This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Lab 18 Answer TemplateProblem 1:
IP address: 192.168.10.0 /27 (given)
a. Subnet Mask: 255.255.255.224
b. Bits Borrowed: 3
c. Number of subnets: 8
d. Magic number: 32
e. Number of valid hosts per subnet: 30
f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.30
i. Broadcast address in subnet 0: 192.168.10.31
j. (Sub) Network address in subnet 3: 192.168.10.64
k. Last usable host address in subnet 4: 192.168.10.158
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.30
192.168.10.31
1
192.168.10.32
192.168.10.33
192.168.10.62
192.168.10.63
2
192.168.10.64
192.168.10.65
192.168.10.94
192.168.10.95
3
192.168.10.96
192.168.10.97
192.168.10.126
192.168.10.127
4
192.168.10.128
192.168.10.129
192.168.10.158
192.168.10.159
5
192.168.10.160
192.168.10.161
192.168.10.190
192.168.10.191
6
192.168.10.192
192.168.10.193
192.168.10.222
192.168.10.223
7
192.168.10.224
192.168.10.225
192.168.10.254
192.168.10.255Problem 2:
IP address: 192.168.10.0 / 26 (given)
a. Subnet Mask: 255.255.255.192
b. Bits Borrowed:
c. Number of subnets: _4
d. Magic number:
e. Number of valid hosts per subnet: 62
f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.62
i. Broadcast address in subnet 0: 192.168.10.63
j. (Sub) Network address in subnet 1: 192.168.10.64
k. Last usable host address in subnet 2: 192.168.10.190
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.14
192.168.10.15
1
192.168.10.16
192.168.10.17
192.168.10.30
192.168.10.31
2
192.168.10.32
192.168.10.33
192.168.10.46
192.168.10.47
3
192.168.10.48
192.168.10.49
192.168.10.62
192.168.10.63
Etc.
Problem 3:
IP address: 192.168.10.0 (given)
Subnet Mask: 255.255.255.240
a. Slash prefix: _________________________________________
b. Bits Borrowed: _________________________________________
c. Number of possible subnets: _________________________________________
d. Magic number: _________________________________________
e. Number of usable hosts per subnet: _________________________________________
f. (Sub) network address of subnet 0: _________________________________________
g. First usable host address in subnet 0: _________________________________________
h. Last usable host address in subnet 0: _________________________________________
i. Broadcast address in subnet 0: _________________________________________
j. (Sub) Network address in subnet 1: _________________________________________
k. Last usable host address in subnet 2: _________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
Problem 4:
IP address: 192.168.10.0 (given)
Minimum number of subnets needed: 31
a. Slash prefix: _ ...
Deceptive Marketing (also known as “dark Marketing”) are tricks used in websites and apps that
make you do things that you didn’t mean to, like buying or signing up for something. The purpose of
this site is to spread awareness and to shame companies that use these patterns.
How does Deceptive Marketing work?
When you use websites and apps, you don’t read every word on every page—you skim read and
make assumptions. If a company wants to trick you into doing something, they can take advantage
of this by making a page look like it is saying one thing when it is in fact saying another. You can
defend yourself by learning about deceptive marketing.
Types of Deceptive Marketing
Trick questions
While filling in a form you respond to a question that tricks you into giving an answer you didn’t
intend. When glanced upon quickly the question appears to ask one thing, but when read carefully it
asks another thing entirely.
This is very common when registering with a service. Typically a series of checkboxes is shown, and
the meaning checkboxes is alternated so that ticking the first one means “opt out” and the second
means “opt in”. Confusing language is often also used. Currys PC World provides a good example of
this on their checkout collection
BRAIN Computer Interface (BCI) is a technique that
provides direct interface between the human brain and the
computer. BCI techniques are broadly classified into
invasive and non-invasive techniques. Non-invasive
techniques are becoming more popular and more research is
being done on this topic. There are various non-invasive BCI
techniques such as EEG, Electro-Oculography. EEG technique
deploys an electrode cap that is placed on the user’s scalp for
the acquisition of the EEG signal, which relates the scalp
potential differences to various complex actions. Classification
of the EEG signal has been made into several bands like alpha,
beta, delta, theta and mu suppression, each corresponding to
various states of being like relaxing, ranging over 8-14 Hz;
concentrating, ranging over 13-30 Hz; deep sleep, from 0-4
Hz; meditating from 4-8 Hz; moving your hands or legs or just
by imagining these motor actions respectively. As it is being
non-invasive in nature, it has an advantage over traditional
BMI, not being hazardous to health. With the advent of
technology the EEG acquisition devices are made more
compact, handy and wireless. Using the above mentioned
technique, a simple thought controlled wheelchair system has
been proposed in this paper. A section that briefly explains the
various blocks included in the system is also added in this
paper
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)Vivek chan
A mathematical model for the arc reactor which takes into account a. cooling and mixing of carbon vapour with a buffer
gas, b . non-isothermal kinetics of carbon clusters growth and c. formation of soot particles and heterogeneous reactions at
their surface has been developed. The model gives quantitative coincidence of experimental data with calculated values both
for the fullerene yield and ratio C70rC60 in the products of the arc synthesis run under widely varied conditions. Numerical
analysis of the model has shown that experimental data obtained for the arc synthesis strictly constrain the choice of the
mechanism of fullerene formation.
[Vivek Chan 2013]
EEG Acquisition Device to Control Wheelchair Using ThoughtsVivek chan
With the advancements in technology and health-care facilities, the number of senior citizens has increased and thus the number of elderly who find it difficult to walk. Hence there is a need for designing a wheelchair that is user friendly and involves fewer complexities. In this context, we propose a thought controlled wheelchair, which uses the captured signals from the brain and process it to control the wheelchair. This wheelchair can also be used by the physically challenged who depend on others for locomotion. Rehabilitation centers at hospitals can also make use of this wheelchair. In this paper, we explain the design and analysis of the thought-controlled wheelchair. In addition, we present some of the experiments that were carried out and the corresponding results in this paper.
http://www.vivek-chan.in
Vivek has his college degree in Computer Science and Engineering. With his strong background in Algorithms and Software Development, Web Development, Graphics Designing ,Internet Marketing, Cyber Security and also in Electronic security and Embedded systems in combination with his inter-personal skills and in-depth knowledge of current research in these fields.
http://www.vivek-chan.in
Vivek has his college degree in Computer Science and Engineering. With his strong background in Algorithms and Software Development, Web Development, Graphics Designing ,Internet Marketing, Cyber Security and also in Electronic security and Embedded systems in combination with his inter-personal skills and in-depth knowledge of current research in these fields.
http://www.vivek-chan.in
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)Vivek chan
Ramcharitmanas (Devanāgarī: श्रीरामचरितमानस, IAST: ŚrīRāmacaritamānasa), also spelt as Ramacharitamanasa, is an epic poem in Awadhi dialect of Hindi, composed by the 16th-century Indian bhakti poet Goswami Tulsidas (c.1532–1623). Ramcharitmanas literally means "Lake of the deeds of Rama". Ramcharitmanas is considered as one of the greatest works of Hindi literature. The work has been acclaimed as "the living sum of Indian culture", "the tallest tree in the magic garden of medieval Indian poetry", "the greatest book of all devotional literature" and "the best and most trustworthy guide to the popular living faith of the Indian people".
The core of the work is considered by some to be a poetic retelling of the events of the Sanskrit epic Ramayana, centered on the narrative of Rama, the scion of the family tree of Raghu of the Sun Dynasty and the crown prince of Ayodhya who is also considered in Hindu tradition as one of the Avataras of Vishnu. However, Tulsidas never alludes to Ramcharitmanas as being a retelling of Valmiki Ramayana. He calls the epic Ramcharitmanas as the story of Rama was stored in the mind (Mānasa) of Shiva before he narrated the same to His consort Parvati. Tulsidas claims to have received the story through his guru, Narharidas. Tulsidas was unconscious (Acheta, Devanāgarī: अचेत) and the story was stored in his mind (Mānasa) for long before he wrote it down as Ramcharitmanas. The epic poem is, therefore, also referred to as Tulsikrit Ramayana (literally, The Ramayana composed by Tulsidas).
CyberLab Training Division :
The .NET Framework is Microsoft's Managed Code programming model for building applications on Windows clients, servers, and mobile or embedded devices. Microsoft's .NET Framework is a software technology that is available with several Microsoft Windows operating systems. In the following sections describes , the basics of Microsoft .Net Frame work Technology and its related programming models.
What is Microsoft .Net Framework
what are the functions of microsoft .net framework?
Common Language Runtime in .Net Framework
How to Common Language Runtime
What is .Net Framework Class Library
What is Common Language Specification
What is Common Type System
What is Microsoft Intermediate Language
What is Portable Executable (PE) File Format
What is Microsoft Just In Time Compiler
How to Managed Code - Microsoft .Net Framework
What is .Net Framework Metadata
what is .Net Framework Assembly
What is Assembly Manifest
What is Global Assembly Cache
What is a .Net Satellite Assembly?
What are the contents of an Assembly?
How to Private Assembly and Shared Assembly
What is Microsoft .Net Strong Name
What is .Net Namespaces
What is Application Domain
What is Code Access Security
What is Garbage Collection
.Net Threads
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
The .NET Framework is Microsoft's Managed Code programming model for building applications on Windows clients, servers, and mobile or embedded devices. Microsoft's .NET Framework is a software technology that is available with several Microsoft Windows operating systems. In the following sections describes , the basics of Microsoft .Net Frame work Technology and its related programming models.
What is Microsoft .Net Framework
what are the functions of microsoft .net framework?
Common Language Runtime in .Net Framework
How to Common Language Runtime
What is .Net Framework Class Library
What is Common Language Specification
What is Common Type System
What is Microsoft Intermediate Language
What is Portable Executable (PE) File Format
What is Microsoft Just In Time Compiler
How to Managed Code - Microsoft .Net Framework
What is .Net Framework Metadata
what is .Net Framework Assembly
What is Assembly Manifest
What is Global Assembly Cache
What is a .Net Satellite Assembly?
What are the contents of an Assembly?
How to Private Assembly and Shared Assembly
What is Microsoft .Net Strong Name
What is .Net Namespaces
What is Application Domain
What is Code Access Security
What is Garbage Collection
.Net Threads
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
The .NET Framework is Microsoft's Managed Code programming model for building applications on Windows clients, servers, and mobile or embedded devices. Microsoft's .NET Framework is a software technology that is available with several Microsoft Windows operating systems. In the following sections describes , the basics of Microsoft .Net Frame work Technology and its related programming models.
What is Microsoft .Net Framework
what are the functions of microsoft .net framework?
Common Language Runtime in .Net Framework
How to Common Language Runtime
What is .Net Framework Class Library
What is Common Language Specification
What is Common Type System
What is Microsoft Intermediate Language
What is Portable Executable (PE) File Format
What is Microsoft Just In Time Compiler
How to Managed Code - Microsoft .Net Framework
What is .Net Framework Metadata
what is .Net Framework Assembly
What is Assembly Manifest
What is Global Assembly Cache
What is a .Net Satellite Assembly?
What are the contents of an Assembly?
How to Private Assembly and Shared Assembly
What is Microsoft .Net Strong Name
What is .Net Namespaces
What is Application Domain
What is Code Access Security
What is Garbage Collection
.Net Threads
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
Intel VTune Amplifier is a commercial application for software performance analysis for 32 and 64-bit x86 based machines, and has both GUI and command line interfaces. It is available for both Linux and Microsoft Windows operating systems. Although basic features work on both Intel and AMD hardware, advanced hardware-based sampling requires an Intel-manufactured CPU.
Whether you are tuning for the first time or doing advanced performance optimization, Intel® VTune Amplifier provides a rich set of performance insight into CPU & GPU performance, threading performance & scalability, bandwidth, caching and much more. Analysis is faster and easier because VTune Amplifier understands common threading models and presents information at a higher level that is easier to interpret. Use its powerful analysis to sort, filter and visualize results on the timeline and on your source.
It is available as part of Intel Parallel Studio or as a stand-alone product.
VTune Amplifier assists in various kinds of code profiling including stack sampling, thread profiling and hardware event sampling. The profiler result consists of details such as time spent in each sub routine which can be drilled down to the instruction level. The time taken by the instructions are indicative of any stalls in the pipeline during instruction execution. The tool can be also used to analyze thread performance. The new GUI can filter data based on a selection in the timeline.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
ASP.NET is a web application framework developed and marketed by Microsoft to allow programmers to build dynamic web sites. It allows you to use a full featured programming language such as C# or VB.NET to build web applications easily.
This tutorial covers all the basic elements of ASP.NET that a beginner would require to get started.
Audience
This tutorial has been prepared for the beginners to help them understand basic ASP.NET programming. After completing this tutorial you will find yourself at a moderate level of expertise in ASP.NET programming from where you can take yourself to next levels.
Prerequisites
Before proceeding with this tutorial, you should have a basic understanding of .NET programming language. As we are going to develop web-based applications using ASP.NET web application framework, it will be good if you have an understanding of other web technologies such as HTML, CSS, AJAX. etc
ASP.NET supports three different development models:
Web Pages, MVC (Model View Controller), and Web Forms.
For More Details.
Visit: http://www.cyberlabzone.com
CyberLab Training Division :
ASP.NET is a web application framework developed and marketed by Microsoft to allow programmers to build dynamic web sites. It allows you to use a full featured programming language such as C# or VB.NET to build web applications easily.
This tutorial covers all the basic elements of ASP.NET that a beginner would require to get started.
Audience
This tutorial has been prepared for the beginners to help them understand basic ASP.NET programming. After completing this tutorial you will find yourself at a moderate level of expertise in ASP.NET programming from where you can take yourself to next levels.
Prerequisites
Before proceeding with this tutorial, you should have a basic understanding of .NET programming language. As we are going to develop web-based applications using ASP.NET web application framework, it will be good if you have an understanding of other web technologies such as HTML, CSS, AJAX. etc
ASP.NET supports three different development models:
Web Pages, MVC (Model View Controller), and Web Forms.
For More Details.
Visit: http://www.cyberlabzone.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
3. www.cyberlabzone.com
Internet Layer - IP Addresses
Hierarchical addressing scheme
32 bit address
Dotted decimal notation
Used for addressing and routing
Divided into 2 main sections
Network identity
Host identity
3
4. www.cyberlabzone.com
IP version 4
4 bytes divided into 4 sections
Each section can range from 0 to 255
If any portion of the IP address contains a number
greater than 255 it is ILEGAL !
Presented with dots in between 4 bytes
e.g. 193.60.61.243
11000001.00111100.00111101.11110011
4
5. www.cyberlabzone.com
For subnetting use BINARY
Always work in Binary
All solutions can be discovered in Binary
Eventually you will see shortcuts
Use Binary first
It will take time to understand
Practice makes perfect
5
6. www.cyberlabzone.com
Address Classes (a history
lesson)
Classes A, B, C, D, E were created
IP numbers that began with :
1 to 126 are class A addresses
128 to 191 are class B addresses
192 to 223 are class C addresses
224 to 239 are class D addresses
240 to 254 are class E addresses.
6
7. www.cyberlabzone.com
Exercise 1 – ‘class’
identification
To which class do the following IP numbers legally belong ?
193.45.67.123
22.23.24.25
131.74.59.12
210.217.12,98
193.260.50.17
7
11. www.cyberlabzone.com
The end of Address class
system
Classes wasted addresses through inflexibility
A better way of dividing network space was sought
This was known as Variable Length Subnet Masking or
VLSM
Now we have to explicitly show the boundary of the
host and network portion of an address
11
12. www.cyberlabzone.com
Caveat to classless addressing
Many people and textbooks still refer to the address class system
No networks EVER use the class system in a production environment
Be aware of the translations between the classful and classless system
Remember ALWAYS to use the classless system despite the terminology
of the question
12
13. www.cyberlabzone.com
Subnet Mask identifies the
boundary
Sometimes called the Extended Network Prefix
Identifies the two sections of the IP address, network
and host fields
Used by routers to work out the network a particular
host belongs to
Written either as dotted decimal or slash notation
13
14. www.cyberlabzone.com
Subnet Mask – two notations
Dotted decimal is one of the notations
255.255.255.0
In binary this is
11111111.11111111.11111111.00000000
Slash is the second notation
Count the number of ‘1’s
There are 24 ‘1’s
So another way of expressing this subnet
mask is /24
14
15. www.cyberlabzone.com
Network (or wire) Address
This is the identity of the network and is used by routers
to deliver packets across networks
No host is ever given this address
To discover the network address, convert IP address from
decimal to binary
Replace the host section with 0s
Convert back to decimal
15
16. www.cyberlabzone.com
Finding the Network Identity
175.13.155.121 /16
10101111.00001101. 10011011. 01111001
What address class was this ?
Which is the host field ?
Replace with 0s
Convert back to dotted decimal
16
17. www.cyberlabzone.com
Broadcast Address RFC 919
Each network needs a broadcast address
No host is ever given this address
A broadcast can message all hosts in a LAN
Useful when a host needs to find information without
knowing exactly what other host can supply it e.g. ARP
When a host wants to provide information to a large set
of hosts in a timely manner
17
18. www.cyberlabzone.com
Finding the Broadcast
Number
Substitute the host section of the binary version of the
IP address with 1s
Convert back to dotted decimal
What is the broadcast address for the IP
175.13.155.121 /16
18
19. www.cyberlabzone.com
Reserved addressing numbers
Host bits set to 0 are Network address
Host bits set to 1 are Broadcast address
127 network numbers reserved for loopback
127.0.0.1 is ‘my NIC’
192.168.x.x & 172.16-31.x.x & 10.x.x.x are non-
routable private addresses – for NAT and private
networks only
defined in RFC 1918
19
21. www.cyberlabzone.com
Host numbers on networks
Original assignment of classes wasted many IP addresses
( 3 bears problem )
Class A for governments with 224 hosts
Class B can have 65 534 hosts
more than most companies require
Class C can have 254 hosts
less than most companies require
21
23. www.cyberlabzone.com
Subnetting
Take a /24 (class C) address
24 network bits & 8 host bits
Company may need different departments
We can borrow bits from host field to augment network field
23
24. www.cyberlabzone.com
Subnetting /24 (Class C)
address
e.g. 198.234.125.0
11000110.11101010.01111101.00000000
Write network number
10111100.11101010.00000000.00000000
Borrow 4 bits from host field
10111100.11101010.00000000.00000000
4 bits remain for host identity
30/0
9/20
24
25. www.cyberlabzone.com
Subnetted /24 (Class C)
How many hosts does this allow on each subnet ?
How many subnetworks can we use ?
First and last subnet numbers are reserved
First and last host numbers are reserved
25
26. www.cyberlabzone.com
More Subnetting
Can borrow 2 host bits minimum
Maximum host bits that can be borrowed is all but the
rightmost 2 bits of the IP address
Why is this so ?
26
27. www.cyberlabzone.com
Calculating subnet mask
1. Express the subnetwork IP address in binary form
2. Replace the network and subnet portion of the address
with all 1s
3. Replace the host portion of the address with all 0s
4. Now convert the binary expression back to dotted-
decimal notation
27
28. www.cyberlabzone.com
Example of subnet mask
Calculate the subnet mask for the Subnetted
class C address 199.177.166.34 that has
borrowed 3 bits from the host field
11000111.10110001.10100110.00100010
27 bits for network identity - substitute these
27 bits for 1s
Change remaining 5 host bits to 0s
Convert to dotted decimal
255.255.255.224
28
29. www.cyberlabzone.com
Exercise 3
Calculate subnet masks for class B that has borrowed 4
bits from host field
155.233.2.13
Calculate subnet masks for class C that has borrowed 5
bits from host field
200.123.23.3
29
30. www.cyberlabzone.com
Use of Subnet Mask
Mask is ANDed with IP address of host
This gives network identity
Can now be used to route the message
30
31. www.cyberlabzone.com
Example
What is the network number for the IP address
199.177.166.34 given that the subnet mask is
255.255.255.224
Convert to binary
AND both numbers together
Result is network identity
31
32. www.cyberlabzone.com
Exercise 3
IP network address 213.72.83.0. You require at
least 17 subnets. Calculate
1. The required subnet mask
2. The number of total subnets
3. The number of available host IP per subnet
4. The first four subnet addresses
5. The valid range of host addresses for the first
four subnets
6. The Broadcast address for each subnet
32
33. www.cyberlabzone.com
Conclusion
3 Classes available, A, B, C
Strictly not used any longer but well understood
Flexibility gained by subnetting
Subnets concealed from outside networks using subnet masks
Masks are ANDed with IP address of host to discover network identity
33
34. www.cyberlabzone.com
Hosts on class A
There are a possible 224 = 16 777 216 combinations
available for the last 24 bits
Subtract the two combinations that cannot be used as
host addresses
A class A address can have 16 777 216 - 2 = 16 777 214
different hosts
34
35. www.cyberlabzone.com
35
Hosts on class B
There are a possible 216 = 65 536
combinations available for the last 16
bits
Subtract the two combinations that
cannot be used as host addresses
A class B address can have
65 536 - 2 = 65 534 different hosts
36. www.cyberlabzone.com
36
Hosts on class C
There are a possible 28 = 256
combinations available for the last 8
bits
Subtract the two combinations that
cannot be used as host addresses
A class B address can have
256 - 2 = 254 different hosts
39. www.cyberlabzone.com
Classes & numbers
12.123.14.0 12.123.14.255 (looks like Class A)
177.177.0.0 177.177.255.255 (Class B)
220.17.124.0 220.17.124.255 (Class C)
277.14.13.86 Illegal number
And illegal subnet mask
39
43. www.cyberlabzone.com
Exercise 3
Need 17 subnets. Calculate bits required for 17 subnets
= 5
Leaves 3 bits for host identity on subnets
When calculating the first four subnet addresses, you
will begin with:
00000000 = 0
00001000 = 8
00010000 = 16
00011000 = 24
43
44. www.cyberlabzone.com
Exercise 3 contd
3 bits for the host leaves 23 - 2 = 6 host addresses per
subnet
Valid host range
213.72.83.1 213.72.83.2
213.72.83.3 213.72.83.4
213.72.83.5 213.72.83.6
44