SlideShare a Scribd company logo
1 of 11
Download to read offline
PRESENTATION
CN
GROUP 11
M.AZHAR(ROLL NO 23)
IHSAN AHMAD SABIR(ROLL NO 13)
FAKHAR FAREED(ROLL NO 38)
ASAD IQBAL(ROLL NO 45)
Classless Adressing
Defination:
Classless addressing is an IPV4
addressing architecture that Uses
variable-length subnet masking.
Clasasless Adressing:
In classful addressing the size of network is fixed
Each address range has a default subnet mask.
Classless Adressing however,decouples IP address
ranges from a default subnet mask ,allowing for
Variable- length subnet masking(VLSM)
How does classless addressing work:
At high level,classless addressing work by allowing IP addresses to be
assigned arbitrary network masks without respect to “Class”.
That means /8(255.0.0.0),/16(255.255.0.0),and /24(255.255.255.0)
Network masks can be assigned to any address that would have tra-
ditionally been in the class A,B or C range.
Notation:
Notation of classless addressing system .
p.q.r.s/n
Where p.q.r.s represent the IP address,and
n represent the mask bits .
Rules for classless Addressing system block:
A classles addressing system is created using a set of three rules
that are as follows:
Rule 1:Every classless addressing system will have contiguous
IPaddress.All the IP address in one classless addressing system
block Will be represented using CIDR block notation.
Rule 2:
The size of block must always be representable in the power
of 2 .The size of block is the total number of Ipaddress in the
Block .Any classless addressing system or classless interdomain
Routing (CIDR) block size will always be in form of 21,22,23,24,
25,etc.
Rule 3:
The block’s first IP address must always be divisible
by the size of the block.
Advantages of the classless addressing:
Classless addressing helped solve three major problems and delivers
These advantages.
• More IP address allocations. Today, we know IPv6 is our long-term IP
address solution to theIP address exhaustion problem. However, IPv6 is not
yet widely used. In the early 1990s, it was clear we would rapidly exhaust the
IPv4 address space if nothing changed. As a result, classless addressing was
used as a medium-term solution to help us stretch the life of IPv4.
• More balanced use of IP address ranges.
Classless addressing decoupled the relationship between
network size and IP address and allowed for balanced use
across what used to be the Class A, B, and C ranges. Far
less wasted addresses.
• More efficient routing. VLSM and subnetting make route
aggregation and classless routing protocols possible.
With route aggregation (sometimes called route summarization
or supernetting), routing tables can be smaller, reducing resource
consumption on routers, and saving bandwidth

More Related Content

Similar to Group 10 CN.pptx

Similar to Group 10 CN.pptx (20)

ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptx
 
Vlsm
VlsmVlsm
Vlsm
 
1 e ip addressing
1 e ip addressing1 e ip addressing
1 e ip addressing
 
Ray ipv4 addresses
Ray   ipv4 addressesRay   ipv4 addresses
Ray ipv4 addresses
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Network layer Part 2
Network layer Part 2Network layer Part 2
Network layer Part 2
 
Subnet Design
Subnet DesignSubnet Design
Subnet Design
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Explaining ip address
Explaining ip addressExplaining ip address
Explaining ip address
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Computer-Network-PowerPoint-Slide (1).pptx
Computer-Network-PowerPoint-Slide (1).pptxComputer-Network-PowerPoint-Slide (1).pptx
Computer-Network-PowerPoint-Slide (1).pptx
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
IP classes
IP classesIP classes
IP classes
 
IEEE 802.16 Standard
IEEE 802.16 StandardIEEE 802.16 Standard
IEEE 802.16 Standard
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Group 10 CN.pptx

  • 1. PRESENTATION CN GROUP 11 M.AZHAR(ROLL NO 23) IHSAN AHMAD SABIR(ROLL NO 13) FAKHAR FAREED(ROLL NO 38) ASAD IQBAL(ROLL NO 45)
  • 2. Classless Adressing Defination: Classless addressing is an IPV4 addressing architecture that Uses variable-length subnet masking.
  • 3. Clasasless Adressing: In classful addressing the size of network is fixed Each address range has a default subnet mask. Classless Adressing however,decouples IP address ranges from a default subnet mask ,allowing for Variable- length subnet masking(VLSM)
  • 4. How does classless addressing work: At high level,classless addressing work by allowing IP addresses to be assigned arbitrary network masks without respect to “Class”. That means /8(255.0.0.0),/16(255.255.0.0),and /24(255.255.255.0) Network masks can be assigned to any address that would have tra- ditionally been in the class A,B or C range.
  • 5. Notation: Notation of classless addressing system . p.q.r.s/n Where p.q.r.s represent the IP address,and n represent the mask bits .
  • 6. Rules for classless Addressing system block: A classles addressing system is created using a set of three rules that are as follows: Rule 1:Every classless addressing system will have contiguous IPaddress.All the IP address in one classless addressing system block Will be represented using CIDR block notation.
  • 7. Rule 2: The size of block must always be representable in the power of 2 .The size of block is the total number of Ipaddress in the Block .Any classless addressing system or classless interdomain Routing (CIDR) block size will always be in form of 21,22,23,24, 25,etc.
  • 8. Rule 3: The block’s first IP address must always be divisible by the size of the block.
  • 9. Advantages of the classless addressing: Classless addressing helped solve three major problems and delivers These advantages. • More IP address allocations. Today, we know IPv6 is our long-term IP address solution to theIP address exhaustion problem. However, IPv6 is not yet widely used. In the early 1990s, it was clear we would rapidly exhaust the IPv4 address space if nothing changed. As a result, classless addressing was used as a medium-term solution to help us stretch the life of IPv4.
  • 10. • More balanced use of IP address ranges. Classless addressing decoupled the relationship between network size and IP address and allowed for balanced use across what used to be the Class A, B, and C ranges. Far less wasted addresses.
  • 11. • More efficient routing. VLSM and subnetting make route aggregation and classless routing protocols possible. With route aggregation (sometimes called route summarization or supernetting), routing tables can be smaller, reducing resource consumption on routers, and saving bandwidth