IP addresses are used to route packets to the correct network and device. There are two main versions: IPv4 uses 32-bit addresses divided into four groups, while IPv6 uses 128-bit hexadecimal addresses. IP addresses are classified and divided into network and host portions based on their class. Private IP ranges are used internally while public IPs are used for internet communication. Subnet masks identify the network and host portions of an IP.
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
This document shows the detailed Steps to set up a simple network inside Packet Tracer. You will get familiarity with the software after following the Steps.
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
This document shows the detailed Steps to set up a simple network inside Packet Tracer. You will get familiarity with the software after following the Steps.
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
My Cisco Training Courses @ MFT.Info
in this chapter I focused on Routing protocols in CCNA Technologies , consider that this info has been presented @ Workshop Teaching , So if you wanna know more about this scenarios feedback me to give you LAB Scenarios,
good luck.
This Presentation will give you about basic IPv4 and IPv6 addressing, Subnetting and NAT process. As much as possible the informations was tried to be summarized and a slideshow of visual weight was made. You can contact the e-mail address in the slide to get information about the yours issue or correct my any mistakes.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
My Cisco Training Courses @ MFT.Info
in this chapter I focused on Routing protocols in CCNA Technologies , consider that this info has been presented @ Workshop Teaching , So if you wanna know more about this scenarios feedback me to give you LAB Scenarios,
good luck.
This Presentation will give you about basic IPv4 and IPv6 addressing, Subnetting and NAT process. As much as possible the informations was tried to be summarized and a slideshow of visual weight was made. You can contact the e-mail address in the slide to get information about the yours issue or correct my any mistakes.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
This project is about controlling the wireless camera mounted robot through PC using RF module at the same thin to pick any light object & place it.
-Zeenat Saba Khan
The present condition in Industry is that they are using the crane system to carry the parcels from one place to another, including harbors. Some times the lifting of big weights may cause the breakage of lifting materials and will cause damage to the parcels too. Application of the proposed system is for industries. The robot movement depends on the track. Use of this robot is to transport the materials from one place to another place in the industry.
A robot is a machine designed to execute one or more tasks repeatedly, with speed and precision. There are as many different types of robots as there are tasks for them to perform. A robot can be controlled by a human operator, sometimes from a great distance. In such type of applications wireless communication is more important.
In robotic applications, generally we need a remote device to control. If we use IR remote device, it is just limited to meters distance and also if any obstacle is in between its path then there will be no communication. If we consider, RF modules for remote operations there is no objection whether an obstacle is present in its path. So that it is very helpful to control robot.
RF modules itself can generates its carrier frequency which is around 2.4 GHz. We need to generate serial data using micro controller and fed to the RF transmitting module. On other side RF receiver receives sent data as RF signals and given to another micro controller. Here, RF receiver itself demodulates the data from carrier signal and generate serial data as output.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
CISCO - CCNA 200-120
These notes will be the basis for more detailed revision.
These "CCNA 200-120" Revision Notes consist of concise summaries or outlines of topics covered, lists of essential information needed.
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
1. IP Addressing
Using the IP address of the destination network, a router can deliver
a packet to the correct network.
When the packet arrives at a router connected to the destination
network, the router uses the IP address to locate the particular
computer connected to that network.
It has two versions:-
1. IPv4- 32 bit decimal address
2. IPv6- 128 bit hexadecimal address
2. IPv4 Address
IPv4 is 32 bit decimal address divided into 4 groups.
Each group contains 8 bit.
Each group is also called an Octet
Contains addresses between 0.0.0.0 to 255.255.255.255
We don’t use these two address for communication
Since 0.0.0.0 is an invalid IP and 255.255.255.255 is a Global
Broadcast address
3. Classification of IP’s
IANA (Internet Assigned Numbering Authority) classified IP addresses
into 5 classes, they are:-
X.X.X.X
Cass A (1-126)
Class B (128-191)
Class C(192-223)
Class D(224-239)
Class E (240-255)
Class A, B, C are used for communication
Class D are Multicast addresses
Class E are used for IP Research
4. Network Portion & Host Portion
In Class 1st octet is in Network portion and rest of them are in Host
portion
5. In Class B 1st two octet are in Network and last two are in Host
portion
6. In Class C 1st three Octets are in Network and last octet is in Host
portion
Two Host in a Network wont communicate when the Network
portion of the IP address is not same.
7. Public IP & Private IP
Public IP are purchasable
Used for WAN
Private IP are non purchasable
Used for LAN
Private Range:-
Class A- 10.0.0.0 to 10.255.255.255
Class B- 172.16.0.0 to 172.31.255.255
Class C- 192.168.0.0 to 192.168.255.255
Others are in Public range
8. Subnet Mask
To identify Network Portion and Host Portion we give an additional
information.
This information is called Subnet Mask.
Predefined Subnet Mask for each class are:-
Class A- 255.0.0.0
Class B- 255.255.0.0
Class C- 255.255.255.0
When all the Network bits are 1 and Host bits are 0, we will get the
Subnet Mask.
9. Special IP’s
127.0.0.1 is a Loopback address or Self Ping (Packet Internet
Gropher) address to check the Net connectivity.
To check, Start- Run- CMD- ping “IP address of other devices”
To check NIC working, Start- Run- CMD- ping 127.0.0.1
164.254.0.0 is a APIPA (Automatic Private IP Address)
10. DHCP (Dynamic Host Configuration
Protocol)
172.16.0.1- Start
172.16.0.100- End DHCP
Server
Client 1 Client 2
11. Client machine broadcast to an address 255.255.255.255 to find the
DHCP server.
Then DHCP recognizes it.
Client replies a request message for an IP address.
DHCP sends an offer message for selection.
Client selects an IP address
At last DHCP sends acknowledgement message.
This Process is called ‘ROSA’
If there is no DHCP server for a network, Client self assigns an IP
address which is APIPA (169.254.0.0 range)
12. Default Gateway
IT is an IP address given to exit from one network to another.
The interface from Private Network to Public Network is a Default
gateway.
NAT (Network Address Translation) service is provided inside the
modem which translates Private address to Public address for
communication.
ICS (Internet Connection Sharing) range will be 192.168.0.0 to
192.168.255.255 (Class C)
This will be the default gateway for all other devices.
13. DNS (Domain Name Server)
DNS is one which resolves IP from name or name from IP
This Server contains name of the websites and its corresponding IPs
Also called Preferred DNS server
Alternate DNS Server- If preferred DNS is down then the nest
contacted DNS server is called Alternate DNS Server
Open DNS Server- It is a Third Party DNS Server
208.67.222.222 (Preferred DNS)
208.67.220.220 (Alternate DNS)
14. Sub netting
Making subnets from a Parent Network is called Sub netting
It is used to implement security in a network rather than
implementing more networks in a company, office, etc.
For that we create Sub networks under one parent network.
Avoids IP wastage.
Implements network security.
Avoids network traffic.
Simplified administration through network
15. Formulas
m= No: of bits taken for Sub netting
n= Remaining bits in the Host Portion
2푚 -2= No: of Networks
2푛 -2= No: of Hosts per Subnet
2푛= Block size
Mask Portion= 256- Block Size
New Subnet Mask= Default Mask + Mask Portion in the Sub netted Octet
First Network= Parent Network + Block size in the Sub netted Octet
1st Host of 1st Network= 1st Network + 1 in the last Octet
1st Network Broadcast= 2nd Network -1 in the last Ocet
Last Host of 1st Network= Broadcast - 1 in the last Octet
Next Network= 1st Network + Block size in the Sub netted Octet
Last Network= Mask portion – Block size in the Sub netted Octet
Broadcast of Last Network= Mask portion -1 in the Sub netted Octet
16. CIDR (Classless Inter-domain Routing)
Basically the method that ISPs (Internet Service Providers) use to
allocate an amount of addresses to a company, a home
Ex: 192.168.10.32/28
The slash notation (/) means how many bits are turned on (1s)
17. VLSM (Variable Length Subnet Mask)
VLSM is a method of designating a different subnet mask for the
same network number on different subnets
Can use a long mask on networks with few hosts and a shorter mask
on subnets with many hosts
With VLSMs we can have different subnet masks for different
subnets.