SlideShare a Scribd company logo
IP Addressing & Subnetting
Made Easy
Developed By
Md Mahmudur Rahman Lanin
MiKroTik Listed Consultant
B.Sc in CSE
G.M (Technical Department)
Bijoy Online Ltd.
____________________________________________________________
MTCNA, MTCRE, CCNA, CCNP, RHSE
1Developed By Lanin
Working with IP
Addresses
2Developed By Lanin
Developed By Lanin 3
Introduction
1. You can probably work with decimal
numbers much easier than with the
binary numbers needed by the
computer.
2. Working with binary numbers is time-
consuming & error-prone.
Developed By Lanin 4
Octets
 The 32-bit IP address is broken up
into 4 octets, which are arranged into
a dotted-decimal notation scheme.
 An octet is a set of 8 bits & not a
musical instrument.
Example of an IP version 4:
172.64.126.52
Developed By Lanin 5
Thinking in Binary
A.The binary system uses only 2 values
“0 & 1” to represent numbers in
positions representing increasing
powers of 2.
B.We all are accustomed to thinking &
working in the decimal system, which
is based on the number 10.
Developed By Lanin 6
Thinking in Binary (Cont.)
A.To most humans, the number 124
represents 100 + 20 + 4.
B.To the computer, this number is
1111100, which is 64 (26) + 32 (25)
+ 16 (24) + 8 (23) + 4 (22) + 0 + 0
Developed By Lanin 7
 Each position in a binary
number represents, right to left,
a power of two beginning with 20
& increasing by one power as it
moves left: 20, 21, 22, 24, etc.
Developed By Lanin 8
Converting to Decimal
1. You’ll need to convert binary to decimal &
vice versa to compute subnets & hosts.
2. So, it’s time for a quick review lesson in
binary-to-decimal conversion.
3. There are 8 bits in an octet & each bit can
only be a 1 or a 0.
Developed By Lanin 9
Converting to Decimal (Cont.)
 What then do you suppose is the largest
decimal number that can be expressed in an
octet?
Eight 1’s (1111 1111)
Developed By Lanin 10
27 26 25 24 23 22 21 20
1 1 1 1 1 1 1 1
128 64 32 16 8 4 2 1
Converting to Decimal (Cont.)
A.Now, for double the money, what is its
equivalent decimal value?
The binary number 1111 1111 converts into the decimal number:
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255
Developed By Lanin 11
Converting to Decimal (Cont.)
1. Therefore, the largest decimal
number that can be stored in an IP
address octet is 255.
2. The significance of this should
become evident later in this
presentation.
Developed By Lanin 12
IPAddress Classes
1.IP addresses are divided into 5 classes,
each of which is designated with the
alphabetic letters A to E.
2.Class D addresses are used for
multicasting.
3.Class E addresses are reserved for
testing & some mysterious future use.
Developed By Lanin 13
IPAddress Classes (Cont.)
The 5 IP classes are split up based on the
value in the 1st octet:
Developed By Lanin 14
IPAddress Classes (Cont.)
Using the ranges, you can determine
the class of an address from its 1st octet
value.
An address beginning with 120 is a
Class A address, 155 is a Class B
address & 220 is a Class C address.
Developed By Lanin 15
Are You the Host or the
Network?
 The 32 bits of the IP address are divided into
Network & Host portions, with the octets assigned
as a part of one or the other.
Network & Host Representation
By IP Address Class
Class Octet1 Octet2 Octet3 Octet4
Class A Network Host Host Host
Class B Network Network Host Host
Class C Network Network Network Host
Developed By Lanin 16
Are You the Host or the
Network? (Cont.)
 Each Network is assigned a network address
& every device or interface (such as a router
port) on the network is assigned a host
address.
 There are only 2 specific rules that govern the
value of the address.
Developed By Lanin 17
Are You the Host or the
Network? (Cont.)
 A host address cannot be designated by
all zeros or all ones.
 These are special addresses that are
reserved for special purposes.
Developed By Lanin 18
Class A Addresses
 Class A IP addresses use the 1st 8 bits (1st Octet)
to designate the Network address.
 The 1st bit which is always a 0, is used to
indicate the address as a Class A address & the
remaining 7 bits are used to designate the
Network.
 The other 3 octets contain the Host address.
Developed By Lanin 19
Class A Addresses (Cont.)
 There are 128 Class A Network
Addresses, but because addresses with
all zeros aren’t used & address 127 is a
special purpose address, 126 Class A
Networks are available.
Developed By Lanin 20
Class A Addresses (Cont.)
 There are 16,777,214 Host addresses
available in a Class A address.
 Rather than remembering this number
exactly, you can use the following formula
to compute the number of hosts available in
any of the class addresses, where “n”
represents the number of bits in the host
portion:
(2n – 2) = Number of available hosts
Developed By Lanin 21
Class A Addresses (Cont.)
 For a Class A network, there are:
224 – 2 or 16,777,214 hosts.
 Half of all IP addresses are Class A
addresses.
 You can use the same formula to
determine the number of Networks in an
address class.
 Eg., a Class A address uses 7 bits to
designate the network, so (27 – 2) = 126 or
there can be 126 Class A Networks.
Developed By Lanin 22
Class B IP Addresses
 Class B addresses use the 1st 16 bits (two
octets) for the Network address.
 The last 2 octets are used for the Host
address.
 The 1st 2 bit, which are always 10,
designate the address as a Class B
address & 14 bits are used to designate
the Network. This leaves 16 bits (two
octets) to designate the Hosts.
Developed By Lanin 23
Class B IP Addresses (Cont.)
 So how many Class B Networks can there
be?
 Using our formula, (214 – 2), there can be
16,382 Class B Networks & each Network
can have (216 – 2) Hosts, or 65,534 Hosts.
Developed By Lanin 24
Class C IP Addresses
 Class C addresses use the 1st 24 bits
(three octets) for the Network address &
only the last octet for Host addresses.the
1st 3 bits of all class C addresses are set to
110, leaving 21 bits for the Network
address, which means there can be
2,097,150 (221 – 2) Class C Networks, but
only 254 (28 – 2) Hosts per Network.
Developed By Lanin 25
Class C IP Addresses (Cont.)
Developed By Lanin 26
Special Addresses
 A few addresses are set aside for specific
purposes.
 Network addresses that are all binary
zeros, all binary ones & Network
addresses beginning with 127 are special
Network addresses.
Developed By Lanin 27
Special Addresses (Cont.)
Developed By Lanin 28
Special Addresses (Cont.)
 Within each address class is a set of
addresses that are set aside for use in
local networks sitting behind a firewall or
NAT (Network Address Translation)
device or Networks not connected to the
Internet.
Developed By Lanin 29
Special Addresses (Cont.)
 A list of these addresses for each IP
address class:
Developed By Lanin 30
Subnet Mask
 An IP address has 2 parts:
 The Network identification.
 The Host identification.
 Frequently, the Network & Host portions of
the address need to be separately
extracted.
 In most cases, if you know the address class,
it’s easy to separate the 2 portions.
Developed By Lanin 31
Subnet Mask (Cont.)
 With the rapid growth of the internet &
the ever-increasing demand for new
addresses, the standard address class
structure has been expanded by
borrowing bits from the Host portion to
allow for more Networks.
 Under this addressing scheme, called
Subnetting, separating the Network &
Host requires a special process called
Subnet Masking.
Developed By Lanin 32
Subnet Mask (Cont.)
 The subnet masking process was
developed to identify & extract the
Network part of the address.
 A subnet mask, which contains a binary
bit pattern of ones & zeros, is applied to
an address to determine whether the
address is on the local Network.
 If it is not, the process of routing it to an
outside network begins.
Developed By Lanin 33
Subnet Mask (Cont.)
 The function of a subnet mask is to
determine whether an IP address exists
on the local network or whether it must
be routed outside the local network.
 It is applied to a message’s destination
address to extract the network address.
 If the extracted network address
matches the local network ID, the
destination is located on the local
network.
Developed By Lanin 34
Subnet Mask (Cont.)
 However, if they don’t match, the
message must be routed outside the
local network.
 The process used to apply the subnet
mask involves Boolean Algebra to filter
out non-matching bits to identify the
network address.
Developed By Lanin 35
Boolean Algebra
 Boolean Algebra is a process that applies
binary logic to yield binary results.
 Working with subnet masks, you need
only 4 basic principles of Boolean
Algebra:
 1 and 1 = 1
 1 and 0 = 0
 0 and 1 = 0
 0 and 0 = 0
Developed By Lanin 36
Boolean Algebra (Cont.)
 In another words, the only way you can
get a result of a 1 is to combine 1 & 1.
Everything else will end up as a 0.
 The process of combining binary values
with Boolean Algebra is called Anding.
Developed By Lanin 37
Default Standard Subnet Masks
 There are default standard subnet masks
for Class A, B and C addresses:
Developed By Lanin 38
A Trial Separation (Cont.)
 The subnet mask goes like this:
1. If a destination IP address is
206.175.162.21, we know that it is a
Class C address & that its binary
equivalent is:
11001110.10101111.10100010.00010101
Developed By Lanin 39
A Trial Separation (Cont.)
2. We also know that the default standard
Class C subnet mask is: 255.255.255.0
and that its binary equivalent is:
11111111.11111111.11111111.00000000
Developed By Lanin 40
A Trial Separation (Cont.)
3. When these two binary numbers (the IP
address & the subnet mask) are
combined using Boolean Algebra, the
Network ID of the destination network is
the result:
Developed By Lanin 41
Configuring an IP Address (Cont.)
 The IP Address command is entered from
the config-if mode because the action
affects only that interface.
 Both the IP address & the subnet mask
are defined in the command.
Developed By Lanin 42
Verifying an IP Address
 IP addresses are verified using PING,
Trace &Telnet.
 It is important that you know that PING
is used to verify IP address connections
to the Network Layer & thatTelnet is
used to verify network IP address
connections to the Application Layer.
Developed By Lanin 43
Verifying with Telnet
 The reason you need to verify IP
addresses is to ensure that the various
parts of a network can properly
communicate with the other parts.
 Eg., if you canTelnet (Terminal
Emulation Protocol) into a router from a
remote location on the same network,
you can verify that the interface & route
are up and available.
Developed By Lanin 44
Verifying with Telnet (Cont.)
 BecauseTelnet operates on the OSI
Model’s Application Layer, when it’s
functioning, it’s safe to assume that all
lower layers are also functioning.
Developed By Lanin 45
Verifying with PING
 The PING (Packet Internet Groper)
command verifies OSI Layer 3 (Network
Layer) connectivity.
 It sends out ICMP (Internet Control
Message Protocol) messages to verify
both the logical addresses & the Physical
connection.
Developed By Lanin 46
Verifying with PING (Cont.)
 The PING command issued from a Cisco router
responds with a number of single character
responses.
Developed By Lanin 47
Verifying with Traceroute
 TheTraceroute orTrace command is used
to show the complete route from a
source to a destination.
 Trace sends out probe packets one at a
time to each router or switch in the path
between the source & the destination IP
address entered.
Developed By Lanin 48
Verifying with Traceroute (Cont.)
 Traceroute displays the round-trip time
for each packet sent to each upstream
router.
 Traceroute has really only 2 results:
 Time exceeded or
 Destination unreachable.
 Trace is used to determine where a
breakdown in a route may be occurring.
Developed By Lanin 49
Verifying with Traceroute (Cont.)
 Example on howTrace is used:
 A network has 4 routers (A, B, C & D). A
Trace command is issued on router A to trace
the route from itself to router D.
 A timing response comes back from router B,
but the next message indicates that router C
is unreachable. You can be fairly certain that
the problem lies somewhere on the route
between router B & router C.
Developed By Lanin 50
Verifying with Traceroute (Cont.)
 Like PING,Trace has its own set of
response codes:

More Related Content

What's hot

IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
Andrew Smith
 
3 ip address
3 ip address3 ip address
3 ip address
Jadavsejal
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
Kashif Sohail
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
Vikas Jagtap
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
IP Address
IP AddressIP Address
IP Address
Sameer Alam
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Online
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
mail2rajeev10
 
IP and MAC addressing
IP and MAC addressingIP and MAC addressing
IP and MAC addressing
ShohanaakterKakon
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Jayesh Chauhan
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
Saad Tanvir
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
Er Bhagat Sharma
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
Manisha Keim
 

What's hot (19)

IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
 
3 ip address
3 ip address3 ip address
3 ip address
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
IP Address
IP AddressIP Address
IP Address
 
Addressing
AddressingAddressing
Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IP addressing
IP addressingIP addressing
IP addressing
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Subnet Design
Subnet DesignSubnet Design
Subnet Design
 
IP and MAC addressing
IP and MAC addressingIP and MAC addressing
IP and MAC addressing
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
DEL-244Chep i
DEL-244Chep iDEL-244Chep i
DEL-244Chep i
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 

Similar to Ip basics

IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
nandiaditi2010
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
SintayehuBeyene2
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
gamerchan1
 
Pjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easyPjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easy
Naresh Gotad
 
chapter 6.pptx
chapter 6.pptxchapter 6.pptx
chapter 6.pptx
MelkamtseganewTigabi1
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
Mustafa Salam
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Tapan Khilar
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
Rathodpradip1
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
Shashank Asthana
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
vssnsarma
 
Subnetting in network layer in computer networks
Subnetting in network layer in computer networksSubnetting in network layer in computer networks
Subnetting in network layer in computer networks
karthiktyagi2
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
sanchitachandrakar94
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.ppt
ListonKiwoli1
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4
praveenps17
 
Subnetting
SubnettingSubnetting
Subnetting
Fredrick Hall
 
IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptx
naseerahmad707715
 
Student IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.pptStudent IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.ppt
johnBronson6
 

Similar to Ip basics (20)

IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
Pjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easyPjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easy
 
chapter 6.pptx
chapter 6.pptxchapter 6.pptx
chapter 6.pptx
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Subnetting in network layer in computer networks
Subnetting in network layer in computer networksSubnetting in network layer in computer networks
Subnetting in network layer in computer networks
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
 
ETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.pptETT 05203 Lecture 5 IP addressing.ppt
ETT 05203 Lecture 5 IP addressing.ppt
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptx
 
Student IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.pptStudent IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.ppt
 

Recently uploaded

一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 

Recently uploaded (20)

一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 

Ip basics

  • 1. IP Addressing & Subnetting Made Easy Developed By Md Mahmudur Rahman Lanin MiKroTik Listed Consultant B.Sc in CSE G.M (Technical Department) Bijoy Online Ltd. ____________________________________________________________ MTCNA, MTCRE, CCNA, CCNP, RHSE 1Developed By Lanin
  • 3. Developed By Lanin 3 Introduction 1. You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. 2. Working with binary numbers is time- consuming & error-prone.
  • 4. Developed By Lanin 4 Octets  The 32-bit IP address is broken up into 4 octets, which are arranged into a dotted-decimal notation scheme.  An octet is a set of 8 bits & not a musical instrument. Example of an IP version 4: 172.64.126.52
  • 5. Developed By Lanin 5 Thinking in Binary A.The binary system uses only 2 values “0 & 1” to represent numbers in positions representing increasing powers of 2. B.We all are accustomed to thinking & working in the decimal system, which is based on the number 10.
  • 6. Developed By Lanin 6 Thinking in Binary (Cont.) A.To most humans, the number 124 represents 100 + 20 + 4. B.To the computer, this number is 1111100, which is 64 (26) + 32 (25) + 16 (24) + 8 (23) + 4 (22) + 0 + 0
  • 7. Developed By Lanin 7  Each position in a binary number represents, right to left, a power of two beginning with 20 & increasing by one power as it moves left: 20, 21, 22, 24, etc.
  • 8. Developed By Lanin 8 Converting to Decimal 1. You’ll need to convert binary to decimal & vice versa to compute subnets & hosts. 2. So, it’s time for a quick review lesson in binary-to-decimal conversion. 3. There are 8 bits in an octet & each bit can only be a 1 or a 0.
  • 9. Developed By Lanin 9 Converting to Decimal (Cont.)  What then do you suppose is the largest decimal number that can be expressed in an octet? Eight 1’s (1111 1111)
  • 10. Developed By Lanin 10 27 26 25 24 23 22 21 20 1 1 1 1 1 1 1 1 128 64 32 16 8 4 2 1 Converting to Decimal (Cont.) A.Now, for double the money, what is its equivalent decimal value? The binary number 1111 1111 converts into the decimal number: 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255
  • 11. Developed By Lanin 11 Converting to Decimal (Cont.) 1. Therefore, the largest decimal number that can be stored in an IP address octet is 255. 2. The significance of this should become evident later in this presentation.
  • 12. Developed By Lanin 12 IPAddress Classes 1.IP addresses are divided into 5 classes, each of which is designated with the alphabetic letters A to E. 2.Class D addresses are used for multicasting. 3.Class E addresses are reserved for testing & some mysterious future use.
  • 13. Developed By Lanin 13 IPAddress Classes (Cont.) The 5 IP classes are split up based on the value in the 1st octet:
  • 14. Developed By Lanin 14 IPAddress Classes (Cont.) Using the ranges, you can determine the class of an address from its 1st octet value. An address beginning with 120 is a Class A address, 155 is a Class B address & 220 is a Class C address.
  • 15. Developed By Lanin 15 Are You the Host or the Network?  The 32 bits of the IP address are divided into Network & Host portions, with the octets assigned as a part of one or the other. Network & Host Representation By IP Address Class Class Octet1 Octet2 Octet3 Octet4 Class A Network Host Host Host Class B Network Network Host Host Class C Network Network Network Host
  • 16. Developed By Lanin 16 Are You the Host or the Network? (Cont.)  Each Network is assigned a network address & every device or interface (such as a router port) on the network is assigned a host address.  There are only 2 specific rules that govern the value of the address.
  • 17. Developed By Lanin 17 Are You the Host or the Network? (Cont.)  A host address cannot be designated by all zeros or all ones.  These are special addresses that are reserved for special purposes.
  • 18. Developed By Lanin 18 Class A Addresses  Class A IP addresses use the 1st 8 bits (1st Octet) to designate the Network address.  The 1st bit which is always a 0, is used to indicate the address as a Class A address & the remaining 7 bits are used to designate the Network.  The other 3 octets contain the Host address.
  • 19. Developed By Lanin 19 Class A Addresses (Cont.)  There are 128 Class A Network Addresses, but because addresses with all zeros aren’t used & address 127 is a special purpose address, 126 Class A Networks are available.
  • 20. Developed By Lanin 20 Class A Addresses (Cont.)  There are 16,777,214 Host addresses available in a Class A address.  Rather than remembering this number exactly, you can use the following formula to compute the number of hosts available in any of the class addresses, where “n” represents the number of bits in the host portion: (2n – 2) = Number of available hosts
  • 21. Developed By Lanin 21 Class A Addresses (Cont.)  For a Class A network, there are: 224 – 2 or 16,777,214 hosts.  Half of all IP addresses are Class A addresses.  You can use the same formula to determine the number of Networks in an address class.  Eg., a Class A address uses 7 bits to designate the network, so (27 – 2) = 126 or there can be 126 Class A Networks.
  • 22. Developed By Lanin 22 Class B IP Addresses  Class B addresses use the 1st 16 bits (two octets) for the Network address.  The last 2 octets are used for the Host address.  The 1st 2 bit, which are always 10, designate the address as a Class B address & 14 bits are used to designate the Network. This leaves 16 bits (two octets) to designate the Hosts.
  • 23. Developed By Lanin 23 Class B IP Addresses (Cont.)  So how many Class B Networks can there be?  Using our formula, (214 – 2), there can be 16,382 Class B Networks & each Network can have (216 – 2) Hosts, or 65,534 Hosts.
  • 24. Developed By Lanin 24 Class C IP Addresses  Class C addresses use the 1st 24 bits (three octets) for the Network address & only the last octet for Host addresses.the 1st 3 bits of all class C addresses are set to 110, leaving 21 bits for the Network address, which means there can be 2,097,150 (221 – 2) Class C Networks, but only 254 (28 – 2) Hosts per Network.
  • 25. Developed By Lanin 25 Class C IP Addresses (Cont.)
  • 26. Developed By Lanin 26 Special Addresses  A few addresses are set aside for specific purposes.  Network addresses that are all binary zeros, all binary ones & Network addresses beginning with 127 are special Network addresses.
  • 27. Developed By Lanin 27 Special Addresses (Cont.)
  • 28. Developed By Lanin 28 Special Addresses (Cont.)  Within each address class is a set of addresses that are set aside for use in local networks sitting behind a firewall or NAT (Network Address Translation) device or Networks not connected to the Internet.
  • 29. Developed By Lanin 29 Special Addresses (Cont.)  A list of these addresses for each IP address class:
  • 30. Developed By Lanin 30 Subnet Mask  An IP address has 2 parts:  The Network identification.  The Host identification.  Frequently, the Network & Host portions of the address need to be separately extracted.  In most cases, if you know the address class, it’s easy to separate the 2 portions.
  • 31. Developed By Lanin 31 Subnet Mask (Cont.)  With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks.  Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking.
  • 32. Developed By Lanin 32 Subnet Mask (Cont.)  The subnet masking process was developed to identify & extract the Network part of the address.  A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network.  If it is not, the process of routing it to an outside network begins.
  • 33. Developed By Lanin 33 Subnet Mask (Cont.)  The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network.  It is applied to a message’s destination address to extract the network address.  If the extracted network address matches the local network ID, the destination is located on the local network.
  • 34. Developed By Lanin 34 Subnet Mask (Cont.)  However, if they don’t match, the message must be routed outside the local network.  The process used to apply the subnet mask involves Boolean Algebra to filter out non-matching bits to identify the network address.
  • 35. Developed By Lanin 35 Boolean Algebra  Boolean Algebra is a process that applies binary logic to yield binary results.  Working with subnet masks, you need only 4 basic principles of Boolean Algebra:  1 and 1 = 1  1 and 0 = 0  0 and 1 = 0  0 and 0 = 0
  • 36. Developed By Lanin 36 Boolean Algebra (Cont.)  In another words, the only way you can get a result of a 1 is to combine 1 & 1. Everything else will end up as a 0.  The process of combining binary values with Boolean Algebra is called Anding.
  • 37. Developed By Lanin 37 Default Standard Subnet Masks  There are default standard subnet masks for Class A, B and C addresses:
  • 38. Developed By Lanin 38 A Trial Separation (Cont.)  The subnet mask goes like this: 1. If a destination IP address is 206.175.162.21, we know that it is a Class C address & that its binary equivalent is: 11001110.10101111.10100010.00010101
  • 39. Developed By Lanin 39 A Trial Separation (Cont.) 2. We also know that the default standard Class C subnet mask is: 255.255.255.0 and that its binary equivalent is: 11111111.11111111.11111111.00000000
  • 40. Developed By Lanin 40 A Trial Separation (Cont.) 3. When these two binary numbers (the IP address & the subnet mask) are combined using Boolean Algebra, the Network ID of the destination network is the result:
  • 41. Developed By Lanin 41 Configuring an IP Address (Cont.)  The IP Address command is entered from the config-if mode because the action affects only that interface.  Both the IP address & the subnet mask are defined in the command.
  • 42. Developed By Lanin 42 Verifying an IP Address  IP addresses are verified using PING, Trace &Telnet.  It is important that you know that PING is used to verify IP address connections to the Network Layer & thatTelnet is used to verify network IP address connections to the Application Layer.
  • 43. Developed By Lanin 43 Verifying with Telnet  The reason you need to verify IP addresses is to ensure that the various parts of a network can properly communicate with the other parts.  Eg., if you canTelnet (Terminal Emulation Protocol) into a router from a remote location on the same network, you can verify that the interface & route are up and available.
  • 44. Developed By Lanin 44 Verifying with Telnet (Cont.)  BecauseTelnet operates on the OSI Model’s Application Layer, when it’s functioning, it’s safe to assume that all lower layers are also functioning.
  • 45. Developed By Lanin 45 Verifying with PING  The PING (Packet Internet Groper) command verifies OSI Layer 3 (Network Layer) connectivity.  It sends out ICMP (Internet Control Message Protocol) messages to verify both the logical addresses & the Physical connection.
  • 46. Developed By Lanin 46 Verifying with PING (Cont.)  The PING command issued from a Cisco router responds with a number of single character responses.
  • 47. Developed By Lanin 47 Verifying with Traceroute  TheTraceroute orTrace command is used to show the complete route from a source to a destination.  Trace sends out probe packets one at a time to each router or switch in the path between the source & the destination IP address entered.
  • 48. Developed By Lanin 48 Verifying with Traceroute (Cont.)  Traceroute displays the round-trip time for each packet sent to each upstream router.  Traceroute has really only 2 results:  Time exceeded or  Destination unreachable.  Trace is used to determine where a breakdown in a route may be occurring.
  • 49. Developed By Lanin 49 Verifying with Traceroute (Cont.)  Example on howTrace is used:  A network has 4 routers (A, B, C & D). A Trace command is issued on router A to trace the route from itself to router D.  A timing response comes back from router B, but the next message indicates that router C is unreachable. You can be fairly certain that the problem lies somewhere on the route between router B & router C.
  • 50. Developed By Lanin 50 Verifying with Traceroute (Cont.)  Like PING,Trace has its own set of response codes: