SlideShare uma empresa Scribd logo
1 de 35
IP ADDRESS ASSIGNMENT
[object Object],[object Object],[object Object],[object Object],[object Object],IP Address
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP version 4 First Octet  Second Octet  Third Octet  Forth Octet
[object Object],IP version 6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Taking Example for First Octet :  Total 8 bits, Value will be 0’s and 1’s  i.e. 2 8  = 256 combination 2 7   2 6   2 5   2 4   2 3   2 2   2 1   2 0 0  0  0  0  0  0  0  0  =  0 0  0  0  0  0  0  0  1  =  1 0  0  0  0  0  0  1  0  =  2 0  0  0  0  0  0  1  1  =  3 0  0  0  0  0  1  0  0  =  4 IPv4 address range 1  1  1  1  1  1  1  1  =  255 Total IP Address Range 0  .  0  .  0  .  0 to 255 . 255 . 255 . 255
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP Address Classification Used in LAN & WAN Reserved for Multicasting Reserved for Research & Development
Parity Bit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In Class A : First bit of the first octet  is reserved as priority bit, bit value is zero. 0 xxxxxxx .  xxxxxxxx .  xxxxxxxx .  xxxxxxxx 2 7   2 6   2 5   2 4   2 3   2 2   2 1   2 0 0  0  0  0  0  0  0  0  =  0 0  0  0  0  0  0  0  1  =  1 0  0  0  0  0  0  1  0  =  2 0  0  0  0  0  0  1  1  =  3 0  0  0  0  0  1  0  0  =  4 CLASS A Range 0  1  1  1  1  1  1  1  =  127 Class A Range 0  .  0  .  0  .  0  to 127 . 255 . 255 . 255 Exception  0.X.X.X and 127.X.X.X networks are reserved
In Class B : First two bits of the first  octet are reserved as priority bits, bit value as 10. 10 xxxxxx .  xxxxxxxx .  xxxxxxxx .  xxxxxxxx 2 7   2 6   2 5   2 4   2 3   2 2   2 1   2 0 1  0  0  0  0  0  0  0  =  128 1  0  0  0  0  0  0  1  =  129 1  0  0  0  0  0  1  0  =  130 1  0  0  0  0  0  1  1  =  131 1  0  0  0  0  1  0  0  =  132 CLASS B Range 1  0  1  1  1  1  1  1  =  191 Class B Range 128 .  0  .  0  .  0 to 191 . 255 . 255 . 255
For Class C range : First Three bits of the first  octet are reserved as priority bits, bit value as 110. 110 xxxxx .  xxxxxxxx .  xxxxxxxx .  xxxxxxxx 2 7   2 6   2 5   2 4   2 3   2 2   2 1   2 0 1  1  0  0  0  0  0  0  =  192 1  1  0  0  0  0  0  1  =  193 1  1  0  0  0  0  1  0  =  194 1  1  0  0  0  0  1  1  =  195 1  1  0  0  0  1  0  0  =  196 CLASS C Range 1  1  0  1  1  1  1  1  =  223 Class C Range 192 .  0  .  0  .  0 to 223 . 255 . 255 . 255
For Class D range : First four bits of the first  octet are reserved as priority bits, bit value as 1110.   1110 xxxx .  xxxxxxxx .  xxxxxxxx .  xxxxxxxx 2 7   2 6   2 5   2 4   2 3   2 2   2 1   2 0 1  1  1  0  0  0  0  0  =  224 1  1  1  0  0  0  0  1  =  225 1  1  1  0  0  0  1  0  =  226 1  1  1  0  0  0  1  1  =  227 1  1  1  0  0  1  0  0  =  228 CLASS D Range 1  1  1  0  1  1  1  1  =  239 Class D Range 224 .  0  .  0  .  0 to 239 . 255 . 255 . 255
For Class E range : First four bits of the first  octet are reserved as priority bits, bit value as 1111.   1111 xxxx .  xxxxxxxx .  xxxxxxxx .  xxxxxxxx 2 7   2 6   2 5   2 4   2 3   2 2   2 1   2 0 1  1  1  1  0  0  0  0  =  240 1  1  1  1  0  0  0  1  =  241 1  1  1  1  0  0  1  0  =  242 1  1  1  1  0  0  1  1  =  243 1  1  1  1  0  1  0  0  =  244 CLASS E Range 1  1  1  1  1  1  1  1  =  255 Class E Range 240 .  0  .  0  .  0 to 255 . 255 . 255 . 255
[object Object],[object Object],[object Object],[object Object],Octet Format
CLASS A – No. Networks & Hosts  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CLASS A 126 Networks & 16777214 Hosts per Network
CLASS B – No. Networks & Hosts  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CLASS B 16384 Networks & 65534 Hosts per Network
CLASS C – No. Networks & Hosts  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CLASS C 2097152 Networks & 254 Hosts per Network
[object Object],[object Object],[object Object],[object Object],Network & Broadcast Address
[object Object],[object Object],[object Object],[object Object],[object Object],Example - Class  A Class A   10.0.0.0 10.0.0.1 10.0.0.2 10.0.0.3 10.255.255.254 10.255.255.255 Broadcast Address Network Address Valid IP Addresses
[object Object],[object Object],[object Object],[object Object],[object Object],Example - Class  B   Class B   172.16.0.0 172.16.0.1 172.16.0.2 172.16.0.3 172.16.255.254 172.16.255.255 Broadcast Address Network Address Valid IP Addresses
[object Object],[object Object],[object Object],[object Object],[object Object],Example - Class  C   Class C   192.168.1.0 192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.254 192.168.1.255 Broadcast Address Network Address Valid IP Addresses
[object Object],[object Object],Private IP Address Class A 10.0.0.0 to 10.255.255.255 Class B 172.16.0.0 to 172.31.255.255 Class C 192.168.0.0 to 192.168.255.255
Subnet Mask ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Subnet Mask - Examples
How Subnet Mask Works ? IP Address  : 192.168.1.1 Subnet Mask  : 255.255.255.0 ANDING PROCESS  : 192.168.1.1   = 11000000.10101000.00000001.00000001 255.255.255.0 = 11111111.11111111.11111111.00000000 ======================================= 192.168.1.0   = 11000000.10101000.00000001.00000000 ======================================= The output of an AND table is 1 if both its inputs are 1.  For all other possible inputs the output is 0. AND TABLE 0 * 0 = 0 0 * 1 = 0 1 * 0 = 0 1 * 1 = 1
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Subnetting
ZOOM Technologies is having 100 PC Which IP address Class is preferred for the network ? Answer : Class C. In ZOOM Technologies there are 5 Five Departments with 20 PCs each ZOOM Technologies – 192.168.1.0/24 Scenario for Subnetting ,[object Object],192.168.1.1   to 192.168.1.20 192.168.1.21 to 192.168.1.40 ,[object Object],[object Object],192.168.1.41 to 192.168.1.60 ,[object Object],192.168.1.61 to 192.168.1.80 ,[object Object],192.168.1.81 to 192.168.1.100
[object Object],[object Object],[object Object],[object Object],[object Object],Scenario (…continued) ,[object Object],192.168.1.1  to 192.168.1.20 192.168.2.1  to 192.168.2.20 ,[object Object],[object Object],192.168.3.1  to 192.168.3.20 ,[object Object],192.168.4.1  to 192.168.4.20 ,[object Object],192.168.5.1  to 192.168.5.20
Main Aim of Subnetting ,[object Object],[object Object],[object Object]
Power table POWER TABLE 2 1   =  2 2 2   =  4 2 3   =  8 2 4   =  16 2 5   =  32 2 6   =  64 2 7   =  128 2 8   =  256 2 9  =  512 2 10   =  1024 2 11   =  2048 2 12   =  4096 2 13   =  8192 2 14   =  16384 2 15   =  32768 2 16   =  65536 2 17   =  131072 2 18   =  262144 2 19   =  524288 2 20   =  1048576 2 21   =  2097152 2 22   =  4194304 2 23   =  8388608 2 24   =   16777216 2 25   =  33554432 2 26   =  67108864 2 27   =  134217728 2 28   =  268435456 2 29   =  536870912 2 30   =  1073741824 2 31   =  2147483648 2 32   =   4294967296
Some Important Values VALUES IN SUBNET MASK   Bit   Value  Mask 1 128 10000000 2 192 11000000 3 224 11100000 4 240 11110000 5 248 11111000 6 252 11111100 7 254 11111110 8 255 11111111
Requirement of Networks is 5 ? Example – 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],110xxxxx . xxxxxxxx . xxxxxxxx . xxx xxxxx HELP
x Example – 1  (Continued…) ,[object Object],[object Object],[object Object],[object Object],11111111 . 11111111 . 11111111 . 111 00000 128 64 32 32 192.168.1.32 192.168.1.64 192.168.1.96 192.168.1.128 192.168.1.160 192.168.1.192 192.168.1.224 192.168.1.31 192.168.1.63 192.168.1.95 192.168.1.127 192.168.1.159 192.168.1.191 192.168.1.223 192.168.1.255 x If you convert 3 Host Bits to Network Bits 6 Subnet  &  30 Hosts/Subnet Customized Subnet Mask 255.255.255.224 Subnet Range 192.168.1.32  to  192.168.1.63     MCSE  . 192.168.1.64  to  192.168.1.95     CISCO  . 192.168.1.96  to  192.168.1.127     FIREWALL 192.168.1.128  to  192.168.1.159     SOLARIS 192.168.1.160  to  192.168.1.191     TRAINING 192.168.1.192  to  192.168.1.223     Future Use 255. 255. 255. Valid Subnets 224
Requirement of Networks is 14 ? Example – 2  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],110xxxxx . xxxxxxxx . xxxxxxxx . xxxx xxxx HELP
x Example – 2  (Continued…) ,[object Object],[object Object],[object Object],[object Object],11111111 . 11111111 . 11111111 . 1111 0000 128 64 32 x 16 16 192.168.1.224 – 192.168.1.239 192.168.1.240 –  192.168.1.255 – 192.168.1.15 192.168.1.16 – 192.168.1.31 192.168.1.32  – 192.168.1.47 192.168.1.48 – 192.168.1.63 255. 255. 255. Valid Subnets 240 If you convert 4 Host Bits to Network Bits 14 Subnet  &  14 Hosts/Subnet Customized Subnet Mask 255.255.255.240 Subnet Range 192.168.1.16  to  192.168.1.31  192.168.1.32  to  192.168.1.47 192.168.1.48  to  192.168.1.63  192.168.1.64  to  192.168.1.80  192.168.1.224  to  192.168.1.239
THE END

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Okkkkk
OkkkkkOkkkkk
Okkkkk
 
Subnetting class B
Subnetting class BSubnetting class B
Subnetting class B
 
Understand data representation on CPU 1
Understand data representation on CPU 1Understand data representation on CPU 1
Understand data representation on CPU 1
 
FYBSC IT Digital Electronics Unit I Chapter I Number System and Binary Arithm...
FYBSC IT Digital Electronics Unit I Chapter I Number System and Binary Arithm...FYBSC IT Digital Electronics Unit I Chapter I Number System and Binary Arithm...
FYBSC IT Digital Electronics Unit I Chapter I Number System and Binary Arithm...
 
Mcsl 17 ALP lab manual
Mcsl 17 ALP lab manualMcsl 17 ALP lab manual
Mcsl 17 ALP lab manual
 
Chapter1b
Chapter1bChapter1b
Chapter1b
 
Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 
Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2
 
Chapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersChapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbers
 
Digital Logic & Design
Digital Logic & DesignDigital Logic & Design
Digital Logic & Design
 
Mcs 012 computer organisation and assemly language programming- ignou assignm...
Mcs 012 computer organisation and assemly language programming- ignou assignm...Mcs 012 computer organisation and assemly language programming- ignou assignm...
Mcs 012 computer organisation and assemly language programming- ignou assignm...
 
Codes r005
Codes  r005Codes  r005
Codes r005
 
Chapter 2.1 introduction to number system
Chapter 2.1 introduction to number systemChapter 2.1 introduction to number system
Chapter 2.1 introduction to number system
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Numbersystemcont
NumbersystemcontNumbersystemcont
Numbersystemcont
 
Number System
Number SystemNumber System
Number System
 
Introducing to number system
Introducing to number systemIntroducing to number system
Introducing to number system
 
Basic electronics
Basic electronicsBasic electronics
Basic electronics
 
Ch03 des
Ch03 desCh03 des
Ch03 des
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 

Destaque

ACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPNACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPNSleek International
 
CCNA site-to-site connectivity security
CCNA  site-to-site connectivity securityCCNA  site-to-site connectivity security
CCNA site-to-site connectivity securityNetworkel
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
ACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACITACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACITSleek International
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP ProtocolNetworkel
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to pointNetworkel
 
CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network MonitoringNetworkel
 
Cisco CCNA Certification Exams
Cisco CCNA Certification ExamsCisco CCNA Certification Exams
Cisco CCNA Certification Examscerts trainer
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)Networkel
 
ACIT - CCNA Training - Wan Interface
ACIT - CCNA Training - Wan InterfaceACIT - CCNA Training - Wan Interface
ACIT - CCNA Training - Wan InterfaceSleek International
 
CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)Networkel
 
CCNA Broadband
CCNA BroadbandCCNA Broadband
CCNA BroadbandNetworkel
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsSleek International
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 

Destaque (20)

ACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPNACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPN
 
CCNA site-to-site connectivity security
CCNA  site-to-site connectivity securityCCNA  site-to-site connectivity security
CCNA site-to-site connectivity security
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
ACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACITACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACIT
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP Protocol
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
 
CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network Monitoring
 
Cisco CCNA Certification Exams
Cisco CCNA Certification ExamsCisco CCNA Certification Exams
Cisco CCNA Certification Exams
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 
acit mumbai - ospf rouitng
acit mumbai - ospf rouitng acit mumbai - ospf rouitng
acit mumbai - ospf rouitng
 
ACIT - CCNA Training - Wan Interface
ACIT - CCNA Training - Wan InterfaceACIT - CCNA Training - Wan Interface
ACIT - CCNA Training - Wan Interface
 
CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)
 
CCNA Broadband
CCNA BroadbandCCNA Broadband
CCNA Broadband
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 

Semelhante a ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT

Semelhante a ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT (20)

Ipaddressing
IpaddressingIpaddressing
Ipaddressing
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
ip addressing
ip addressingip addressing
ip addressing
 
Chap3. i pv4
Chap3. i pv4Chap3. i pv4
Chap3. i pv4
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Computer networking
Computer networkingComputer networking
Computer networking
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
CCNA part 2 ip addressing
CCNA part 2 ip addressingCCNA part 2 ip addressing
CCNA part 2 ip addressing
 
IP Addressing.ppt
IP Addressing.pptIP Addressing.ppt
IP Addressing.ppt
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
Ccent notes part 3
Ccent notes part 3Ccent notes part 3
Ccent notes part 3
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Umutima.ppt
Umutima.pptUmutima.ppt
Umutima.ppt
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Mod6
Mod6Mod6
Mod6
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT

  • 2.
  • 3.
  • 4.
  • 5. Taking Example for First Octet : Total 8 bits, Value will be 0’s and 1’s i.e. 2 8 = 256 combination 2 7 2 6 2 5 2 4 2 3 2 2 2 1 2 0 0 0 0 0 0 0 0 0 = 0 0 0 0 0 0 0 0 1 = 1 0 0 0 0 0 0 1 0 = 2 0 0 0 0 0 0 1 1 = 3 0 0 0 0 0 1 0 0 = 4 IPv4 address range 1 1 1 1 1 1 1 1 = 255 Total IP Address Range 0 . 0 . 0 . 0 to 255 . 255 . 255 . 255
  • 6.
  • 7.
  • 8. In Class A : First bit of the first octet is reserved as priority bit, bit value is zero. 0 xxxxxxx . xxxxxxxx . xxxxxxxx . xxxxxxxx 2 7 2 6 2 5 2 4 2 3 2 2 2 1 2 0 0 0 0 0 0 0 0 0 = 0 0 0 0 0 0 0 0 1 = 1 0 0 0 0 0 0 1 0 = 2 0 0 0 0 0 0 1 1 = 3 0 0 0 0 0 1 0 0 = 4 CLASS A Range 0 1 1 1 1 1 1 1 = 127 Class A Range 0 . 0 . 0 . 0 to 127 . 255 . 255 . 255 Exception 0.X.X.X and 127.X.X.X networks are reserved
  • 9. In Class B : First two bits of the first octet are reserved as priority bits, bit value as 10. 10 xxxxxx . xxxxxxxx . xxxxxxxx . xxxxxxxx 2 7 2 6 2 5 2 4 2 3 2 2 2 1 2 0 1 0 0 0 0 0 0 0 = 128 1 0 0 0 0 0 0 1 = 129 1 0 0 0 0 0 1 0 = 130 1 0 0 0 0 0 1 1 = 131 1 0 0 0 0 1 0 0 = 132 CLASS B Range 1 0 1 1 1 1 1 1 = 191 Class B Range 128 . 0 . 0 . 0 to 191 . 255 . 255 . 255
  • 10. For Class C range : First Three bits of the first octet are reserved as priority bits, bit value as 110. 110 xxxxx . xxxxxxxx . xxxxxxxx . xxxxxxxx 2 7 2 6 2 5 2 4 2 3 2 2 2 1 2 0 1 1 0 0 0 0 0 0 = 192 1 1 0 0 0 0 0 1 = 193 1 1 0 0 0 0 1 0 = 194 1 1 0 0 0 0 1 1 = 195 1 1 0 0 0 1 0 0 = 196 CLASS C Range 1 1 0 1 1 1 1 1 = 223 Class C Range 192 . 0 . 0 . 0 to 223 . 255 . 255 . 255
  • 11. For Class D range : First four bits of the first octet are reserved as priority bits, bit value as 1110. 1110 xxxx . xxxxxxxx . xxxxxxxx . xxxxxxxx 2 7 2 6 2 5 2 4 2 3 2 2 2 1 2 0 1 1 1 0 0 0 0 0 = 224 1 1 1 0 0 0 0 1 = 225 1 1 1 0 0 0 1 0 = 226 1 1 1 0 0 0 1 1 = 227 1 1 1 0 0 1 0 0 = 228 CLASS D Range 1 1 1 0 1 1 1 1 = 239 Class D Range 224 . 0 . 0 . 0 to 239 . 255 . 255 . 255
  • 12. For Class E range : First four bits of the first octet are reserved as priority bits, bit value as 1111. 1111 xxxx . xxxxxxxx . xxxxxxxx . xxxxxxxx 2 7 2 6 2 5 2 4 2 3 2 2 2 1 2 0 1 1 1 1 0 0 0 0 = 240 1 1 1 1 0 0 0 1 = 241 1 1 1 1 0 0 1 0 = 242 1 1 1 1 0 0 1 1 = 243 1 1 1 1 0 1 0 0 = 244 CLASS E Range 1 1 1 1 1 1 1 1 = 255 Class E Range 240 . 0 . 0 . 0 to 255 . 255 . 255 . 255
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. How Subnet Mask Works ? IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 ANDING PROCESS : 192.168.1.1 = 11000000.10101000.00000001.00000001 255.255.255.0 = 11111111.11111111.11111111.00000000 ======================================= 192.168.1.0 = 11000000.10101000.00000001.00000000 ======================================= The output of an AND table is 1 if both its inputs are 1. For all other possible inputs the output is 0. AND TABLE 0 * 0 = 0 0 * 1 = 0 1 * 0 = 0 1 * 1 = 1
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Power table POWER TABLE 2 1 = 2 2 2 = 4 2 3 = 8 2 4 = 16 2 5 = 32 2 6 = 64 2 7 = 128 2 8 = 256 2 9 = 512 2 10 = 1024 2 11 = 2048 2 12 = 4096 2 13 = 8192 2 14 = 16384 2 15 = 32768 2 16 = 65536 2 17 = 131072 2 18 = 262144 2 19 = 524288 2 20 = 1048576 2 21 = 2097152 2 22 = 4194304 2 23 = 8388608 2 24 = 16777216 2 25 = 33554432 2 26 = 67108864 2 27 = 134217728 2 28 = 268435456 2 29 = 536870912 2 30 = 1073741824 2 31 = 2147483648 2 32 = 4294967296
  • 30. Some Important Values VALUES IN SUBNET MASK Bit Value Mask 1 128 10000000 2 192 11000000 3 224 11100000 4 240 11110000 5 248 11111000 6 252 11111100 7 254 11111110 8 255 11111111
  • 31.
  • 32.
  • 33.
  • 34.