This document provides an overview of IP subnetting and addressing. It begins by stating the learning objectives, which are to explain IP subnets, subnet masks, benefits of subnets over multiple address classes, variable length subnet masks (VLSM), and classless inter-domain routing (CIDR). It then covers key concepts such as IP subnets, natural masks, creating subnets using masks, default vs subnet masks, benefits of subnets vs multiple address classes, VLSM examples, CIDR introduction and addressing, and solutions to a quiz on the content.
What is IP Address?
How to assign IP to any computer?
Explain IP Addressing Schemes.
Explain IPv4 Addresses with Class. (Class structure)
Explain Subnetting ?
What is Subnet mask ?
Explain Supernetting
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
What is IP Address?
How to assign IP to any computer?
Explain IP Addressing Schemes.
Explain IPv4 Addresses with Class. (Class structure)
Explain Subnetting ?
What is Subnet mask ?
Explain Supernetting
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
My aim of writing this eBook is to teach you how to subnet using VLSM the easy way.
I promised myself to go straight to VLSM, but I won’t be doing some readers justice without giving an overview of what IP addressing is. If you are writing the CCNA exam or you are a network administrator, the thorough knowledge of TCP/IP especially IP addressing and sub-netting
Here is the presentation for Transport Layer Questions from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
My aim of writing this eBook is to teach you how to subnet using VLSM the easy way.
I promised myself to go straight to VLSM, but I won’t be doing some readers justice without giving an overview of what IP addressing is. If you are writing the CCNA exam or you are a network administrator, the thorough knowledge of TCP/IP especially IP addressing and sub-netting
Here is the presentation for Transport Layer Questions from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
CISCO - CCNA 200-120
These notes will be the basis for more detailed revision.
These "CCNA 200-120" Revision Notes consist of concise summaries or outlines of topics covered, lists of essential information needed.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Why React Native as a Strategic Advantage for Startup Innovation.pdfayushiqss
Do you know that React Native is being increasingly adopted by startups as well as big companies in the mobile app development industry? Big names like Facebook, Instagram, and Pinterest have already integrated this robust open-source framework.
In fact, according to a report by Statista, the number of React Native developers has been steadily increasing over the years, reaching an estimated 1.9 million by the end of 2024. This means that the demand for this framework in the job market has been growing making it a valuable skill.
But what makes React Native so popular for mobile application development? It offers excellent cross-platform capabilities among other benefits. This way, with React Native, developers can write code once and run it on both iOS and Android devices thus saving time and resources leading to shorter development cycles hence faster time-to-market for your app.
Let’s take the example of a startup, which wanted to release their app on both iOS and Android at once. Through the use of React Native they managed to create an app and bring it into the market within a very short period. This helped them gain an advantage over their competitors because they had access to a large user base who were able to generate revenue quickly for them.
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
Lecture 06
1. 1
IP Subnetting and
Addressing
Indian Institute of Technology Kharagpur
Prof Indranil Sengupta
Computer Science and Engineering
Indian Institute of Technology
Kharagpur
Lecture 6: IP Subnetting and Addressing
On completion, the student will be able to:
1. Explain the concept of IP subnets, and subnet
masks.
2. Compare the benefits of using subnets against
multiple address classes.
3. Explain the concept of variable length subnet
mask (VLSM) with example.
4. Explain how classless inter-domain routing
(CIDR) helps in better address assignment.
2. 2
IP Subnetting
IP Subnet
• Basic concept:
A subset of a class A, B or C network.
• IP addresses that do not use subnets
consists of
a network portion, and
a host portion.
Represents a static two-level hierarchical
addressing model.
3. 3
IP Subnet (contd.)
• IP subnets introduces a third level of
hierarchy.
a network portion
a subnet portion
a host portion
Allow more efficient (and structured)
utilization of the addresses.
Uses network masks.
Natural Masks
• Network mask 255.0.0.0 is applied to
a class A network 10.0.0.0.
In binary, the mask is a series of
contiguous 1’s followed by a series of
contiguous 0’s.
11111111 00000000 00000000 00000000
Network
portion
Host
portion
4. 4
Natural Masks (contd.)
• Provide a mechanism to split the IP
address 10.0.0.20 into
a network portion of 10, and
a host portion of 20.
Decimal Binary
IP address:10.0.0.20 00001010 00000000 00000000 00010100
Mask: 255.0.0.0 11111111 00000000 00000000 00000000
Network Host
Natural Masks (contd.)
• Class A, B and C addresses
Have fixed division of network and host
portions.
Can be expressed as masks.
Called natural masks.
• Natural Masks
Class A :: 255.0.0.0
Class B :: 255.255.0.0
Class C :: 255.255.255.0
5. 5
Creating Subnets using Masks
• Masks are very flexible.
Using masks, networks can be divided
into smaller subnets.
• How?
By extending the network portion of the
address into the host portion.
• Advantage gained:
We can create a large number of subnets
from one network.
Can have less number of hosts per
network.
Example: Subnets
• Network mask 255.255.0.0 is applied
to a class A network 10.0.0.0.
This divides the IP address 10.5.0.20
into
a network portion of 10,
a subnet portion of 5, and
a host portion of 20.
The 255.255.0.0 mask borrows a portion
of the host space, and applies it to
network space.
6. 6
Subnets (contd.)
• What happens?
Initially it was a single large Class A
network (224-2 hosts).
We have now split the network into
256 subnets.
From 10.0.0.0 to 10.255.0.0.
The hosts pet subnet decreases to
65,534.
Subnets (contd.)
Decimal Binary
IP address: 10.5.0.20 00001010 00000101 00000000 00010100
Mask: 255.255.0.0 11111111 11111111 00000000 00000000
Network Subnet Host
7. 7
Default Mask and Subnet mask
AND
AND
Default Mask
255.255.0.0
Subnet Mask
255.255.192.0
IP Address
144.16.72.57
IP Address
144.16.72.57
Network Address
144.16.0.0
Network Address
144.16.64.0
192: 1100 0000
72: 0100 1000
Subnets vrs Multiple Address Classes
• Subnets
Management of subnets is done by
local network administrator.
Single entry in external router tables.
• Multiple Address Classes
Multiple entries in external router tables.
Additional overhead on the backbone
(external) routers.
9. 9
Example: VLSM
• Suppose we are assigned a Class C
network 192.203.17.0.
To be divided into three subnets.
Corresponding to three departments.
With 110, 45 and 50 hosts respectively.
D1
(110)
D2
(45)
D3
(50)
The Example (contd.)
• Available subnet options
The network mask will be the Class C
natural mask 255.255.255.0
Subnet masks of the form 255.255.255.X
Can be used to divide the network
into more subnets.
10. 10
4641111 1100252
8321111 1000248
16161111 0000240
3281110 0000224
6441100 0000192
12821000 0000128
No. of
Hosts
No. of
Subnets
X (in
binary)
X
• Cannot satisfy the requirements.
The Subnet Options
The VLSM Option
• Basic concept:
Use the mask 255.255.255.128 to divide
the network address into two subnets
with 128 hosts each.
192.203.17.0 (.0 to .127)
192.203.17.0 (.128 to .255)
11. 11
The VLSM Option (contd.)
Next subnet the second .128 subnet
using a mask of 255.255.255.192.
Creates two subnets, 64 hosts each
192.213.17.128 (.128 to .191)
192.213.17.128 (.192 to .255)
The VLSM Option (contd.)
192.203.17.0
192.203.17.0 (.0 to .127) 192.203.17.0 (.128 to .255)
192.213.17.128 (.128 to .191)
192.213.17.128 (.192 to .255)
Mask:
255.255.255.128
Mask:
255.255.255.192
12. 12
HIDDEN SLIDE
Interface 1 :: 128 hosts
Network number: 192.203.17.0
Network mask: 255.255.255.128
Address: 192.203.17.0 -- .127
Interface 2 :: 64 hosts
Network number: 192.203.17.128
Network mask: 255.255.255.192
Address: 192.203.17.128 -- .191
Interface 3 :: 64 hosts
Network number: 192.203.17.192
Network mask: 255.255.255.192
Address: 192.203.17.192 -- .255
Running out of IP addresses
• Growing demand for IP addresses.
Severe strain on the classful model.
Due to wastage of address space.
• Measures taken:
Creative allocation of IP addresses.
Classless Inter-Domain Routing (CIDR).
Private IP addresses, and Network
Address Translation (NAT).
IP version 6 (IPv6).
13. 13
CIDR: Introduction
• The size of the global routing tables
have grown very fast in recent years.
Caused routers to become saturated.
• CIDR is a new concept to manage IP
networks.
Classless Inter Domain Routing.
No concept of class A, B, C networks.
Reduces sizes of routing tables.
Basic Idea Behind CIDR
• An IP address is represented by a
prefix, which is the IP address of the
network.
• It is followed by a slash, followed by
a number M.
M: number of leftmost contiguous bits
to be used for the network mask.
Example: 144.16.192.57 / 18
14. 14
CIDR: An Important Rule
• The number of addresses in each
block must be a power of 2.
• The beginning address in each block
must be divisible by the number of
addresses in the block.
A block that contains 16 addresses
cannot have beginning address as
144.16.223.36.
But the address 144.16.192.64 is
possible.
Example: CIDR
• An organization is allotted a block with
beginning address:
144.16.192.24 / 29
What is the range of the block?
Start addr: 10010000 00011000 11000000 00011000
End addr: 10010000 00011000 11000000 00011111
There are 8 addresses in the block.
15. 15
Recent Trend
• Move on to CIDR addressing.
Existing classful networks can also be
represented using this notation.
Class A: W.X.Y.Z / 8
Class B: W.X.Y.Z / 16
Class C: W.X.Y.Z / 24
• Recent routers support CIDR.
16. 16
SOLUTIONS TO QUIZ
QUESTIONS ON
LECTURE 5
Quiz Solutions on Lecture 5
1. What does the port number in a TCP
connection specify?
It specifies the communicating
processes on the two end systems.
2. Why is it necessary to have both IP
address and port number in a packet?
IP address identifies the host computer.
Port number identifies a running process
in the host computer.
17. 17
Quiz Solutions on Lecture 5
3. Which of the layers TCP, UDP and IP
provides for reliable communication?
Only TCP provides reliable
communication.
4. Both UDP and IP transmit datagrams. In
what ways are they different?
UDP carries the port numbers of
source and destination, and an
optional checksum, in addition.
Quiz Solutions on Lecture 5
5. What are well-known port numbers?
Port numbers that are assigned to
standard programs and known publicly
are called well-known port numbers.
They lie in the range 1 and 1023.
6. What are ephemeral port numbers?
They are temporary and short-lived port
numbers assigned by client on a per
connection basis. They range from 1024
to 65535.
18. 18
Quiz Solutions on Lecture 5
7. With respect to a transport level
connection, what are the five components
in an association?
a) The protocol (TCP or UDP).
b) Local host IP address (32-bit value).
c) Local port number (16-bit value).
d) Remote host IP address (32-bit value).
e) Remote port number (16-bit value).
Quiz Solutions on Lecture 5
8. Why is the pseudo-header used in
calculating TCP checksum?
To protect TCP from misdelivery from IP.
9. What are the different fields in the pseudo
header?
Source IP address, destination IP address,
protocol, segment length.
19. 19
Quiz Solutions on Lecture 5
10. Suppose that 5000 bytes are transferred over
TCP. The first byte is numbered 20050. What
are the sequence numbers for each segment
if data is sent in four segments with the first
two segments carrying 1000 bytes and the
last two segment carrying 1500 bytes?
Segment 1 20,050 (20,050 to 21,049)
Segment 2 21,050 (21,050 to 22,049)
Segment 3 22,050 (22,050 to 23,549)
Segment 4 23,550 (23,550 to 25,049)
Quiz Solutions on Lecture 5
11. What is the purpose of the PSH flag in the
TCP header?
To “push” TCP data. Typically used to
indicate end of message.
12. What is the purpose of the ACK flag in the
TCP header?
To indicate that the “Acknowledgement”
field is in use.
20. 20
Quiz Solutions on Lecture 5
13. If you are developing a network application
on a reliable LAN environment, which of TCP
or UDP would you prefer, and why?
UDP, because reliability of transmission
need not be worried about. And UDP is
faster than TCP.
QUIZ QUESTIONS ON
LECTURE 6
21. 21
Quiz Questions on Lecture 6
1. For the subnet mask 255.255.192.0, how
many hosts per subnet are possible?
2. In classful addressing, if we are using the
subnet mask 255.255.192.0, which address
class does it correspond to?
3. What is the subnet address if the
destination IP address is 144.16.34.124 and
the subnet mask is 255.255.240.0 ?
4. What is the natural mask for a class C
network?
Quiz Questions on Lecture 6
5. Using simple subnets, is it possible to
divide a network into unequal sized
subnets?
6. For an IP address 10.17.5.122 and subnet
mask 255.255.128.0, what is the subnet
address? How many hosts per subnet
are possible?
7. Among multiple network classes and
subnets, which alternative imposes more
burden on the external router?
22. 22
Quiz Questions on Lecture 6
8. Using VLSM, give a scheme to split a
class C address into four subnets where
the number of hosts required are:
100, 55, 20, 30
9. If the number of hosts required are 100,
50, 50 and 20, can VLSM be used?
10. Can the following be the beginning
addresses in CIDR based addressing?
144.16.192.32/28 188.15.170.55/28
10.17.18.42/28 200.0.100.80/28
Quiz Questions on Lecture 6
11. For a CIDR address of the form W.X.Y.Z/20,
what is the maximum number of hosts
possible in the network?
12. Which of the following can be the starting
address of a CIDR block that contains 512
addresses?
144.16.24.128 144.16.75.0
144.16.24.0 144.16.0.0