The document summarizes key concepts about network layer addressing in computer networks, including:
1) It discusses IP address classes and issues with classful addressing such as inefficient use of address space and increased router table entries.
2) It introduces subnetting as a way to add hierarchy and flexibility to IP addressing by splitting the host ID portion of an address into subnet ID and host ID bits.
3) It explains how subnet masks are used to indicate which bits of an IP address correspond to the network/subnet ID and which to the host ID.
4) It provides examples of how to determine subnet masks and design subnet addressing schemes based on network and host requirements.
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Data Communication & Computer Networks: Multi level, multi transition & block...Dr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. It covers Multi level, Multi transition and Block codes which are used in communication of data. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Data Communication & Computer Networks: Multi level, multi transition & block...Dr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. It covers Multi level, Multi transition and Block codes which are used in communication of data. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
These slides cover the fundamentals of data communication & networking. It covers Channel Capacity It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
In this we discuss about DATA RATE LIMITS
Two theoretical formulas were developed to calculate the data rate:
Nyquist bit rate for a noiseless channel
BitRate = 2 * bandwidth * log 2 L
2: Shannon Capacity for a noisy channel
Capacity = bandwidth * log 2 (1 + SNR)
...............
PERFORMANCE (Network PERFORMANCE) :
Bandwidth: ( Bandwidth in Hertz and Bandwidth in Bits per Seconds) :
Throughput:
These above topics covered in this slide
Thanks You!
File ini berisi latihan-latihan dalam mengatasi subneting dengan menggunakan VLSM. Solusi yang diberikan memang cukup sulit untuk difahami. Walaupun demikian, tak lepas untuk kita mempelajarinya.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
Here is the presentation for Physical Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
These slides cover the fundamentals of data communication & networking. It covers Channel Capacity It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
In this we discuss about DATA RATE LIMITS
Two theoretical formulas were developed to calculate the data rate:
Nyquist bit rate for a noiseless channel
BitRate = 2 * bandwidth * log 2 L
2: Shannon Capacity for a noisy channel
Capacity = bandwidth * log 2 (1 + SNR)
...............
PERFORMANCE (Network PERFORMANCE) :
Bandwidth: ( Bandwidth in Hertz and Bandwidth in Bits per Seconds) :
Throughput:
These above topics covered in this slide
Thanks You!
File ini berisi latihan-latihan dalam mengatasi subneting dengan menggunakan VLSM. Solusi yang diberikan memang cukup sulit untuk difahami. Walaupun demikian, tak lepas untuk kita mempelajarinya.
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
Here is the presentation for Physical Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
Oct. 14, 2011 webcast ch7 subnets bruce hartpenceO'Reilly Media
In this webcast we'll talk about address space, the purpose of the network mask and the reasons we manipulate network masks. Presented by: Bruce Hartpence
Lab 18 Answer TemplateProblem 1:
IP address: 192.168.10.0 /27 (given)
a. Subnet Mask: 255.255.255.224
b. Bits Borrowed: 3
c. Number of subnets: 8
d. Magic number: 32
e. Number of valid hosts per subnet: 30
f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.30
i. Broadcast address in subnet 0: 192.168.10.31
j. (Sub) Network address in subnet 3: 192.168.10.64
k. Last usable host address in subnet 4: 192.168.10.158
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.30
192.168.10.31
1
192.168.10.32
192.168.10.33
192.168.10.62
192.168.10.63
2
192.168.10.64
192.168.10.65
192.168.10.94
192.168.10.95
3
192.168.10.96
192.168.10.97
192.168.10.126
192.168.10.127
4
192.168.10.128
192.168.10.129
192.168.10.158
192.168.10.159
5
192.168.10.160
192.168.10.161
192.168.10.190
192.168.10.191
6
192.168.10.192
192.168.10.193
192.168.10.222
192.168.10.223
7
192.168.10.224
192.168.10.225
192.168.10.254
192.168.10.255Problem 2:
IP address: 192.168.10.0 / 26 (given)
a. Subnet Mask: 255.255.255.192
b. Bits Borrowed:
c. Number of subnets: _4
d. Magic number:
e. Number of valid hosts per subnet: 62
f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.62
i. Broadcast address in subnet 0: 192.168.10.63
j. (Sub) Network address in subnet 1: 192.168.10.64
k. Last usable host address in subnet 2: 192.168.10.190
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.14
192.168.10.15
1
192.168.10.16
192.168.10.17
192.168.10.30
192.168.10.31
2
192.168.10.32
192.168.10.33
192.168.10.46
192.168.10.47
3
192.168.10.48
192.168.10.49
192.168.10.62
192.168.10.63
Etc.
Problem 3:
IP address: 192.168.10.0 (given)
Subnet Mask: 255.255.255.240
a. Slash prefix: _________________________________________
b. Bits Borrowed: _________________________________________
c. Number of possible subnets: _________________________________________
d. Magic number: _________________________________________
e. Number of usable hosts per subnet: _________________________________________
f. (Sub) network address of subnet 0: _________________________________________
g. First usable host address in subnet 0: _________________________________________
h. Last usable host address in subnet 0: _________________________________________
i. Broadcast address in subnet 0: _________________________________________
j. (Sub) Network address in subnet 1: _________________________________________
k. Last usable host address in subnet 2: _________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
Problem 4:
IP address: 192.168.10.0 (given)
Minimum number of subnets needed: 31
a. Slash prefix: _ ...
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
4. Issues with Classful Addressing
• Flexibility in Internal addressing:
– Thousands of hosts connected to one large network
• Inefficient Use of Address Space:
– Wastage of limited IP address space.
• Router Table Entries:
– Increase in router table entries.
Example:
• Hosts needed by organization are 5000
• Hosts in B 65,536 and in C 256
– Organization with 5,000 hosts is in a dilemma
– It can only choose to either waste 90% of a Class B address
or use 20 different Class C networks.
– Replacing with 20 C networks will increase entries in routers
5. Subnetting
• Subnetting adds an additional level to the hierarchy
of structures used in IP addressing.
• IP addresses must be broken into three elements
instead of two.
• Network ID is unchanged
• The host ID into a subnet ID and host ID.
• These subnet ID bits are used to identify each
subnet within the network.
• Splitting the host ID into subnet ID and host ID, we
reduce the size of the host ID portion of the address
• Class A networks have 24 bits to split between the
subnet ID and host ID: class B networks have 16, and
class C networks only 8.
6. Subnetting
The more bits we use from the host ID for the subnet ID, the more
subnets we can have but the fewer hosts we can have for each subnet.
7. Subnet Mask
• In classful addressing without subnetting
– Routers use the first octet of the IP address to determine
what the class is of the address
– From class they know which bits are the network ID and
which are the host ID.
• In subnetting, the routers also need to know how that
host ID is divided into subnet ID and host ID.
– This division can be arbitrary for each network.
– There is no way to tell how many bits belong to each simply
by looking at the IP address.
– The additional information about which bits are for the
subnet ID and which for the host ID must be communicated
to devices that interpret IP addresses.
– This information is given in the form of a 32-bit binary
number called a subnet mask.
8. Determining the Subnet Mask
• The subnet mask is a 32-bit binary number
• It is created so that it has a one bit for each corresponding bit of
the IP address that is part of its network ID or subnet ID, and a
zero for each bit of the IP address’s host ID.
• The mask thus tells TCP/IP devices which bits in that IP address
belong to the network ID and subnet ID, and which are part of
the host ID.
9. Determining the Subnet Mask
• Suppose we have the Class B network 154.71.0.0.
• We decide to subnet this using 5 bits for the subnet
ID and 11 bits for the host ID.
• In this case, the subnet mask will have 16 ones for
the network portion (since this is Class B) followed by
5 ones for the subnet ID, and 11 zeroes for the host
ID.
• That's “11111111 11111111 11111000 00000000” in
binary, with the bits corresponding to the subnet ID
highlighted.
• Converting to dotted decimal, the subnet mask would
be 255.255.248.0
10. Determining the Subnet Mask
Example
• A company is granted the site address
210.70.64.0. The company needs six
subnets. What is the subnet Mask?
11. Determining the Subnet Mask
Solution
• Class C address
• 6 subnets means 3 bits in the subnet id
• 3 ones in the subnet mask
• 11111111 11111111 11111111 11100000
• 255.255.255.224 (decimal)
12. Using a Subnet Mask
• Suppose we have a host on a network with an IP of
154.71.150.42 and subnet mask 255.255.248.0
• A router needs to figure out which subnet this
address is on.
154.71.144.0 is the IP address of the subnet to which 154.71.150.42 belongs.
13. Designing a Subnet
•
•
•
•
Analyze the requirements
Determine the subnet mask
Each Subnet address
Host Addresses
Example:
• Network Address: 211.77.20.0
• 8 sub networks
• 32 hosts in each
17. Determining Host Address
•
Subnet #0
– First address: 11010011 01001101 00010100 00000000 (211.77.20.0)
– Second address: 11010011 01001101 00010100 00000001
(211.77.20.1)
– Third address: 11010011 01001101 00010100 00000010
(211.77.20.2)
– Last address: 11010011 01001101 00010100 00011111
(211.77.20.31)
•
Subnet #6.
It has “110” for the subnet bits instead of “000”.
– First address: 11010011 01001101 00010100 11000000
(211.77.20.192)
– Second address: 11010011 01001101 00010100 11000001
(211.77.20.193)
– Third address: 11010011 01001101 00010100 11000010
(211.77.20.194)
– Last address: 11010011 01001101 00010100 11011111
– (211.77.20.223)
Similarly for other subnets
•
18. Designing a Subnet
Home Assignment
• A company is granted the site address
172.16.0.0. The company needs 1000
subnets. Design the subnets?
19. Classless Addressing
•To overcome address depletion
•No classes, but the address are still granted in blocks.
•The size of the block( the number of addresses) varies based
on the nature and size of the entity.
• Household: 2 addresses
•Large organization: thousands of addresses
• ISP: thousands or hundreds of thousands based on the
number of customers it may serve.
•The number of addresses in a block must be power of two
(2,4,8…..).
•Classless Inter Domain Routing (CIDR)
20. Mask:Slash Notation
• Each mask is made of some ones from
the left and followed by some 0s.
• Instead of 255.255.255.224
– Mask has 27 1s
– Attach this number to a classless address
–x.y.z.t/n
• n defines the number of bits that are same in
every block.
21. Classless Addressing: Mask
• The n leftmost bits are 1s
• 32-n rightmost bits are 0s
• In CIDR, n has a value from 0 to 32 and
used to show the mask in the form /n.
• A block of addresses can be defined as
x.y.z.t/n in which x.y.z.t defines one of
the addresses and the /n defines the
mask.
Example: 172.31.1.2/25
23. Address allocation with Classful
Addressing
Need 10 addresses
Class C. Give them 256.
Need 200 addresses
Class C. Give them 256.
Need 500 addresses
Class B. Give them 65,536.
Need 1000 addresses
Class B. Give them 65,536.
Need 4000 addresses
Class B. Give them 65,536.
Fig courtesy: Ward Abingdon and Witney College CCNA Exploration
24. Address allocation with
Classless Addressing
Need 10 addresses
/28. Give them 16.
Need 200 addresses
/24. Give them 256.
Need 500 addresses
/23. Give them 512.
Need 1000 addresses
/22. Give them 1024.
Need 4000 addresses
/20. Give them 4096.
Fig courtesy: Ward Abingdon and Witney College CCNA Exploration
25. Classless Addressing
• A small organization is given a block with a
beginning address 205.16.37.24/29.What is
the range of the block?
• Number of bits for hosts =32-29=3
• Total hosts=8
• The first address is 205.16.37.24
• The last address is 205.16.37.31
26. Classless Addressing
• A block of addresses is granted to a small
organization. We know that one of the
addresses is 205.16.37.39/28.What is the
first address in the block?
The given address in binary is
• 11001101 00010000 00100101 00100111
• If we set right most 4 bits to 0 we get
• 11001101 00010000 00100101 00100000
– 205.16.37.32 (decimal)
27. Classless Addressing
• A block of addresses is granted to a small
organization. We know that one of the
addresses is 167.199.170.82/27.What is
the first address in the block?
28. Classless Addressing
Solution
• The last byte is 01010010
• Changing the last 5 bits to 0s we get
• 01000000 or 64
• The first address in the block is
167.199.170.64/27
29. Subnetting
• An organization is granted the block
17.12.40.0/26. The organization has
three offices and needs to divide the
addresses into three sub-blocks of
32,16 and 16 addresses.What are the
subnet addresses and the range of
addresses for each subnet?
30. Subnetting
Solution:
• For subnet 1 that requires 32 addresses
– The mask is 32-5=27
• For subnet 2 that requires 16 addresses
– The mask is 32-4=28
• For subnet 3 that requires 16 addresses
– The mask is 32-4=28
• This means we have the masks 27,28,28
with the organization mask being 26
31. Subnetting
Solution:
• For subnet 1
– The first address is 17.12.40.0/27
– The last address is 17.12.40.31/27
• For subnet 2
– The first address is 17.12.40.32/28
– The last address is 17.12.40.47/28
• For subnet 3
– The first address is 17.12.40.48/28
– The last address is 17.12.40.63/28
32. Subnetting
• An organization is granted the block
130.34.12.64/26. The organization
needs to have four subnets with 16
hosts. What are the subnet addresses
and the range of addresses for each
subnet?
33. Subnetting
• For all subnets
– The mask is 32-4=28
• For subnet 1
– The first address is 130.34.12.64/28
– The last address is 130.34.12.79/28
• For subnet 2
– The first address is 130.34.12.80/28
– The last address is 130.34.12.95/28
• For subnet 3
– The first address is 130.34.12.96/28
– The last address is 130.34.12.111/28
• For subnet 4
– The first address is 130.34.12.112/28
– The last address is 130.34.12.127/28
34. Subnetting
Home Assignment
An organization is granted a block of addresses with the
beginning address 14.24.74.0/24. There are 232−24= 256
addresses in this block. The organization needs to have
11 subnets as shown below:
a. two subnets, each with 64 addresses.
b. two subnets, each with 32 addresses.
c. three subnets, each with 16 addresses.
d. four subnets, each with 4 addresses.
Design the subnets.