The document discusses IP addressing and IPv6. It defines what an IP address is, how it is written in dotted decimal notation, and its structure including the network prefix and host number. It describes problems with the original IP address classification scheme and how subnetting and CIDR addressed these. It also summarizes IPv6, including its 128-bit address size which vastly increases the available address space compared to IPv4.
Subnetting of IPv4 ip address that help you to solve every type of ip address with any one of the class you want to subnet,and have a basic introduction of IPv6 ,and why, Ipv5 is not used.
Subnetting of IPv4 ip address that help you to solve every type of ip address with any one of the class you want to subnet,and have a basic introduction of IPv6 ,and why, Ipv5 is not used.
CCNA certification is a cornerstone of many IT careers. This book is a comprehensive study guide for the CCNA Intro, CCNA ICND, and CCNA Certification exams. Its target audience is a high school student, a first-year community college or any adult wanting to understand networking better.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 ("IPv4").
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
CCNA certification is a cornerstone of many IT careers. This book is a comprehensive study guide for the CCNA Intro, CCNA ICND, and CCNA Certification exams. Its target audience is a high school student, a first-year community college or any adult wanting to understand networking better.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 ("IPv4").
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
Indian Railway is the state-owned railway company of India, which owns and operates most of the country's rail transport. It is overseen by the Ministry of Railways of the Government of India It's provides the full knowledge about Indian railways & its signalling system and it's gives the knowledge about rail-net and the network used in Indian rail and the topology used in indian railway for the internet .
1 month Summer Training Report on "Universal Axel Counter" .
in this report it's gives full description about CEL Profile and the description about universal axle counter and solar cell
it's gives the full description about satellite . it's provide the knowledge about wireless communication.and it's gives the comparison between oft and satellite.ti's gives the basic knowledge about optical fibre
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
2. What is an IP address
Dotted decimal notation
Structure of an IP address
Network prefix and Host number
IP ADDRESS classification
Problems with IP classification
Sub netting
IP Version 6 addresses
3. An IP address is a unique global address for a
network interface
It designates the specific location of a device
on the network
An IP address:
- is a 32 bit long identifier
- encodes a network number
(network prefix)
and a host number
4. IP addresses are written in a so-called dotted
decimal notation
Each byte is identified by a decimal number in
the range [0..255]:
Example:
10000000 10001111 10001001 10010000
1st Byte
= 128
2nd Byte
= 143
3rd Byte
= 137
4th Byte
= 144
128.143.137.144
5. version
(4 bits)
header
length
Type of Service/TOS
(8 bits)
Total Length (in bytes)
(16 bits)
Identification (16 bits)
flags
(3 bits)
Fragment Offset (13 bits)
Source IP address (32 bits)
Destination IP address (32 bits)
TTL Time-to-Live
(8 bits)
Protocol
(8 bits)
Header Checksum (16 bits)
32 bits
6. The network prefix identifies a network and the
host number identifies a specific host (actually,
interface on the network).
How do we know how long the network prefix is?
◦ The network prefix is implicitly defined (see class-based
addressing)
◦ The network prefix is indicated by a netmask.
network prefix host number
7. Example: ellington.cs.virginia.edu
Network id is: 128.143.0.0
Host number is: 137.144
Network mask is: 255.255.0.0 or ffff0000
Prefix notation: 128.143.137.144/16
Network prefix is 16 bits long
128.143 137.144
8. When Internet addresses were standardized (early
1980s), the Internet address space was divided up
into classes:
◦ Class A: Network prefix is 8 bits long
◦ Class B: Network prefix is 16 bits long
◦ Class C: Network prefix is 24 bits long
◦ Class D; Multicast
◦ Class E: Research
Each IP address contained a key which identifies the
class:
◦ Class A: IP address 0-127
◦ Class B: IP address 128-191
◦ Class C: IP address 192-223
◦ Class D & E : IP address 224-255
9. The original classful address scheme had a
number of problems
Problem 1. Too few network addresses for
large networks
◦ Class A and Class B addresses are gone
Problem 2. Two-layer hierarchy is not
appropriate for large networks with Class A
and Class B addresses.
◦ Fix #1: Subnetting
10. Problem 3. Inflexible. Assume a company
requires 2,000 addresses
◦ Class A and B addresses are overkill
◦ Class C address is insufficient (requires 8 Class C
addresses)
◦ Fix #2: Classless Interdomain Routing (CIDR)
11. Problem 4: Exploding Routing Tables: Routing
on the backbone Internet needs to have an
entry for each network address. In 1993, the
size of the routing tables started to outgrow
the capacity of routers.
◦ Fix #2: Classless Interdomain Routing (CIDR)
12. Problem 5. The Internet is going to outgrow
the 32-bit addresses
◦ Fix #3: IP Version 6
13. Subnetting
Problem: Organizations
have multiple networks
which are independently
managed
◦ Solution 1: Allocate one or
more addresses for each
network
Difficult to manage
From the outside of the
organization, each
network must be
addressable.
◦ Solution 2: Add another
level of hierarchy to the IP
addressing structure
University Network
Medical
School
Library
Engineering
School
14. Split the host number portion of an IP
address into a subnet
number and a (smaller) host number.
Result is a 3-layer hierarchy
Then:
Subnets can be freely assigned within the organization
Internally, subnets are treated as separate networks
Subnet structure is not visible outside the organization
network prefix host number
subnet numbernetwork prefix host number
extended network prefix
16. With subnetting, IP addresses use a 3-layer hierarchy:
Network
Subnet
Host
Improves efficiency of IP addresses by not consuming
an entire address space for each physical network.
Reduces router complexity. Since external routers do
not know about subnetting, the complexity of routing
tables at external routers is reduced.
Note: Length of the subnet mask need not be
identical at all subnetworks.
17. IP Version 6
◦ Is the successor to the currently used IPv4
◦ Specification completed in 1994
◦ Makes improvements to IPv4 (no revolutionary
changes)
One (not the only !) feature of IPv6 is a
significant increase in size of the IP address
to 128 bits (16 bytes)
IPv6 will solve – for the foreseeable future – the
problems with IP addressing
18. version
(4 bits)
Traffic Class
(8 bits)
Flow Label
(24 bits)
Payload Length (16 bits)
Next Header
(8 bits)
Hop Limits (8 bits)
Source IP address (128 bits)
32 bits
Destination IP address (128 bits)
19. IPv4 has a maximum of
232 4 billion addresses
IPv6 has a maximum of
2128 = (232)4 4 billion x 4 billion x 4 billion x 4 billion
addresses
20. Convention: The 128-bit IPv6 address is written
as eight 16-bit integers (using hexadecimal
digits for each integer)
CEDF:BP76:3245:4464:FACE:2E50:3025:DF12
Short notation:
Abbreviations of leading zeroes:
CEDF:BP76:0000:0000:009E:0000:3025:DF12
CEDF:BP76:0:0:9E :0:3025:DF12
“:0000:0000” can be written as “::”
CEDF:BP76:0:0:FACE:0:3025:DF12 CEDF:BP76::FACE:0:3025:DF12
IPv6 addresses derived from IPv4 addresses have 96 leading zero
bits. Convention allows to use IPv4 notation for the last 32 bits.
::80:8F:89:90 ::128.143.137.144
21. The first IPv6 addresses will be allocated to a
provider-based plan
Type: Set to “010” for provider-based addresses
Registry: identifies the agency that registered the
address
The following fields have a variable length (recommeded length in “()”)
Provider: Id of Internet access provider (16 bits)
Subscriber: Id of the organization at provider (24 bits)
Subnetwork: Id of subnet within organization (32 bits)
Interface: identifies an interface at a node (48 bits)
Registry
ID
Provider
ID
010
Subscriber
ID
Interface
ID
Subnetwork
ID
22. The provider-based addresses have a similar
flavor as CIDR addresses
IPv6 provides address formats for:
◦ Unicast – identifies a single interface
◦ Multicast – identifies a group. Datagrams sent to a
multicast address are sent to all members of the
group
◦ Anycast – identifies a group. Datagrams sent to an
anycast address are sent to one of the members in
the group.