SlideShare a Scribd company logo
IP Addressing 
 Using the IP address of the destination network, a router can deliver 
a packet to the correct network. 
 When the packet arrives at a router connected to the destination 
network, the router uses the IP address to locate the particular 
computer connected to that network. 
 It has two versions:- 
1. IPv4- 32 bit decimal address 
2. IPv6- 128 bit hexadecimal address
IPv4 Address 
 IPv4 is 32 bit decimal address divided into 4 groups. 
 Each group contains 8 bit. 
 Each group is also called an Octet 
 Contains addresses between 0.0.0.0 to 255.255.255.255 
 We don’t use these two address for communication 
 Since 0.0.0.0 is an invalid IP and 255.255.255.255 is a Global 
Broadcast address
Classification of IP’s 
 IANA (Internet Assigned Numbering Authority) classified IP addresses 
into 5 classes, they are:- 
X.X.X.X 
Cass A (1-126) 
Class B (128-191) 
Class C(192-223) 
Class D(224-239) 
Class E (240-255) 
 Class A, B, C are used for communication 
 Class D are Multicast addresses 
 Class E are used for IP Research
Network Portion & Host Portion 
 In Class 1st octet is in Network portion and rest of them are in Host 
portion
 In Class B 1st two octet are in Network and last two are in Host 
portion
 In Class C 1st three Octets are in Network and last octet is in Host 
portion 
 Two Host in a Network wont communicate when the Network 
portion of the IP address is not same.
Public IP & Private IP 
 Public IP are purchasable 
 Used for WAN 
 Private IP are non purchasable 
 Used for LAN 
 Private Range:- 
Class A- 10.0.0.0 to 10.255.255.255 
Class B- 172.16.0.0 to 172.31.255.255 
Class C- 192.168.0.0 to 192.168.255.255 
 Others are in Public range
Subnet Mask 
 To identify Network Portion and Host Portion we give an additional 
information. 
 This information is called Subnet Mask. 
 Predefined Subnet Mask for each class are:- 
Class A- 255.0.0.0 
Class B- 255.255.0.0 
Class C- 255.255.255.0 
 When all the Network bits are 1 and Host bits are 0, we will get the 
Subnet Mask.
Special IP’s 
 127.0.0.1 is a Loopback address or Self Ping (Packet Internet 
Gropher) address to check the Net connectivity. 
To check, Start- Run- CMD- ping “IP address of other devices” 
To check NIC working, Start- Run- CMD- ping 127.0.0.1 
 164.254.0.0 is a APIPA (Automatic Private IP Address)
DHCP (Dynamic Host Configuration 
Protocol) 
172.16.0.1- Start 
172.16.0.100- End DHCP 
Server 
Client 1 Client 2
 Client machine broadcast to an address 255.255.255.255 to find the 
DHCP server. 
 Then DHCP recognizes it. 
 Client replies a request message for an IP address. 
 DHCP sends an offer message for selection. 
 Client selects an IP address 
 At last DHCP sends acknowledgement message. 
 This Process is called ‘ROSA’ 
 If there is no DHCP server for a network, Client self assigns an IP 
address which is APIPA (169.254.0.0 range)
Default Gateway 
 IT is an IP address given to exit from one network to another. 
 The interface from Private Network to Public Network is a Default 
gateway. 
 NAT (Network Address Translation) service is provided inside the 
modem which translates Private address to Public address for 
communication. 
 ICS (Internet Connection Sharing) range will be 192.168.0.0 to 
192.168.255.255 (Class C) 
 This will be the default gateway for all other devices.
DNS (Domain Name Server) 
 DNS is one which resolves IP from name or name from IP 
 This Server contains name of the websites and its corresponding IPs 
 Also called Preferred DNS server 
 Alternate DNS Server- If preferred DNS is down then the nest 
contacted DNS server is called Alternate DNS Server 
 Open DNS Server- It is a Third Party DNS Server 
208.67.222.222 (Preferred DNS) 
208.67.220.220 (Alternate DNS)
Sub netting 
 Making subnets from a Parent Network is called Sub netting 
 It is used to implement security in a network rather than 
implementing more networks in a company, office, etc. 
 For that we create Sub networks under one parent network. 
 Avoids IP wastage. 
 Implements network security. 
 Avoids network traffic. 
 Simplified administration through network
Formulas 
 m= No: of bits taken for Sub netting 
 n= Remaining bits in the Host Portion 
 2푚 -2= No: of Networks 
 2푛 -2= No: of Hosts per Subnet 
 2푛= Block size 
 Mask Portion= 256- Block Size 
 New Subnet Mask= Default Mask + Mask Portion in the Sub netted Octet 
 First Network= Parent Network + Block size in the Sub netted Octet 
 1st Host of 1st Network= 1st Network + 1 in the last Octet 
 1st Network Broadcast= 2nd Network -1 in the last Ocet 
 Last Host of 1st Network= Broadcast - 1 in the last Octet 
 Next Network= 1st Network + Block size in the Sub netted Octet 
 Last Network= Mask portion – Block size in the Sub netted Octet 
 Broadcast of Last Network= Mask portion -1 in the Sub netted Octet
CIDR (Classless Inter-domain Routing) 
 Basically the method that ISPs (Internet Service Providers) use to 
allocate an amount of addresses to a company, a home 
 Ex: 192.168.10.32/28 
 The slash notation (/) means how many bits are turned on (1s)
VLSM (Variable Length Subnet Mask) 
 VLSM is a method of designating a different subnet mask for the 
same network number on different subnets 
 Can use a long mask on networks with few hosts and a shorter mask 
on subnets with many hosts 
 With VLSMs we can have different subnet masks for different 
subnets.
Parent Network 192.168.1.0 
2 
2 
2 
40 
25 
12
Parent Network 192.168.1.0 
2 
2 
8 
5 
15 
2 
2 
35

More Related Content

What's hot

CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheetaromal4frnz
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
ernestlithur
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA pptCCNA ppt Day 6
CCNA pptCCNA ppt Day 6CCNA pptCCNA ppt Day 6
CCNA pptCCNA ppt Day 6
VISHNU N
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheetvannastart
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
Sarmad Ali
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switch
ADDY50
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Lan Network with Redundancy.ppt
Lan Network with Redundancy.pptLan Network with Redundancy.ppt
Lan Network with Redundancy.ppt
Santanu Mukhopadhyay
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
Nitin Bhasin
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
Mansour Naslcheraghi
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
Atakan ATAK
 
How to make a simple application on packet tracer
How to make a simple application on packet tracerHow to make a simple application on packet tracer
How to make a simple application on packet tracer
Federal Urdu University of Arts,Science and technology
 

What's hot (20)

CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA pptCCNA ppt Day 6
CCNA pptCCNA ppt Day 6CCNA pptCCNA ppt Day 6
CCNA pptCCNA ppt Day 6
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheet
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switch
 
Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Lan Network with Redundancy.ppt
Lan Network with Redundancy.pptLan Network with Redundancy.ppt
Lan Network with Redundancy.ppt
 
Chapter4ccna
Chapter4ccnaChapter4ccna
Chapter4ccna
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
How to make a simple application on packet tracer
How to make a simple application on packet tracerHow to make a simple application on packet tracer
How to make a simple application on packet tracer
 

Viewers also liked

CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
VISHNU N
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
CCNA ppt Day 5
CCNA ppt Day 5CCNA ppt Day 5
CCNA ppt Day 5
VISHNU N
 
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric VanderburgCCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg
Eric Vanderburg
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9
VISHNU N
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
VISHNU N
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2
AIRTEL
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
VISHNU N
 
DNS server configuration
DNS server configurationDNS server configuration
DNS server configuration
Sanguine_Eva
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robotBen Johnke
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
Chinmay Joshi
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepInstall Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Mehdi Poustchi Amin
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
Akshay Tiwari
 
Wireless Pick and Place Surveillance Robot
Wireless Pick and Place Surveillance RobotWireless Pick and Place Surveillance Robot
Wireless Pick and Place Surveillance Robot
Zeenat Saba Khan
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-Step
Mehdi Poustchi Amin
 
WIRELESS ROBOT PPT
WIRELESS ROBOT PPTWIRELESS ROBOT PPT
WIRELESS ROBOT PPT
AIRTEL
 

Viewers also liked (19)

CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
CCNA ppt Day 5
CCNA ppt Day 5CCNA ppt Day 5
CCNA ppt Day 5
 
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric VanderburgCCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2
 
DSN
DSNDSN
DSN
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
 
DNS server configuration
DNS server configurationDNS server configuration
DNS server configuration
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robot
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepInstall Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
Wireless Pick and Place Surveillance Robot
Wireless Pick and Place Surveillance RobotWireless Pick and Place Surveillance Robot
Wireless Pick and Place Surveillance Robot
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-Step
 
WIRELESS ROBOT PPT
WIRELESS ROBOT PPTWIRELESS ROBOT PPT
WIRELESS ROBOT PPT
 

Similar to CCNA ppt Day 3

IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
Shashank Asthana
 
Ip addressing upload
Ip addressing uploadIp addressing upload
Ip addressing upload
Debasis Dwibedy
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
tmavroidis
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
SintayehuBeyene2
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
junnubabu
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
Hameda Hurmat
 
IP classes
IP classesIP classes
IP classes
Meenakshi Paul
 
IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
nandiaditi2010
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
vishweshbhat4
 
Ip address and subnet masking final
Ip address and subnet masking finalIp address and subnet masking final
Ip address and subnet masking final
NeerajBhardwaj57
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
Mustafa Salam
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
Pijush Kanti Das
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
Eng. Emad Al-Atoum
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
sanchitachandrakar94
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
ShehryarFreelancer
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
Vikas Jagtap
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptx
SelfUse
 
How IP address works
How IP address worksHow IP address works
How IP address works
Sanjeev Kumar Jaiswal
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
gamerchan1
 

Similar to CCNA ppt Day 3 (20)

IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Ip addressing upload
Ip addressing uploadIp addressing upload
Ip addressing upload
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
IP classes
IP classesIP classes
IP classes
 
IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
Ip address and subnet masking final
Ip address and subnet masking finalIp address and subnet masking final
Ip address and subnet masking final
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptx
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

CCNA ppt Day 3

  • 1. IP Addressing  Using the IP address of the destination network, a router can deliver a packet to the correct network.  When the packet arrives at a router connected to the destination network, the router uses the IP address to locate the particular computer connected to that network.  It has two versions:- 1. IPv4- 32 bit decimal address 2. IPv6- 128 bit hexadecimal address
  • 2. IPv4 Address  IPv4 is 32 bit decimal address divided into 4 groups.  Each group contains 8 bit.  Each group is also called an Octet  Contains addresses between 0.0.0.0 to 255.255.255.255  We don’t use these two address for communication  Since 0.0.0.0 is an invalid IP and 255.255.255.255 is a Global Broadcast address
  • 3. Classification of IP’s  IANA (Internet Assigned Numbering Authority) classified IP addresses into 5 classes, they are:- X.X.X.X Cass A (1-126) Class B (128-191) Class C(192-223) Class D(224-239) Class E (240-255)  Class A, B, C are used for communication  Class D are Multicast addresses  Class E are used for IP Research
  • 4. Network Portion & Host Portion  In Class 1st octet is in Network portion and rest of them are in Host portion
  • 5.  In Class B 1st two octet are in Network and last two are in Host portion
  • 6.  In Class C 1st three Octets are in Network and last octet is in Host portion  Two Host in a Network wont communicate when the Network portion of the IP address is not same.
  • 7. Public IP & Private IP  Public IP are purchasable  Used for WAN  Private IP are non purchasable  Used for LAN  Private Range:- Class A- 10.0.0.0 to 10.255.255.255 Class B- 172.16.0.0 to 172.31.255.255 Class C- 192.168.0.0 to 192.168.255.255  Others are in Public range
  • 8. Subnet Mask  To identify Network Portion and Host Portion we give an additional information.  This information is called Subnet Mask.  Predefined Subnet Mask for each class are:- Class A- 255.0.0.0 Class B- 255.255.0.0 Class C- 255.255.255.0  When all the Network bits are 1 and Host bits are 0, we will get the Subnet Mask.
  • 9. Special IP’s  127.0.0.1 is a Loopback address or Self Ping (Packet Internet Gropher) address to check the Net connectivity. To check, Start- Run- CMD- ping “IP address of other devices” To check NIC working, Start- Run- CMD- ping 127.0.0.1  164.254.0.0 is a APIPA (Automatic Private IP Address)
  • 10. DHCP (Dynamic Host Configuration Protocol) 172.16.0.1- Start 172.16.0.100- End DHCP Server Client 1 Client 2
  • 11.  Client machine broadcast to an address 255.255.255.255 to find the DHCP server.  Then DHCP recognizes it.  Client replies a request message for an IP address.  DHCP sends an offer message for selection.  Client selects an IP address  At last DHCP sends acknowledgement message.  This Process is called ‘ROSA’  If there is no DHCP server for a network, Client self assigns an IP address which is APIPA (169.254.0.0 range)
  • 12. Default Gateway  IT is an IP address given to exit from one network to another.  The interface from Private Network to Public Network is a Default gateway.  NAT (Network Address Translation) service is provided inside the modem which translates Private address to Public address for communication.  ICS (Internet Connection Sharing) range will be 192.168.0.0 to 192.168.255.255 (Class C)  This will be the default gateway for all other devices.
  • 13. DNS (Domain Name Server)  DNS is one which resolves IP from name or name from IP  This Server contains name of the websites and its corresponding IPs  Also called Preferred DNS server  Alternate DNS Server- If preferred DNS is down then the nest contacted DNS server is called Alternate DNS Server  Open DNS Server- It is a Third Party DNS Server 208.67.222.222 (Preferred DNS) 208.67.220.220 (Alternate DNS)
  • 14. Sub netting  Making subnets from a Parent Network is called Sub netting  It is used to implement security in a network rather than implementing more networks in a company, office, etc.  For that we create Sub networks under one parent network.  Avoids IP wastage.  Implements network security.  Avoids network traffic.  Simplified administration through network
  • 15. Formulas  m= No: of bits taken for Sub netting  n= Remaining bits in the Host Portion  2푚 -2= No: of Networks  2푛 -2= No: of Hosts per Subnet  2푛= Block size  Mask Portion= 256- Block Size  New Subnet Mask= Default Mask + Mask Portion in the Sub netted Octet  First Network= Parent Network + Block size in the Sub netted Octet  1st Host of 1st Network= 1st Network + 1 in the last Octet  1st Network Broadcast= 2nd Network -1 in the last Ocet  Last Host of 1st Network= Broadcast - 1 in the last Octet  Next Network= 1st Network + Block size in the Sub netted Octet  Last Network= Mask portion – Block size in the Sub netted Octet  Broadcast of Last Network= Mask portion -1 in the Sub netted Octet
  • 16. CIDR (Classless Inter-domain Routing)  Basically the method that ISPs (Internet Service Providers) use to allocate an amount of addresses to a company, a home  Ex: 192.168.10.32/28  The slash notation (/) means how many bits are turned on (1s)
  • 17. VLSM (Variable Length Subnet Mask)  VLSM is a method of designating a different subnet mask for the same network number on different subnets  Can use a long mask on networks with few hosts and a shorter mask on subnets with many hosts  With VLSMs we can have different subnet masks for different subnets.
  • 18. Parent Network 192.168.1.0 2 2 2 40 25 12
  • 19. Parent Network 192.168.1.0 2 2 8 5 15 2 2 35