The document provides an introduction to IP addressing and subnetting. It discusses working with IP addresses in binary, the classes of IP addresses, subnet masks, and methods for verifying IP addresses including ping, telnet, and traceroute. The key points covered include how IP addresses are broken into octets, converting between binary and decimal, the number of networks and hosts for each address class, using subnet masks to separate the network and host portions of an address, and commands to test connectivity like ping and traceroute.
hey! everybody this is my third and last pps of this month and i ensure that this will definately guide you about ip address and its contain and what r all different kinds of ip r available with questions tags specified also. all thoes who u cannot find on any search engine u can get all stuff here!!!!!!
hope u loved it ???!@@@#
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
hey! everybody this is my third and last pps of this month and i ensure that this will definately guide you about ip address and its contain and what r all different kinds of ip r available with questions tags specified also. all thoes who u cannot find on any search engine u can get all stuff here!!!!!!
hope u loved it ???!@@@#
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
What is IP Address?
How to assign IP to any computer?
Explain IP Addressing Schemes.
Explain IPv4 Addresses with Class. (Class structure)
Explain Subnetting ?
What is Subnet mask ?
Explain Supernetting
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
What is IP Address?
How to assign IP to any computer?
Explain IP Addressing Schemes.
Explain IPv4 Addresses with Class. (Class structure)
Explain Subnetting ?
What is Subnet mask ?
Explain Supernetting
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
This is my work it is very good ppt ic yiu read this book you will get better knowledge about computer system I am a fresh electrical engineering graduate from Gondar university Institute of electrical and computer engineering intending to continue my development as communication engineer. In terms of results and objectives, I am enthusiastic and hard working. I am mature enough for the position because I have taken the basic communication engineering courses such as introduction to communication system , digital communication system, advanced computer system, switching and intelligent network ,
Electrical power system ,electrical work shop I,&II ,electrical lab 1,2,3,4, programing course math lab++,java, assembly language, introduction to control system, digital signal processing, signal and system analysis ,fundamental of electrical circuit, electrical measurement ,embedded system, I am familiar with cisco configuration,multism.organized a team of four students for thesis project
Projects
a four-month internship experience on antenna design for Ethio telecom
a six-month thesis project experience on performance analysis of aquastic echo cancellation in teleconference
semester project FM transmitter practically
university network design using sisco
online shopping using graphical user interface
other mini project such as QAM,error detection and correction using humming algorism Transcripts are records of students’ academic performance. They are the most valuable private
and sensitive documents. Utmost care is taken in their recording, storing and issuance. The
following is a set of regulation governing issuance of transcripts.
a. No student records are shown or given to a third party without the written
consent of the student. The University College may make discretionary
exceptions to this.
b. No transcripts will be issued for requests made through third parties ,that is
representatives, friends or relatives, agencies, etc. in exceptional cases
transcripts are given to third parties if the third party meets the following
conditions :
i.
The third party must carry a power of attorney;
ii. The third party does not demand that the transcripts be given to him/her;
iii. The third party must sign an affidavit to the effect that it assumes full
responsibilities for any disputes arising from the possibility that the
Registrar’s office is misled into sending transcripts to persons who have
no legal claims over the document.
c. All students who have dropped out, withdrawn or graduated from the
University College must present an official clearance sheet to get
transcripts and other services. Third parties of such students must present
clearance sheets of students they represent. The official clearance form or its
equivalent clears the students from all their financial and other obligations to
the University College.
d. Transcripts given by the Registrar Office are of two kinds: student copy and
official copy. The student copy is a trans
In this lecture you can learn about IPv4 addressing Schemes and subnetting in easy and simple way. the topics are explained with example which can help you to understand the concept.
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
3. Developed By Lanin 3
Introduction
1. You can probably work with decimal
numbers much easier than with the
binary numbers needed by the
computer.
2. Working with binary numbers is time-
consuming & error-prone.
4. Developed By Lanin 4
Octets
The 32-bit IP address is broken up
into 4 octets, which are arranged into
a dotted-decimal notation scheme.
An octet is a set of 8 bits & not a
musical instrument.
Example of an IP version 4:
172.64.126.52
5. Developed By Lanin 5
Thinking in Binary
A.The binary system uses only 2 values
“0 & 1” to represent numbers in
positions representing increasing
powers of 2.
B.We all are accustomed to thinking &
working in the decimal system, which
is based on the number 10.
6. Developed By Lanin 6
Thinking in Binary (Cont.)
A.To most humans, the number 124
represents 100 + 20 + 4.
B.To the computer, this number is
1111100, which is 64 (26) + 32 (25)
+ 16 (24) + 8 (23) + 4 (22) + 0 + 0
7. Developed By Lanin 7
Each position in a binary
number represents, right to left,
a power of two beginning with 20
& increasing by one power as it
moves left: 20, 21, 22, 24, etc.
8. Developed By Lanin 8
Converting to Decimal
1. You’ll need to convert binary to decimal &
vice versa to compute subnets & hosts.
2. So, it’s time for a quick review lesson in
binary-to-decimal conversion.
3. There are 8 bits in an octet & each bit can
only be a 1 or a 0.
9. Developed By Lanin 9
Converting to Decimal (Cont.)
What then do you suppose is the largest
decimal number that can be expressed in an
octet?
Eight 1’s (1111 1111)
10. Developed By Lanin 10
27 26 25 24 23 22 21 20
1 1 1 1 1 1 1 1
128 64 32 16 8 4 2 1
Converting to Decimal (Cont.)
A.Now, for double the money, what is its
equivalent decimal value?
The binary number 1111 1111 converts into the decimal number:
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255
11. Developed By Lanin 11
Converting to Decimal (Cont.)
1. Therefore, the largest decimal
number that can be stored in an IP
address octet is 255.
2. The significance of this should
become evident later in this
presentation.
12. Developed By Lanin 12
IPAddress Classes
1.IP addresses are divided into 5 classes,
each of which is designated with the
alphabetic letters A to E.
2.Class D addresses are used for
multicasting.
3.Class E addresses are reserved for
testing & some mysterious future use.
13. Developed By Lanin 13
IPAddress Classes (Cont.)
The 5 IP classes are split up based on the
value in the 1st octet:
14. Developed By Lanin 14
IPAddress Classes (Cont.)
Using the ranges, you can determine
the class of an address from its 1st octet
value.
An address beginning with 120 is a
Class A address, 155 is a Class B
address & 220 is a Class C address.
15. Developed By Lanin 15
Are You the Host or the
Network?
The 32 bits of the IP address are divided into
Network & Host portions, with the octets assigned
as a part of one or the other.
Network & Host Representation
By IP Address Class
Class Octet1 Octet2 Octet3 Octet4
Class A Network Host Host Host
Class B Network Network Host Host
Class C Network Network Network Host
16. Developed By Lanin 16
Are You the Host or the
Network? (Cont.)
Each Network is assigned a network address
& every device or interface (such as a router
port) on the network is assigned a host
address.
There are only 2 specific rules that govern the
value of the address.
17. Developed By Lanin 17
Are You the Host or the
Network? (Cont.)
A host address cannot be designated by
all zeros or all ones.
These are special addresses that are
reserved for special purposes.
18. Developed By Lanin 18
Class A Addresses
Class A IP addresses use the 1st 8 bits (1st Octet)
to designate the Network address.
The 1st bit which is always a 0, is used to
indicate the address as a Class A address & the
remaining 7 bits are used to designate the
Network.
The other 3 octets contain the Host address.
19. Developed By Lanin 19
Class A Addresses (Cont.)
There are 128 Class A Network
Addresses, but because addresses with
all zeros aren’t used & address 127 is a
special purpose address, 126 Class A
Networks are available.
20. Developed By Lanin 20
Class A Addresses (Cont.)
There are 16,777,214 Host addresses
available in a Class A address.
Rather than remembering this number
exactly, you can use the following formula
to compute the number of hosts available in
any of the class addresses, where “n”
represents the number of bits in the host
portion:
(2n – 2) = Number of available hosts
21. Developed By Lanin 21
Class A Addresses (Cont.)
For a Class A network, there are:
224 – 2 or 16,777,214 hosts.
Half of all IP addresses are Class A
addresses.
You can use the same formula to
determine the number of Networks in an
address class.
Eg., a Class A address uses 7 bits to
designate the network, so (27 – 2) = 126 or
there can be 126 Class A Networks.
22. Developed By Lanin 22
Class B IP Addresses
Class B addresses use the 1st 16 bits (two
octets) for the Network address.
The last 2 octets are used for the Host
address.
The 1st 2 bit, which are always 10,
designate the address as a Class B
address & 14 bits are used to designate
the Network. This leaves 16 bits (two
octets) to designate the Hosts.
23. Developed By Lanin 23
Class B IP Addresses (Cont.)
So how many Class B Networks can there
be?
Using our formula, (214 – 2), there can be
16,382 Class B Networks & each Network
can have (216 – 2) Hosts, or 65,534 Hosts.
24. Developed By Lanin 24
Class C IP Addresses
Class C addresses use the 1st 24 bits
(three octets) for the Network address &
only the last octet for Host addresses.the
1st 3 bits of all class C addresses are set to
110, leaving 21 bits for the Network
address, which means there can be
2,097,150 (221 – 2) Class C Networks, but
only 254 (28 – 2) Hosts per Network.
26. Developed By Lanin 26
Special Addresses
A few addresses are set aside for specific
purposes.
Network addresses that are all binary
zeros, all binary ones & Network
addresses beginning with 127 are special
Network addresses.
28. Developed By Lanin 28
Special Addresses (Cont.)
Within each address class is a set of
addresses that are set aside for use in
local networks sitting behind a firewall or
NAT (Network Address Translation)
device or Networks not connected to the
Internet.
29. Developed By Lanin 29
Special Addresses (Cont.)
A list of these addresses for each IP
address class:
30. Developed By Lanin 30
Subnet Mask
An IP address has 2 parts:
The Network identification.
The Host identification.
Frequently, the Network & Host portions of
the address need to be separately
extracted.
In most cases, if you know the address class,
it’s easy to separate the 2 portions.
31. Developed By Lanin 31
Subnet Mask (Cont.)
With the rapid growth of the internet &
the ever-increasing demand for new
addresses, the standard address class
structure has been expanded by
borrowing bits from the Host portion to
allow for more Networks.
Under this addressing scheme, called
Subnetting, separating the Network &
Host requires a special process called
Subnet Masking.
32. Developed By Lanin 32
Subnet Mask (Cont.)
The subnet masking process was
developed to identify & extract the
Network part of the address.
A subnet mask, which contains a binary
bit pattern of ones & zeros, is applied to
an address to determine whether the
address is on the local Network.
If it is not, the process of routing it to an
outside network begins.
33. Developed By Lanin 33
Subnet Mask (Cont.)
The function of a subnet mask is to
determine whether an IP address exists
on the local network or whether it must
be routed outside the local network.
It is applied to a message’s destination
address to extract the network address.
If the extracted network address
matches the local network ID, the
destination is located on the local
network.
34. Developed By Lanin 34
Subnet Mask (Cont.)
However, if they don’t match, the
message must be routed outside the
local network.
The process used to apply the subnet
mask involves Boolean Algebra to filter
out non-matching bits to identify the
network address.
35. Developed By Lanin 35
Boolean Algebra
Boolean Algebra is a process that applies
binary logic to yield binary results.
Working with subnet masks, you need
only 4 basic principles of Boolean
Algebra:
1 and 1 = 1
1 and 0 = 0
0 and 1 = 0
0 and 0 = 0
36. Developed By Lanin 36
Boolean Algebra (Cont.)
In another words, the only way you can
get a result of a 1 is to combine 1 & 1.
Everything else will end up as a 0.
The process of combining binary values
with Boolean Algebra is called Anding.
37. Developed By Lanin 37
Default Standard Subnet Masks
There are default standard subnet masks
for Class A, B and C addresses:
38. Developed By Lanin 38
A Trial Separation (Cont.)
The subnet mask goes like this:
1. If a destination IP address is
206.175.162.21, we know that it is a
Class C address & that its binary
equivalent is:
11001110.10101111.10100010.00010101
39. Developed By Lanin 39
A Trial Separation (Cont.)
2. We also know that the default standard
Class C subnet mask is: 255.255.255.0
and that its binary equivalent is:
11111111.11111111.11111111.00000000
40. Developed By Lanin 40
A Trial Separation (Cont.)
3. When these two binary numbers (the IP
address & the subnet mask) are
combined using Boolean Algebra, the
Network ID of the destination network is
the result:
41. Developed By Lanin 41
Configuring an IP Address (Cont.)
The IP Address command is entered from
the config-if mode because the action
affects only that interface.
Both the IP address & the subnet mask
are defined in the command.
42. Developed By Lanin 42
Verifying an IP Address
IP addresses are verified using PING,
Trace &Telnet.
It is important that you know that PING
is used to verify IP address connections
to the Network Layer & thatTelnet is
used to verify network IP address
connections to the Application Layer.
43. Developed By Lanin 43
Verifying with Telnet
The reason you need to verify IP
addresses is to ensure that the various
parts of a network can properly
communicate with the other parts.
Eg., if you canTelnet (Terminal
Emulation Protocol) into a router from a
remote location on the same network,
you can verify that the interface & route
are up and available.
44. Developed By Lanin 44
Verifying with Telnet (Cont.)
BecauseTelnet operates on the OSI
Model’s Application Layer, when it’s
functioning, it’s safe to assume that all
lower layers are also functioning.
45. Developed By Lanin 45
Verifying with PING
The PING (Packet Internet Groper)
command verifies OSI Layer 3 (Network
Layer) connectivity.
It sends out ICMP (Internet Control
Message Protocol) messages to verify
both the logical addresses & the Physical
connection.
46. Developed By Lanin 46
Verifying with PING (Cont.)
The PING command issued from a Cisco router
responds with a number of single character
responses.
47. Developed By Lanin 47
Verifying with Traceroute
TheTraceroute orTrace command is used
to show the complete route from a
source to a destination.
Trace sends out probe packets one at a
time to each router or switch in the path
between the source & the destination IP
address entered.
48. Developed By Lanin 48
Verifying with Traceroute (Cont.)
Traceroute displays the round-trip time
for each packet sent to each upstream
router.
Traceroute has really only 2 results:
Time exceeded or
Destination unreachable.
Trace is used to determine where a
breakdown in a route may be occurring.
49. Developed By Lanin 49
Verifying with Traceroute (Cont.)
Example on howTrace is used:
A network has 4 routers (A, B, C & D). A
Trace command is issued on router A to trace
the route from itself to router D.
A timing response comes back from router B,
but the next message indicates that router C
is unreachable. You can be fairly certain that
the problem lies somewhere on the route
between router B & router C.
50. Developed By Lanin 50
Verifying with Traceroute (Cont.)
Like PING,Trace has its own set of
response codes: