Dr. Amandeep Singh presents on dynamic routing using FLSM (Fixed Length Subnet Masking) and VLSM (Variable Length Subnet Masking). The document outlines the steps to perform subnetting using FLSM and VLSM, including determining the required number of subnets, calculating the subnet mask, and finding the subnet ranges. Configuration examples are provided for setting up RIP routing on three routers to route between the subnets.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
More Related Content
Similar to 6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
2. Poll 1
Subnet is end result of dividing a network
into two or more networks
• Yes
• No
3. FLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 30 IP’s and rest IP’s belong to network two
32-5=27 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11100000 =224 hence mask will be: 255.255.255.224
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.224
-----------------------
0.0.0.31
3
Range will be
192.10.10.0 to 192.10.10.31
4. FLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 30 IP’s and rest IP’s belong to network two
32-5=27 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11100000 =224 hence mask will be: 255.255.255.224
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.224
-----------------------
0.0.0.31
4
Range will be
192.10.10.32 to 192.10.10.63
6. FLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 30 IP’s and rest IP’s belong to network two
32-5=27 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11100000 =224 hence mask will be: 255.255.255.224
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.224
-----------------------
0.0.0.31
6
Range will be
192.10.10.64 to 192.10.10.95
7. FLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 30 IP’s and rest IP’s belong to network two
32-5=27 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11100000 =224 hence mask will be: 255.255.255.224
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.224
-----------------------
0.0.0.31
7
Range will be
192.10.10.96 to 192.10.10.127
8. FLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 30 IP’s and rest IP’s belong to network two
32-5=27 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11100000 =224 hence mask will be: 255.255.255.224
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.224
-----------------------
0.0.0.31
8
Range will be
192.10.10.128 to 192.10.10.159
9.
10. Router 1 setting for RIP
• Router>
• Router>enable
• Router#
• Router#configure terminal
• Enter configuration commands, one per line. End with CNTL/Z.
• Router(config)#router rip
• Router(config-router)#version 1
• Router(config-router)#network 192.10.10.0
• Router(config-router)#network 192.10.10.96
• Router(config-router)#
11. Router 2 setting for RIP
• Router>
• Router>enable
• Router#
• Router#configure terminal
• Enter configuration commands, one per line. End with CNTL/Z.
• Router(config)#router rip
• Router(config-router)#version 1
• Router(config-router)#network 192.10.10.96
• Router(config-router)#network 192.10.10.32
• Router(config-router)#network 192.10.10.128
• Router(config-router)#
12. Router 3 setting for RIP
• Router>
• Router>enable
• Router#
• Router#configure terminal
• Enter configuration commands, one per line. End with CNTL/Z.
• Router(config)#router rip
• Router(config-router)#version 1
• Router(config-router)#network 192.10.10.128
• Router(config-router)#network 192.10.10.64
• Router(config-router)#
13. • Change the all addresses starting from
192 to180 it will become class less
addressing (version 2) for e.g.
• Router>
• Router>enable
• Router#
• Router#configure terminal
• Enter configuration commands, one per line. End with CNTL/Z.
• Router(config)#router rip
• Router(config-router)#version 2
• Router(config-router)#network 180.10.10.0
• Router(config-router)#network 180.10.10.96
• Router(config-router)#
14.
15. Poll 3
What will be sub netmask for class C, 6 IP
network
A.248
B.250
C.252
D.254
16. VLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 8 IP’s and rest IP’s belong to network two
32-3=29 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11111000 =248 hence mask will be: 255.255.255.248
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.248
-----------------------
0.0.0.7
16
Range will be
192.10.10.96 to 192.10.10.103
17. VLSM subnetting (variable
length subnet mask)
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example in assumed case
network one need 64 IP’s and rest IP’s belong to network two
32-6=26 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11000000 =192 hence mask will be: 255.255.255.192
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.192
-----------------------
0.0.0.63
17
Range will be
192.10.10.0 to 192.10.10.63
18. VLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 30 IP’s and rest IP’s belong to network two
32-5=27 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11100000 =224 hence mask will be: 255.255.255.224
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.224
-----------------------
0.0.0.31
18
Range will be
192.10.10.64 to 192.10.10.95
19. Poll 4
What will be sub netmask for class C, two
host network
A.248
B.250
C.252
D.254
20. VLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 4 IP’s and rest IP’s belong to network two
32-2=30 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11111100 =252 hence mask will be: 255.255.255.252
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.252
-----------------------
0.0.0.3
20
Range will be
192.10.10.96 to 192.10.10.99
21. VLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 4 IP’s and rest IP’s belong to network two
32-2=30 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11111100 =252 hence mask will be: 255.255.255.252
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.252
-----------------------
0.0.0.3
21
Range will be
192.10.10.100 to 192.10.10.103
22. VLSM subnetting
• Step 1:decide total number of sub net required , lets say 2
• Step 2: calculate required network bits for example is assumed case
network one need 4 IP’s and rest IP’s belong to network two
32-2=30 bits
(2^n formula used and 32 is (8.8.8.8 total no of bits ))
• Step 3: calculate subnet mask by converting this binary number to
decimal for eg.
11111100 =252 hence mask will be: 255.255.255.252
• Step 4: Find range by subtracting calculated mask from maximum
possible number 255.255.255.255
255.255.255.255
255.255.255.252
-----------------------
0.0.0.3
22
Range will be
192.10.10.104 to 192.10.10.107
23.
24.
25.
26.
27.
28.
29.
30.
31. Router 1 setting for RIP
• Router>
• Router>enable
• Router#
• Router#configure terminal
• Enter configuration commands, one per line. End with CNTL/Z.
• Router(config)#router rip
• Router(config-router)#version 1
• Router(config-router)#network 192.10.10.0
• Router(config-router)#network 192.10.10.100
• Router(config-router)#
32. Router 2 setting for RIP
• Router>
• Router>enable
• Router#
• Router#configure terminal
• Enter configuration commands, one per line. End with CNTL/Z.
• Router(config)#router rip
• Router(config-router)#version 1
• Router(config-router)#network 192.10.10.64
• Router(config-router)#network 192.10.10.100
• Router(config-router)#network 192.10.10.104
• Router(config-router)#
33. Router 3 setting for RIP
• Router>
• Router>enable
• Router#
• Router#configure terminal
• Enter configuration commands, one per line. End with CNTL/Z.
• Router(config)#router rip
• Router(config-router)#version 1
• Router(config-router)#network 192.10.10.104
• Router(config-router)#network 192.10.10.96
• Router(config-router)#