SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
IP Addressing Basics NAD710 Introduction to Networking Using Linux Portions of this presentation are from the online text Linux Network Administrators Guide January 20,2002 Professor Tom Mavroidis      
Where to start? ,[object Object],[object Object],[object Object],[object Object]
MAC address ,[object Object]
Example Vendor codes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The ifconfig command  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Machines communicate via: ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP addresses ,[object Object],[object Object],[object Object],[object Object],[object Object]
127.0.0.1 ,[object Object]
Private IP Addresses Table 2-1. IP Address Ranges Reserved for Private Use Class Networks A 10.0.0.0 through 10.255.255.255 B 172.16.0.0 through 172.31.0.0 C 192.168.0.0 through 192.168.255.0 RFC 1918
Example Network From Text
Public addresses ,[object Object],[object Object],[object Object],[object Object]
Who servers out Public Addresses? ,[object Object],[object Object]
Example of Addressing ,[object Object]
IPv4 addresses are expressed in dotted decimal notation. For example, a 32-bit address may look like this in binary:
We convert each eight-bit block to decimal and separate the decimal values with periods or “dots”. The converted IPv4 address, expressed as a dotted decimal address, is:
Class A The largest grouping of addresses is the class A group. Class A network addresses can be identified by a unique bit pattern in the 32bit address.
Class B The next grouping of addresses is the class B group. Class B network addresses can be identified by a unique bit pattern in the 32-bit address.
Class C The next grouping of addresses is the class C group. Class C network addresses can be identified by a unique bit pattern in the 32bit address.
Each of the three IP address classes has these characteristics
A device connected to a network may have one or many networking interfaces that require an IP address.
Devices with more than one interface are called  multihomed , and the process is called  multihoming
The process of providing more than one IP address on an interface is often called  multinetting  or  secondary addressing . interface ethernet 0 ip address 183.55.2.77 255.255.255.0 ip address 204.238.7.22 255.255.255.0 secondary ip address 88.127.6.209 255.255.255.0 secondary
Class A Subnet Table
Class B Subnet Table
Class C Subnet Table
Things to Remember ,[object Object],[object Object],[object Object],[object Object],[object Object]
Review-RFC950 ,[object Object]
Rules - RFC950 ,[object Object]
Rules - RFC950 ,[object Object],[object Object],[object Object]
Valid Subnet ,[object Object]
Invalid Network ,[object Object]
Why Subnet? ,[object Object],[object Object],[object Object]
An example of Subneting ,[object Object],[object Object],[object Object],[object Object],[object Object]
192.168.1.0 or  11000000.10101000.00000001.00000000 ,[object Object],[object Object],[object Object],[object Object]
List of subnetworks for 192.168.1.0 ,[object Object]
Network Address Calculation ,[object Object]
Host Address ,[object Object]
Broadcast address ,[object Object]
Conclusion ,[object Object],[object Object]

Contenu connexe

Tendances

Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar pptSmriti Rastogi
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 

Tendances (20)

Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
IPv6
IPv6IPv6
IPv6
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 

Similaire à Ip Addressing Basics

5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3VISHNU N
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and SubnettingAtakan ATAK
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfNetworkershome
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.ArcyJeromeGallardo2
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
Cisco discovery d homesb module 5 - v.4 in english.
Cisco discovery   d homesb module 5 - v.4 in english.Cisco discovery   d homesb module 5 - v.4 in english.
Cisco discovery d homesb module 5 - v.4 in english.igede tirtanata
 
Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnetstmavroidis
 

Similaire à Ip Addressing Basics (20)

5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
 
15 3
15 315 3
15 3
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.
 
Subnetting class C
Subnetting class CSubnetting class C
Subnetting class C
 
Hardware9
Hardware9Hardware9
Hardware9
 
IP classes
IP classesIP classes
IP classes
 
Ramakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressingRamakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressing
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
Cisco discovery d homesb module 5 - v.4 in english.
Cisco discovery   d homesb module 5 - v.4 in english.Cisco discovery   d homesb module 5 - v.4 in english.
Cisco discovery d homesb module 5 - v.4 in english.
 
Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnets
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 

Plus de tmavroidis

What Is Tcp Ip
What Is Tcp IpWhat Is Tcp Ip
What Is Tcp Iptmavroidis
 
Transport Layer
Transport LayerTransport Layer
Transport Layertmavroidis
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layertmavroidis
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layerstmavroidis
 
Network Basics
Network BasicsNetwork Basics
Network Basicstmavroidis
 
Nad710 Network Address Translation
Nad710   Network Address TranslationNad710   Network Address Translation
Nad710 Network Address Translationtmavroidis
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linuxtmavroidis
 
Manchester Encoding
Manchester EncodingManchester Encoding
Manchester Encodingtmavroidis
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commandstmavroidis
 
Introduction To Networks Using Linux
Introduction To Networks Using LinuxIntroduction To Networks Using Linux
Introduction To Networks Using Linuxtmavroidis
 
Introduction To Networks
Introduction To NetworksIntroduction To Networks
Introduction To Networkstmavroidis
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routingtmavroidis
 
About Connection Types
About Connection TypesAbout Connection Types
About Connection Typestmavroidis
 
What Is A Carrier
What Is A CarrierWhat Is A Carrier
What Is A Carriertmavroidis
 

Plus de tmavroidis (17)

What Is Tcp Ip
What Is Tcp IpWhat Is Tcp Ip
What Is Tcp Ip
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Samba
SambaSamba
Samba
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
 
Nfs
NfsNfs
Nfs
 
Network Basics
Network BasicsNetwork Basics
Network Basics
 
Nad710 Network Address Translation
Nad710   Network Address TranslationNad710   Network Address Translation
Nad710 Network Address Translation
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Manchester Encoding
Manchester EncodingManchester Encoding
Manchester Encoding
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commands
 
Introduction To Networks Using Linux
Introduction To Networks Using LinuxIntroduction To Networks Using Linux
Introduction To Networks Using Linux
 
Introduction To Networks
Introduction To NetworksIntroduction To Networks
Introduction To Networks
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
 
Dns
DnsDns
Dns
 
About Connection Types
About Connection TypesAbout Connection Types
About Connection Types
 
What Is A Carrier
What Is A CarrierWhat Is A Carrier
What Is A Carrier
 

Dernier

4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 

Dernier (20)

4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 

Ip Addressing Basics

  • 1. IP Addressing Basics NAD710 Introduction to Networking Using Linux Portions of this presentation are from the online text Linux Network Administrators Guide January 20,2002 Professor Tom Mavroidis      
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Private IP Addresses Table 2-1. IP Address Ranges Reserved for Private Use Class Networks A 10.0.0.0 through 10.255.255.255 B 172.16.0.0 through 172.31.0.0 C 192.168.0.0 through 192.168.255.0 RFC 1918
  • 11.
  • 12.
  • 13.
  • 14. IPv4 addresses are expressed in dotted decimal notation. For example, a 32-bit address may look like this in binary:
  • 15. We convert each eight-bit block to decimal and separate the decimal values with periods or “dots”. The converted IPv4 address, expressed as a dotted decimal address, is:
  • 16. Class A The largest grouping of addresses is the class A group. Class A network addresses can be identified by a unique bit pattern in the 32bit address.
  • 17. Class B The next grouping of addresses is the class B group. Class B network addresses can be identified by a unique bit pattern in the 32-bit address.
  • 18. Class C The next grouping of addresses is the class C group. Class C network addresses can be identified by a unique bit pattern in the 32bit address.
  • 19. Each of the three IP address classes has these characteristics
  • 20. A device connected to a network may have one or many networking interfaces that require an IP address.
  • 21. Devices with more than one interface are called multihomed , and the process is called multihoming
  • 22. The process of providing more than one IP address on an interface is often called multinetting or secondary addressing . interface ethernet 0 ip address 183.55.2.77 255.255.255.0 ip address 204.238.7.22 255.255.255.0 secondary ip address 88.127.6.209 255.255.255.0 secondary
  • 23. Class A Subnet Table
  • 24. Class B Subnet Table
  • 25. Class C Subnet Table
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.