SlideShare a Scribd company logo
Chapter 5
1© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
‫تمرین‬1:
‫با‬‫داشتن‬‫یک‬‫نج‬‫ر‬‫آی‬‫پی‬172.16.0.0/16‫می‬‫خواهیم‬2000‫شبکه‬‫ا‬‫ز‬‫مج‬
‫از‬‫هم‬‫داشته‬‫باشیم‬.
‫ای‬‫ر‬‫ب‬‫انجام‬‫این‬‫کار‬‫باید‬‫حساب‬‫کنیم‬2‫به‬‫توان‬‫چه‬‫عددی‬‫برسد‬‫تا‬‫به‬‫عدد‬
2000‫برسیم‬.
‫عدد‬‫توان‬‫ابر‬‫ر‬‫ب‬‫تعداد‬‫بیت‬‫هایی‬‫است‬‫که‬‫باید‬‫از‬host id‫به‬net id
‫قرض‬‫بدهیم‬‫تا‬2000‫شبکه‬‫یا‬subnet‫به‬‫دست‬‫بیاید‬.
Chapter 5
2© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
‫عدد‬2‫به‬‫توان‬10‫ابر‬‫ر‬‫ب‬1024‫و‬‫عدد‬2‫به‬‫توان‬11‫ابر‬‫ر‬‫ب‬2048‫میشود‬.
‫پس‬‫باید‬11‫بیت‬‫از‬‫سمت‬host id‫به‬net id‫قرض‬‫بدهیم‬.
Chapter 5
3© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
Chapter 5
4© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
128 + 64 + 32 = 224
/27
Chapter 5
5© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
/27
Chapter 5
6© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
/27

More Related Content

Viewers also liked

Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesiaPeran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesiaSri Sediaz
 
Addressing the full attack continuum persian revision2
Addressing the full attack continuum persian revision2Addressing the full attack continuum persian revision2
Addressing the full attack continuum persian revision2
Alireza Taj
 
Cisco security report midyear 2015 persian revision 6
Cisco security report midyear 2015 persian revision 6Cisco security report midyear 2015 persian revision 6
Cisco security report midyear 2015 persian revision 6
Alireza Taj
 
Cisco security report midyear 2015 Persian revision 5
Cisco security report midyear 2015 Persian revision 5Cisco security report midyear 2015 Persian revision 5
Cisco security report midyear 2015 Persian revision 5
Alireza Taj
 
Black hole
Black holeBlack hole
Black holehabinaya
 
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesiaPeran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesiaSri Sediaz
 
Tugas Ekonomi teknik 2.1
Tugas Ekonomi teknik 2.1Tugas Ekonomi teknik 2.1
Tugas Ekonomi teknik 2.1Sri Sediaz
 
Tugas softskill 2 Ekonomi Teknik
Tugas softskill 2 Ekonomi TeknikTugas softskill 2 Ekonomi Teknik
Tugas softskill 2 Ekonomi TeknikSri Sediaz
 
Tugas Ekonomi Teknik 2.2
Tugas Ekonomi Teknik 2.2Tugas Ekonomi Teknik 2.2
Tugas Ekonomi Teknik 2.2Sri Sediaz
 

Viewers also liked (11)

Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesiaPeran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
 
Addressing the full attack continuum persian revision2
Addressing the full attack continuum persian revision2Addressing the full attack continuum persian revision2
Addressing the full attack continuum persian revision2
 
Cisco security report midyear 2015 persian revision 6
Cisco security report midyear 2015 persian revision 6Cisco security report midyear 2015 persian revision 6
Cisco security report midyear 2015 persian revision 6
 
Cisco security report midyear 2015 Persian revision 5
Cisco security report midyear 2015 Persian revision 5Cisco security report midyear 2015 Persian revision 5
Cisco security report midyear 2015 Persian revision 5
 
Black hole
Black holeBlack hole
Black hole
 
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesiaPeran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
Peran warga negara dalam pemenuhan kebutuhan listrik bangsa indonesia
 
Tugas Ekonomi teknik 2.1
Tugas Ekonomi teknik 2.1Tugas Ekonomi teknik 2.1
Tugas Ekonomi teknik 2.1
 
Tugas softskill 2 Ekonomi Teknik
Tugas softskill 2 Ekonomi TeknikTugas softskill 2 Ekonomi Teknik
Tugas softskill 2 Ekonomi Teknik
 
Presentation2
Presentation2Presentation2
Presentation2
 
Tugas Ekonomi Teknik 2.2
Tugas Ekonomi Teknik 2.2Tugas Ekonomi Teknik 2.2
Tugas Ekonomi Teknik 2.2
 
Htpb
HtpbHtpb
Htpb
 

More from Alireza Taj

Cisco cybersecurity report midyear 2017 persian revision
Cisco cybersecurity report midyear 2017 persian revisionCisco cybersecurity report midyear 2017 persian revision
Cisco cybersecurity report midyear 2017 persian revision
Alireza Taj
 
Cisco security report 2017 persian revision
Cisco security report 2017 persian revisionCisco security report 2017 persian revision
Cisco security report 2017 persian revision
Alireza Taj
 
Annual security report cisco 2016 persian revision
Annual security report cisco 2016 persian revisionAnnual security report cisco 2016 persian revision
Annual security report cisco 2016 persian revision
Alireza Taj
 
Cisco security report midyear 2015 persian revision 8
Cisco security report midyear 2015 persian revision 8Cisco security report midyear 2015 persian revision 8
Cisco security report midyear 2015 persian revision 8
Alireza Taj
 
Cisco security report midyear 2015 persian revision 7
Cisco security report midyear 2015 persian revision 7Cisco security report midyear 2015 persian revision 7
Cisco security report midyear 2015 persian revision 7
Alireza Taj
 
Cisco security report midyear 2015 persian revision 1
Cisco security report midyear 2015 persian revision 1Cisco security report midyear 2015 persian revision 1
Cisco security report midyear 2015 persian revision 1
Alireza Taj
 
5 steps for securing data center
5 steps for securing data center5 steps for securing data center
5 steps for securing data center
Alireza Taj
 
Cisco Secure Data Center Solution
Cisco Secure Data Center SolutionCisco Secure Data Center Solution
Cisco Secure Data Center Solution
Alireza Taj
 
پنج مرحله برای امن کردن دیتا سنتر2
پنج مرحله برای امن کردن دیتا سنتر2پنج مرحله برای امن کردن دیتا سنتر2
پنج مرحله برای امن کردن دیتا سنتر2
Alireza Taj
 
1پنج مرحله برای امن کردن دیتا سنتر
1پنج مرحله برای امن کردن دیتا سنتر1پنج مرحله برای امن کردن دیتا سنتر
1پنج مرحله برای امن کردن دیتا سنتر
Alireza Taj
 
پنج مرحله برای امن کردن دیتا سنتر
پنج مرحله برای امن کردن دیتا سنترپنج مرحله برای امن کردن دیتا سنتر
پنج مرحله برای امن کردن دیتا سنتر
Alireza Taj
 
Switch security workshop 2014
Switch security workshop 2014Switch security workshop 2014
Switch security workshop 2014
Alireza Taj
 
Cloud adoption
Cloud adoptionCloud adoption
Cloud adoption
Alireza Taj
 

More from Alireza Taj (13)

Cisco cybersecurity report midyear 2017 persian revision
Cisco cybersecurity report midyear 2017 persian revisionCisco cybersecurity report midyear 2017 persian revision
Cisco cybersecurity report midyear 2017 persian revision
 
Cisco security report 2017 persian revision
Cisco security report 2017 persian revisionCisco security report 2017 persian revision
Cisco security report 2017 persian revision
 
Annual security report cisco 2016 persian revision
Annual security report cisco 2016 persian revisionAnnual security report cisco 2016 persian revision
Annual security report cisco 2016 persian revision
 
Cisco security report midyear 2015 persian revision 8
Cisco security report midyear 2015 persian revision 8Cisco security report midyear 2015 persian revision 8
Cisco security report midyear 2015 persian revision 8
 
Cisco security report midyear 2015 persian revision 7
Cisco security report midyear 2015 persian revision 7Cisco security report midyear 2015 persian revision 7
Cisco security report midyear 2015 persian revision 7
 
Cisco security report midyear 2015 persian revision 1
Cisco security report midyear 2015 persian revision 1Cisco security report midyear 2015 persian revision 1
Cisco security report midyear 2015 persian revision 1
 
5 steps for securing data center
5 steps for securing data center5 steps for securing data center
5 steps for securing data center
 
Cisco Secure Data Center Solution
Cisco Secure Data Center SolutionCisco Secure Data Center Solution
Cisco Secure Data Center Solution
 
پنج مرحله برای امن کردن دیتا سنتر2
پنج مرحله برای امن کردن دیتا سنتر2پنج مرحله برای امن کردن دیتا سنتر2
پنج مرحله برای امن کردن دیتا سنتر2
 
1پنج مرحله برای امن کردن دیتا سنتر
1پنج مرحله برای امن کردن دیتا سنتر1پنج مرحله برای امن کردن دیتا سنتر
1پنج مرحله برای امن کردن دیتا سنتر
 
پنج مرحله برای امن کردن دیتا سنتر
پنج مرحله برای امن کردن دیتا سنترپنج مرحله برای امن کردن دیتا سنتر
پنج مرحله برای امن کردن دیتا سنتر
 
Switch security workshop 2014
Switch security workshop 2014Switch security workshop 2014
Switch security workshop 2014
 
Cloud adoption
Cloud adoptionCloud adoption
Cloud adoption
 

ip tamrin

  • 1. Chapter 5 1© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ‫تمرین‬1: ‫با‬‫داشتن‬‫یک‬‫نج‬‫ر‬‫آی‬‫پی‬172.16.0.0/16‫می‬‫خواهیم‬2000‫شبکه‬‫ا‬‫ز‬‫مج‬ ‫از‬‫هم‬‫داشته‬‫باشیم‬. ‫ای‬‫ر‬‫ب‬‫انجام‬‫این‬‫کار‬‫باید‬‫حساب‬‫کنیم‬2‫به‬‫توان‬‫چه‬‫عددی‬‫برسد‬‫تا‬‫به‬‫عدد‬ 2000‫برسیم‬. ‫عدد‬‫توان‬‫ابر‬‫ر‬‫ب‬‫تعداد‬‫بیت‬‫هایی‬‫است‬‫که‬‫باید‬‫از‬host id‫به‬net id ‫قرض‬‫بدهیم‬‫تا‬2000‫شبکه‬‫یا‬subnet‫به‬‫دست‬‫بیاید‬.
  • 2. Chapter 5 2© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ‫عدد‬2‫به‬‫توان‬10‫ابر‬‫ر‬‫ب‬1024‫و‬‫عدد‬2‫به‬‫توان‬11‫ابر‬‫ر‬‫ب‬2048‫میشود‬. ‫پس‬‫باید‬11‫بیت‬‫از‬‫سمت‬host id‫به‬net id‫قرض‬‫بدهیم‬.
  • 3. Chapter 5 3© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
  • 4. Chapter 5 4© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 128 + 64 + 32 = 224 /27
  • 5. Chapter 5 5© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public /27
  • 6. Chapter 5 6© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public /27