当前位置:网站首页>13. IP address and subnet partitioning (VLSM)
13. IP address and subnet partitioning (VLSM)
2022-06-23 17:51:22【Fallen bird】
One 、IP Address
1、ip The role of address
The network address used to identify a node
2、2 Base number
3、2-10 Base conversion
Calculate by short division 10 Binary forwarding 2 Base number
2 Binary exchange 10 Base number
4、IP Composition and classification of addresses
bit The smallest unit in a computer ,1bit It's equal to... In binary 1
8bit( position )=Byte( byte )
D class IP Address is used for multicast
E class IP For scientific research
5、 Subnet mask
Used to identify network bits , The same network bits can communicate with each other ( On the same network )
A class 255.0.0.0
B class 255.255.0.0
C class 255.255.255.0
Two 、 Divide subnets
1、 The role of subnets
By setting the subnet mask side length , Divide a large network into several small networks ( save IP, Narrow the broadcast domain )
2、 How to divide subnets
Information before subnet partition
The Internet 172.168.0.0 Mask 255.255.0.0
There are... In this network 2^16-2 individual IP Address , But it is rare to use so many in a network IP, Then we divide the network into several subnets .
Information after subnetwork partition
The mask changes to 255.255.255.0
Number of subnets 2^8-2=254( The subnet number cannot be all 0 Or all 1. When the subnet numbers are all 0 Is the first subnet , But it has the same network number as the whole network , The broadcast address of the last subnet is the same as that of the whole network , In the past, some principles seemed to be something RFC-95 It is specified that the subnet number cannot be all 0 Or all 1, To prevent the router from being unrecognized . But today's routers are basically ready to use , However, some books do not emphasize that the subnet numbers are all 0 Or all 1 Is it available . In the exam all 0 And all 1 The subnet number of is OK .)
The network is divided into 172.16.1.0、172.16.2.0、172.16.3.0…… 172.168.254.0
3、VLSM( Variable length subnet mask )
Keep at least... In the variable length subnet mask 2 Host location
Calculate the number of subnets 2^x x Is the number of subnets
Calculate the number of hosts 2^y-2 y Is the host bit number
4、 Fast subnet partition
How many subnets will this selected subnet mask generate ?
How many legal host numbers are available in this subnet ?
What is the legal subnet number of CPPCC ?
What is the broadcast address of each subnet ?
In each subnet , Those legitimate host numbers ?
5、 Allow all 0 whole 1 Subnet segment
IP subnet zero
12 Cisco devices of the above versions are started by default
show running-config You can see the configuration
边栏推荐
- Discussion on five kinds of zero crossing detection circuit
- MySQL transaction submission process
- Answer 01: why can Smith circle "allow left string and right parallel"?
- What is the mobile account opening process? Is it safe to open an account online now?
- How to open an account through online stock? Is online account opening safe?
- [mae]masked autoencoders mask self encoder
- JSON - learning notes (message converter, etc.)
- Thymeleaf - learning notes
- 12 initialization of beautifulsoup class
- Analysis of object class structure in Nanny level teaching (common class) [source code attached]
猜你喜欢
Add new members to the connector family! Scenario connector helps enterprises comprehensively improve the operational efficiency of business systems
Tencent Qianfan scene connector: worry and effort saving automatic SMS sending
Redis ubuntu18.04.6 intranet deployment
Interpretation of eventbus source code
Year end: the "time value" and business methodology of live broadcast E-commerce
JS custom error
JS reset form
JS regular verification time test() method
History of storage technology: from tape to hardware liquefaction
First use of kubernetes cronjob
随机推荐
- Cross browser common events
- Tencent three sides: how to duplicate 4billion QQ numbers?
- Goframe framework: fast implementation of service end flow limiting Middleware
- What is the problem with TS File Error 404 when easynvr plays HLS protocol?
- [JS reverse hundred examples] pedata encryption information and zlib Application of gunzipsync()
- How code 39 check bits are calculated
- Listen attentively and give back sincerely! Pay tribute to the best product people!
- How to quickly obtain and analyze the housing price in your city?
- Petitpotam – NTLM relay to ad CS
- Explanation of the principle and code implementation analysis of rainbow docking istio
- Drawing black technology - easy to build a "real twin" 2D scene
- How to make a shirt certificate
- High availability solution practice of mongodb advanced applications (4)
- Introduction to GTS Academy
- Digital intelligent supply chain collaboration solution for new energy industry
- How to create a three elimination game
- The mail function is normal locally, and the ECS reports an error
- POC about secureworks' recent azure Active Directory password brute force vulnerability
- Similarities and differences between Chinese and American electronic signature SaaS
- Company offensive operation guide
- Go unit test
- Intelligent supply chain collaborative management solution for logistics industry
- PostgreSQL series articles -- the world's most advanced open source relational database
- Script to view the execution of SQLSERVER database stored procedures
- Transaction processing of cloud development database
- Skills that all applet developers should know: applying applet components
- ACM players take you to play with the array!
- Kotlin invoke convention makes kotlin code more concise
- January 5, 2022: there are four kinds of rhythms: AABB, ABAB and ABB
- Lighthouse open source application practice: o2oa
- . Net cloud native architect training camp (responsibility chain mode) -- learning notes
- Android kotlin exception handling
- Best practices cloud development cloudbase content audit capability
- The principle of MySQL index algorithm and the use of common indexes
- Goframe framework: graceful closing process
- Nanny level teaching! Take you to play with time complexity and space complexity!
- How to design a seckill system - geek course notes
- Method of copying web page content and automatically adding copyright information (compatible with ie, Firefox and chrome)
- [Hyperf]Entry “xxxInterface“ cannot be resolved: the class is not instantiable
- How to use JSON data format