- An organization was granted a block of IP addresses with the beginning address 14.24.74.0/24, containing 256 addresses total.
- The organization needs to create 11 subnets within this block to meet its networking needs.
- To create 11 subnets, the subnet prefix length would need to increase by 4 bits to /28, dividing the block into 16-address subnets (2^4 = 16 subnets).
Introduction to Wireless Local Area Networks (WLANs). Cover IEEE 802.11a, 802.11b, 802.11g, 802.11n, 802.11i, 802.11x, and deployment & security issues
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Asynchronous Transfer Mode ATM is the cell relay protocol designed by ATM Forum and adopted by the ITU-T. Cell, a small fixed size block of information with asynchronous TDM ensures high speed real time transmission with efficient and cheaper technology. Instead of user addresses, it uses virtual circuit identifier and virtual path identifier, which can be repeated at unrelated locations. This technology ensures connectivity to much more users than normal packet switching networks.
ATM and ISDN-B combination allows high-speed interconnection of world's network.
Introduction to Wireless Local Area Networks (WLANs). Cover IEEE 802.11a, 802.11b, 802.11g, 802.11n, 802.11i, 802.11x, and deployment & security issues
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Asynchronous Transfer Mode ATM is the cell relay protocol designed by ATM Forum and adopted by the ITU-T. Cell, a small fixed size block of information with asynchronous TDM ensures high speed real time transmission with efficient and cheaper technology. Instead of user addresses, it uses virtual circuit identifier and virtual path identifier, which can be repeated at unrelated locations. This technology ensures connectivity to much more users than normal packet switching networks.
ATM and ISDN-B combination allows high-speed interconnection of world's network.
IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 ("IPv4").
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 ("IPv4").
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
This presentation provides a high-level overview for the practice of IT Architecture in today's enterprise. It is the first in several IT Architecture presentations we will be providing.
Computer Security Lecture 4.1: DES Supplementary MaterialMohamed Loey
We will discuss the following: Data Encryption Standard, DES Algorithm, DES Key Creation
https://www.youtube.com/watch?v=1-lF4dePpts&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf
https://mloey.github.io/courses/security2017.html
https://www.youtube.com/watch?v=td_8AM80DUA&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=2&t=37s
We will discuss the following: Symmetric Encryption, Substitution Techniques, Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher
https://mloey.github.io/courses/security2017.html
We will discuss the following: Cryptography, Computer Security, OSI Security Architecture, Security Structure Scheme, Key Properties, Symmetric Encryption, Asymmetric Encryption, finally Our Book
hello everyone this a very interesting pps about general concepts of ip address here u can find lot of stuff and all those matter which u could not find even in a search engine
HOPE U LOVE IT
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Vaccine management system project report documentation..pdf
Chap 05 ip addresses classfless
1. CChhaapptteerr 55
IIPP AAddddrreesssseess::
CCllaasssslleessss AAddddrreessssiinngg
Objectives
Upon completion you will be able to:
• Understand the concept of classless addressing
• Be able to find the first and last address given an IP address
• Be able to find the network address given a classless IP address
• Be able to create subnets from a block of classless IP addresses
• Understand address allocation and address aggregation
TCP/IP Protocol Suite 1
4. ExamplE 1
Which of the following can be the beginning address
of a block that contains 16 addresses?
a. 205.16.37.32 b.190.16.42.44
c. 17.17.33.80 d.123.45.24.52
Solution
Only two are eligible (a and c). The address
205.16.37.32 is eligible because 32 is divisible by 16.
The address 17.17.33.80 is eligible because 80 is
divisible by 16.
TCP/IP Protocol Suite 4
5. ExamplE 2
Which of the following can be the beginning address
of a block that contains 256 addresses?
a.205.16.37.32 b.190.16.42.0
c.17.17.32.0 d.123.45.24.52
Solution
In this case, the right-most byte must be 0. As we
mentioned in Chapter 4, the IP addresses use base
256 arithmetic. When the right-most byte is 0, the
total address is divisible by 256. Only two addresses
are eligible (b and c).
TCP/IP Protocol Suite 5
6. ExamplE 3
Which of the following can be the beginning address
of a block that contains 1024 addresses?
a. 205.16.37.32 b.190.16.42.0
c. 17.17.32.0 d.123.45.24.52
Solution
In this case, we need to check two bytes because
1024 = 4 × 256. The right-most byte must be divisible
by 256. The second byte (from the right) must be
divisible by 4. Only one address is eligible (c).
TCP/IP Protocol Suite 6
7. Figure 5.2 Format of classless addressing address
TCP/IP Protocol Suite 7
10. ExamplE 4
What is the first address in the block if one of the
addresses is 167.199.170.82/27?
Solution
The prefix length is 27, which means that we must
keep the first 27 bits as is and change the remaining
bits (5) to 0s. The following shows the process:
Address in binary: 10100111 11000111 10101010 01010010
Keep the left 27 bits: 10100111 11000111 10101010 01000000
Result in CIDR notation: 167.199.170.64/27
TCP/IP Protocol Suite 10
11. ExamplE 5
What is the first address in the block if one of the
addresses is 140.120.84.24/20?
Solution
Figure 5.3 shows the solution. The first, second, and
fourth bytes are easy; for the third byte we keep the
bits corresponding to the number of 1s in that group.
The first address is 140.120.80.0/20.
See Next Slide
TCP/IP Protocol Suite 11
13. ExamplE 6
Find the first address in the block if one of the
addresses is 140.120.84.24/20.
Solution
The first, second, and fourth bytes are as defined in
the previous example. To find the third byte, we write
84 as the sum of powers of 2 and select only the
leftmost 4 (m is 4) as shown in Figure 5.4. The first
address is 140.120.80.0/20.
See Next Slide
TCP/IP Protocol Suite 13
15. ExamplE 7
Find the number of addresses in the block if one of
the addresses is 140.120.84.24/20.
Solution
The prefix length is 20. The number of addresses in
the block is 232−20 or 212 or 4096. Note that
this is a large block with 4096 addresses.
TCP/IP Protocol Suite 15
16. ExamplE 8
Using the first method, find the last address in the
block if one of the addresses is 140.120.84.24/20.
Solution
We found in the previous examples that the first
address is 140.120.80.0/20 and the number of
addresses is 4096. To find the last address, we need to
add 4095 (4096 − 1) to the first address.
See Next Slide
TCP/IP Protocol Suite 16
17. ExamplE 8 (Continued)
To keep the format in dotted-decimal notation, we
need to represent 4095 in base 256 (see Appendix B)
and do the calculation in base 256. We write 4095 as
15.255. We then add the first address to this number
(in base 255) to obtain the last address as shown
below:
140 . 120 . 80 . 0
15 . 255
-------------------------
140 . 120 . 95 . 255
The last address is 140.120.95.255/20.
TCP/IP Protocol Suite 17
18. ExamplE 9
Using the second method, find the last address in the
block if one of the addresses is 140.120.84.24/20.
Solution
The mask has twenty 1s and twelve 0s. The
complement of the mask has twenty 0s and twelve 1s.
In other words, the mask complement is
00000000 00000000 00001111 11111111
or 0.0.15.255. We add the mask complement to the
beginning address to find the last address.
See Next Slide
TCP/IP Protocol Suite 18
19. ExamplE 9 (Continued)
We add the mask complement to the beginning
address to find the last address.
140 . 120 . 80 . 0
0 . 0 . 15 . 255
----------------------------
140 . 120 . 95 . 255
The last address is 140.120.95.255/20.
TCP/IP Protocol Suite 19
20. ExamplE
10
Find the block if one of the addresses is
190.87.140.202/29.
Solution
We follow the procedure in the previous examples to
find the first address, the number of addresses, and
the last address. To find the first address, we notice
that the mask (/29) has five 1s in the last byte. So we
write the last byte as powers of 2 and retain only the
leftmost five as shown below:
See Next Slide
TCP/IP Protocol Suite 20
21. ExamplE 10 (Continued)
202 ➡ 128 + 64 + 0 + 0 + 8 + 0 + 2 + 0
The leftmost 5 numbers are ➡ 128 + 64 + 0 + 0 + 8
The first address is 190.87.140.200/29
The number of addresses is 232−29 or 8. To find the last address,
we use the complement of the mask. The mask has twenty-nine
1s; the complement has three 1s. The complement is 0.0.0.7. If
we add this to the first address, we get 190.87.140.207/29. In
other words, the first address is 190.87.140.200/29, the last
address is 190.87.140.207/29. There are only 8 addresses in
this block.
TCP/IP Protocol Suite 21
22. ExamplE
11
Show a network configuration for the block in the previous
example.
Solution
The organization that is granted the block in the previous
example can assign the addresses in the block to the hosts in its
network. However, the first address needs to be used as the
network address and the last address is kept as a special
address (limited broadcast address). Figure 5.5 shows how the
block can be used by an organization. Note that the last
address ends with 207, which is different from the 255 seen in
classful addressing.
See Next Slide
TCP/IP Protocol Suite 22
28. ExamplE
12
An organization is granted the block 130.34.12.64/26.
The organization needs 4 subnets. What is the subnet
prefix length?
Solution
We need 4 subnets, which means we need to add two
more 1s (log2 4 = 2) to the site prefix. The subnet
prefix is then /28.
TCP/IP Protocol Suite 28
29. ExamplE
13
What are the subnet addresses and the range of
addresses for each subnet in the previous example?
Solution
Figure 5.6 shows one configuration.
See Next Slide
TCP/IP Protocol Suite 29
31. ExamplE 13 (ContinuEd)
The site has 232−26 = 64 addresses. Each subnet has
232–28 = 16 addresses. Now let us find the first and last
address in each subnet.
1. The first address in the first subnet is 130.34.12.64/28,
using the procedure we showed in the previous examples.
Note that the first address of the first subnet is the first
address of the block. The last address of the subnet can
be found by adding 15 (16 −1) to the first address. The
last address is 130.34.12.79/28.
See Next Slide
TCP/IP Protocol Suite 31
32. ExamplE 13 (ContinuEd)
2.The first address in the second subnet is
130.34.12.80/28; it is found by adding 1 to the last
address of the previous subnet. Again adding 15 to
the first address, we obtain the last address,
130.34.12.95/28.
3. Similarly, we find the first address of the third
subnet to be 130.34.12.96/28 and the last to be
130.34.12.111/28.
4. Similarly, we find the first address of the fourth
subnet to be 130.34.12.112/28 and the last to be
130.34.12.127/28.
TCP/IP Protocol Suite 32
33. ExamplE
14
An organization is granted a block of addresses with the
beginning address 14.24.74.0/24. There are 232−24= 256
addresses in this block. The organization needs to have 11
subnets as shown below:
a. two subnets, each with 64 addresses.
b. two subnets, each with 32 addresses.
c. three subnets, each with 16 addresses.
d. four subnets, each with 4 addresses.
Design the subnets.
See Next Slide For One Solution
TCP/IP Protocol Suite 33
35. ExamplE 14 (ContinutEd)
1. We use the first 128 addresses for the first two
subnets, each with 64 addresses. Note that the mask
for each network is /26. The subnet address for each
subnet is given in the figure.
2. We use the next 64 addresses for the next two
subnets, each with 32 addresses. Note that the mask
for each network is /27. The subnet address for each
subnet is given in the figure.
See Next Slide
TCP/IP Protocol Suite 35
36. ExamplE 14 (ContinutEd)
3. We use the next 48 addresses for the next three
subnets, each with 16 addresses. Note that the mask
for each network is /28. The subnet address for each
subnet is given in the figure.
4. We use the last 16 addresses for the last four
subnets, each with 4 addresses. Note that the mask for
each network is /30. The subnet address for each
subnet is given in the figure.
TCP/IP Protocol Suite 36
37. ExamplE
15
As another example, assume a company has three
offices: Central, East, and West. The Central office is
connected to the East and West offices via private,
point-to-point WAN lines. The company is granted a
block of 64 addresses with the beginning address
70.12.100.128/26. The management has decided to
allocate 32 addresses for the Central office and
divides the rest of addresses between the two offices.
Figure 5.8 shows the configuration designed by the
management.
See Next Slide
TCP/IP Protocol Suite 37
39. ExamplE 15 (ContinuEd)
The company will have three subnets, one at Central, one at
East, and one at West. The following lists the subblocks
allocated for each network:
a. The Central office uses the network address
70.12.100.128/27. This is the first address, and the mask
/27 shows that there are 32 addresses in this network.
Note that three of these addresses are used for the
routers and the company has reserved the last address
in the sub-block. The addresses in this subnet are
70.12.100.128/27 to 70.12.100.159/27. Note that the
interface of the router that connects the Central subnet
to the WAN needs no address because it is a point-to-point
See Next Slide
connection.
TCP/IP Protocol Suite 39
40. ExamplE 15 (ContinuEd)
b. The West office uses the network address
70.12.100.160/28. The mask /28 shows that there are
only 16 addresses in this network. Note that one of
these addresses is used for the router and the company
has reserved the last address in the sub-block. The
addresses in this subnet are 70.12.100.160/28 to
70.12.100.175/28. Note also that the interface of the
router that connects the West subnet to the WAN needs
no address because it is a point-to- point connection.
See Next Slide
TCP/IP Protocol Suite 40
41. ExamplE 15 (ContinuEd)
c. The East office uses the network address
70.12.100.176/28. The mask /28 shows that there are
only 16 addresses in this network. Note that one of
these addresses is used for the router and the company
has reserved the last address in the sub-block. The
addresses in. this subnet are 70.12.100.176/28 to
70.12.100.191/28. Note also that the interface of the
router that connects the East subnet to the WAN needs
no address because it is a point-to-point connection.
TCP/IP Protocol Suite 41
42. 5.3 ADDRESS ALLOCATION
Address allocation is the responsibility of a global aauutthhoorriittyy ccaalllleedd tthhee
IInntteerrnneett CCoorrppoorraattiioonn ffoorr AAssssiiggnneedd NNaammeess aanndd AAddddrreesssseess ((IICCAANNNN)).. IItt
uussuuaallllyy aassssiiggnnss aa llaarrggee bblloocckk ooff aaddddrreesssseess ttoo aann IISSPP ttoo bbee ddiissttrriibbuutteedd ttoo
iittss IInntteerrnneett uusseerrss..
TCP/IP Protocol Suite 42
43. ExamplE
16
An ISP is granted a block of addresses starting with
190.100.0.0/16 (65,536 addresses). The ISP needs to
distribute these addresses to three groups of
customers as follows:
a. The first group has 64 customers; each needs 256
addresses.
b. The second group has 128 customers; each needs 128
addresses
c. The third group has 128 customers; each needs 64
addresses.
See Next Slide
TCP/IP Protocol Suite 43
44. ExamplE 16 (ContinuEd)
Design the subblocks and find out how many
addresses are still available after these allocations.
Solution
Figure 5.9 shows the situation.
See Next Slide
TCP/IP Protocol Suite 44
46. ExamplE 16 (ContinuEd)
Group 1
For this group, each customer needs 256 addresses.
This means the suffix length is 8 (28 =256). The prefix
length is then 32 − 8 = 24. The addresses are:
1st Customer 190.100.0.0/24 190.100.0.255/24
2nd Customer 190.100.1.0/24 190.100.1.255/24
. . .
64th Customer 190.100.63.0/24 190.100.63.255/24
Total = 64 × 256 = 16,384
See Next Slide
TCP/IP Protocol Suite 46
47. ExamplE 16 (ContinuEd)
Group 2
For this group, each customer needs 128 addresses.
This means the suffix length is 7 (27 =128). The prefix
length is then 32 − 7 = 25. The addresses are:
1st Customer 190.100.64.0/25 190.100.64.127/25
2nd Customer 190.100.64.128/25 190.100.64.255/25
· · ·
128th Customer 190.100.127.128/25 190.100.127.255/25
Total = 128 × 128 = 16,384
See Next Slide
TCP/IP Protocol Suite 47
48. ExamplE 16 (ContinuEd)
Group 3
For this group, each customer needs 64 addresses.
This means the suffix length is 6 (26 = 64). The prefix
length is then 32 − 6 = 26. The addresses are:
1st Customer 190.100.128.0/26 190.100.128.63/26
2nd Customer 190.100.128.64/26 190.100.128.127/26
· · ·
128th Customer 190.100.159.192/26 190.100.159.255/26
Total = 128 × 64 = 8,192
See Next Slide
TCP/IP Protocol Suite 48
49. ExamplE 16 (ContinuEd)
Number of granted addresses to the ISP: 65,536
Number of allocated addresses by the ISP: 40,960
Number of available addresses: 24,576
TCP/IP Protocol Suite 49