This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
Many users of computers, tablets, smartphones, routers and other networking devices are faced with a term such as MAC address. In this presentation, we’ll explain what a MAC address is, how to get a MAC address and how to change it in on a Mac operating system.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
Many users of computers, tablets, smartphones, routers and other networking devices are faced with a term such as MAC address. In this presentation, we’ll explain what a MAC address is, how to get a MAC address and how to change it in on a Mac operating system.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
If the number of spine switches were to be merely doubled, the effect of a single switch failure is halved. With 8 spine switches, the effect of a single switch failure only causes a 12% reduction in available bandwidth. So, in modern data centers, people build networks with anywhere from 4 to 32 spine switches. With a leaf-spine network, every server on the network is exactly the same distance away from all other servers – three port hops, to be precise. The benefit of this architecture is that you can just add more spines and leaves as you expand the cluster and you don't have to do any recabling. Intuition Systems will also get more predictable latency between the nodes.
As a trend, disaggregation seems to be most useful for very large companies like Facebook and Google, or cloud providers. The technology does not necessarily have significant implications for small or medium sized businesses. Historically, however, technology has a way of trickling down from the pioneering phases of existing only within large companies with tremendous resources, to becoming more standardized across the board.
Subnetting of IPv4 ip address that help you to solve every type of ip address with any one of the class you want to subnet,and have a basic introduction of IPv6 ,and why, Ipv5 is not used.
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. What is an IP address?
An unique identifier for a computer or
device (host) on a TCP/IP network.
32 bit binary sequence.
Valid addresses can range from
0.0.0.0 to 255.255.255.255
Total No.Of address= 2^32 =4.3 Billion.
5/9/2018 2
3. Dotted Decimal Notation
IP addresses are written in a so-called dotted decimal
notation
Each byte is identified by a decimal number in the range
[0..255]:
Example:
1000111110000000 10001001 10010000
1st Byte
= 128
2nd Byte
= 143
3rd Byte
= 137
4th Byte
= 144
128.143.137.144
5/9/2018 3
4. History:
I P was the connectionless datagram service in the original.
Transmission Control Program introduced by Vint Cerf and Bob
Kahn in 1974; the other being the connection-oriented Transmission
Control Protocol (TCP). The Internet protocol suite is therefore
often referred to as TCP/IP.
General structure:
5/9/2018
IP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which mIP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which mIP is the core of the TCP/IP protocol suite. IP provides the fundamental mechanism using which data is delivered between devices which m
NETWORK ID HOST ID
HIGH order bits LOW order bits
4
6. Types of IP addresses:
Static address:
Permanently fixed for external devices
Manually Configured for a device.
Manageable for small networks.
Security less, more vulnerable to hacking treats.
Good for web, emails database server and FTP server.
5/9/2018 6
7. Dynamic address:
Assigned by server when host boots.
Assigned via DHCP and BOOTP protocols .
Derived automatically from a range of addresses.
Cheaper than static IP address.
Changing IP address gives more privacy
5/9/2018 7
9. CLASS—A IP ADDRESS
0_ _ _ _ _ _ _ (8 bit NID) 24 bit HID
• No. of networks =2^7=128
• Range= 1 to 126 (loopback address=127.0.0.0)
• No. Of IP addresses/networks= 2^24=16M
• No. of host configured = 2^24-2
5/9/2018 9
10. CLASS—B IP ADDRESS
10____________(16 bit NID) 16 bit HID
• No. of networks =2^14=16K.
• Range= 128 to 191.
• No. Of IP addresses/networks= 2^16=64K.
• No. of host configured= 2^16-2.
5/9/2018 10
11. CLASS—C IP ADDRESS
110____________(24bit NID) 8 bit HID
• No. of networks =2^21=2M.
• Range=192 to 223.
• No. Of IP addresses/networks= 2^8=256.
• No. of host configured=254.
5/9/2018 11
12. 5/9/2018
CLASS—D IP ADDRESS
• Range= 224 to 239
Class –E IP ADDRESS
• Range= 240 to 255
• Not used for host addressing.
12
13. Reserved IP Address
First IP address of any class of IP is reserved representing
IP Address of entire network where HID=0.
Limited Broadcast address (Sending the packet to all the
host in the SAME network)=255.255.255.255 is FIXED.
Last IP address is reserved for Directed broadcast address
( to all host in DIFFERENT network) where HID=1.
Example: 20.255.255.255
5/9/2018
NID HID=1
13
14. Classfull : DISADVANTAGES
Value of first octet determines the NID and HID
part.
Address space exhaustion.
Same subnet Mask is used in complete network.
Used with classfull routing protocol like RIPv1.
Limited No. of network for a particular class.
5/9/2018 14
15. CIDR
Subnet Mask determines the NID and HID portion.
BGP( Border gateway protocol), RIPv2 protocols are used.
a.b.c.d/x where x is # bits in network portion of address.
Variable length subnet mask (VLSM) is used.
5/9/2018
11001000 00010111 00010000 00000000
network
part
host
part
200.23.16.0/23
15
16. 5/9/2018 4a-16
Public IP Addresses
1. Public IP addresses are global and standardized.
2. Can be accessed over the Internet.
3. Internet Assigned Numbers Authority (IANA) formerly
known as (InterNIC) is responsible for registering IP address
to organizations and ISPs.
4. For multiple computers ;
Private IP addresses to address each
computer and router gets the public IP address, and each of
the computers, connected to your router (via wired or wifi)
gets a private IP address from your router via DHCP (Client-
server)protocol on network layer.
17. Private IP address
Local or internal IP connect devices in a private
network and can’t access internet.
They are Non-Routable.
To allow direct access to a local device which is assigned a
private IP address, a Network Address Translator (NAT)
should be used.
5/9/2018
CLASS RANGE # of HOST
A 10.0.0.0/8 10.255.255.255 16,777,216
B 172.16.0.0./12 172.31.255.255 1,048,576
C 192.168.0.0/16 192.168.255.255 65,536
17
18. IP Usage:
An Internet Protocol provides for a set of rules
that govern Internet activity and facilitate completion of
transfer of files and E-mail on the World Wide Web.
Used to connect to another computer via host
or network interface identification and location
addressing.
IP is the core of the TCP/IP protocol suite. IP
provides the fundamental mechanism using which data
is delivered between devices which may or may not be
in the same network.
5/9/2018 18
19. DATA ENCAPSULATION which provides security.
FRAGMENTATION which promotes reliability.
REASSEMBLING on the receiving device and passes it
on to the higher layers for interpretation.
FORMATTING/PACKAGING where format and
package is only decipherable by the recipient.
5/9/2018 19
20. IPv4 and IPv6
• IPv6 is used by less than 1% of the networks, while IPv4 is still in use by
the remaining 99%.
5/9/2018
PARAMETERS IPv4 address IPv6 address
Length • 32 bit • 128 bit
Representation • decimals (.) • Hexadecimal (:)
Security Application dependent Inbuilt IPsec support.
Packet Fragmentation Senders and Router. Only Senders
Packet Flow NOT AVAILABLE FLOW label field in
IPv6 header.
Address Configuration Manual and DHCP support. Auto-configuration.
Address Types Unicast and Broadcast. Multicast and Anycast.
Address Resolution
Protocol (ARP)
ARP is available to map IPv4
addresses to MAC address.
MAC address embedded
HID part.NDP
Available.
20
Hence ip addresses are unique in nature. NO two machines that connect to a public network can have the same IP address.
A web server, email server and any server device directly accessible from the Internet
encapsulating the data into an IP datagram.
IP fragments datagram into pieces, so that they can each be carried on the local network.
IP reassembles the datagrams received into the full IP datagram (as they may be fragmented)
IP uses a specific formatting and packaging prior to transmission. IP accepts data from the transport layer protocols above it in the OSI layer--UDP and TCP--and passes them to the data layers.
Enhanced version
Internet protocol security IPsec is optional. More
In packet switching networks, traffic flow, packet flow or network flow is a sequence of packets from a source computer to a destination,
dynAMIC or static configuration.
Every packet based network has an MTU (Maximum Transmission Unit) size. The MTU is the size of the largest packet that that network can transmit.
Packets larger than the allowable MTU must be divided into smaller packets or fragments to enable them to traverse the network.
The Neighbor Discovery Protocol (NDP, ND)[1] is a protocol in the Internet protocol suite used with Internet Protocol Version 6 (IPv6). It operates at the Network Layer of the Internet model (RFC 1122), and is responsible for gathering various information required for internet communication, including the configuration of local connections and the domain name servers and gateways used to communicate with more distant systems.[2]