The document discusses subnetting a Class C network using the "moving stick" and "magic number" methods. It shows how to borrow bits from the last octet to create subnets and calculates the subnet, range, and broadcast addresses. Using the IP address 192.168.12.0 with requirements for at least 3 subnets with more than 50 hosts each, it determines the subnet mask would be 255.255.255.192, creating 4 subnets of 64 addresses each.
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
This presentation contains why we need sub netting, how we do sub netting, CIDR, Subnet mask, Subnet mask value, Class A Sub netting, Class B Sub netting, Class C Sub netting.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
Complete understanding of subnet masking
also available on the youtube channal in three parts 1,2,3
link:-
https://www.youtube.com/channel/UC36lyOTi8w1EhQ-yZssjX1g?view_as=subscriber.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
Subnetting of IPv4 ip address that help you to solve every type of ip address with any one of the class you want to subnet,and have a basic introduction of IPv6 ,and why, Ipv5 is not used.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
Complete understanding of subnet masking
also available on the youtube channal in three parts 1,2,3
link:-
https://www.youtube.com/channel/UC36lyOTi8w1EhQ-yZssjX1g?view_as=subscriber.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
Subnetting of IPv4 ip address that help you to solve every type of ip address with any one of the class you want to subnet,and have a basic introduction of IPv6 ,and why, Ipv5 is not used.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Elevating Tactical DDD Patterns Through Object Calisthenics
Subnetting a class_c_address
1. Subnetting Made Easy?Subnetting Made Easy?
The “moving stick” and the “magic number”The “moving stick” and the “magic number”
Jim BlancoJim Blanco
Aparicio-Levy Technical CenterAparicio-Levy Technical Center
2. Subnetting Made EasySubnetting Made Easy
•First let’s look at the overall requirement.
•A class C network consists of 4 octets totaling 32 bits.
•If we use a Class C network such as 192.168.12.0, we can only
make use of the last octet or 8 bits.
•There are 256 possible combinations of bits “on” or “off” in one octet.
3. Subnetting Made EasySubnetting Made Easy
•256 addresses would result in a very large collision domain.
•256 hosts using the “wire” one at a time would render the LAN
unusable.
•In business environments, host addresses are usually divided
into groups or subnets for management and security reasons.
•In addition the first address is reserved for the subnet address
and the last for a broadcast address.
•So we really have 254 available host addresses.
4. Subnetting Made EasySubnetting Made Easy
We could just divide the addresses in the last octet into more manageable
blocks or “subnets”:
256/4 = 64 or 4 subnets each with 64 addresses
256/8 = 32 or 8 subnets each with 32 addresses
256/16 = 16 or 16 subnets each with 16 addresses
But this is too simple. We must also keep track of subnet and broadcast
addresses.
5. Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•First convert the last octet, represented by the decimal number “0”,
into 8 binary “0”s to represent 8 bits.
6. Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 000000000000000
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
• By just utilizing the last bit, we have two possible IP addresses.
7. Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 000000000000000 bit offbit off
192192 168168 1212 00 IP addressIP address
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•First, with the bit remaining at “0” or off, the IP address is 192.168.12.0
8. Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000 bit offbit off
192192 168168 1212 00 IP addressIP address
192192 168168 1212 000000000000001 bit onbit on
192192 168168 1212 11 IP addressIP address
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•Second, when the bit is “1” or turned on, the IP address is 192.168.12.1
•Thus we have 2 possible IP addresses just utilizing the last bit
9. Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000 bit offbit off
192192 168168 1212 00 .0.0
192192 168168 1212 0000000100000001 bit onbit on
192192 168168 1212 11 .1.1
192192 168168 1212 00000000000000 .0.0
192192 168168 1212 00000000000001 .1.1
192192 168168 1212 00000000000010 .2.2
192192 168168 1212 00000000000011 .3.3
•If we use the two last bits, in the on an off positions, we have four possible IP
addresses.
•We could continue with combinations of 3, 4 and more bits up to 8 which
would result in 256 combinations of 1 and 0 or potential IP addresses.
•Remember “0” is a number.
10. Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000 bit offbit off
192192 168168 1212 00 .0.0
192192 168168 1212 0000000100000001 bit onbit on
192192 168168 1212 11 .1.1
192192 168168 1212 00000000000000 .0.0
192192 168168 1212 00000000000001 .1.1
192192 168168 1212 00000000000010 .2.2
192192 168168 1212 00000000000011 .3.3
•Since we cannot use the first address (subnet), 0 or the last address 255
(broadcast) we have 256-2=254 usable addresses.
•That’s one big collision domain.
•We need to divide it up into smaller blocks or “subnets”.
11. Subnetting: Class CSubnetting: Class C hosthost addressaddress
Hold on. Thought we had 256 addresses?Hold on. Thought we had 256 addresses?
Or is it 254?Or is it 254?
There are 256 combinations of 1 and 0.There are 256 combinations of 1 and 0.
Possible addresses run from .0 to .255.Possible addresses run from .0 to .255.
““0” is a number.0” is a number.
0-255 yields 256 addresses.0-255 yields 256 addresses.
The first “0” is reserved for the subnet andThe first “0” is reserved for the subnet and
the last “255” is the broadcast address.the last “255” is the broadcast address.
12. Subnetting: Class CSubnetting: Class C hosthost addressaddress
So that’s 256 – 2 or 254 usable addressesSo that’s 256 – 2 or 254 usable addresses
in our one big subnet.in our one big subnet.
Next we need to decide how manyNext we need to decide how many
subnets will meet our networkingsubnets will meet our networking
requirement.requirement.
13. Subnetting: Class CSubnetting: Class C subnetsubnet addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000 bit offbit off
192192 168168 1212 00 11stst
subnetsubnet
192192 168168 1212 100000000000000 bit onbit on
192192 168168 1212 11 22eded
subnetsubnet
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•The same rule applies to borrowing bits for subnet addresses.
•Start at the left side.
•The first bit can be borrowed and turned on or off resulting in 2 subnets.
14. Subnetting: Class CSubnetting: Class C subnetsubnet addressaddress
192192 168168 1212 00
192192 168168 1212 00000000000000
192192 168168 1212 00
192192 168168 1212 1000000010000000
192192 168168 1212 11
192192 168168 1212 00000000000000 00
192192 168168 1212 10000000000000 11
192192 168168 1212 01000000000000 22
192192 168168 1212 11000000000000 33
•Borrowing two bits yields four combinations of bits on and off, or four
different combinations and 4 possible subnets
15. The moving stickThe moving stick
0 0 0 0 0 0 0 0
192.168.12.0
•Now let’s put it all together with our “moving stick” method
•Write the last octet in binary
16. The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible host addresses
0 0 0 0 0 0 0 0
•Start on the right.
•Number to the left to show possible numbers of host addresses.
17. The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
Start on the left.
Number to the right to show possible numbers of subnets.
18. The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•Draw the “moving stick.”
•You could have a combination of 4 subnets with 64 addresses each.
19. The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
Move the “stick” to the right.
You could have a combination of 8 subnets with 32 addresses each.
20. The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
Move it again.
You could have a combination of 16 subnets with 16 addresses each.
21. Calculate the subnetsCalculate the subnets
Use this IP addressUse this IP address
192.168.12.0192.168.12.0
Our company requires at least 3 subnets withOur company requires at least 3 subnets with
more than 50 hosts per subnet.more than 50 hosts per subnet.
22. The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•Look back to our first example.
•We borrowed two bits.
•This fits the requirement of our company – 4 subnets each with up to 64 addresses.
23. The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•We could move the “stick” to the right.
•But a combination of 8 subnets with 32 addresses each
does not meet our company’s requirement.
24. The moving stickThe moving stick
add the “add the “magic numbermagic number””
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•We move the stick back to the left.
•64 is our “magic” number”.
25. Calculate the subnetsCalculate the subnets
SubnetSubnet RangeRange BroadcastBroadcast
addressaddress
192.168.12.0192.168.12.0
192.168.12.192.168.12.64
192.168.12.192.168.12.128
192.168.12.192.168.12.1192
•Add to the “0” subnet by increments of 64, our magic number.
•We find our 4 subnet addresses.
26. Calculate the subnetsCalculate the subnets
SubnetSubnet RangeRange BroadcastBroadcast
addressaddress
192.168.12.0192.168.12.0 192.168.12.1 - 192.168.12.62 192.168.12.63
192.168.12.64192.168.12.64
192.168.12.128192.168.12.128
192.168.12.192192.168.12.192
•The first usable address is 192.168.12.1 in our first subnet
•The last usable address is 192.168.12.62
•The broadcast address is 192.168.12.63
•.0 through .63 totals 64 addresses, our “magic number”
29. Ok, I lied. You still haveOk, I lied. You still have
to figure out that peskyto figure out that pesky
subnet mask.subnet mask.
30. •Just because you graphJust because you graph
subnets on a piece of papersubnets on a piece of paper
doesn’t mean your router ordoesn’t mean your router or
PC has any idea what you did.PC has any idea what you did.
•We need a subnet mask toWe need a subnet mask to
enter into the router CLI or yourenter into the router CLI or your
PC’s local area connectionPC’s local area connection
propertiesproperties
31. Subnet MaskSubnet Mask
128 64 32 16 8 4 2 1 binary numbers
0 0 0 0 0 0 0 0
•Renumber your last 8 bits to show the binary equivalent.
•Draw your stick to show the two borrowed bits.
•Your subnet mask is 128 + 64 = 192.
32. Subnet MaskSubnet Mask
128 64 32 16 8 4 2 1 binary numbers
0 0 0 0 0 0 0 0
•If you had borrowed 3 bits.
•Your subnet mask would be 128 + 64 + 32 = 224.
34. Problem completedProblem completed
Our company required us to borrow 2 bitsOur company required us to borrow 2 bits
so our IP address and subnet mask is:so our IP address and subnet mask is:
192.168. 12. 0192.168. 12. 0
255.255.255.192255.255.255.192