This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document discusses subnetting and provides an example of how to subnet the IP network address 192.168.1.128 into 6 subnets. It explains that subnetting allows a single network number to be shared among multiple physical networks. Each host is configured with an IP address and subnet mask, where the subnet is calculated by performing a bitwise AND of the IP address and subnet mask. The example shows how to determine the subnet mask is 255.255.255.224 when creating 6 subnets, and that each subnet can support up to 30 hosts.
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
An IP address is a unique 32-bit number that identifies each device on a network. It allows devices to communicate by sending and receiving data packets. IP addresses are made up of a network portion and host portion, with four sections that each range from 0-255. There are five classes of IP addresses - A, B, C, D and E - that determine the number of networks and hosts. IPv4 uses 32-bit addresses written in dotted decimal notation, while IPv6 uses 128-bit addresses written in hex. IP addresses can be static or dynamically assigned by a DHCP server.
The document discusses the Internet Protocol (IP) which is the cornerstone of the TCP/IP architecture and allows all computers on the Internet to communicate. There are two main versions of IP - IPv4, the currently used version, and IPv6 which is intended to replace IPv4 and includes improvements like longer addresses. IP addresses are 32-bit for IPv4 and 128-bit for IPv6. Strategies like private addressing and Classless Inter-Domain Routing (CIDR) help conserve the limited number of available IP addresses.
This document provides an introduction to IP addressing, including:
- A brief history of IP development and the OSI and TCP/IP models.
- An overview of IP address classes (A, B, C, D, E), how they are determined, and their characteristics like address ranges and network/host portions.
- Explanations of limitations of classful addressing, subnetting, and how classless or CIDR addressing helps address those limitations by allowing flexible prefix lengths.
- An example is given of how CIDR allows efficient allocation of addresses to networks of different sizes.
IP addressing provides a unique identifier for devices on a network. There are two main types - static and dynamic. IP addresses are 32-bit numbers divided into network and host portions. Classes A, B, and C determine the portions. Subnetting and CIDR allow flexible allocation. Special addresses like private and link-local are never used publicly. IPv6 uses 128-bit addressing. Tools like ping, tracert, and pathping test network connectivity. Mobile IP uses home and care-of addresses to maintain connectivity as devices move between networks, with home and foreign agents facilitating address changes. Inefficiency can occur via double crossing or triangle routing.
IP address is a logical address defined at the network layer that is used by devices to communicate on an IP network. IP addresses are 32 bits in length and are allocated by IANA. As the internet grew, concerns arose around exhausting the available IP version 4 address space and increasing routing table sizes. Subnetting was introduced to help address these issues by adding a third level to the IP address hierarchy. Network address translation allows private IP addresses to be used internally and mapped to public IP addresses when communicating externally, further conserving the available IP address space.
This document discusses subnetting and provides examples. It describes subnetting as breaking up a large network into smaller subnets. Subnetting allows creating multiple networks from a single address block and maximizes addressing efficiency. The document then provides examples of subnetting a network using CIDR notation and calculating the number of subnets, hosts per subnet, valid IP ranges, and broadcast addresses. It also discusses an example of optimally subnetting the IP addresses needed across different departments within a university based on their host requirements.
The document discusses subnetting and provides an example of how to subnet the IP network address 192.168.1.128 into 6 subnets. It explains that subnetting allows a single network number to be shared among multiple physical networks. Each host is configured with an IP address and subnet mask, where the subnet is calculated by performing a bitwise AND of the IP address and subnet mask. The example shows how to determine the subnet mask is 255.255.255.224 when creating 6 subnets, and that each subnet can support up to 30 hosts.
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
An IP address is a unique 32-bit number that identifies each device on a network. It allows devices to communicate by sending and receiving data packets. IP addresses are made up of a network portion and host portion, with four sections that each range from 0-255. There are five classes of IP addresses - A, B, C, D and E - that determine the number of networks and hosts. IPv4 uses 32-bit addresses written in dotted decimal notation, while IPv6 uses 128-bit addresses written in hex. IP addresses can be static or dynamically assigned by a DHCP server.
The document discusses the Internet Protocol (IP) which is the cornerstone of the TCP/IP architecture and allows all computers on the Internet to communicate. There are two main versions of IP - IPv4, the currently used version, and IPv6 which is intended to replace IPv4 and includes improvements like longer addresses. IP addresses are 32-bit for IPv4 and 128-bit for IPv6. Strategies like private addressing and Classless Inter-Domain Routing (CIDR) help conserve the limited number of available IP addresses.
This document provides an introduction to IP addressing, including:
- A brief history of IP development and the OSI and TCP/IP models.
- An overview of IP address classes (A, B, C, D, E), how they are determined, and their characteristics like address ranges and network/host portions.
- Explanations of limitations of classful addressing, subnetting, and how classless or CIDR addressing helps address those limitations by allowing flexible prefix lengths.
- An example is given of how CIDR allows efficient allocation of addresses to networks of different sizes.
IP addressing provides a unique identifier for devices on a network. There are two main types - static and dynamic. IP addresses are 32-bit numbers divided into network and host portions. Classes A, B, and C determine the portions. Subnetting and CIDR allow flexible allocation. Special addresses like private and link-local are never used publicly. IPv6 uses 128-bit addressing. Tools like ping, tracert, and pathping test network connectivity. Mobile IP uses home and care-of addresses to maintain connectivity as devices move between networks, with home and foreign agents facilitating address changes. Inefficiency can occur via double crossing or triangle routing.
IP address is a logical address defined at the network layer that is used by devices to communicate on an IP network. IP addresses are 32 bits in length and are allocated by IANA. As the internet grew, concerns arose around exhausting the available IP version 4 address space and increasing routing table sizes. Subnetting was introduced to help address these issues by adding a third level to the IP address hierarchy. Network address translation allows private IP addresses to be used internally and mapped to public IP addresses when communicating externally, further conserving the available IP address space.
This document discusses subnetting and provides examples. It describes subnetting as breaking up a large network into smaller subnets. Subnetting allows creating multiple networks from a single address block and maximizes addressing efficiency. The document then provides examples of subnetting a network using CIDR notation and calculating the number of subnets, hosts per subnet, valid IP ranges, and broadcast addresses. It also discusses an example of optimally subnetting the IP addresses needed across different departments within a university based on their host requirements.
There are 5 classes of IP addresses - A, B, C, D and E - defined by TCP/IP, with classes A, B and C used for host addresses and classes D and E used for multicast and experimental purposes respectively. The value of the first octet determines the class and range of valid IP addresses. Special IP address ranges include 0.0.0.0/8 for communicating with the local network, 127.0.0.0/8 for loopback addresses, and 169.254.0.0/16 for link-local addresses.
Subnets divide a network into smaller sub-networks or subnets. Each subnet is treated as a separate network and can be further divided. When a packet enters a network with subnets, routers will route based on the subnet ID which is a combination of the network ID and subnet portion of the IP address. Subnets are only relevant for routing within an organization and are transparent outside the organization.
This document discusses the Internet Protocol (IP) version 4 and 6. It describes the key tasks of IP including addressing computers and fragmenting packets. IP version 4 uses 32-bit addresses while IP version 6 uses 128-bit addresses and has improvements like larger address space and better security. The document also covers IP address classes, private addressing, subnetting, Classless Inter-Domain Routing (CIDR), and address blocks.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
This document provides an overview of IPv4 addressing and subnetting. It discusses hardware addressing using MAC addresses, logical addressing using network IDs and host IDs, and the Internet Protocol (IP). IP uses 32-bit addresses and provides logical addressing and routing. Subnet masks distinguish the network and host portions of an IP address. CIDR notation compactly represents subnet masks. Address classes and subnetting create networks and hosts. Private IP addresses are used internally while public addresses can route on the internet.
IPv4 and IPv6 are the two main versions of Internet Protocol (IP) addresses currently in use. IPv4 addresses are 32-bit numbers expressed in dotted decimal notation, while IPv6 addresses are longer 128-bit hexadecimal strings. IP addresses are assigned to identify machines on a network and allow communication and transfer of data between devices.
Complete understanding of subnet masking
also available on the youtube channal in three parts 1,2,3
link:-
https://www.youtube.com/channel/UC36lyOTi8w1EhQ-yZssjX1g?view_as=subscriber.
Subnetting allows dividing a single network into multiple subnets. Each subnet is treated as a separate network and can be a LAN or WAN. Subnetting transforms host bits in the IP address into network bits, creating additional network identifiers from a single address block. The default subnet masks divide networks into classes A, B, and C. An example shows subnetting a Class C network with address 192.168.1.0/24 to create two /25 networks with 126 hosts each by using 1 host bit as a network bit. Transforming 2 host bits creates four /26 networks each with 62 hosts.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
The document discusses IP subnetting, including:
1. IP classes and why subnetting is used to preserve public IPv4 addresses.
2. An example of subnetting a Class C IP address to create 5 networks, including reserving bits in the subnet mask and determining the resulting network ranges.
3. Another example of subnetting a Class C IP address to create network ranges for 50 hosts, again reserving bits in the subnet mask and determining the network ranges.
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
The document discusses IP addressing basics including MAC addresses, IP addresses, private and public IP addresses, and subnetting. It provides examples of MAC addresses, ifconfig output showing MAC and IP addresses, private IP address ranges, and how to break up a Class C network into multiple subnets using subnet masks.
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
The document discusses various IP addressing concepts including IP addresses, subnet masks, CIDR notation, private and public IP addresses, subnetting using both fixed length and variable length subnet masks, and supernetting. IP addresses have a network portion and host portion that can be varied using subnet masks to create multiple logical subnets from one physical network. Subnetting and VLSM allow for more efficient use of IP address space, while supernetting reduces routing table sizes.
This document discusses IP addresses and MAC addresses. It provides details on:
1) IP addresses - including the structure of IP addresses, classes of IP addresses, private vs public IP addresses, and the roles of the network ID and host ID.
2) MAC addresses - including the unique 48-bit hardware number embedded in network cards, the format of MAC addresses, common manufacturer identifiers, and types of MAC addresses like unicast, multicast, and broadcast.
3) The relationship between IP addresses, which are logical addresses, and MAC addresses, which are physical addresses. IP addresses help identify devices over the network while MAC addresses uniquely identify network interfaces.
An IP address is a numerical label assigned to devices in a network using the Internet Protocol for communication. It is composed of four numbers separated by periods, with each number representing eight bits for a total of 32 bits. A subnet mask defines which parts of the IP address represent the network ID and which represent the host ID. A default gateway, usually a router, delivers packets when a computer does not know the destination network.
There are two main types of addresses used in networking: IP addresses and MAC addresses. IP addresses are assigned to devices using TCP/IP and allow devices to communicate on an IP network or the Internet. They consist of a network portion and host portion. MAC addresses are unique identifiers assigned to network interfaces.
IP addresses are a unique identifier for devices connected to a network. They allow for the delivery of data packets across networks. The structure of IP addresses includes a network prefix that identifies the network and a host number that identifies the specific device. Techniques like subnetting, CIDR, and IPv6 were developed to address the limited available IPv4 address space and allow for more efficient allocation and routing of IP addresses.
The document discusses Cisco routers and routing concepts. It provides details about Cisco router components, configuration, interfaces, routing protocols like RIP and IGRP, and autonomous systems. Cisco routers range from small access layer routers like the 700 series to large core routers like the 12000 series. Configuration is done through the console port initially and involves tasks like setting the hostname, passwords, interfaces and routing.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
There are 5 classes of IP addresses - A, B, C, D and E - defined by TCP/IP, with classes A, B and C used for host addresses and classes D and E used for multicast and experimental purposes respectively. The value of the first octet determines the class and range of valid IP addresses. Special IP address ranges include 0.0.0.0/8 for communicating with the local network, 127.0.0.0/8 for loopback addresses, and 169.254.0.0/16 for link-local addresses.
Subnets divide a network into smaller sub-networks or subnets. Each subnet is treated as a separate network and can be further divided. When a packet enters a network with subnets, routers will route based on the subnet ID which is a combination of the network ID and subnet portion of the IP address. Subnets are only relevant for routing within an organization and are transparent outside the organization.
This document discusses the Internet Protocol (IP) version 4 and 6. It describes the key tasks of IP including addressing computers and fragmenting packets. IP version 4 uses 32-bit addresses while IP version 6 uses 128-bit addresses and has improvements like larger address space and better security. The document also covers IP address classes, private addressing, subnetting, Classless Inter-Domain Routing (CIDR), and address blocks.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
This document provides an overview of IPv4 addressing and subnetting. It discusses hardware addressing using MAC addresses, logical addressing using network IDs and host IDs, and the Internet Protocol (IP). IP uses 32-bit addresses and provides logical addressing and routing. Subnet masks distinguish the network and host portions of an IP address. CIDR notation compactly represents subnet masks. Address classes and subnetting create networks and hosts. Private IP addresses are used internally while public addresses can route on the internet.
IPv4 and IPv6 are the two main versions of Internet Protocol (IP) addresses currently in use. IPv4 addresses are 32-bit numbers expressed in dotted decimal notation, while IPv6 addresses are longer 128-bit hexadecimal strings. IP addresses are assigned to identify machines on a network and allow communication and transfer of data between devices.
Complete understanding of subnet masking
also available on the youtube channal in three parts 1,2,3
link:-
https://www.youtube.com/channel/UC36lyOTi8w1EhQ-yZssjX1g?view_as=subscriber.
Subnetting allows dividing a single network into multiple subnets. Each subnet is treated as a separate network and can be a LAN or WAN. Subnetting transforms host bits in the IP address into network bits, creating additional network identifiers from a single address block. The default subnet masks divide networks into classes A, B, and C. An example shows subnetting a Class C network with address 192.168.1.0/24 to create two /25 networks with 126 hosts each by using 1 host bit as a network bit. Transforming 2 host bits creates four /26 networks each with 62 hosts.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
The document discusses IP subnetting, including:
1. IP classes and why subnetting is used to preserve public IPv4 addresses.
2. An example of subnetting a Class C IP address to create 5 networks, including reserving bits in the subnet mask and determining the resulting network ranges.
3. Another example of subnetting a Class C IP address to create network ranges for 50 hosts, again reserving bits in the subnet mask and determining the network ranges.
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
The document discusses IP addressing basics including MAC addresses, IP addresses, private and public IP addresses, and subnetting. It provides examples of MAC addresses, ifconfig output showing MAC and IP addresses, private IP address ranges, and how to break up a Class C network into multiple subnets using subnet masks.
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
The document discusses various IP addressing concepts including IP addresses, subnet masks, CIDR notation, private and public IP addresses, subnetting using both fixed length and variable length subnet masks, and supernetting. IP addresses have a network portion and host portion that can be varied using subnet masks to create multiple logical subnets from one physical network. Subnetting and VLSM allow for more efficient use of IP address space, while supernetting reduces routing table sizes.
This document discusses IP addresses and MAC addresses. It provides details on:
1) IP addresses - including the structure of IP addresses, classes of IP addresses, private vs public IP addresses, and the roles of the network ID and host ID.
2) MAC addresses - including the unique 48-bit hardware number embedded in network cards, the format of MAC addresses, common manufacturer identifiers, and types of MAC addresses like unicast, multicast, and broadcast.
3) The relationship between IP addresses, which are logical addresses, and MAC addresses, which are physical addresses. IP addresses help identify devices over the network while MAC addresses uniquely identify network interfaces.
An IP address is a numerical label assigned to devices in a network using the Internet Protocol for communication. It is composed of four numbers separated by periods, with each number representing eight bits for a total of 32 bits. A subnet mask defines which parts of the IP address represent the network ID and which represent the host ID. A default gateway, usually a router, delivers packets when a computer does not know the destination network.
There are two main types of addresses used in networking: IP addresses and MAC addresses. IP addresses are assigned to devices using TCP/IP and allow devices to communicate on an IP network or the Internet. They consist of a network portion and host portion. MAC addresses are unique identifiers assigned to network interfaces.
IP addresses are a unique identifier for devices connected to a network. They allow for the delivery of data packets across networks. The structure of IP addresses includes a network prefix that identifies the network and a host number that identifies the specific device. Techniques like subnetting, CIDR, and IPv6 were developed to address the limited available IPv4 address space and allow for more efficient allocation and routing of IP addresses.
The document discusses Cisco routers and routing concepts. It provides details about Cisco router components, configuration, interfaces, routing protocols like RIP and IGRP, and autonomous systems. Cisco routers range from small access layer routers like the 700 series to large core routers like the 12000 series. Configuration is done through the console port initially and involves tasks like setting the hostname, passwords, interfaces and routing.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This document provides information about the Cisco Certified Network Associate (CCNA) certification exam offered by ZOOM Technologies. The exam costs $150 USD and takes place over 90 minutes. It covers topics related to networking like IP addressing, routing, switching, VLANs, and troubleshooting through 55-65 multiple choice, drag and drop, and simulation questions. The recommended study materials are CCNA study guides and reference books by Wendell Odom and Richard Deal. The 13-day training course covers these topics in order.
Multilayer switching allows a single device to perform both layer 2 switching and layer 3 routing. It uses application-specific integrated circuits (ASICs) to store routing and forwarding information in hardware tables, allowing traffic to be forwarded at line speed with little delay. Multilayer switches can create a switched virtual interface (SVI) for each VLAN to allow routing between VLANs, functioning similarly to a router but with the ports remaining at layer 2. Cisco Express Forwarding (CEF) further improves efficiency by building forwarding tables to store layer 2 and layer 3 information, allowing very fast lookups and transmission of traffic through the switch.
This document discusses networking devices and technologies used to connect local area networks (LANs) and wide area networks (WANs). It describes common physical layer components used in Ethernet LANs such as twisted pair cable, fiber optic cable, and connectors. It also discusses serial connection options and devices used for WAN connections including CSU/DSUs and their roles as data terminal equipment (DTE) and data circuit-terminating equipment (DCE).
Networking allows devices to interconnect and communicate. The basic components required for a network are networking devices like switches and routers, network interfaces cards for each device, cabling or wireless media to connect the devices, and network protocols for communication. Common network types include LAN, MAN and WAN. LAN connects devices within a building, MAN within a city, and WAN connects LANs over long distances. IP addressing using IPv4 addresses in dot decimal notation like 192.168.1.1 is required for devices to communicate on a network.
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
This document provides a summary of a presentation on CCNA (Cisco Certified Network Associate). It was trained by Ravinder Kumar from Gurukul Technical Institute and submitted by Tarun Khaneja with roll number 2110045 and contact number 09034406598. The presentation introduces CCNA and discusses networking types and applications. It also covers networking devices, subnetting, routing protocols like RIP, EIGRP, OSPF, ACLs, VLANs, and inter-VLAN routing. Configuration examples are provided for EIGRP and RIP routing on the same network.
The document provides examples of subnetting IP address ranges to meet specific requirements for number of subnets and hosts. It demonstrates converting host bits in an IP address to network bits to create subnets, and calculating the resulting number of subnets, hosts per subnet, and subnet ranges. Custom subnet masks are provided based on the number of bits converted from host to network.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Interior Gateway Routing Protocol (IGRP) is a proprietary distance-vector routing protocol developed by Cisco that is used within an autonomous system to exchange routing information. The document describes IGRP configuration and operation, including setting the autonomous system number, configuring IGRP on routers, and verifying IGRP routes and neighbor adjacencies. Key aspects of IGRP covered are metrics, timers, and network diagrams demonstrating IGRP configuration between three routers to exchange routes.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document outlines a Cisco Certified Network Associate training program detailing the submission of a report on network media types to various instructors and administrators. It provides an overview of networking concepts such as how networks transmit data between users, the role of logical addressing and error correction, and routing processes to select paths for network traffic. The document lists several references used in creating the report on network media types for the Cisco training program.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document describes the Cisco Certified Network Associate (CCNA) Routing and Switching composite exam, including the topics covered, their weightings, and examples of items assessed. The exam focuses on network fundamentals, LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, infrastructure security, and infrastructure management. It provides detailed breakdowns of the content assessed within each of these areas.
The document discusses various WAN connection types including dedicated lines, circuit switching, and packet switching. It then describes specific connection types like DSL lines, ISDN, and Frame Relay. Protocols like PPP and HDLC are covered as well as authentication methods, NAT, routing, and configurations for ISDN internet and site-to-site connections.
A router is a networking device that connects different networks together and allows communication between them. It uses logical addressing like IP addresses to direct traffic between the networks. The document discusses different types of routers from Cisco including access layer routers for small networks, distribution layer routers for ISPs, and core layer routers for large backbones. It describes the various ports on a router like Ethernet, serial, console, and auxiliary ports and their purposes. The boot process of a router is also summarized where the ROM loads a bootstrap program from flash memory which then loads the IOS software and configuration from NVRAM into RAM.
This document discusses IP addressing and subnetting. It covers:
- The basics of IP version 4 and 6 addressing, including dotted decimal and colon-hex notation.
- How IP addresses are divided into classes A, B, C, D and E based on the priority bit in the first octet. This determines the number of available networks and hosts for each class.
- The concepts of network and broadcast addresses. Subnet masks are used to differentiate the network and host portions of an IP address.
- How subnetting can be used to divide a single network into multiple subnets to better utilize available addresses and bandwidth.
This document discusses IP addressing and subnetting. It covers:
- IP version 4 uses 32-bit addressing while IP version 6 uses 128-bit addressing.
- IP addresses are divided into classes A, B, C, D and E based on the number of network and host bits.
- Subnet masks are used to identify the network and host portions of an IP address. Subnetting allows dividing a network into multiple subnets.
IP addressing uses logical addressing at the network layer and includes both IP version 4 (32-bit) and version 6 (128-bit). MAC addressing uses physical addressing at the data link layer with a 48-bit address. IP addresses are divided into classes (A-E) based on the priority bit in the first octet, with each class designating a range of addresses and dividing the address into a network and host portion using subnet masks. Private IP addresses are reserved ranges that can be used internally without being routed on the public internet.
This document discusses IPv4 addressing concepts including:
- ARP and gratuitous ARP for address resolution and conflict detection
- Bitwise operations on IPv4 addresses like NOT, AND, OR
- Classful addressing which divides IPv4 space into classes A, B, C, D, E and uses network masks
- Classless addressing with CIDR which allows variable length network prefixes
- Special IPv4 addresses like network, broadcast and private addresses
The document discusses IPv4 addressing and subnetting. It begins by explaining the need for a network layer and describing IPv4 addressing fundamentals like address classes and notations. It then covers topics like subnet masks, CIDR notation, private IP ranges for NAT, and address depletion issues in IPv4. The document provides examples of subnetting Class C addresses using different subnet mask values. It also gives practice examples of subnetting Class B addresses.
Here are the subnet assignments for the given network:
NETWORK NUMBER NODE ADDRESSES BROADCAST ADDRESS
200.31.192.0 Reserved None
200.31.192.8 .9-.17 200.31.192.18
200.31.192.32 .33-.39 200.31.192.40
200.31.192.64 .65-.66 200.31.192.67
200.31.192.128 .129-.156 200.31.192.157
200.31.192.192 .193-.216 200.31.192.217
This document provides an overview of IPv4, ARP, and ICMP. It describes IPv4 addressing including classful addressing using classes A-E, classless addressing using CIDR notation, and special addresses. It also covers ARP including its operation, format, cache, and applications like proxy ARP and ARP spoofing. ICMP is introduced including its operation, format, types of messages for error reporting and querying, and tools. Hands-on examples of ARP requests, replies, probes and gratuitous ARP are also provided.
This document discusses IP addressing concepts including:
- An IP address is a numeric identifier assigned to each device on a network that indicates its location. It is a software address, not a hardware address.
- IP addresses are written in dotted decimal format with four sections separated by dots, where each section contains a number between 0 and 255.
- The network mask splits an IP address into the network portion and host portion, with 1s in the network mask indicating the network section and 0s the host section.
This document discusses IP addressing, subnetting, and how computers determine network addresses. It begins by explaining IP addresses and address classes. It then covers subnet masks and how they are used with a logical AND operation to identify the network portion of an IP address. The document provides an example of how subnetting can take a single class C network and divide it into multiple subnets/networks to make more efficient use of addressing. Specifically, it shows how 3 bits can be taken from the host portion and assigned to the network portion to create 6 subnets with up to 30 host addresses each from a single class C network.
An IP address is a unique 32-bit number that identifies each device on a network. It has two parts - a network prefix that identifies the network, and a host number that identifies the specific device. IP addresses are written in dotted decimal notation with four numbers between 0-255 separated by periods. Subnetting allows an organization to split the host number portion of an IP address into a subnet number and smaller host number, creating a three-level address hierarchy of network, subnet, and host. This improves efficiency and allows independent management of multiple internal networks.
The document discusses IP addressing and subnetting. It explains that an IP address consists of 32 bits and can be represented in dotted-decimal, binary, or hexadecimal notation. The 32-bit address is divided into four octets. Subnetting allows a network administrator to create multiple logical subnets within a single IP network by borrowing bits from the host field of the address and designating them as the subnet field. The document provides an example of how to determine the subnet mask size, create subnets, and calculate subnet, host, and broadcast addresses when subnetting a network.
The document discusses IPv4 addressing and subnetting. It describes the original IPv4 classful addressing scheme which divided addresses into classes A, B, and C based on the first octet. It explains how each class defined the number of network and host bits. It then introduces subnetting which allows networks to be divided into smaller subnets using a subnet mask, and describes how this led to classless addressing with variable length subnet masks.
This document discusses addressing in networks using TCP/IP. It defines physical addresses (MAC addresses), logical addresses (IP addresses), and port addresses. It explains IP version 4 addressing using dotted decimal notation and how addresses are divided into network and host portions based on class (A, B, C). Subnetting and supernetting allow networks to be divided into subnets or combined into larger supernets. The document provides examples of addressing calculation, network/broadcast addresses, subnet and supernet masks.
Reviews core networking concepts relevant for the Cloud practitioner. We use AWS as the platform. However the content is generally applicable across clouds.
Note: The instructor-led version of this presentation is at:
https://www.udemy.com/course/primer-for-the-aws-cloud-networking/
The Udemy.com course titled Primer for the AWS Cloud: Networking.
The document discusses IP addressing concepts including:
1. IP addresses are represented in binary and decimal, and methods to convert between the two. IPv4 addresses are 32-bit numbers that are commonly shown in dotted decimal notation.
2. IP networks are divided into a network portion and host portion using subnet masks. Common subnet masks like /24, /16, and /8 define the traditional IP address classes. More flexible classless addressing allows any prefix length.
3. Key addressing concepts include private vs public IP addresses, network vs broadcast addresses, subnetting to create more networks from an existing range, and utilities like ping and traceroute.
This document discusses subnetting and IP addressing. It introduces subnet masks and how they are used to divide networks into subnets. Specific examples are provided on subnetting Class A, B, and C networks using subnet masks like /28, 255.255.255.192, and 255.255.240.0. The document also discusses calculating the number of subnets and valid hosts for different subnet masks. Multiple practice questions are provided at the end to help understand subnetting.
The document summarizes key concepts in network design and IP subnetting, including:
1. It reviews IP addressing formats, classful addressing, and reserved addresses.
2. It defines subnetting terms like subnet mask, network field, host field, subnet ID, and broadcast ID.
3. It provides examples of how to calculate subnets by converting IP addresses and subnet masks to binary, applying the binary subnet mask using an AND operation, and determining the subnet ID, broadcast ID, and usable address range.
This document discusses IP address classes and classful addressing. It begins by introducing IP addresses and address space. It then covers the five IP address classes (A, B, C, D, E), describing the network and host ID bits for each class. Examples are provided to demonstrate calculating network addresses from IP addresses. The document concludes by discussing limitations of classful addressing and how it was replaced by CIDR.
Multilayer switching allows a single device to perform both layer 2 switching and layer 3 routing. It uses application-specific integrated circuits (ASICs) to store routing and forwarding information in hardware tables, allowing traffic to be forwarded at line speed with little delay. Multilayer switches can create a switched virtual interface (SVI) for each VLAN to allow routing between VLANs, functioning similarly to a router but with the ports remaining at layer 2. Cisco Express Forwarding (CEF) further improves efficiency by building forwarding tables to store layer 2 and layer 3 information, allowing very fast lookups and transmission of traffic through the switch.
Route authentication allows routers to authenticate routing updates by exchanging passwords or keys. It prevents routers without the correct authentication from participating in the routing process. There are two main types: simple password authentication uses a shared password, while MD5 authentication uses cryptographic hashes to authenticate packets without sending the key over the wire, making it more secure. The document provides sample configurations for enabling simple password authentication on RIPv2, EIGRP and OSPF routing protocols. It also explains how to configure MD5 authentication which involves additional commands to change the authentication mode.
The document discusses various common security threats and how to mitigate them using Cisco's IOS Firewall features. It describes application-layer attacks, autorooters, backdoors, denial of service attacks, IP spoofing, man-in-the-middle attacks, network reconnaissance, packet sniffers, password attacks, port redirection attacks, Trojan horse attacks and viruses, and trust exploitation attacks. It then outlines Cisco IOS Firewall features like stateful inspection, intrusion detection, firewall voice traversal, ICMP inspection, authentication proxy, destination URL policy management, per-user firewalls, router provisioning, DoS prevention, dynamic port mapping, Java applet blocking, traffic filtering, multi-interface support, NAT, time-
This document provides instructions and configuration examples for practicing CCNA exam simulations. It includes 15 practice exam simulations focused on configuring and troubleshooting routing protocols, VLANs, ACLs, and other networking topics. For each simulation, the document describes the network topology and objectives that must be met to complete the simulation successfully. It stresses the importance of fully understanding configuration topics in the author's CCNA study guide before attempting the practice exams.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document describes an OSPF network configuration across three routers - Hyderabad, Chennai and Bangalore. Chennai is configured as the backbone Area 0 router connecting two other areas - Area 1 between Hyderabad and Area 2 between Bangalore. Each router is configured with OSPF and associated networks and area IDs.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document discusses dynamic routing and the Routing Information Protocol (RIP). It provides details on RIP including that it is a distance vector protocol that uses hop count as its metric. RIP routers exchange their full routing tables every 30 seconds and routers learn routes to networks that are up to 15 hops away. The document also includes configuration examples for three routers to establish RIP routing between networks and verify connectivity between the routers.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document discusses dynamic routing and the Routing Information Protocol (RIP). It provides details on RIP including that it is a distance vector protocol that uses hop count as its metric. RIP routers exchange their full routing tables every 30 seconds and routers learn routes to networks that are up to 15 hops away. The document also includes configuration examples for RIP on routers in a sample network topology connecting the cities of Hyderabad, Chennai, and Bangalore.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This document provides instructions for connecting to and navigating the management console of a Cisco Catalyst 1900 switch. It includes:
1) Connecting a PC to the switch console port using a rollover cable and serial port adapter.
2) Opening terminal emulation software on the PC like HyperTerminal or Minicom to access the switch console.
3) Browsing the switch management console menu to configure settings like the IP address, subnet mask, and switching various ports to different VLANs for network segmentation.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
2. IP Addressing
• IP Addressing is Logical Addressing
• It works on Network Layer (Layer 3)
• Two Versions of Addressing Scheme
• IP version 4 – 32 bit addressing
• IP version 6 – 128 bit addressing
2
3. IP version 4
Bit is a value that will represent 0’s or 1’s (i.e. Binary)
01010101000001011011111100000001
• 32 bits are divided into 4 Octets known as Dotted
Decimal Notation
First Octet
Second Octet
Third Octet
Forth Octet
01010101. 00000101. 10111111. 00000001
3
4. IP version 6
• 128-bit address is divided along 16-bit boundaries,
and each 16-bit block is converted to a 4-digit
hexadecimal number and separated by colons
(Colon-Hex Notation)
FEDC:BA98:7654:3210:FEDC:BA98:7654:3210
4
5. Binary to Decimal Conversion
Taking Example for First Octet :
Total 8 bits, Value will be 0’s and 1’s
i.e. 28 = 256 combination
2 7 2 6 25 24 2 3 2 2 21 2 0
0 0 0 0 0 0 0 0 = 0
0 0 0 0 0 0 0 1 = 1
Total IP Address Range
0 0 0 0 0 0 1 0 = 2
Total IP Address Range
0 0 0 0 0 0 1 1 = 3
0 .. 0 .. 0 .. 0
0 0 0 0
0 0 0 0 0 1 0 0 = 4
to
to
255.255.255.255
255.255.255.255
1
1
1
1
1
1
1
1
= 255
5
6. IP Address Classes
• Total IP Addressing Scheme is divided
into 5 Classes
• CLASS A
• CLASS B
LAN & WAN
• CLASS C
• CLASS D
Multicasting
• CLASS E
Research & Development
6
7. Priority Bit Concept
• To identify the range of each class
a bit called priority bit is used.
• Priority Bit is the left most bits in the First Octet
• CLASS A priority bit is
0
• CLASS B priority bit is
10
• CLASS C priority bit is
110
• CLASS D priority bit is
1110
• CLASS E priority bit is
1111
7
8. CLASS A Range
For Class A range : First bit of the first octet
should be reserved for the priority bit.
0xxxxxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27
0
0
0
0
0
26
0
0
0
0
0
25
0
0
0
0
0
24
0
0
0
0
0
23
0
0
0
0
0
22
0
0
0
0
1
21
0
0
1
1
0
20
0
1
0
1
0
=
=
=
=
=
0
1
1
1
1
1
1
1
= 127
0
1
2
3
4
Class A Range
Class A Range
0 0 0 0 to
0 .. 0 .. 0 .. 0 to
127.255.255.255
127.255.255.255
Exception
Exception
0.X.X.X and 127.X.X.X
0.X.X.X and 127.X.X.X
network are reserved
network are reserved
8
9. CLASS B Range
For Class B range : First two bits of the first
octet should be reserved for the priority bit.
10xxxxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27
1
1
1
1
1
26
0
0
0
0
0
25
0
0
0
0
0
24
0
0
0
0
0
23
0
0
0
0
0
22
0
0
0
0
1
21
0
0
1
1
0
20
0
1
0
1
0
=
=
=
=
=
1
0
1
1
1
1
1
1
= 191
128
129
130
131
132
Class B Range
Class B Range
128. 0 0 0
128. 0 .. 0 .. 0
to
to
191.255.255.255
191.255.255.255
9
10. CLASS C Range
For Class C range : First Three bits of the first
octet should be reserved for the priority bit.
110xxxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27
1
1
1
1
1
26
1
1
1
1
1
25
0
0
0
0
0
24
0
0
0
0
0
23
0
0
0
0
0
22
0
0
0
0
1
21
0
0
1
1
0
20
0
1
0
1
0
=
=
=
=
=
1
1
0
1
1
1
1
1
= 223
192
193
194
195
196
Class C Range
Class C Range
192. 0 0 0
192. 0 .. 0 .. 0
to
to
223.255.255.255
223.255.255.255
10
11. CLASS D Range
For Class D range : First four bits of the first
octet should be reserved for the priority bit.
1110xxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27
1
1
1
1
1
26
1
1
1
1
1
25
1
1
1
1
1
24
0
0
0
0
0
23
0
0
0
0
0
22
0
0
0
0
1
21
0
0
1
1
0
20
0
1
0
1
0
=
=
=
=
=
1
1
1
0
1
1
1
1
= 239
224
225
226
227
228
Class D Range
Class D Range
224. 0 0 0
224. 0 .. 0 .. 0
to
to
239.255.255.255
239.255.255.255
11
12. CLASS E Range
For Class E range : First four bits of the first
octet should be reserved for the priority bit.
1111xxxx. xxxxxxxx. xxxxxxxx. xxxxxxxx
27
1
1
1
1
1
26
1
1
1
1
1
25
1
1
1
1
1
24
1
1
1
1
1
23
0
0
0
0
0
22
0
0
0
0
1
1
1
1
1
1 1
21
0
0
1
1
0
1
20
0
1
0
1
0
1
=
=
=
=
=
240
241
242
243
244
Class E Range
Class E Range
240. 0 0 0
240. 0 .. 0 .. 0
to
to
255.255.255.255
255.255.255.255
= 255
12
13. Octet Format
• IP address is divided into Network & Host Portion
• CLASS A is written as
N.H.H.H
• CLASS B is written as
N.N.H.H
• CLASS C is written as
N.N.N.H
13
14. CLASS A – No. Networks & Host
• Class A Octet Format is N.H.H.H
• Network bits : 8
• No.
=
=
=
=
• No.
=
=
=
Host bits : 24
of Networks
28-1
(-1 is Priority Bit for Class A)
27
CLASS A
128 – 2 (-2 is for 0 & 127 Network) CLASS A
126 Networks
126 Networks
126 Networks
&
&
16777214 Hosts/Nw
of Host
16777214 Hosts/Nw
224 – 2 (-2 is for Network ID & Broadcast ID)
16777216 - 2
16777214 Hosts/Network
14
15. CLASS B – No. Networks & Host
• Class B Octet Format is N.N.H.H
• Network bits : 16
Host bits : 16
• No.
=
=
=
of Networks
216-2 (-2 is Priority Bit for Class B)
214
CLASS B
CLASS B
16384 Networks
• No.
=
=
=
&
&
of Host
65534 Hosts/Nw
216 – 2 (-2 is for Network ID & 65534 Hosts/Nw
Broadcast ID)
65536 - 2
65534 Hosts/Network
16384 Networks
16384 Networks
15
16. CLASS C – No. Networks & Host
• Class C Octet Format is N.N.N.H
• Network bits : 24
Host bits : 8
• No.
=
=
=
of Networks
224-3 (-3 is Priority Bit for Class C)
221
CLASS C
CLASS C
2097152 Networks
• No.
=
=
=
&
&
of Host
254 Hosts/Nw
28 – 2 (-2 is for Network ID & Broadcast ID)
254 Hosts/Nw
256 - 2
254 Hosts/Network
2097152 Networks
2097152 Networks
16
17. Network & Broadcast Address
• The network address is represented with all bits as
ZERO in the host portion of the address
• The broadcast address is represented with all bits as
ONES in the host portion of the address
• Valid IP Addresses lie between the Network Address
and the Broadcast Address.
• Only Valid IP Addresses are assigned to hosts/clients
17
18. Example - Class A
Class A : N.H.H.H
Network Address :
0xxxxxxx.00000000.00000000.00000000
Broadcast Address :
0xxxxxxx.11111111.11111111.11111111
Class A
Class A
10.0.0.0
10.0.0.0
10.0.0.1
10.0.0.1
10.0.0.2
10.0.0.2
10.0.0.3
10.0.0.3
10.255.255.254
10.255.255.254
10.255.255.255
10.255.255.255
Network Address
Valid IP Addresses
Broadcast Address
18
19. Example - Class B
Class B : N.N.H.H
Network Address :
10xxxxxx.xxxxxxxx.00000000.00000000
Broadcast Address :
10xxxxxx.xxxxxxxx.11111111.11111111
Class B
Class B
172.16.0.0
172.16.0.0
172.16.0.1
172.16.0.1
172.16.0.2
172.16.0.2
172.16.0.3
172.16.0.3
172.16.255.254
172.16.255.254
172.16.255.255
172.16.255.255
Network Address
Valid IP Addresses
Broadcast Address
19
20. Example - Class C
Class C : N.N.N.H
Network Address :
110xxxxx.xxxxxxxx.xxxxxxxx.00000000
Broadcast Address :
110xxxxx.xxxxxxxx.xxxxxxxx.11111111
Class C
Class C
192.168.1.0
192.168.1.0
192.168.1.1
192.168.1.1
192.168.1.2
192.168.1.2
192.168.1.3
192.168.1.3
192.168.1.254
192.168.1.254
192.168.1.255
192.168.1.255
Network Address
Valid IP Addresses
Broadcast Address
20
21. Private IP Address
• There are certain addresses in each class of IP
address that are reserved for LAN. These addresses
are called private addresses.
• They can be used for: home & office networks,
networks not connected to Internet.
Class A
Class A
10.0.0.0 to 10.255.255.255
10.0.0.0 to 10.255.255.255
Class B
Class B
172.16.0.0 to 172.31.255.255
172.16.0.0 to 172.31.255.255
Class C
Class C
192.168.0.0 to 192.168.255.255
192.168.0.0 to 192.168.255.255
21
22. Subnet Mask
• Subnet Mask differentiates Network portion and Host
Portion
• Subnet Mask is been given for host Identification of
Network ID
• Represented with all 1’s in the network portion
and with all 0’s in the host portion.
22
23. Subnet Mask - Examples
Class A : N.H.H.H
11111111.00000000.00000000.00000000
Default Subnet Mask for Class A is 255.0.0.0
Class B : N.N.H.H
11111111.11111111.00000000.00000000
Default Subnet Mask for Class B is 255.255.0.0
Class C : N.N.N.H
11111111.11111111.11111111.00000000
Default Subnet Mask for Class C is 255.255.255.0
23
24. How Subnet Mask Works ?
IP Address :
Subnet Mask :
192.168.1.1
255.255.255.0
ANDING PROCESS :
192.168.1.1
= 11000000.10101000.00000001.00000001
AND TABLE
AND TABLE
255.255.255.0 = 11111111.11111111.11111111.00000000
A
B
C
=======================================
A
B
C
192.168.1.0
= 11000000.10101000.00000001.00000000
0
0
0
0
0
0
=======================================
0
1
0
0
1
0
1
0
1
0are 1.0
0
The output of an AND table is 1 if both its inputs
1
1
1
1
1
For all other possible inputs the output is1
0.
24
25. Subnetting
• Dividing a Single Network into Multiple Networks.
• Converting Host bits to Network Bits
i.e. Converting 0’s into 1’s
• Subnetting is also called as FLSM (Fixed Length
Subnet Mask)
• Subnetting can be done in three ways.
– Requirement of Networks
– Requirement of Hosts
– Cisco / Notation
25
26. Scenario
ZOOM Technologies is having 100 PC
• Which Class is preffered for the network ?
Answer : Class C.
• In ZOOM Technologies we have Five Departments
with 20 Pcs each
ZOOM Technologies – 192.168.1.0/24
–
–
–
–
–
MCSE
CISCO
FIREWALL
SOLARIS
TRAINING
192.168.1.1
192.168.1.21
192.168.1.41
192.168.1.61
192.168.1.81
to
to
to
to
to
192.168.1.20
192.168.1.40
192.168.1.60
192.168.1.80
192.168.1.100
26
27. Scenario (…continued)
• Administrator’s Requirement :
Inter-department communication should not be
possible ?
Solution.
Allocate a different Network to each Department
i.e.
– MCSE
192.168.1.1 to 192.168.1.20
– CISCO
192.168.2.1 to 192.168.2.20
– FIREWALL
192.168.3.1 to 192.168.3.20
– SOLARIS
192.168.4.1 to 192.168.4.20
– TRAINING
192.168.5.1 to 192.168.5.20
• In the above Scenario inter-department
communication is not possible.
27
28. Main Aim of Subnetting
Problem with the previous Scenario is :• Loss of bandwidth as the broadcasting is done for
254 machines rather than for 20 machines.
• Wastage of IP addresses (Approximately 1000)
• No Security
28
30. Some Important Values
VALUES IN SUBNET MASK
VALUES IN SUBNET MASK
Bit
Bit
Value
Value
Mask
Mask
1
1
128
128
10000000
10000000
2
2
192
192
11000000
11000000
3
3
224
224
11100000
11100000
4
4
240
240
11110000
11110000
5
5
248
248
11111000
11111000
6
6
252
252
11111100
11111100
7
7
254
254
11111110
11111110
8
8
255
255
11111111
11111111
30
31. Requirement of Networks is 5 ?
Example – 1
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.0
• No.
=
=
=
=
• No.
=
=
=
=
of Subnet
2n – 2 ≥ Req. of Subnet
23 – 2 ≥ 5 (-2 is for First & Last Subnet Range)
8–2
6 Subnet
of Host
2h – 2 (-2 is for Network ID & Broadcast ID)
25 – 2
32 – 2
30 Hosts/Subnet
31
HELP
32. Example – 1 (Continued…)
• Customize Subnet Mask = Bits to Network Bits
If you convert 3 Host
If you convert 3 Host Bits to Network Bits
255.
255.
224
6 Subnet & 30 Hosts/Subnet
Subnet & 255.
30 Hosts/Subnet
6
1
2
8
6
4
3
2
11111111 11111111 11111111 11100000
Customize Subnet Mask
.
.
.
Customize Subnet Mask
255.255.255.224
255.255.255.224
• Range of Networks
Network ID
Broadcast ID
Subnet Range
Subnet Range
192.168.1.31 x
192.168.1.0
192.168.1.32 to 192.168.1.63 MCSE
to 192.168.1.63 MCSE
192.168.1.32
..
192.168.1.32
192.168.1.63
192.168.1.64 to 192.168.1.95 CISCO
to 192.168.1.95 CISCO
192.168.1.64
..
192.168.1.64
192.168.1.95
192.168.1.96 to 192.168.1.127 FIREWALL
to 192.168.1.127 FIREWALL
192.168.1.96
192.168.1.96
192.168.1.127
192.168.1.128 to 192.168.1.159 SOLARIS
Valid Subnets
192.168.1.128 to 192.168.1.159 SOLARIS
192.168.1.128
192.168.1.159
192.168.1.160 to 192.168.1.191 TRAINING
to 192.168.1.191 TRAINING
192.168.1.160
192.168.1.160
192.168.1.191
192.168.1.192 to 192.168.1.223 Future Use
to 192.168.1.223 Future Use
192.168.1.192
192.168.1.192
192.168.1.223
192.168.1.224
192.168.1.255 x
32
33. Requirement of Networks is 14 ?
Example – 2
Class C : N.N.N.H
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Class C : 192.168.1.0
• No.
=
=
=
=
of Subnet
2n – 2 ≥ Req. of Subnet
24 – 2 ≥ 14 (-2 is for First & Last Subnet Range)
16 – 2
14 Subnet
• No.
=
=
=
=
of Host
2h – 2 (-2 is for Network ID & Broadcast ID)
24 – 2
16 - 2
14 Hosts/Subnet
33
HELP
34. Example – 2 (Continued…)
• Customize Subnet Mask = Bits to Network Bits
If you convert 4 Host
If you convert 4 Host Bits to Network Bits
255.
255.
240
14 Subnet & 255.Hosts/Subnet
Subnet & 14 Hosts/Subnet
14
14
1
2
8
6
4
3
2
1
6
11111111 11111111 11111111 11110000
Customize Subnet Mask
.
.
.
Customize Subnet Mask
255.255.255.240
255.255.255.240
• Range of Networks
Network ID
Broadcast ID
Subnet Range
Subnet Range
–
192.168.1.15 x
192.168.1.0
192.168.1.16 to 192.168.1.31
192.168.1.16 to 192.168.1.31
192.168.1.16
–
192.168.1.31
192.168.1.32 to 192.168.1.47
192.168.1.32 to 192.168.1.47
192.168.1.32
–
192.168.1.47
192.168.1.48 to 192.168.1.63
192.168.1.48 to 192.168.1.63
192.168.1.48
–
192.168.1.63
192.168.1.64 to 192.168.1.80
192.168.1.64 to 192.168.1.80Valid Subnets
192.168.1.224 –
192.168.1.239
192.168.1.224 to 192.168.1.239
192.168.1.224 to 192.168.1.239
192.168.1.240 –
192.168.1.255 x
34