Reverse Engineering is the most common form of subnetting. You’ll start with an IP address and Subnet Mask. Is this IP Address Valid? What Subnet Range does it belong to? Is it on the same subnet as the others plugged in? Scenario #1: 192.168.1.127 / 255.255.255.224 /27 = 11100000 = 32 Increment 192.168.1.0 – 192.168.1.31 ..
Category : TCP/IP
This article outlines the steps required to break a Class A, B or C network down into multiple Subnets as defined by the number of Hosts required for each subnet. Several examples are provided below, along with practice exercises (actual answers not provided.) Use these examples to work on your speed! Goal: 2 – 3 ..
This article outlines the steps required to break a Class A, B or C Network and break it down into multiple subnets as defined by the required number of subnets. At the bottom of the page, several examples are provided, as well as several test scenarios (actual answers not provided.) The Three Steps of ..
Reviewing the basics of IP IPv4 Addresses: 4 Octet Address, each octet = 1 byte. 32 Total Bits Can be one of 3 classes, A, B or C A: 001 – 126, 16,777,214 Hosts (256^3 – 2) B: 128 – 191, 65,534 Hosts (256^2 – 2) C: 192 – 223, 254 Hosts (256 – 2) ..
Bob Packet – The “Local Boy” Bob is a ‘PING’ request that will travel from 172.10.1.20 to 172.10.1.30. Subnet Mask is 255.255.255.0 .20 Compares its Network ID (172.10.1) with that of the Destination IP (172.10.1) and sees they are a match. .20 sends an ARP (Address Resolution Protocol) asking for the MAC address of the ..
How Port Numbers Work Every time an applications communicates across a network, it must decide both the source and destination port numbers. If 10.1.1.1 wants to access 150.1.1.1’s web server, it will use well known port 80. This is written as 150.1.1.1:80 When written in this notation, it is known as a “Socket”. The Source ..
Understanding the Differences Between TCP and UDP Networks communicate in Layers. This is handled in Layer 4, Transport Layer TCP is “Reliable” Reliable – Uses Acknowledgements Builds Connections with system it is communicating with Uses Sequence Numbers – Every packet is tagged with a # to know the order the packets had been sent. UPD ..
How does OSI Model and TCP/IP Relate OSI was a competing model with TCP/IP in the 70’s It failed because addresses were too complex. Using HEX values and people never thought they would need that many. OSI MODEL is used to explain, but TCP/IP is actually in use. Actually very similar to new IPv6 Protocols ..
Process Definition Application Provides an interface that allows applications to communicate across a network. Presentation “Generifies” the data. Makes the data generic and compliant to standards. Also includes generic encryption services. Session Starts and ends a session. Logically keeps all sessions separate. Transport Defines how the data is sent. Reliably (TCP) or Unreliably (UDP – ..
Recent Comments