This document discusses IP subnetting. It begins by outlining the objectives of explaining classless addressing, subnetting, and super netting. It then provides background on IPv4 addressing classes and how routing works using network IDs and default network masks. The key points are that subnetting allows a network to be divided into multiple subnets, each with their own subnet address. This creates a three-level addressing scheme using the network, subnet, and host portions of the IP address. The document provides an example of how to calculate subnet masks and determine the subnet address of a given host IP. It demonstrates subnetting a Class B network into four subnets. Homework is assigned to study chapter 5 of a networking textbook and complete examples and exercises
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
4. OBJECTIVES:
To discuss classless addressing, that has been devised to solve the
problems in classful addressing.
To explain subnetting and super netting.
6. Quotes of the day
Rabi Zidni Elma.
Aay ALLAH mairy Elam main izafa kr.
Seek of knowledge from cradle to the grave.
7. So Far we Study in IPv4
Header
Address format
Classful IP Address
Class A
0 to 127
Class B
128 to 191
Class C
192 to 223
Class D
224 to 239
Class E
240 to 255
8. Routing
The data communication is done through the Network id (1st part) of an IP Address.
The data is reach first to the destination network (using Network id) and then to
that particular host (Destination) in that network (using Host id).
9. Network Address and Network Mask
Network Address: The First address of a Network is the network address of that
network, which specify the network.
All the data communication in WAN is done through the Network address, so that the
data first reach to network and then to Host.
Network Mask: A network mask or a default mask in classful
addressing with n leftmost bits all set to 1s and (32 − n)
rightmost bits all set to 0s.
11. Network Address
To extract the network address from the destination address of a packet, a router
uses the AND operation.
When the destination address (or any address in the block) is ANDed with the
default mask, the result is the network address.
AND Operation:
1 AND 1 = 1
1 AND 0 = 0
0 AND 1 = 0
0 AND 0 = 0
12. Example
Example: A router receives a packet with the destination address
131.24.67.32. Show how the router finds the network address of the packet.
Solution: Since the class of the address is B, the router applies the default
mask for class B, 255.255.0.0 to find the network address.
Dest. Add. : 10000011. 00011000. 01000011. 00100000
AND
Mask: 11111111.11111111.00000000.00000000
Net. Add. : 10000011. 00011000. 00000000.00000000
= 131.24.0.0
13. Example
Example: A router receives a packet with the destination address 131.24.67.32. Show how the router finds
the network address of the packet.
Solution: Since the class of the address is B, the router applies the default mask for class B, 255.255.0.0 to
find the network address.
14. Three-Level Addressing: Subnetting
The IP addresses were originally designed with two levels of addressing.
To reach a host on the Internet, we must first reach the network and then the host.
It soon became clear that we need more than two hierarchical levels, for two reasons.
First, an organization that was granted a block in class A or B needed to divide its large
network into several subnetworks for better security and management.
Second, the blocks in class A and B are larger and most of the IP address then lost so
class A or B could divide the block into smaller subblocks.
15. Subnetting
In subnetting, a network is divided into several
smaller sub-networks (subnets)
Each sub network having its own sub network
address.
For a network here we will use /n,
Where the “n” will show the length of the network id.
16. Subnet Mask
The network mask is use when a network is not subnetted.
When we divide a network to several sub networks, we need to create a sub
network mask (or subnet mask) for each sub network.
A sub network has subnet id and host id.
17. Subnet Mask Cont.
Subnetting increases the length of the net id and decreases the length of host id.
When we divide a network to “s” number of subnetworks, each of equal numbers
of hosts,
we can calculate the subnetid for each subnetwork.
18. Subnet Mask cont.
For Example: Calculate a subnet mask for a network 141.14.0.0/16. we want to make 4 sub networks
for this IP address uing subnet.
First we have to calculate Subnet Mask.
We need 4 networks so 22 = 4. so we require 2 more bits to add them in Network Id bits, so now we
have 16 + 2 = 18 network id bits.
So Subnet mask for this class B will now =
11111111.11111111.11000000.00000000
OR: 255.255.192.0
20. Subnetting Host IDs
Now we can further subdivide a single IP to Sub networks through Subnetting.
In Each Subnet the First and Last IP address will be reserved.
First IP Address will be the Network Address for that small network (Sub
Network).
The Last IP address will be the Broadcast Address for that small network (Sub
Network).
It mean that the a sub network will always support to -2 sub host ids.
21. Example (with out subnetting)
We have an IP address: 141.14.0.0
It is Class B IP address.
This network can have 216 = 65536 – 2 = 65534 Hosts.
It is a single Network.
22. Example (Using Subnetting)
We have an IP address: 141.14.0.0
It is Class B IP address.
This network can have 216 = 65536 – 2 = 65534 Hosts.
But we want to have let suppose 4 sub networks of this single network
As 2n = 4 if n = 2, so 22 = 4
So we require 2 extra bits to add in the network id bits.
23. Example Cont.
IP address: 141.14.0.0
Network ID: 141.14.0.0/16
4 Networks = 2 bits
141.14.0.0/18
Now we have 18 bits for Network id and the remaining bits for host id = 32-18 = 14
So now we can make 4 networks and each network will have 214 = 16384 – 2 =
16382 Hosts.
24. Example Cont.
IP address: 141.14.0.0
Binary : 10001101.00001110.00000000.0000000
Network Mask for Class B: 255.255.0.0
Or: 11111111.11111111.00000000.00000000
For Subnetting: for 4 sub networks
IP address: 141.14.0.0/18
Subnet Mask: 11111111.11111111.11000000.00000000
Or: 255.255.192.0
25. Example cont.
First Subnet:
IP address: 141.14.0.0/18
Hosts in each network 214 = 16384 – 2 = 16382
Range:
141.14.0.0 to 141.14.63.255
1st Subnet ID: 141.14.0.0/18
28. Example to Find the Subnet Address of a host
IP
A network is divided into four subnets. Since one of the addresses in a subnet is
141.14.120.77, Find the subnet address.
Sol: As the IP is from Class B i.e. 141.14.120.77
Divided into 4 sub networks so 2 bits are reserved.
So the subnet mask is
11111111.11111111.11000000.00000000
Or: 255.255.192.0
29. Example Cont.
IP address: 141.14.120.77
Binary : 10001101.00001110.01111000.01001101
Subnet mask: 255.255.192.0
Or: 11111111.11111111.11000000.00000000
Subnet Address: IP AND subnet mask:
10001101.00001110.01111000.01001101
AND
11111111.11111111.11000000.00000000
Subnet Address:
10001101.00001110.01000000.00000000
= 141.14.64.0
33. Exercise
A company is granted the IP address 201.70.64.0, The company needs six
subnets. Design the subnets.
34. Solution
The Address is of Class C: 201.70.64.0
The company needs six subnets. This number 6 is not a power of 2. The next number
that is a power of 2 is 8 (23).
We need 3 more 1s in the subnet mask. The total number of 1s in the subnet mask is
27 (24 + 3).
The total number of 0s is 5 (32 ‐ 27). The mask is
11111111 11111111 11111111 11100000
Or 255.255.255.224
The number of subnets is 8.
The number of addresses in each subnet is 25 (5 is the number of 0s) = 32-2 = 30