 bits 
• Example of an IP version 4: 
172.64.126.52
IP Address as a 
32-Bit Binary Number
Binary and Decimal Conversion
IP Address Classes
IP Address Classes
IP Addresses as Decimal Numbers
Hosts for Classes of 
IP Addresses 
Class A (24 bits for hosts) 224 - 2* = 16,777,214 maximum hosts 
Class B (16 bits for hosts) 216 - 2* = 65,534 maximum hosts 
Class C (8 bits for hosts) 28 - 2* = 254 maximum hosts 
* Subtracting the network and broadcast reserved address
IP Addresses as Decimal Numbers
Network IDs and Broadcast 
Addresses 
An IP address such as 176.10.0.0 that has all binary 0s in the host 
bit positions is reserved for the network address. 
An IP address such as 176.10.255.255 that has all binary 1s in the 
host bit positions is reserved for the broadcast address.
Private Addresses
Reserved Address Space 
• Network ID 
• Broadcast address 
• Hosts for classes of IP addresses
Basics of Subnetting 
• Classical IP addressing 
• Subnetworks 
• Subnet mask 
• Boolean operations: AND, OR, and NOT 
• Performing the AND function
Subnetworks 
To create a subnet address, a network administrator 
borrows bits from the original host portion and 
designates them as the subnet field.
Subnetworks
Subnet Mask 
• Determines which part of an IP address is the network 
field and which part is the host field 
• Follow these steps to determine the subnet mask: 
– 1. Express the subnetwork IP address in binary form. 
– 2. Replace the network and subnet portion of the address 
with all 1s. 
– 3. Replace the host portion of the address with all 0s. 
– 4. Convert the binary expression back to dotted-decimal 
notation.
Subnet Mask 
Subnet mask in decimal = 255.255.240.0
Boolean Operations: 
AND, OR, and NOT 
• AND is like multiplication. 
• OR is like addition. 
• NOT changes 1 to 0, and 0 to 1.
Range of Bits Needed to Create 
Subnets
Subnet Addresses
Decimal Equivalents of 8-Bit Patterns
Creating a Subnet 
• Determining subnet mask size 
• Computing subnet mask and IP address 
• Computing hosts per subnetwork 
• Boolean AND operation 
• IP configuration on a network diagram 
• Host and subnet schemes 
• Private addresses
Determining Subnet Mask Size 
Class B address with 8 bits borrowed for the subnet 
130.5.2.144 (8 bits borrowed for subnetting) routes to subnet 
130.5.2.0 rather than just to network 130.5.0.0.
Determining Subnet Mask Size 
Class C address 197.15.22.131 with a subnet mask of 
255.255.255.224 (3 bits borrowed) 
11000101 00001111 00010110 100 00011 
Network Field SN Host 
Field 
The address 197.15.22.131 would be on the subnet 
197.15.22.128.
Subnetting Example 
with AND Operation
Host Subnet Schemes 
The number of lost IP addresses with a Class C network depends on 
the number of bits borrowed for subnetting.
Working with Addresses (The Easy 
Way) 
• The key is to work in octets, rather than trying to 
work with the entire IP address at once!
Subnetting Exercise 
• What would be the case if the Network Administrator were 
given the following network address 192.12.8.0, and the 
number of departments were 7. 
• 1. What class is the network address? 
• 2. How many subnets are needed? 
• 3. How many bits are borrowed from the host part of the address? 
• 4. How many subnets are defined and how many of these are useable? 
• 5. What is the default subnet mask? 
• 6. What is the new customised subnet mask? 
• 7. What is the decimal value of each subnet? 
• 8. What is the total number of hosts?
Subnetting 
• 1. What class is the network address? 
– Class C as it is above 191 
• 2. How many subnets are needed? 
– 7 subnets -why not use just 3 bits 
• 3. How many bits are borrowed from the host part of the address? 
– 4 bits are needed 
• 4. How many subnets are defined and how many of these are useable? 
– 2 x 2 x 2 x 2 = 16 are defined - 16 - 2 = 14 are useable 
• 5. What is the default subnet mask? 
– 255.255.255.0 class C 
• 6. What is the new customised subnet mask? 
– 255.255.255.240
Subnetting a Class C Network 
• First you must determine the reason you 
are subnetting a network. 
• There are many reasons. We will choose 
one. 
• If we put all 254 hosts on this one major 
network, and the bandwidth is 100 Mbps, 
each host will have approximately 393,700 
bps of bandwidth (~394 kbps)
Subnetting a Class C Network 
• Suppose that we wish to give 4 Mbps of 
bandwidth to each user, 
• Then we will subnet the network and put a 
maximum of 25 users on each subnet.
Subnetting a Class C Network 
• Aim: maximum of 25 users or hosts 
• Add 2 the the total number of users. 
• Write this chart. 
128 64 32 16 8 4 2 1 
It is the same chart we used earlier for 
number conversions.
Subnetting a Class C Network 
• Locate between which two numbers where 
27 is located. 
128 64 32 16 8 4 2 1 
^ 
27 is located between 16 and 32. 
Note: After adding 2 to the number of workstations and the 
result is 4, 16, 32, 64, etc, draw the line to the right of that 
number.
Subnetting a Class C Network 
• Draw a line between 16 and 32 as shown. 
128 64 32 | 16 8 4 2 1 
| 
The three bits left of the vertical line will be 
used for the subnetwork number. 
The five bits to the right of the line will be 
used for the host address.
Subnetting a Class C Network 
• Place 1s below the three bots to the left of 
the line 
• Place 0s below the five bits to the right of 
the line 
128 64 32 | 16 8 4 2 1 
1 1 1 | 0 0 0 0 0 
Remember, this is the fourth octet.
Determining the Subnet Mask 
• The default mask for a class C address is 
255.255.255.0 
• The 255.255.255 identifies the part of the 
subnet mask used for identifying the 
network portion of the IP address 
• The .0 identifies the host portion of the IP 
address.
Determining the Subnet Mask 
• Start by writing the first three octets for the 
subnet mask: 255.255.255. 
• Now calculate the subnet mask number for 
the fourth octet 
128 64 32 | 16 8 4 2 1 
1 1 1 | 0 0 0 0 0 
128 + 64 + 32 = ?
Determining the Subnet Mask 
• Start by writing the first three octets for the 
subnet mask: 255.255.255. 
• Now calculate the subnet mask number for 
the fourth octet 
128 64 32 | 16 8 4 2 1 
1 1 1 | 0 0 0 0 0 
128 + 64 + 32 = 224 
Therefore the subnet mask is 
255.255.255.224
Addresses 
• The last steps. 
• Calculate each subnet address 
• Calculate the 1st host address 
• Calculate the last host address 
• Calculate the broadcast address for each 
subnetwork
Addresses 
• The first subnetwork address is always 0. 
192.1.2.0 
• For this example, the subnetwork address 
will increment by 32. 32 is the smallest 
part of the subnetwork address. 
128 64 32 | 16 8 4 2 1 
1 1 1 | 0 0 0 0 0
Subnet Addresses 
128 64 32 | 16 8 4 2 1 
1 1 1 | 0 0 0 0 0 
Subnet Addresses 
0- 192.1.2.0 4- 192.1.2.128 
1- 192.1.2.32 5- 192.1.2.160 
2- 192.1.2.64 6- 192.1.2.192 
3- 192.1.2.96 7- 192.1.2.224
1st Host Addresses 
• The first host address is always the subnet 
address plus 1. 
• For example: 192.1.2.0 + 1 = 192.1.2.1 
• Therefore the first host address is 192.1.2.1
1st Host Addresses 
128 64 32 | 16 8 4 2 1 
x x x | 0 0 0 0 1 
1st host Addresses 
0- 192.1.2.1 4- 192.1.2.129 
1- 192.1.2.33 5- 192.1.2.161 
2- 192.1.2.65 6- 192.1.2.193 
3- 192.1.2.97 7- 192.1.2.225
1st Host Addresses 
128 64 32 | 16 8 4 2 1 
x x x | 0 0 0 0 1 
1st host Addresses 
0- 192.1.2.1 4- 192.1.2.129 
1- 192.1.2.33 5- 192.1.2.161 
2- 192.1.2.65 6- 192.1.2.193 
3- 192.1.2.97 7- 192.1.2.225
Broadcast Addresses 
• The broadcast address is always 1 less than 
the next subnetwork address. 
• For example, the broadcast address for 
subnet 0 can be calculated by subtracting 1 
from the next subnetwork address. 
• 192.1.2.32 – 1 = ? 
• Therefore the broadcast address for subnet 
0 is 192.1.2.32 – 1 = 192.1.2.31
Broadcast Addresses 
128 64 32 | 16 8 4 2 1 
x x x | 1 1 1 1 1 
1st host Addresses 
0- 192.1.2.31 4- 192.1.2.159 
1- 192.1.2.63 5- 192.1.2.191 
2- 192.1.2.95 6- 192.1.2.223 
3- 192.1.2.127 7- 192.1.2.255
Last Host Addresses 
• The last set of addresses to calculate are 
the the last available host addresses. 
• Using the broadcast address for each 
subnetwork, subtract 1 to obtain the last 
host address. 
• For example: broadcast address for subnet 
0 is 192.1.2.31 
• The last host address is 192.1.2.30
Last Host Addresses 
128 64 32 | 16 8 4 2 1 
x x x | 1 1 1 1 0 
1st host Addresses 
0- 192.1.2.30 4- 192.1.2.158 
1- 192.1.2.62 5- 192.1.2.190 
2- 192.1.2.94 6- 192.1.2.222 
3- 192.1.2.126 7- 192.1.2.254
IPv4 versus IPv6 
• IP version 6 (IPv6) has been defined and developed. 
• IPv6 uses 128 bits rather than the 32 bits currently 
used in IPv4. 
• IPv6 uses hexadecimal numbers to represent the 128 
bits. 
IPv4

More Related Content

What's hot

Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaaDhani Ahmad
 
Risk Management ecommerce
Risk Management ecommerceRisk Management ecommerce
Risk Management ecommerceRaina Zia
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridgeskeyur Nandaniya
 
Telecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologyTelecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologySyed Ali Roshaan Raza
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 
01 Introduction to E-commerce slides
01 Introduction to E-commerce slides01 Introduction to E-commerce slides
01 Introduction to E-commerce slidesmonchai sopitka
 
Computer network
Computer networkComputer network
Computer networkKetan Garg
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networkingnhumar
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topologyDEVI NATARAJAN
 

What's hot (20)

Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
E business & e-commerce
E business & e-commerceE business & e-commerce
E business & e-commerce
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Risk Management ecommerce
Risk Management ecommerceRisk Management ecommerce
Risk Management ecommerce
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Telecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologyTelecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless Technology
 
IPv4
IPv4IPv4
IPv4
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
01 Introduction to E-commerce slides
01 Introduction to E-commerce slides01 Introduction to E-commerce slides
01 Introduction to E-commerce slides
 
Computer network
Computer networkComputer network
Computer network
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topology
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 

Similar to Ipaddress presentationdemoclass

08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.pptssuserf7cd2b
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting Saad Tanvir
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationZakaria Hossain
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7mlrbrown
 
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdfSILVIUSyt
 
TCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptxTCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptxSalmanButt80
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 

Similar to Ipaddress presentationdemoclass (20)

chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.ppt
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
Subnetting
SubnettingSubnetting
Subnetting
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
lecture 6.pptx
lecture 6.pptxlecture 6.pptx
lecture 6.pptx
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
 
IP Address
IP AddressIP Address
IP Address
 
TCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptxTCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptx
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

More from askme

016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptxaskme
 
Cisco ip-addressing
Cisco ip-addressingCisco ip-addressing
Cisco ip-addressingaskme
 
Human Generation
Human GenerationHuman Generation
Human Generationaskme
 
Do U Know Him
Do U Know HimDo U Know Him
Do U Know Himaskme
 
Investment Proposal
Investment ProposalInvestment Proposal
Investment Proposalaskme
 
Ramadan For Bodyand Soul
Ramadan For Bodyand SoulRamadan For Bodyand Soul
Ramadan For Bodyand Soulaskme
 
Shame On Us Or Us
Shame On Us Or UsShame On Us Or Us
Shame On Us Or Usaskme
 
Network Project
Network ProjectNetwork Project
Network Projectaskme
 
Zend Framework In Action
Zend Framework In ActionZend Framework In Action
Zend Framework In Actionaskme
 
Linux Vs Windows Tco Comparison
Linux Vs Windows Tco ComparisonLinux Vs Windows Tco Comparison
Linux Vs Windows Tco Comparisonaskme
 
B B Q Party
B B Q  PartyB B Q  Party
B B Q Partyaskme
 
Dit211 Chapter 7 (Lab 4)
Dit211   Chapter 7 (Lab 4)Dit211   Chapter 7 (Lab 4)
Dit211 Chapter 7 (Lab 4)askme
 
Dit211 Chapter 2 (Lab 1)
Dit211   Chapter 2 (Lab 1)Dit211   Chapter 2 (Lab 1)
Dit211 Chapter 2 (Lab 1)askme
 
D I T211 Chapter 5 ( Lab 3)
D I T211    Chapter 5 ( Lab 3)D I T211    Chapter 5 ( Lab 3)
D I T211 Chapter 5 ( Lab 3)askme
 
D I T211 Chapter 2 ( Lab 1)
D I T211    Chapter 2 ( Lab 1)D I T211    Chapter 2 ( Lab 1)
D I T211 Chapter 2 ( Lab 1)askme
 
D I T211 Chapter 7 ( Lab 4)
D I T211    Chapter 7 ( Lab 4)D I T211    Chapter 7 ( Lab 4)
D I T211 Chapter 7 ( Lab 4)askme
 
D I T211 Chapter 6
D I T211    Chapter 6D I T211    Chapter 6
D I T211 Chapter 6askme
 
D I T211 Chapter 4 ( Lab 2)
D I T211    Chapter 4 ( Lab 2)D I T211    Chapter 4 ( Lab 2)
D I T211 Chapter 4 ( Lab 2)askme
 
D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1askme
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1askme
 

More from askme (20)

016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
 
Cisco ip-addressing
Cisco ip-addressingCisco ip-addressing
Cisco ip-addressing
 
Human Generation
Human GenerationHuman Generation
Human Generation
 
Do U Know Him
Do U Know HimDo U Know Him
Do U Know Him
 
Investment Proposal
Investment ProposalInvestment Proposal
Investment Proposal
 
Ramadan For Bodyand Soul
Ramadan For Bodyand SoulRamadan For Bodyand Soul
Ramadan For Bodyand Soul
 
Shame On Us Or Us
Shame On Us Or UsShame On Us Or Us
Shame On Us Or Us
 
Network Project
Network ProjectNetwork Project
Network Project
 
Zend Framework In Action
Zend Framework In ActionZend Framework In Action
Zend Framework In Action
 
Linux Vs Windows Tco Comparison
Linux Vs Windows Tco ComparisonLinux Vs Windows Tco Comparison
Linux Vs Windows Tco Comparison
 
B B Q Party
B B Q  PartyB B Q  Party
B B Q Party
 
Dit211 Chapter 7 (Lab 4)
Dit211   Chapter 7 (Lab 4)Dit211   Chapter 7 (Lab 4)
Dit211 Chapter 7 (Lab 4)
 
Dit211 Chapter 2 (Lab 1)
Dit211   Chapter 2 (Lab 1)Dit211   Chapter 2 (Lab 1)
Dit211 Chapter 2 (Lab 1)
 
D I T211 Chapter 5 ( Lab 3)
D I T211    Chapter 5 ( Lab 3)D I T211    Chapter 5 ( Lab 3)
D I T211 Chapter 5 ( Lab 3)
 
D I T211 Chapter 2 ( Lab 1)
D I T211    Chapter 2 ( Lab 1)D I T211    Chapter 2 ( Lab 1)
D I T211 Chapter 2 ( Lab 1)
 
D I T211 Chapter 7 ( Lab 4)
D I T211    Chapter 7 ( Lab 4)D I T211    Chapter 7 ( Lab 4)
D I T211 Chapter 7 ( Lab 4)
 
D I T211 Chapter 6
D I T211    Chapter 6D I T211    Chapter 6
D I T211 Chapter 6
 
D I T211 Chapter 4 ( Lab 2)
D I T211    Chapter 4 ( Lab 2)D I T211    Chapter 4 ( Lab 2)
D I T211 Chapter 4 ( Lab 2)
 
D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Ipaddress presentationdemoclass

  • 1. The Hierarchical IP Addressing Scheme IP address consists of 32 bits of information. You can depict an IP address using one of three methods: Dotted-decimal, as in 172.16.30.56 Binary, as in 10101100.00010000.00011110.00111000 Hexadecimal, as in AC.10.1E.38 11/11/14 OIT,RMUTT. 1
  • 2. Octets • The 32-bit IP address is broken up into 4 octets, which are arranged into a dotted-decimal notation scheme. • An octet is a set of 8 bits • Example of an IP version 4: 172.64.126.52
  • 3. IP Address as a 32-Bit Binary Number
  • 4. Binary and Decimal Conversion
  • 7. IP Addresses as Decimal Numbers
  • 8. Hosts for Classes of IP Addresses Class A (24 bits for hosts) 224 - 2* = 16,777,214 maximum hosts Class B (16 bits for hosts) 216 - 2* = 65,534 maximum hosts Class C (8 bits for hosts) 28 - 2* = 254 maximum hosts * Subtracting the network and broadcast reserved address
  • 9. IP Addresses as Decimal Numbers
  • 10. Network IDs and Broadcast Addresses An IP address such as 176.10.0.0 that has all binary 0s in the host bit positions is reserved for the network address. An IP address such as 176.10.255.255 that has all binary 1s in the host bit positions is reserved for the broadcast address.
  • 12. Reserved Address Space • Network ID • Broadcast address • Hosts for classes of IP addresses
  • 13. Basics of Subnetting • Classical IP addressing • Subnetworks • Subnet mask • Boolean operations: AND, OR, and NOT • Performing the AND function
  • 14. Subnetworks To create a subnet address, a network administrator borrows bits from the original host portion and designates them as the subnet field.
  • 16. Subnet Mask • Determines which part of an IP address is the network field and which part is the host field • Follow these steps to determine the subnet mask: – 1. Express the subnetwork IP address in binary form. – 2. Replace the network and subnet portion of the address with all 1s. – 3. Replace the host portion of the address with all 0s. – 4. Convert the binary expression back to dotted-decimal notation.
  • 17. Subnet Mask Subnet mask in decimal = 255.255.240.0
  • 18. Boolean Operations: AND, OR, and NOT • AND is like multiplication. • OR is like addition. • NOT changes 1 to 0, and 0 to 1.
  • 19. Range of Bits Needed to Create Subnets
  • 21. Decimal Equivalents of 8-Bit Patterns
  • 22. Creating a Subnet • Determining subnet mask size • Computing subnet mask and IP address • Computing hosts per subnetwork • Boolean AND operation • IP configuration on a network diagram • Host and subnet schemes • Private addresses
  • 23. Determining Subnet Mask Size Class B address with 8 bits borrowed for the subnet 130.5.2.144 (8 bits borrowed for subnetting) routes to subnet 130.5.2.0 rather than just to network 130.5.0.0.
  • 24. Determining Subnet Mask Size Class C address 197.15.22.131 with a subnet mask of 255.255.255.224 (3 bits borrowed) 11000101 00001111 00010110 100 00011 Network Field SN Host Field The address 197.15.22.131 would be on the subnet 197.15.22.128.
  • 25. Subnetting Example with AND Operation
  • 26. Host Subnet Schemes The number of lost IP addresses with a Class C network depends on the number of bits borrowed for subnetting.
  • 27. Working with Addresses (The Easy Way) • The key is to work in octets, rather than trying to work with the entire IP address at once!
  • 28. Subnetting Exercise • What would be the case if the Network Administrator were given the following network address 192.12.8.0, and the number of departments were 7. • 1. What class is the network address? • 2. How many subnets are needed? • 3. How many bits are borrowed from the host part of the address? • 4. How many subnets are defined and how many of these are useable? • 5. What is the default subnet mask? • 6. What is the new customised subnet mask? • 7. What is the decimal value of each subnet? • 8. What is the total number of hosts?
  • 29. Subnetting • 1. What class is the network address? – Class C as it is above 191 • 2. How many subnets are needed? – 7 subnets -why not use just 3 bits • 3. How many bits are borrowed from the host part of the address? – 4 bits are needed • 4. How many subnets are defined and how many of these are useable? – 2 x 2 x 2 x 2 = 16 are defined - 16 - 2 = 14 are useable • 5. What is the default subnet mask? – 255.255.255.0 class C • 6. What is the new customised subnet mask? – 255.255.255.240
  • 30. Subnetting a Class C Network • First you must determine the reason you are subnetting a network. • There are many reasons. We will choose one. • If we put all 254 hosts on this one major network, and the bandwidth is 100 Mbps, each host will have approximately 393,700 bps of bandwidth (~394 kbps)
  • 31. Subnetting a Class C Network • Suppose that we wish to give 4 Mbps of bandwidth to each user, • Then we will subnet the network and put a maximum of 25 users on each subnet.
  • 32. Subnetting a Class C Network • Aim: maximum of 25 users or hosts • Add 2 the the total number of users. • Write this chart. 128 64 32 16 8 4 2 1 It is the same chart we used earlier for number conversions.
  • 33. Subnetting a Class C Network • Locate between which two numbers where 27 is located. 128 64 32 16 8 4 2 1 ^ 27 is located between 16 and 32. Note: After adding 2 to the number of workstations and the result is 4, 16, 32, 64, etc, draw the line to the right of that number.
  • 34. Subnetting a Class C Network • Draw a line between 16 and 32 as shown. 128 64 32 | 16 8 4 2 1 | The three bits left of the vertical line will be used for the subnetwork number. The five bits to the right of the line will be used for the host address.
  • 35. Subnetting a Class C Network • Place 1s below the three bots to the left of the line • Place 0s below the five bits to the right of the line 128 64 32 | 16 8 4 2 1 1 1 1 | 0 0 0 0 0 Remember, this is the fourth octet.
  • 36. Determining the Subnet Mask • The default mask for a class C address is 255.255.255.0 • The 255.255.255 identifies the part of the subnet mask used for identifying the network portion of the IP address • The .0 identifies the host portion of the IP address.
  • 37. Determining the Subnet Mask • Start by writing the first three octets for the subnet mask: 255.255.255. • Now calculate the subnet mask number for the fourth octet 128 64 32 | 16 8 4 2 1 1 1 1 | 0 0 0 0 0 128 + 64 + 32 = ?
  • 38. Determining the Subnet Mask • Start by writing the first three octets for the subnet mask: 255.255.255. • Now calculate the subnet mask number for the fourth octet 128 64 32 | 16 8 4 2 1 1 1 1 | 0 0 0 0 0 128 + 64 + 32 = 224 Therefore the subnet mask is 255.255.255.224
  • 39. Addresses • The last steps. • Calculate each subnet address • Calculate the 1st host address • Calculate the last host address • Calculate the broadcast address for each subnetwork
  • 40. Addresses • The first subnetwork address is always 0. 192.1.2.0 • For this example, the subnetwork address will increment by 32. 32 is the smallest part of the subnetwork address. 128 64 32 | 16 8 4 2 1 1 1 1 | 0 0 0 0 0
  • 41. Subnet Addresses 128 64 32 | 16 8 4 2 1 1 1 1 | 0 0 0 0 0 Subnet Addresses 0- 192.1.2.0 4- 192.1.2.128 1- 192.1.2.32 5- 192.1.2.160 2- 192.1.2.64 6- 192.1.2.192 3- 192.1.2.96 7- 192.1.2.224
  • 42. 1st Host Addresses • The first host address is always the subnet address plus 1. • For example: 192.1.2.0 + 1 = 192.1.2.1 • Therefore the first host address is 192.1.2.1
  • 43. 1st Host Addresses 128 64 32 | 16 8 4 2 1 x x x | 0 0 0 0 1 1st host Addresses 0- 192.1.2.1 4- 192.1.2.129 1- 192.1.2.33 5- 192.1.2.161 2- 192.1.2.65 6- 192.1.2.193 3- 192.1.2.97 7- 192.1.2.225
  • 44. 1st Host Addresses 128 64 32 | 16 8 4 2 1 x x x | 0 0 0 0 1 1st host Addresses 0- 192.1.2.1 4- 192.1.2.129 1- 192.1.2.33 5- 192.1.2.161 2- 192.1.2.65 6- 192.1.2.193 3- 192.1.2.97 7- 192.1.2.225
  • 45. Broadcast Addresses • The broadcast address is always 1 less than the next subnetwork address. • For example, the broadcast address for subnet 0 can be calculated by subtracting 1 from the next subnetwork address. • 192.1.2.32 – 1 = ? • Therefore the broadcast address for subnet 0 is 192.1.2.32 – 1 = 192.1.2.31
  • 46. Broadcast Addresses 128 64 32 | 16 8 4 2 1 x x x | 1 1 1 1 1 1st host Addresses 0- 192.1.2.31 4- 192.1.2.159 1- 192.1.2.63 5- 192.1.2.191 2- 192.1.2.95 6- 192.1.2.223 3- 192.1.2.127 7- 192.1.2.255
  • 47. Last Host Addresses • The last set of addresses to calculate are the the last available host addresses. • Using the broadcast address for each subnetwork, subtract 1 to obtain the last host address. • For example: broadcast address for subnet 0 is 192.1.2.31 • The last host address is 192.1.2.30
  • 48. Last Host Addresses 128 64 32 | 16 8 4 2 1 x x x | 1 1 1 1 0 1st host Addresses 0- 192.1.2.30 4- 192.1.2.158 1- 192.1.2.62 5- 192.1.2.190 2- 192.1.2.94 6- 192.1.2.222 3- 192.1.2.126 7- 192.1.2.254
  • 49. IPv4 versus IPv6 • IP version 6 (IPv6) has been defined and developed. • IPv6 uses 128 bits rather than the 32 bits currently used in IPv4. • IPv6 uses hexadecimal numbers to represent the 128 bits. IPv4