Heart Disease Prediction using machine learning.pptx
Bots.pdf
1. 1
A Report
On
Ip Addressing & Subnetting for a given scenario
Prepared By:
Group-05 (Bots)
Nomanur Rahman (19103034)
Fahiman Muntasirm (18303047)
Md. Ruhul Amin (18303061)
Course: Data Communication and Computer Networks Lab
Course Number: CSC-466
Department: CSE
Submitted to:
Dr. Md. Hasibur Rashid chayon
Co-ordinator, Dept. of Computer Science & Engineering
International University of Business Agriculture and Technology
2. 2
ABSTRACT
As computer-networks grow steadily Network management becomes more and more important. IP
Subnetting is a critical skill for any network administrator or security admin that supports a network
environment. Subnetting allows us to break a large network into smaller networks. If an organization is
large or if its computers are geographically dispersed, it makes good sense to divide networks into
smaller ones connected together by routers. Subnetting is important for several reasons such as,
Reduced Network Traffic, optimized network performance, Simplified management, security, facilitates
spanning of large Geographical distance, etc. In short IP Subnetting is an important skill to acquire
because it offers many benefits in any network environment.
3. 3
Table of contents
Chapter 1: INTRODUCTION
Background of project scenario....................................................................................... page 6
Methodology implemented for solving the
problem.............................................................................................................................page 7
Chapter 2: PROJECT DEVELOPMENT
IP Address Calculation….................................................................................................. page 8-12
Project Description ......................................................................................................... page 13-16
Chapter 3: EXPERIMENTS AND RESULTS
Results......................................................................................................................... page 17-19
Chapter 4: CONCLUSION
4.1 Conclusion....................................................................................................................page 20
5. 5
List of Tables
Table 1…............................................................................................................ page 10-12
6. 6
Chapter 1
INTRODUCTION
Background of Project Scenario:
The given scenario includes a combination of total 14 networks. The scenario includes 5 routers
and 1 wireless router for specifying the route for the movement of data. The scenario also
contains 1 access point switch. Switches enable connected devices to share information and talk
to each other. The devices that are connected in the distributed networks are PCs and servers.
There is total 8 PCs and 1 server. The IP address that is to be distributed among the networks is
192.168.100.0/24.
Figure 1: Project Scenario
7. 7
Methodology implemented for solving the problem:
The problem given is distribution of the given IP address to different networks of the given
scenario. The methodology that is used for solving the problem is Subnetting.
Subnetting:
The process of dividing a large network into smaller networks is called subnetting. It allows
creating multiple logical networks that exist within a single class. Subnetting splits the host field
into subnet and host fields. The smaller networks that are generated through subnetting are
called sub networks or subnet.
To create subnets bits from host portion of the IP address is taken and reserve them to define
the subnet address. In other words, in order to subnet a network, extend the natural mask using
some of the bits from the host ID portion of the address to create a sub network ID.
Subnet Mask:
The subnet mask determines how the IP address is split.
A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits
to all 1s. In this way, the subnet mask separates the IP address into the network and host
addresses.
The “255” address is always assigned to a broadcast address, and the “0” address is always
assigned to a network address. Neither can be assigned to hosts, as they are reserved for these
special purposes.
A 32-bit IP address uniquely identifies a single device on an IP network. The 32 binary bits are
divided into the host and network sections by the subnet mask but they are also broken into four
8-bit octets.
8. 8
Chapter 2
Project Development
IP address calculation:
We are going to perform subnetting for distributing the IP address. Given IP
Address is 192.168.100.0/24
By performing the following steps, we calculated the IP address,
➢ Step 1: Convert to binary
After converting the given IP address into its equivalent binary form, we get
the following,
IP Address in Decimal: 192 168 100 0
IP Address in Binary: 11000000 10101000 01100100 00000000
➢ Step 2: Determining Number bits that needs to be borrowed:
In the given IP address, we can see that 24 bits are already reserved. So, there remain only 8
bits (last octet) from which bits can be borrowed for doing subnetting.
In the given scenario there are total 14 networks. So, we need to borrow 4 bits for distributing
the IP address among 14 different networks (as 2^4=16 but we only need to use 14 network
address).
After borrowing 4 bits for network portion the IP Address becomes,
192.168.100.0/28
(Since 4 more bits got reserved for network portion)
9. 9
➢ Step 3: Calculating Subnet Mask:
As from step 2 we know that we have borrowed 4 bits from the last octet of the given IP address
so total 28 bits now gets reserved for network portion of the IP address. For calculating subnet
mask, after converting the IP address into binary we take all the binary digits of the network
portion as “1” and host portion as “0”.
By doing so we the subnet mask. The subnet mask of the given IP address is calculated in the
following way
IP Address in Decimal: 192 168 100 0
IP Address in Binary: 11000000 10101000 01100100 00000000
Subnet Mask in Binary: 11111111 11111111 11111111 1111000
Subnet mask in Decimal: 255 255 255 240
So, the subnet mask for the given IP address is 255.255.255.240
➢ Step 4: Finding total host number:
Since we have 4 bits for host portion, the number of hosts for each network will be,
2^4-2= 14 hosts in each network
We deduct 2 from the total number because the 1st and the last address is reserved for network
and broadcast address respectively.
➢ Step 5: Calculating Sub network address:
IP Address in Decimal: 192 168 100 0
IP Address in Binary: 11000000 10101000 01100100 00000000
From the last octet of the address, we have borrowed the 1st 4 bits for network portion and rest
of the 4 bits are for host portion. We can calculate the 1st network in the following way,
10. 10
IP Address of 1st network in Binary: 11000000 10101000 01100100 00000000
IP Address of 1st network in Decimal: 192 168 100 0
IP Address of 1st Host in Binary: 11000000 10101000 01100100 00000001
IP Address of 1st Host in Decimal: 192 168 100 1
IP Address of 1st Host in Binary: 11000000 10101000 01100100 00001110
IP Address of 1st Last in Decimal: 192 168 100 14
Broadcast address in Binary: 11000000 10101000 01100100 00001111
Broadcast in Decimal: 192 168 100 15
Similarly, we can calculate all the addresses for all the 10 networks. All addresses of the 10
networks are given in the table below,
SL
NO
Network 1st
host Last host
1 Binary 11000000.10101000.0110
0100. 00000000
11000000.10101000.01100
100. 00000001
11000000.10101000.0110
0100. 00001110
Decimal 192.168.100.0/28 192.168.100.1/28 192.168.100.14/28
2 Binary 11000000.10101000.0110
0100. 00010000
11000000.10101000.01100
100. 00010001
11000000.10101000.0110
0100. 00011110
Decimal 192.168.100.16/28 192.168.100.17/28 192.168.100.30/28
3 Binary 11000000.10101000.0110
0100. 00100000
11000000.10101000.01100
100. 00100001
11000000.10101000.0110
0100. 00101110
Decimal 192.168.100.32/28 192.168.100.33/28 192.168.100.46/28
13. 13
Project Description:
➢ IP address Distribution:
The following network addresses are distributed among the 14 networks as given in the project
scenario.
1. 192.168.100.0/28
2. 192.168.100.16/28
3. 192.168.100.32/28
4. 192.168.100.48/28
5. 192.168.100.64/28
6. 192.168.100.80/28
7. 192.168.100.16/28
8. 192.168.100.112/28
9. 192.168.100.128/28
10. 192.168.100.144/28
11. 192.168.100.160/28
12. 192.168.100.176/28
13. 192.168.100.192/28
14. 192.168.100.208/28
➢ RIP Routing:
For Routing, RIP routing has been used.
Figure 2: RIP Routing
14. 14
➢ Web Server configuration:
The web server configuration is done by creating a new html file and editing the index.html file
of the HTTP portion in the services of the server. Then by using the IP address of the server if a
search is made is the web browser all the files will appear.
Figure 3: Web Server Configuration
➢ File Server Configuration:
The FTP server is configured by creating a user name and password in the FTP portion of the
services of the servers. Then the IP address is given as the command in the command prompt
and thus by logging into the server by using the given username and password we can transfer
files. File transfer includes uploading a file into the server from any device in any network. And
also includes downloading the files from the server.
15. 15
Figure 4: FTP server Configuration
➢ Email Server Configuration:
Email server configuration is done by creating a domain name in the Email portion of the services
of the server. We also created user names and passwords for different users. In the emails of any
device by using the user’s name and password along with the IP address of the Email server the
device is configured. After that it was possible to send and receive emails from one configured
device to another configured device by using the user’s name along with the domain name.
Figure 5: Email Server Configuration
16. 16
➢ Wireless Router Configuration:
Figure 6: Wireless router Configuration
For access wireless router we have to configure pc wireless network.
17. 17
Chapter 3
Experiments and Results
Results:
➢ Packet Sending:
After the Subnetting was done and RIP routing is done packets of data was successfully
sent from all possible sources to destinations.
Figure 7: Successful Packet sending
18. 18
➢ Web server:
After configuring web server by doing search in wed browser using the IP address of the
web server, we can’t find the files configured in the HTTP server because server doesn’t
connect with network tree.
Figure 8: Successful HTTP server configuration
19. 19
➢ Email server:
After configuring email server, it wasn’t possible to send and receive emails among the
generated users by using the email ids along with the domain name.
➢ File server:
After configuring file server, it was possible to upload but wasn’t possible download files
from the server that is file transferring was possible.
20. Chapter 3
Conclusion
By using subletting the IP address is distributed among the given 14 networks
of the given scenario. After configuring RIP routing packets, it was possible to
send packets from all possible sources to destinations. The server was
configured and the servers was not working because it was not connected with
the network tree.