hello everyone this a very interesting pps about general concepts of ip address here u can find lot of stuff and all those matter which u could not find even in a search engine
HOPE U LOVE IT
hey! everybody this is my third and last pps of this month and i ensure that this will definately guide you about ip address and its contain and what r all different kinds of ip r available with questions tags specified also. all thoes who u cannot find on any search engine u can get all stuff here!!!!!!
hope u loved it ???!@@@#
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
hey! everybody this is my third and last pps of this month and i ensure that this will definately guide you about ip address and its contain and what r all different kinds of ip r available with questions tags specified also. all thoes who u cannot find on any search engine u can get all stuff here!!!!!!
hope u loved it ???!@@@#
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
What is IP Address?
How to assign IP to any computer?
Explain IP Addressing Schemes.
Explain IPv4 Addresses with Class. (Class structure)
Explain Subnetting ?
What is Subnet mask ?
Explain Supernetting
Network layer,ipv4, Classful Addressing,notations, Classless addressing,classful and classless addressing, netid and hostid.
Notations type :-
Binary notations
Dotted decimal notation
Classful addressing and its types:-
class A
class B
class C
class D
class E
Netid and Hostid
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
What is IP Address?
How to assign IP to any computer?
Explain IP Addressing Schemes.
Explain IPv4 Addresses with Class. (Class structure)
Explain Subnetting ?
What is Subnet mask ?
Explain Supernetting
Network layer,ipv4, Classful Addressing,notations, Classless addressing,classful and classless addressing, netid and hostid.
Notations type :-
Binary notations
Dotted decimal notation
Classful addressing and its types:-
class A
class B
class C
class D
class E
Netid and Hostid
Hello people this is first time in the history when somebody has take a pain to create such a large ppt it is almost my 5 months laborious work..
although i know ppt cannot b more than 30 slides but at the same time i dont want my readers to to feel the lack of knowledge
THIS PPT BELONGS TO TECHNICALS PERSONS hope u like it thanking you ........
hey!!!!! everybody dats was simple ppt on mobile computing as u all aware dat d world is not stationary things are getting change technology is rocking all over so lets get into in it
and plz. dont forget to comment on my work weather u lik or not
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
ip address
1. TCP/IP Protocol Suite 1
All About IP’S
Presented by
Gaurav Koriya
c@ a product of korian
cooperation
2. TCP/IP Protocol Suite 2
Chapter 4Chapter 4
Objectives
Upon completion you will be able to:
IP Addresses:IP Addresses:
Classful AddressingClassful Addressing
• Understand IPv4 addresses and classes
• Identify the class of an IP address
• Find the network address given an IP address
• Understand masks and how to use them
• Understand subnets and supernets
3. TCP/IP Protocol Suite 3
4.1 INTRODUCTION4.1 INTRODUCTION
The identifier used in the IP layer of the TCP/IP protocol suite toThe identifier used in the IP layer of the TCP/IP protocol suite to
identify each device connected to the Internet is called the Internetidentify each device connected to the Internet is called the Internet
address or IP address. An IP address is aaddress or IP address. An IP address is a 32-bit address32-bit address that uniquelythat uniquely
and universally defines the connection of a host or a router to theand universally defines the connection of a host or a router to the
Internet. IP addresses are unique. They are unique in the sense thatInternet. IP addresses are unique. They are unique in the sense that
each address defines one, and only one, connection to the Internet. Twoeach address defines one, and only one, connection to the Internet. Two
devices on the Internet can never have the same address.devices on the Internet can never have the same address.
The topics discussed in this section include:The topics discussed in this section include:
Address SpaceAddress Space
NotationNotation
8. TCP/IP Protocol Suite 8
The binary, decimal, and hexadecimal
number systems are reviewed in
Appendix B.
Note:Note:
9. TCP/IP Protocol Suite 9
Change the following IP addresses from binary notation to
dotted-decimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 11100111 11011011 10001011 01101111
d. 11111001 10011011 11111011 00001111
ExamplE 1
Solution
We replace each group of 8 bits with its equivalent decimal
number (see Appendix B) and add dots for separation:
a. 129.11.11.239 b. 193.131.27.255
c. 231.219.139.111 d. 249.155.251.15
10. TCP/IP Protocol Suite 10
Change the following IP addresses from dotted-decimal
notation to binary notation.
a. 111.56.45.78 b. 221.34.7.82
c. 241.8.56.12 d. 75.45.34.78
ExamplE 2
Solution
We replace each decimal number with its binary equivalent:
a. 01101111 00111000 00101101 01001110
b. 11011101 00100010 00000111 01010010
c. 11110001 00001000 00111000 00001100
d. 01001011 00101101 00100010 01001110
11. TCP/IP Protocol Suite 11
Find the error, if any, in the following IP addresses:
a. 111.56.045.78 b. 221.34.7.8.20
c. 75.45.301.14 d. 11100010.23.14.67
ExamplE 3
Solution
a. There are no leading zeroes in dotted-decimal notation (045).
b. We may not have more than four numbers in an IP address.
c. In dotted-decimal notation, each number is less than or equal
to 255; 301 is outside this range.
d. A mixture of binary notation and dotted-decimal notation is
not
allowed.
12. TCP/IP Protocol Suite 12
Change the following IP addresses from binary notation to
hexadecimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
ExamplE 4
Solution
We replace each group of 4 bits with its hexadecimal
equivalent (see Appendix B). Note that hexadecimal notation
normally has no added spaces or dots; however, 0X (or 0x) is
added at the beginning or the subscript 16 at the end to show
that the number is in hexadecimal.
a. 0X810B0BEF or 810B0BEF16
b. 0XC1831BFF or C1831BFF16
13. TCP/IP Protocol Suite 13
4.2 CLASSFUL ADDRESSING
IP addresses, when started a few decades ago, used the concept ofIP addresses, when started a few decades ago, used the concept of
classes. This architecture is calledclasses. This architecture is called classful addressingclassful addressing. In the mid-1990s,. In the mid-1990s,
a new architecture, called classless addressing, was introduced and willa new architecture, called classless addressing, was introduced and will
eventually supersede the original architecture. However, part of theeventually supersede the original architecture. However, part of the
Internet is still using classful addressing, but the migration is very fast.Internet is still using classful addressing, but the migration is very fast.
The topics discussed in this section include:The topics discussed in this section include:
Recognizing ClassesRecognizing Classes
Netid and HostidNetid and Hostid
Classes and BlocksClasses and Blocks
Network AddressesNetwork Addresses
Sufficient InformationSufficient Information
MaskMask
CIDR NotationCIDR Notation
Address DepletionAddress Depletion
18. TCP/IP Protocol Suite 18
How can we prove that we have 2,147,483,648 addresses in
class A?
ExamplE 5
Solution
In class A, only 1 bit defines the class. The remaining 31 bits
are available for the address. With 31 bits, we can have 231
or 2,147,483,648 addresses.
19. TCP/IP Protocol Suite 19
Find the class of each address:
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 10100111 11011011 10001011 01101111
d. 11110011 10011011 11111011 00001111
ExamplE 6
Solution
See the procedure in Figure 4.4.
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C address.
c. The first bit is 0; the second bit is 1. This is a class B address.
d. The first 4 bits are 1s. This is a class E address..
21. TCP/IP Protocol Suite 21
Find the class of each address:
a. 227.12.14.87 b.193.14.56.22 c.14.23.120.8
d. 252.5.15.111 e.134.11.78.56
ExamplE 7
Solution
a. The first byte is 227 (between 224 and 239); the class is D.
b. The first byte is 193 (between 192 and 223); the class is C.
c. The first byte is 14 (between 0 and 127); the class is A.
d. The first byte is 252 (between 240 and 255); the class is E.
e. The first byte is 134 (between 128 and 191); the class is B.
22. TCP/IP Protocol Suite 22
In Example 5 we showed that class A has 231
(2,147,483,648)
addresses. How can we prove this same fact using dotted-
decimal notation?
ExamplE 8
Solution
The addresses in class A range from 0.0.0.0 to
127.255.255.255. We need to show that the difference between
these two numbers is 2,147,483,648. This is a good exercise
because it shows us how to define the range of addresses
between two addresses. We notice that we are dealing with base
256 numbers here. Each byte in the notation has a weight. The
weights are as follows (see Appendix B):
See Next Slide
23. TCP/IP Protocol Suite 23
2563
, 2562
, 2561
, 2560
ExamplE 8 (continuEd)
Last address: 127 × 2563
+ 255 × 2562
+
255 × 2561
+ 255 × 2560
= 2,147,483,647
First address: = 0
Now to find the integer value of each number, we multiply
each byte by its weight:
If we subtract the first from the last and add 1 to the result
(remember we always add 1 to get the range), we get
2,147,483,648 or 231
.
30. TCP/IP Protocol Suite 30
The number of addresses in class C is
smaller than the needs of most
organizations.
Note:Note:
31. TCP/IP Protocol Suite 31
Class D addresses are used for
multicasting; there is only one block in
this class.
Note:Note:
32. TCP/IP Protocol Suite 32
Class E addresses are reserved for
future purposes; most of the block is
wasted.
Note:Note:
33. TCP/IP Protocol Suite 33
In classful addressing, the network
address (the first address in the block)
is the one that is assigned to the
organization. The range of addresses
can automatically be inferred from the
network address.
Note:Note:
34. TCP/IP Protocol Suite 34
Given the network address 17.0.0.0, find the class, the block,
and the range of the addresses.
ExamplE 9
Solution
The class is A because the first byte is between 0 and 127. The
block has a netid of 17. The addresses range from 17.0.0.0 to
17.255.255.255.
35. TCP/IP Protocol Suite 35
Given the network address 132.21.0.0, find the class, the block,
and the range of the addresses.
ExamplE
10
Solution
The class is B because the first byte is between 128 and 191.
The block has a netid of 132.21. The addresses range from
132.21.0.0 to 132.21.255.255.
36. TCP/IP Protocol Suite 36
Given the network address 220.34.76.0, find the class, the
block, and the range of the addresses.
ExamplE
11
Solution
The class is C because the first byte is between 192
and 223. The block has a netid of 220.34.76. The
addresses range from 220.34.76.0 to 220.34.76.255.
40. TCP/IP Protocol Suite 40
The network address is the beginning
address of each block. It can be found
by applying the default mask to any of
the addresses in the block (including
itself). It retains the netid of the block
and sets the hostid to zero.
Note:Note:
41. TCP/IP Protocol Suite 41
Given the address 23.56.7.91, find the beginning address
(network address).
ExamplE
12
Solution
The default mask is 255.0.0.0, which means that only the first
byte is preserved and the other 3 bytes are set to 0s. The
network address is 23.0.0.0.
42. TCP/IP Protocol Suite 42
Given the address 132.6.17.85, find the beginning address
(network address).
ExamplE
13
Solution
The default mask is 255.255.0.0, which means that the first 2
bytes are preserved and the other 2 bytes are set to 0s. The
network address is 132.6.0.0.
43. TCP/IP Protocol Suite 43
Given the address 201.180.56.5, find the beginning address
(network address).
ExamplE
14
Solution
The default mask is 255.255.255.0, which means that the first 3
bytes are preserved and the last byte is set to 0. The network
address is 201.180.56.0.
44. TCP/IP Protocol Suite 44
Note that we must not apply the
default mask of one class to an address
belonging to another class.
Note:Note:
45. TCP/IP Protocol Suite 45
4.3 OTHER ISSUES
In this section, we discuss some other issues that are related toIn this section, we discuss some other issues that are related to
addressing in general and classful addressing in particular.addressing in general and classful addressing in particular.
The topics discussed in this section include:The topics discussed in this section include:
Multihomed DevicesMultihomed Devices
Location, Not NamesLocation, Not Names
Special AddressesSpecial Addresses
Private AddressesPrivate Addresses
Unicast, Multicast, and Broadcast AddressesUnicast, Multicast, and Broadcast Addresses
59. TCP/IP Protocol Suite 59
4.4 SUBNETTING AND
SUPERNETTING
In the previous sections we discussed the problems associated withIn the previous sections we discussed the problems associated with
classful addressing. Specifically, the network addresses available forclassful addressing. Specifically, the network addresses available for
assignment to organizations are close to depletion. This is coupled withassignment to organizations are close to depletion. This is coupled with
the ever-increasing demand for addresses from organizations that wantthe ever-increasing demand for addresses from organizations that want
connection to the Internet. In this section we briefly discuss twoconnection to the Internet. In this section we briefly discuss two
solutions: subnetting and supernetting.solutions: subnetting and supernetting.
The topics discussed in this section include:The topics discussed in this section include:
SubnettingSubnetting
SupernettingSupernetting
Supernet MaskSupernet Mask
ObsolescenceObsolescence
60. TCP/IP Protocol Suite 60
IP addresses are designed with two
levels of hierarchy.
Note:Note:
61. TCP/IP Protocol Suite 61
Figure 4.20 A network with two levels of hierarchy (not subnetted)
62. TCP/IP Protocol Suite 62
Figure 4.21 A network with three levels of hierarchy (subnetted)
63. TCP/IP Protocol Suite 63
Figure 4.22 Addresses in a network with and without subnetting
66. TCP/IP Protocol Suite 66
What is the subnetwork address if the destination address is
200.45.34.56 and the subnet mask is 255.255.240.0?
ExamplE
15
Solution
We apply the AND operation on the address and the subnet
mask.
Address ➡ 11001000 00101101 00100010 00111000
Subnet Mask ➡ 11111111 11111111 11110000 00000000
Subnetwork Address ➡ 11001000 00101101 00100000 00000000.
69. TCP/IP Protocol Suite 69
In subnetting, we need the first
address of the subnet and the subnet
mask to define the range of addresses.
In supernetting, we need the first
address of the supernet and the
supernet mask to define the range of
addresses.
Note:Note:
70. TCP/IP Protocol Suite 70
Figure 4.27 Comparison of subnet, default, and supernet masks
71. TCP/IP Protocol Suite 71
The idea of subnetting and
supernetting of classful addresses is
almost obsolete.
Note:Note: