# TCP/IP Drill Pack. By Donna Warren. Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19

Save this PDF as:

Size: px
Start display at page:

Download "TCP/IP Drill Pack. By Donna Warren. Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19"

## Transcription

1 TCP/IP Drill Pack By Donna Warren Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19

2 Drill 1: OSI vs DOD and the TCP/IP Protocol Suite Complete the following chart. On the next page give a brief description of each of the TCP/IP protocols. It is important that you understand how the older protocols are represented in the OSI model. Some of the functionality is combined in the older protocols but as the hardware and software keeps constantly changing, knowing where everything fits matters. OSI Model DoD Model TCP/IP Protocols Created by Donna P. Warren Revised: 1/2/2012 Page 2 of 19

3 Drill 2: Converting Decimal to Binary, Binary to Decimal They have been talking about eliminating TCP/IP version 4 for at least 20 years. It hasn t happened yet and until they work out the security issues such as figuring out who does and does not belong on your network, I don t see it not being used for a long time to come, at least on a company s internal network. As a result, you need to know how to do binary to decimal and decimal to binary conversions. Complete the following table to practice converting a number from binary notation to decimal format. Binary Decimal = Complete the following table to practice converting a number from decimal notation to binary format. Decimal Binary = Created by Donna P. Warren Revised: 1/2/2012 Page 3 of 19

5 Drill 4: Understanding Address Classes Since the subnet mask determines how many hosts addresses are available on a network or subnet, you need to understand how to calculate the number of host addresses that are available. 1. Write the address class next to each IP address. Address Class Which address class(es) will allow you to have more than 1,000 hosts per network? 3. Which address class(es) will allow only 254 hosts per network? Created by Donna P. Warren Revised: 1/2/2012 Page 5 of 19

6 Drill 5: Identifying Invalid Host IP Addresses It is also important to know whether an IP address is valid. Invalid addresses don t work. Objective: Identify which portion of the below host IP addresses are invalid and explain why it is invalid. Hint: If you aren't sure, convert to binary then answer Created by Donna P. Warren Revised: 1/2/2012 Page 6 of 19

7 Created by Donna P. Warren Revised: 1/2/2012 Page 7 of 19

8 Drill 6: Assigning IP Addresses Objective: Review the following scenario and answer the questions that follow. You have a network with 10 Novell Servers, 40 Windows NT Servers, 50 UNIX workstations, 180 Windows 9x Workstations, and 20 Windows NT Workstations. They are all on the same network and using the same subnet/segment. 1. Which address classes will support this network? 2. Which of the following network addresses will support this network? a b c d Created by Donna P. Warren Revised: 1/2/2012 Page 8 of 19

9 Drill 7: Subnet Masks Determined Subnetting just complicates matters and you need to know how it works. In the following drill determine the Subnet Mask in decimal and binary Class Address Bits Borrowed 1. Class A 8 Subnet Mask Decimal/Binary Class B 6 3. Class C 4 4. Class B Class A Class C 3 7. Class A Class C 5 9. Class B Class A Class B Class C Class B Class A 16 Created by Donna P. Warren Revised: 1/2/2012 Page 9 of 19

10 (7 cont'd) In the following section determine how many bits have been borrowed IP Address Subnet Mask Bit Borrowed (( Class A = n.s.s/h.h - 2 nd & 3 rd octets)) n h = 10 bits Created by Donna P. Warren Revised: 1/2/2012 Page 10 of 19

12 Drill 9: Determining Subnet IDs and Host IDs Objective: Determine the Subnet IDs and Host IDs within the scenarios. Example Scenario You have a network with four subnets. It is using a Class B subnet mask by using 3 bits from the third octet. 1. Using the information in the table below, list all valid and invalid subnet numbers. Also list the beginning value of the valid subnet(s). (Remember subnet and host ids can not be all zeros or all ones in binary.) 255 n n n n n n n n n n n n n n n n s s s h h h h h h h h h h h h h h h h h h - invalid subnet h h h h h Subnet # (w/ starting host) (w/ ending host) # # # # # h h h h h - invalid subnet Created by Donna P. Warren Revised: 1/2/2012 Page 12 of 19

13 (9: Example Scenario cont'd.) 2. List the range of valid host IDs for each subnet using the example format below. Since this is Class B, the first two octets (shown with x's) are the original network number and are unneeded for this demonstration. Subnet Beginning Value Ending value Subnet 1 x.x..1 x.x..254 Subnet 2 x.x..1 x.x Subnet 3 x.x..1 x.x Subnet 4 x.x..1 x.x..254 Subnet 5 x.x..1 x.x..254 (will be available for later use) 192 Subnet 6 x.x..1 x.x..254 (will be available for later use) Scenario 1 You have a network with two subnets. It is using a Class B subnet mask by using 2 bits from the third octet. 2. Using the information in the table below, list all valid and invalid subnet numbers. Also list the beginning value of the valid subnet(s) List the range of host IDs for each subnet using the example format below.. Subnet Beginning Value Ending value Subnet 1 x.x..1 x.x..254 Created by Donna P. Warren Revised: 1/2/2012 Page 13 of 19

14 Scenario 2 You have a network with 14 subnets. It is using a Class B subnet mask by using 4 bits in the third octet. 1. Using the information in the table below, list all valid and invalid subnet numbers. Also list the beginning value of the valid subnet(s) List the range of host IDs for each subnet using the example format below.. Subnet Beginning Value Ending value Subnet 1 x.x..1 x.x..254 Created by Donna P. Warren Revised: 1/2/2012 Page 14 of 19

15 Using Subnet Shortcuts Using Scenario 2 above that has 14 subnets, perform the following shortcut steps. Compare the results to the Scenario 2 results. They should match exactly. The first three subnets have been completed for you. 1. Identify the number of bits beyond the default mask bits that will be used for the subnet mask. This scenario includes a Class B subnet mask using 4 bits in the third octet We borrowed 4 bits. Take the lowest valued bit of the ones borrowed and covert it to decimal So 16 is the value that we are interested in. The 3 rd octet of the host IP number ranges will increment by To determine the number of possible subnets, reverse the bits so that they are in what is called low order as shown below. Convert the bits to decimal format and then subtract = 15 (# of valid subnets) 4. Starting with 0, increment by the value calculated in Step 2 (16) the same number of times as the possible number of bit combinations(subnets) calculated in Step 3 (15). # of Subnets Increment by number found Valid range of host IP addresses for Class B with subnet of (step 3) In step 2 ( Starting # of Range (4 th octet will be 1) Increment by 1 less than next starting # Ending # of Range (4 TH octet will 254) = 16 N.N = 31 (or 32-1) N.N = 32 N.N = 47 (or 48-1) N.N = 48 N.N = 63 (or 64-1) N.N = 64 N.N = 79 N.N Continue until you reach 14 subnets (where N.N. = network octets) Created by Donna P. Warren Revised: 1/2/2012 Page 15 of 19

16 1. Define the ranges of host IDs that would be available for 2 subnets that use the following information (the subnet numbers are not known): Network ID , subnet mask Define the ranges of host IDs that would be available for 4 subnets that use the following information (the subnet numbers are not known): Network ID , subnet mask Define the ranges of host IDs for the following 2 subnets that are using a subnet mask of and Network IDs of and Created by Donna P. Warren Revised: 1/2/2012 Page 16 of 19

17 4. Define the ranges of host IDs for the following 4 subnets that are using a subnet mask of and Network IDs of , , , and Define the ranges of host IDs for the following 3 subnets that are using a subnet mask of and Network IDs of , , and Created by Donna P. Warren Revised: 1/2/2012 Page 17 of 19

18 You can tell by the range of valid addresses what the increments are, then determine the number of bits borrowed and the subnet mask. Objective: Determine the appropriate subnet mask for a given range of IP addresses 1. Address range of through Address range of through Address range of through Address range of through Address range of through Created by Donna P. Warren Revised: 1/2/2012 Page 18 of 19

### APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

### Subnetting Examples. There are three types of subnetting examples I will show in this document:

Subnetting Examples There are three types of subnetting examples I will show in this document: 1) Subnetting when given a required number of networks 2) Subnetting when given a required number of clients

### Subnetting Study Guide

Subnetting Study Guide by Boson Software, LLC An octet is a binary number of 8 bits, with the lowest possible number being 00000000 and the highest possible number being 11111111, or 28. The binary number

### Source net: 200.1.1.0 Destination net: 200.1.2.0 Subnet mask: 255.255.255.0 Subnet mask: 255.255.255.0. Router Hub

then to a router. Remember that with a Class C network address, the first 3 octets, or 24 bits, are assigned as the network address. So, these are two different Class C networks. This leaves one octet,

### Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

### Question 3.1.1. Question 3.2.1. Question 3.3.1. EdTech 552: Lab 3 Answer Sheet

Question 3.1.1 Question Answers a. 123 01111011 b. 202 11001010 c. 67 01000011 d. 7 00000111 e. 252 11111100 f. 91 01011011 g. 116.127.71.3 01110100.01111111.01010001.00000011 h. 255.255.255.0 11111111.11111111.11111111.00000000

### Lab 10.3.5a Basic Subnetting

Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet

### CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

CCNA R&S: Introduction to Networks Chapter 9: Subnetting IP Networks Frank Schneemann Chapter 9: Subnetting IP Networks Subnetting IP Networks In this chapter, you will be learning how devices can be grouped

### Number of bits needed to address hosts 8

Advanced Subnetting Example 1: Your ISP has assigned you a Class C network address of 198.47.212.0. You have 3 networks in your company with the largest containing 134 hosts. You need to figure out if

### TCP/IP Cheat Sheet. A Free Study Guide by Boson Software, LLC

boson_logo_tcpip.pdf 9/23/2010 11:28:19 AM TCP/IP Cheat Sheet A Free Study Guide by Boson Software, LLC Table 1 Address Class Summary Class s Hosts per Range of Network IDs (First Octet) Class A 126 16,777,214

Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address. Every computer on network has an IP address that represent its location on network. Two version

### 3201 Computer Networks 2014/2015 Handout: Subnetting Question

Subnetting Questions with Answers Question1: Given the following: Network address: 192.168.10.0 Subnet mask: 255.255.255.224 1. How many subnets? Ans: 6 2. How many hosts? Ans: 30 3. What are the valid

### 2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

### Module 4, Assignment 3-2

Module 4, Assignment 3-2 Lab 3.4 Basic Subnetting Question 3.4.1: A company has applied for and received a Class C network address of 197.15.22.0. The physical network is to be divided into 4 subnets,

### Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d

Module 10 Subnetting Class A, B and C addresses Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d 10.3.5a Basic Subnetting Use the following information and answer the following subnet

### Activity 6.7.4: IPv4 Address Subnetting Part 2

Activity 6.7.4: IPv4 Address Subnetting Part 2 Learning Objectives Upon completion of this activity, you will be able to determine subnet information for a given IP address and subnetwork mask. Background

### You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

### IP Subnetting Colin Weaver, ITdojo

IP Subnetting Colin Weaver, ITdojo Note: This document assumes that subnet zero is NOT used. For a description of subnet-zero, go here (http://www.cisco.com/warp/public/105/40.html). Subnetting IP networks

### 2.3 IPv4 Address Subnetting Part 2

.3 IPv4 Address Subnetting Part Objective Upon completion of this activity, you will be able to determine subnet information for a given IP address and subnetwork mask. When given an IP address, network

### IP Subnetting and Related Topics A Tutorial by Chris Uriarte <chrisjur@cju.com> Updated April 2001

IP Subnetting and Related Topics A Tutorial by Chris Uriarte Updated April 2001 IP Addresses and their Binary Equivalents First and foremost, it s important to understand that every

### One of the most important topics in any discussion of TCP/IP is IP. IP Addressing

IP Addressing 125 machine, called a RARP server, responds with the answer, and the identity crisis is over. RARP uses the information it does know about the machine s MAC address to learn its IP address

### Seven Steps to Subnetting

Seven Steps to Subnetting Excerpt from MCSE Guide to Microsoft Windows 2000 Networking Certification Edition, written by Kelly Caudle, Walter J. Glenn, and James Michael Stewart; published by Course Technology

### Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

Expert Reference Series of White Papers Binary and IP Address Basics of Subnetting 1-800-COURSES www.globalknowledge.com Binary and IP Address Basics of Subnetting Alan Thomas, CCNA, CCSI, Global Knowledge

### IT:101 Cisco Networking Academy I Subnetting

IT:101 Cisco Networking Academy I Subnetting The IPv4 address is 32 bits long and it is written in the form of dotted decimal notation. IP address in binary format: 11000000.00000001.00000001.00000020

### Classful Subnetting Explained

Classful ting Explained When given an IP Address and a Mask, how can you determine other information such as: The subnet address of this subnet The broadcast address of this subnet The range of Host Addresses

### Expert Reference Series of White Papers. Solving the Mysteries of Subnetting 1-800-COURSES. www.globalknowledge.com

Expert Reference Series of White Papers Solving the Mysteries of Subnetting 1-800-COURSES www.globalknowledge.com Solving the Mysteries of Subnetting Raj Tolani, Global Knowledge Instructor Introduction

### CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

### Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

### Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

### Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

### Fast and Easy Subnetting. Marc Khayat, Technical Advocacy Team makhayat@cisco.com May 2011

Fast and Easy Subnetting Marc Khayat, Technical Advocacy Team makhayat@cisco.com May 2011 Number of required subnets Number of required hosts per subnet 2011 Cisco and/or its affiliates. All rights reserved.

### IP Subnetting: Practical Subnet Design and Address Determination Example

IP Subnetting: Practical Subnet Design and Address Determination Example When educators ask students what they consider to be the most confusing aspect in learning about networking, many say that it is

### Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Subnetting Basics You learned previously how to define and find the valid host ranges used in a Class A, Class B, and Class C network address by turning the host bits all off and then all on. This is very

### TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers

### Lab#2: IP Addressing and Subnetting

IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by

### IP Addressing. and Subnetting. Workbook Version 1.5. Student Name:

IP Addressing and Subnetting Workbook Version.5 Student Name: IP Address Classes Class A 27 (Network 27 is reserved for loopback and internal testing) Leading bit pattern... Network. Host. Host. Host Class

### Expert Reference Series of White Papers. Solving the Mysteries of Subnetting

Expert Reference Series of White Papers Solving the Mysteries of Subnetting 1-800-COURSES www.globalknowledge.com Solving the Mysteries of Subnetting Raj Tolani, Global Knowledge Instructor Introduction

### SUBNETTING SCENARIO S

SUBNETTING SCENARIO S This white paper provides several in-depth scenario s dealing with a very confusing topic, subnetting. Many networking engineers need extra practice to completely understand the intricacies

### IP Addressing A Simplified Tutorial

Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

### Sybex CCENT 100-101 Chapter 4: Easy Subnetting. Instructor & Todd Lammle

Sybex CCENT 100-101 Chapter 4: Easy Subnetting Instructor & Todd Lammle Chapter 4 Objectives The CCENT Topics Covered in this chapter include: IP addressing (IPv4 / IPv6) Describe the operation and necessity

### Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe

### The Subnet Training Guide

The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP

SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

### IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification Wayne M. Pecena, CPBE, CBNE Texas A&M Information Technology Educational Broadcast Services IP Networking,

### How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

SUBNET MASK To define the network and host portions of an address, the devices use a separate 32-bit pattern called a subnet mask. We express the subnet mask in the same dotted decimal format as the IPv4

### cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

3 Concepts in IP Addressing Terms You ll Need to Understand: Binary Hexadecimal Decimal Octet IP address Subnet Mask Subnet Host Increment Techniques You ll Need to Master: Identifying Address Class and

### examines the ideas related to Class A, Class B, and Class C networks (in other words, classful IP networks).

This chapter covers the following subjects: Classful Network Concepts: This section examines the ideas related to Class A, Class B, and Class C networks (in other words, classful IP networks). Practice

Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful

### IPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011

IPv4 Addressing Simplified by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011 The concept of IP Addressing is foundational to overall routing in general. Without

### Pre-lab Preparation: 1. Read thoroughly and prepare the experiment sheet. 2. You must bring a printed copy of this experiment with you to the lab.

University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.5 Subnetting &Variable Length Subnet Mask (VLSM) Objectives 1. To become

### SYMETRIX SOLUTIONS: TECH TIP April 2014

Understanding Class C Masking In the day to day support operations a Symertix tech support agent will most often come across customers that have their PC and Symetrix DSP on a Class C Mask of 255.255.255.0.

### The Basics. As we begin our discussion of TCP/IP networking with Windows 2000 we first look at the basics of TCP/IP. We look at all PART ONE

ch01.qxd 3/19/01 3:05 PM Page 1 PART ONE The Basics As we begin our discussion of TCP/IP networking with Windows 2000 we first look at the basics of TCP/IP. We look at all those funny numbers and talk

### Part A:Background/Preparation

Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration

### IP Subnetting for the Masses Or How a 12 year old kid can subnet the most complex network.

IP Subnetting for the Masses Or How a 12 year old kid can subnet the most complex network. Joe Richker Page 1 8/8/2008 IP subnetting is the most feared part of working with TCP/IP for many people. The

### Expert Reference Series of White Papers. Simple Tricks To Ace the Subnetting Portion of Any Certification Exam 1-800-COURSES. www.globalknowledge.

Expert Reference Series of White Papers Simple Tricks To Ace the Subnetting Portion of Any Certification Exam 1-800-COURSES www.globalknowledge.com Simple Tricks To Ace the Subnetting Portion of Any Certification

### Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

### VLSM CHAPTER 2. IP Subnet Zero

CHAPTER 2 VLSM Variable-length subnet masking (VLSM) is the me realistic way of subnetting a netwk to make f the most efficient use of all of the bits Remember that when you perfm classful ( what I sometimes

### Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

Part2 Chapter 8 Advanced TCP/IP Network Design - CLASSLESS ADDRESSING AND VARIABLE- LENGTH SUBNET MASKS Variable-Length Subnet Masks Variable-length subnet masks specified how a single network ID could

### Chapter 5 - Ethernet Setup

Chapter 5 - Ethernet Setup Chapter Overview Introduction... 5-3 EtherTalk Network Configuration... 5-3 Select the EtherTalk Phase 2 Driver...5-3 Change the EtherTalk Zone Name...5-4 Novell NetWare Configuration...

### Packet Tracer - Subnetting Scenario 1 (Instructor Version)

(Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or to provide

### Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 5 IPv4 Addresses TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Outline TCP/IP Protocol Suite 2 5-1 INTRODUCTION The

### Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

### 1. How many unique network IDs are there in class A addresses? # of unique hosts?

CS445: IPv4 Addresses In-class activity Names: Part 1: Address Classes Original three classes of IPv4 addresses: A: 0 network (7 bits) host (24 bits) B: 10 network (14 bits) host (16 bits) C: 110 network

### Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

### TCP/IP Basis. OSI Model

TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

### IP Addressing and Subnetting for New Users

IP Addressing and Subnetting for New Users Document ID: 13788 Contents Introduction Prerequisites Requirements Components Used Additional Information Conventions Understanding IP Addresses Network Masks

### CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing

CE363 Data Communications & Networking Chapter 6 Network Layer: Logical Addressing TCP/IP and OSI model APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT NETWORK Host-Network TRANSPORT NETWORK DATA

### 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

IP Addressing To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a 32-bit logical address known as an IP address. This topic introduces the components of an IP address.

### Topics. Subnetting. The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing Creating a Subnet Example of Subnetting 1/37

1/37 Subnetting Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Topics 2/37 The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing

### Planning for Information Network

Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making

### CONFIGURING TCP/IP ADDRESSING AND SECURITY

1 Chapter 11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 2 OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security

### Networking Test 4 Study Guide

Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

### Internet Protocols. Addressing & Services. Updated: 9-29-2012

Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is

### Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

### - IPv4 Addressing and Subnetting -

1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

### This document explains how to use your Web Browser to configure the 100BaseT IOPRINT+ Print Server models. Connecting to the IOPRINT+ Print Server

Web Browser This document explains how to use your Web Browser to configure the 100BaseT IOPRINT+ Print Server models Overview The 100BaseT IOPRINT+ Print Server models incorporate a HTTP server. This

### IP Subnetting. Subnetting

IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network

### IP Sub Networking Mini Howto

Table of Contents IP Sub Networking Mini Howto...1 Robert Hart, hartr@interweft.com.au...1 1. Copyright...1 2. Introduction...1 3. The Anatomy of IP numbers...1 4. What are subnets?...1 5. Why subnetwork?...1

### 2. IP Networks, IP Hosts and IP Ports

1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

Web Browser This document explains how to use your Web Browser to configure the 100BaseT Print Server models Overview 100BaseT Print Server models incorporate a HTTP server. This allows you to connect

IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

### IST 220 Honors Project. Subnets with Variable Length Subnet Masks

IST 220 Honors Project Subnets with Variable Length Subnet Masks Project Objectives: In this project, you will subnet the IP address 193.170.10.0 according to needs of the organization. Overview a) Perform

### 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

### Subnetting IPv4 and IPv6

Subnetting IPv4 and IPv6 Advanced Networking: Routing & Switching 1 Chapter 9 Copyleft 2013 Hacklab Cosenza (http://hlcs.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials

### Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

Section #6: Addressing Problem 1: Routing entries Consider the following routing table for router A, given in CIDR ( slash-n ) notation: 56.162.0.0/15: Port 0 56.164.0.0/15: Port 1 56.166.0.0/16: Port

### Advanced Topics: IP Subnetting A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY. www.aspetech.com toll-free: 877-800-5221

Advanced Topics: IP Subnetting A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY www.aspetech.com toll-free: 877-800-5221 Advanced Topics IP Subnetting It is almost impossible to lay out an IP network without