SlideShare a Scribd company logo
1 of 49
IP ADDRESSING AND
SUBNETTING
2
Objectives
• Explain the different classes of IP addresses
• Configure IP addresses
• Subdivide an IP network
3
Objectives (continued)
• Discuss advanced routing concepts such as
CIDR(Classless Inter-Domain Routing),
summarization, and VLSM(Variable Length Subnet
Masking)
• Convert between decimal, binary, and hexadecimal
numbering systems
• Explain the differences between IPv4 and IPv6
4
IP Addressing
• An IP address has 32 bits divided into four octets
• To make the address easier to read, people use
decimal numbers to represent the binary digits
– Example: 192.168.1.1
• Dotted decimal notation
– When binary IP addresses are written in decimal
format
5
IP Addressing (continued)
6
MAC to IP Address Comparison
• MAC address
– Identifies a specific NIC in a computer on a network
– Each MAC address is unique
– TCP/IP networks can use MAC addresses in
communication
• Network devices cannot efficiently route traffic using
MAC addresses because they:
– Are not grouped logically
– Cannot be modified
– Do not give information about physical or logical
network configuration
7
MAC to IP Address Comparison
(continued)
• IP addressing
– Devised for use on large networks
• IP addresses have a hierarchical structure and do
provide logical groupings
– IP address identifies both a network and a host
8
IP Classes
• Internet Assigned Numbers Authority (IANA)
– Devised the hierarchical IP addressing structure
• American Registry of Internet Numbers (ARIN)
– Manages IP addresses in the United States
• Internet Corporation for Assigned Names and
Numbers (ICANN)
– A global, government-independent entity with overall
responsibility for the Internet
– ICANN has effectively replaced IANA
9
IP Classes (continued)
• Class A
– Reserved for governments and large corporations
throughout the world
– Each Class A address supports 16,777,214 hosts
• Class B
– Addresses are assigned to large- and medium-sized
companies
– Each Class B address supports 65,534 hosts
10
IP Classes (continued)
11
IP Classes (continued)
• Class C
– Addresses are assigned to groups that do not meet
the qualifications to obtain Class A or B addresses
– Each Class C address supports 254 hosts
• Class D
– Addresses (also known as multicast addresses) are
reserved for multicasting
– Multicasting is the sending of a stream of data
(usually audio and video) to multiple computers
simultaneously
12
IP Classes (continued)
13
IP Classes (continued)
• Class E
– Addresses are reserved for research, testing, and
experimentation
– The Class E range starts where Class D leaves off
• Private IP ranges
– Many companies use private IP addresses for their
internal networks
• Will not be routable on the Internet
– Gateway devices have network interface connections
to the internal network and the Internet
• Route packets between them
14
IP Classes (continued)
15
Network Addressing
• IP addresses identify both the network and the host
– The division between the two is not specific to a
certain number of octets
• Subnet mask
– Indicates how much of the IP address represents the
network or subnet
• Standard (default) subnet masks:
– Class A subnet mask is 255.0.0.0
– Class B subnet mask is 255.255.0.0
– Class C subnet mask is 255.255.255.0
16
Network Addressing (continued)
• TCP/IP hosts use the combination of the IP address
and the subnet mask
– To determine if other addresses are local or remote
– The binary AND operation is used to perform the
calculation
• Subnetting
– Manipulation of the subnet mask to get more network
numbers
17
Network Addressing (continued)
• Subnet address
– Network is identified by the first, or first few, octets
– A TCP/IP host must have a nonzero host identifier
• Broadcast address
– When the entire host portion of an IP address is all
binary ones
– Examples: 190.55.255.255 and 199.192.65.63
18
Network Addressing (continued)
19
Broadcast Types
• Flooded broadcasts
– Broadcasts for any subnet
– Use use the IP address 255.255.255.255
– A router does not propagate flooded broadcasts
because they are considered local
• Directed broadcasts are for a specific subnet
– Routers can forward directed broadcasts
– For example, a packet sent to the Class B address
129.30.255.255 would be a broadcast for network
129.30.0.0
20
Subdividing IP Classes
• Reasons for subnetting
– To match the physical layout of the organization
– To match the administrative structure of the
organization
– To plan for future growth
– To reduce network traffic
21
Subdividing IP Classes (continued)
22
Subnet Masking
• When network administrators create subnets
– They borrow bits from the original host field to make a
set of subnetworks
– The number of borrowed bits determines how many
subnetworks and hosts will be available
• Class C addresses also can be subdivided
– Not as many options or available masks exist
because only the last octet can be manipulated with
this class
23
24
Subnet Masking (continued)
25
Subnet Masking (continued)
26
Learning to Subnet
• Suppose you had a network with:
– Five different segments
– Somewhere between 15 and 20 TCP/IP hosts on
each network segment
• You just received your Class C address from ARIN
(199.1.10.0)
• Only one subnet mask can handle your network
configuration: 255.255.255.224
– This subnet mask will allow you to create eight
subnetworks and to place up to 30 hosts per network
27
Learning to Subnet (continued)
• Determine the subnet identifiers (IP addresses)
– Write the last masking octet as a binary number
– Determine the binary place of the last masking digit
• Calculate the subnets
– Begin with the major network number (subnet zero)
and increment by 32
– Stop counting when you reach the value of the mask
• Determine the valid ranges for your hosts on each
subnet
– Take the ranges between each subnet identifier
– Remove the broadcast address for each subnet
28
Learning to Subnet (continued)
29
Learning to Subnet (continued)
30
Learning to Subnet (continued)
31
Subnetting Formulas
• Consider memorizing the following two formulas:
2y
= # of usable subnets (where y is the number of bits
borrowed)
2x
– 2 = # of usable hosts per subnet (where x is the
number of bits remaining in the host field after
borrowing)
32
Subnetting Formulas (continued)
33
Subnetting Formulas (continued)
34
CIDR
• Classless Inter-Domain Routing (CIDR)
– Developed to slow the exhaustion of IP addresses
– Based on assigning IP addresses on criteria other
than octet boundaries
• CIDR addressing method allows the use of a prefix
to designate the number of network bits in the mask
– Example: 200.16.1.48 /25 (CIDR notation)
– The first 25 bits in the mask are network bits (1s)
• The prefix can be longer than the default subnet
mask (subnetting) or it can be shorter than the
default mask (supernetting)
35
Summarization
• Summarization
– Also know as route aggregation or supernetting
– Allows many IP subnets to be advertised as one
• Reduces the number of entries in the router’s routing
table
• Summarize a group of subnets
– Count the number of bits that are common to all of the
networks you want to advertise
– Then use the prefix that identifies the number of
common bits
36
Summarization (continued)
37
Variable Length Subnet Masks
• Variable length subnet masking (VLSM)
– Allows different masks on the subnets
– Essentially done by subnetting the subnets
• Basic routing protocols such as RIP version 1 and
IGRP
– Do not support VLSM because they do not carry
subnet mask information in their routing table updates
– Are classful routing protocols
• RIP version 2, OSPF, or EIGRP are classless
protocols
38
39
Variable Length Subnet Masks
(continued)
40
Variable Length Subnet Masks
(continued)
41
Working with Hexadecimal Numbers
• Hexadecimal numbering system is base 16
– 16 numerals are used to express any given number
– Numerals include 0 through 9 as well as A through F
– For example, the decimal number 192 is C0 in
hexadecimal
• Often you will come across hexadecimal numbers
when working with computers and networking
– The MAC address is a 12-digit hexadecimal number
• Computers typically process information in 8-bit
chunks (bytes)
– Easier to express bytes with two hex digits
42
43
IPv4 versus IPv6
• IP version 4 (IPv4)
– The version of IP currently deployed on most systems
today
• IP version 6 (IPv6)
– Originally designed to address the eventual depletion
of IPv4 addresses
• CIDR has slowed the exhaustion of IPv4 address
space and made the move to IPv6 less urgent
– However, CIDR is destined to become obsolete
because it is based on IPv4
44
IPv4 versus IPv6 (continued)
• Network address translation (NAT)
– Another technique developed in part to slow the
depletion of IPv4 addresses
– Allows a single IP address to provide connectivity for
many hosts
• NAT is CPU intensive and expensive
– Some protocols do not work well with NAT, such as
the IP Security Protocol (IPSec)
• IPv4 does not provide security in itself
– Has led to security issues with DNS and ARP
45
IPv4 versus IPv6 (continued)
• Security concerns were factored into the design of
IPv6
• IPv4 networks rely on broadcasting
– Inefficient because many hosts unnecessarily see and
partially process traffic not ultimately destined for them
• IPv6 does away completely with broadcasting and
replaces it with multicasting
• IPv6 addresses are 128 bits compared with IPv4’s
32-bit structure
46
IPv4 versus IPv6 (continued)
• IPv6 addresses are expressed as hexadecimal
numbers
– Example:
3FFE:0501:0008:0000:0260:97FF:FE40:EFAB
• IPv6 can be subnetted
– CIDR notation is also used with IPv6
• Example: 2001:702:21:: /48
• Organizations requesting an IPv6 address may be
assigned a /64 prefix
– Minimum subnet with space for over a billion hosts
47
Transitioning to IPv6
• Dual stack
– Involves enabling IPv6 on all routers, switches, and
end nodes but not disabling IPv4
– Both version 4 and version 6 stacks run at the same
time
• Tunneling
– Encapsulates IPv6 traffic inside IPv4 packets
– Done when portions of a network are running IPv6 and
other network areas have not been upgraded yet
– Greatest concern: security
48
Summary
• The ICANN and the ARIN work together to
subdivide and issue addresses for Internet clients
• Three classes of addresses (A, B, and C) are
available to organizations
• The two additional address categories are Class D
and Class E
• Subnetting involves subdividing assigned
addresses
• Routing tables can be created manually and
dynamically
49
Summary (continued)
• Advanced routing protocols such as RIP version 2,
OSPF, and EIGRP support variable length subnet
masking (VLSM)
• The hexadecimal numbering system is also known
as base 16 because it has 16 available numerals
• IPv6 is the latest version of IP addressing

More Related Content

What's hot

What's hot (20)

Subnetting
SubnettingSubnetting
Subnetting
 
OSI Model
OSI ModelOSI Model
OSI Model
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
IP Address
IP AddressIP Address
IP Address
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Ip address
Ip addressIp address
Ip address
 
Addressing
AddressingAddressing
Addressing
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
IPv6
IPv6IPv6
IPv6
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 

Viewers also liked

IP Address Management Best Practices
IP Address Management Best PracticesIP Address Management Best Practices
IP Address Management Best PracticesSolarWinds
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersS Khawaja
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6RIPE NCC
 
How to Master Difficult Conversations at Work – Leader’s Guide
How to Master Difficult Conversations at Work – Leader’s GuideHow to Master Difficult Conversations at Work – Leader’s Guide
How to Master Difficult Conversations at Work – Leader’s GuidePiktochart
 
4 Biggest Challenges for Creative Teams
4 Biggest Challenges for Creative Teams4 Biggest Challenges for Creative Teams
4 Biggest Challenges for Creative TeamsWrike
 
10 Dead Simple Ways to Improve Your Company Culture
10 Dead Simple Ways to Improve Your Company Culture10 Dead Simple Ways to Improve Your Company Culture
10 Dead Simple Ways to Improve Your Company CultureBonusly
 
How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startupLoic Le Meur
 
10 Things your Audience Hates About your Presentation
10 Things your Audience Hates About your Presentation10 Things your Audience Hates About your Presentation
10 Things your Audience Hates About your PresentationStinson
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionTim O'Reilly
 
125 Clickass Copywriting Tips
125 Clickass Copywriting Tips125 Clickass Copywriting Tips
125 Clickass Copywriting TipsBarry Feldman
 
The Productivity Secret Of The Best Leaders
The Productivity Secret Of The Best LeadersThe Productivity Secret Of The Best Leaders
The Productivity Secret Of The Best LeadersOfficevibe
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
SlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
SlideShare Experts - 7 Experts Reveal Their Presentation Design SecretsSlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
SlideShare Experts - 7 Experts Reveal Their Presentation Design SecretsEugene Cheng
 
14 Tips to Entrepreneurs to start the Right Stuff
14 Tips to Entrepreneurs to start the Right Stuff14 Tips to Entrepreneurs to start the Right Stuff
14 Tips to Entrepreneurs to start the Right StuffPatrick Stähler
 
Leader's Guide to Motivate People at Work
Leader's Guide to Motivate People at WorkLeader's Guide to Motivate People at Work
Leader's Guide to Motivate People at WorkWeekdone.com
 

Viewers also liked (20)

IP Address Management Best Practices
IP Address Management Best PracticesIP Address Management Best Practices
IP Address Management Best Practices
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
IP addressing
IP addressingIP addressing
IP addressing
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
How to Master Difficult Conversations at Work – Leader’s Guide
How to Master Difficult Conversations at Work – Leader’s GuideHow to Master Difficult Conversations at Work – Leader’s Guide
How to Master Difficult Conversations at Work – Leader’s Guide
 
4 Biggest Challenges for Creative Teams
4 Biggest Challenges for Creative Teams4 Biggest Challenges for Creative Teams
4 Biggest Challenges for Creative Teams
 
10 Dead Simple Ways to Improve Your Company Culture
10 Dead Simple Ways to Improve Your Company Culture10 Dead Simple Ways to Improve Your Company Culture
10 Dead Simple Ways to Improve Your Company Culture
 
How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startup
 
10 Things your Audience Hates About your Presentation
10 Things your Audience Hates About your Presentation10 Things your Audience Hates About your Presentation
10 Things your Audience Hates About your Presentation
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx version
 
125 Clickass Copywriting Tips
125 Clickass Copywriting Tips125 Clickass Copywriting Tips
125 Clickass Copywriting Tips
 
The Productivity Secret Of The Best Leaders
The Productivity Secret Of The Best LeadersThe Productivity Secret Of The Best Leaders
The Productivity Secret Of The Best Leaders
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
SlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
SlideShare Experts - 7 Experts Reveal Their Presentation Design SecretsSlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
SlideShare Experts - 7 Experts Reveal Their Presentation Design Secrets
 
14 Tips to Entrepreneurs to start the Right Stuff
14 Tips to Entrepreneurs to start the Right Stuff14 Tips to Entrepreneurs to start the Right Stuff
14 Tips to Entrepreneurs to start the Right Stuff
 
Leader's Guide to Motivate People at Work
Leader's Guide to Motivate People at WorkLeader's Guide to Motivate People at Work
Leader's Guide to Motivate People at Work
 
5 Storytelling Lessons From Superhero Stories
5 Storytelling Lessons From Superhero Stories5 Storytelling Lessons From Superhero Stories
5 Storytelling Lessons From Superhero Stories
 

Similar to Ip address and subnetting

ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptxSelfUse
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptssuserde23af
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-finalTaymoor Nazmy
 
4. Understanding Internet Protocol.pptx
4. Understanding Internet Protocol.pptx4. Understanding Internet Protocol.pptx
4. Understanding Internet Protocol.pptxRobertohtirolhsconce
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfPeterOwenje1
 
this is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.pptthis is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.pptBlackHat41
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
IP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.pptIP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.pptAkkiKumar26
 
module03-ipaddr.ppt
module03-ipaddr.pptmodule03-ipaddr.ppt
module03-ipaddr.pptImXaib
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptanwarkade1
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptEsubesisay
 

Similar to Ip address and subnetting (20)

ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptx
 
Ipv4 address
Ipv4 addressIpv4 address
Ipv4 address
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
4. Understanding Internet Protocol.pptx
4. Understanding Internet Protocol.pptx4. Understanding Internet Protocol.pptx
4. Understanding Internet Protocol.pptx
 
MVA slides lesson 4
MVA slides lesson 4MVA slides lesson 4
MVA slides lesson 4
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
this is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.pptthis is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.ppt
 
Ray ipv4 addresses
Ray   ipv4 addressesRay   ipv4 addresses
Ray ipv4 addresses
 
Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
IP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.pptIP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.ppt
 
module03-ipaddr.ppt
module03-ipaddr.pptmodule03-ipaddr.ppt
module03-ipaddr.ppt
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
Tcpip
TcpipTcpip
Tcpip
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 

More from IGZ Software house (20)

Window server 2008
Window server 2008Window server 2008
Window server 2008
 
Types of server
Types of serverTypes of server
Types of server
 
Types of network
Types of networkTypes of network
Types of network
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
 
FSMO
FSMO FSMO
FSMO
 
Active directory domain services
Active directory domain servicesActive directory domain services
Active directory domain services
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2
 
Raid and its levels
Raid and its levelsRaid and its levels
Raid and its levels
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
X86 Architecture
X86 Architecture X86 Architecture
X86 Architecture
 
Window architecture
Window architecture Window architecture
Window architecture
 
What is-32-bit-and-64-bit
What is-32-bit-and-64-bitWhat is-32-bit-and-64-bit
What is-32-bit-and-64-bit
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Compiler
Compiler Compiler
Compiler
 
Interpreter
InterpreterInterpreter
Interpreter
 
Competitor analaysis
Competitor analaysisCompetitor analaysis
Competitor analaysis
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Ip address and subnetting

  • 2. 2 Objectives • Explain the different classes of IP addresses • Configure IP addresses • Subdivide an IP network
  • 3. 3 Objectives (continued) • Discuss advanced routing concepts such as CIDR(Classless Inter-Domain Routing), summarization, and VLSM(Variable Length Subnet Masking) • Convert between decimal, binary, and hexadecimal numbering systems • Explain the differences between IPv4 and IPv6
  • 4. 4 IP Addressing • An IP address has 32 bits divided into four octets • To make the address easier to read, people use decimal numbers to represent the binary digits – Example: 192.168.1.1 • Dotted decimal notation – When binary IP addresses are written in decimal format
  • 6. 6 MAC to IP Address Comparison • MAC address – Identifies a specific NIC in a computer on a network – Each MAC address is unique – TCP/IP networks can use MAC addresses in communication • Network devices cannot efficiently route traffic using MAC addresses because they: – Are not grouped logically – Cannot be modified – Do not give information about physical or logical network configuration
  • 7. 7 MAC to IP Address Comparison (continued) • IP addressing – Devised for use on large networks • IP addresses have a hierarchical structure and do provide logical groupings – IP address identifies both a network and a host
  • 8. 8 IP Classes • Internet Assigned Numbers Authority (IANA) – Devised the hierarchical IP addressing structure • American Registry of Internet Numbers (ARIN) – Manages IP addresses in the United States • Internet Corporation for Assigned Names and Numbers (ICANN) – A global, government-independent entity with overall responsibility for the Internet – ICANN has effectively replaced IANA
  • 9. 9 IP Classes (continued) • Class A – Reserved for governments and large corporations throughout the world – Each Class A address supports 16,777,214 hosts • Class B – Addresses are assigned to large- and medium-sized companies – Each Class B address supports 65,534 hosts
  • 11. 11 IP Classes (continued) • Class C – Addresses are assigned to groups that do not meet the qualifications to obtain Class A or B addresses – Each Class C address supports 254 hosts • Class D – Addresses (also known as multicast addresses) are reserved for multicasting – Multicasting is the sending of a stream of data (usually audio and video) to multiple computers simultaneously
  • 13. 13 IP Classes (continued) • Class E – Addresses are reserved for research, testing, and experimentation – The Class E range starts where Class D leaves off • Private IP ranges – Many companies use private IP addresses for their internal networks • Will not be routable on the Internet – Gateway devices have network interface connections to the internal network and the Internet • Route packets between them
  • 15. 15 Network Addressing • IP addresses identify both the network and the host – The division between the two is not specific to a certain number of octets • Subnet mask – Indicates how much of the IP address represents the network or subnet • Standard (default) subnet masks: – Class A subnet mask is 255.0.0.0 – Class B subnet mask is 255.255.0.0 – Class C subnet mask is 255.255.255.0
  • 16. 16 Network Addressing (continued) • TCP/IP hosts use the combination of the IP address and the subnet mask – To determine if other addresses are local or remote – The binary AND operation is used to perform the calculation • Subnetting – Manipulation of the subnet mask to get more network numbers
  • 17. 17 Network Addressing (continued) • Subnet address – Network is identified by the first, or first few, octets – A TCP/IP host must have a nonzero host identifier • Broadcast address – When the entire host portion of an IP address is all binary ones – Examples: 190.55.255.255 and 199.192.65.63
  • 19. 19 Broadcast Types • Flooded broadcasts – Broadcasts for any subnet – Use use the IP address 255.255.255.255 – A router does not propagate flooded broadcasts because they are considered local • Directed broadcasts are for a specific subnet – Routers can forward directed broadcasts – For example, a packet sent to the Class B address 129.30.255.255 would be a broadcast for network 129.30.0.0
  • 20. 20 Subdividing IP Classes • Reasons for subnetting – To match the physical layout of the organization – To match the administrative structure of the organization – To plan for future growth – To reduce network traffic
  • 22. 22 Subnet Masking • When network administrators create subnets – They borrow bits from the original host field to make a set of subnetworks – The number of borrowed bits determines how many subnetworks and hosts will be available • Class C addresses also can be subdivided – Not as many options or available masks exist because only the last octet can be manipulated with this class
  • 23. 23
  • 26. 26 Learning to Subnet • Suppose you had a network with: – Five different segments – Somewhere between 15 and 20 TCP/IP hosts on each network segment • You just received your Class C address from ARIN (199.1.10.0) • Only one subnet mask can handle your network configuration: 255.255.255.224 – This subnet mask will allow you to create eight subnetworks and to place up to 30 hosts per network
  • 27. 27 Learning to Subnet (continued) • Determine the subnet identifiers (IP addresses) – Write the last masking octet as a binary number – Determine the binary place of the last masking digit • Calculate the subnets – Begin with the major network number (subnet zero) and increment by 32 – Stop counting when you reach the value of the mask • Determine the valid ranges for your hosts on each subnet – Take the ranges between each subnet identifier – Remove the broadcast address for each subnet
  • 28. 28 Learning to Subnet (continued)
  • 29. 29 Learning to Subnet (continued)
  • 30. 30 Learning to Subnet (continued)
  • 31. 31 Subnetting Formulas • Consider memorizing the following two formulas: 2y = # of usable subnets (where y is the number of bits borrowed) 2x – 2 = # of usable hosts per subnet (where x is the number of bits remaining in the host field after borrowing)
  • 34. 34 CIDR • Classless Inter-Domain Routing (CIDR) – Developed to slow the exhaustion of IP addresses – Based on assigning IP addresses on criteria other than octet boundaries • CIDR addressing method allows the use of a prefix to designate the number of network bits in the mask – Example: 200.16.1.48 /25 (CIDR notation) – The first 25 bits in the mask are network bits (1s) • The prefix can be longer than the default subnet mask (subnetting) or it can be shorter than the default mask (supernetting)
  • 35. 35 Summarization • Summarization – Also know as route aggregation or supernetting – Allows many IP subnets to be advertised as one • Reduces the number of entries in the router’s routing table • Summarize a group of subnets – Count the number of bits that are common to all of the networks you want to advertise – Then use the prefix that identifies the number of common bits
  • 37. 37 Variable Length Subnet Masks • Variable length subnet masking (VLSM) – Allows different masks on the subnets – Essentially done by subnetting the subnets • Basic routing protocols such as RIP version 1 and IGRP – Do not support VLSM because they do not carry subnet mask information in their routing table updates – Are classful routing protocols • RIP version 2, OSPF, or EIGRP are classless protocols
  • 38. 38
  • 39. 39 Variable Length Subnet Masks (continued)
  • 40. 40 Variable Length Subnet Masks (continued)
  • 41. 41 Working with Hexadecimal Numbers • Hexadecimal numbering system is base 16 – 16 numerals are used to express any given number – Numerals include 0 through 9 as well as A through F – For example, the decimal number 192 is C0 in hexadecimal • Often you will come across hexadecimal numbers when working with computers and networking – The MAC address is a 12-digit hexadecimal number • Computers typically process information in 8-bit chunks (bytes) – Easier to express bytes with two hex digits
  • 42. 42
  • 43. 43 IPv4 versus IPv6 • IP version 4 (IPv4) – The version of IP currently deployed on most systems today • IP version 6 (IPv6) – Originally designed to address the eventual depletion of IPv4 addresses • CIDR has slowed the exhaustion of IPv4 address space and made the move to IPv6 less urgent – However, CIDR is destined to become obsolete because it is based on IPv4
  • 44. 44 IPv4 versus IPv6 (continued) • Network address translation (NAT) – Another technique developed in part to slow the depletion of IPv4 addresses – Allows a single IP address to provide connectivity for many hosts • NAT is CPU intensive and expensive – Some protocols do not work well with NAT, such as the IP Security Protocol (IPSec) • IPv4 does not provide security in itself – Has led to security issues with DNS and ARP
  • 45. 45 IPv4 versus IPv6 (continued) • Security concerns were factored into the design of IPv6 • IPv4 networks rely on broadcasting – Inefficient because many hosts unnecessarily see and partially process traffic not ultimately destined for them • IPv6 does away completely with broadcasting and replaces it with multicasting • IPv6 addresses are 128 bits compared with IPv4’s 32-bit structure
  • 46. 46 IPv4 versus IPv6 (continued) • IPv6 addresses are expressed as hexadecimal numbers – Example: 3FFE:0501:0008:0000:0260:97FF:FE40:EFAB • IPv6 can be subnetted – CIDR notation is also used with IPv6 • Example: 2001:702:21:: /48 • Organizations requesting an IPv6 address may be assigned a /64 prefix – Minimum subnet with space for over a billion hosts
  • 47. 47 Transitioning to IPv6 • Dual stack – Involves enabling IPv6 on all routers, switches, and end nodes but not disabling IPv4 – Both version 4 and version 6 stacks run at the same time • Tunneling – Encapsulates IPv6 traffic inside IPv4 packets – Done when portions of a network are running IPv6 and other network areas have not been upgraded yet – Greatest concern: security
  • 48. 48 Summary • The ICANN and the ARIN work together to subdivide and issue addresses for Internet clients • Three classes of addresses (A, B, and C) are available to organizations • The two additional address categories are Class D and Class E • Subnetting involves subdividing assigned addresses • Routing tables can be created manually and dynamically
  • 49. 49 Summary (continued) • Advanced routing protocols such as RIP version 2, OSPF, and EIGRP support variable length subnet masking (VLSM) • The hexadecimal numbering system is also known as base 16 because it has 16 available numerals • IPv6 is the latest version of IP addressing