Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Wednesday, 26 February 2014
On 09:19 by Unknown in CCNA1, CCNA2, CCNA3, CCNA4, classful network, distance-vector, IP, Lesson, RIP1, Router No comments
Classful Network
let's first know little bit about classful network, what it is, how to implement it. A classful network is a network addressing architecture used in the Internet from 1981 until the introduction of Classless Inter-Domain Routing in 1993. The method divides the address space for Internet Protocol Version 4 (IPv4) into five address classes. Each class, coded in the first four bits of the address, defines either a different network size, i.e. number of hosts for unicast addresses (classes A, B, C), or a multicast network (class D). The fifth class (E) address range is reserved for future or experimental purposes.
Classful addressing, formally adopted as part of the Internet Protocol (IP) in RFC 791, was the Internet's first major addressing scheme. The IP address was 32 bits in size, just as today, but was managed considerably differently.
There were three address classes to chose from: A, B, or C, corresponding to 8-bit, 16-bit, or 24-bit prefixes. No other prefix lengths were allowed, and there was no concept of nesting a group of 24-bit prefixes, for example, within a 16-bit prefix.
Class | Leading bits | Size of network number bit field | Size of rest bit field | Number of networks | Addresses per network | Start address | End address |
---|---|---|---|---|---|---|---|
Class A | 0 | 8 | 24 | 128 (27) | 16,777,216 (224) | 0.0.0.0 | 127.255.255.255 |
Class B | 10 | 16 | 16 | 16,384 (214) | 65,536 (216) | 128.0.0.0 | 191.255.255.255 |
Class C | 110 | 24 | 8 | 2,097,152 (221) | 256 (28) | 192.0.0.0 | 223.255.255.255 |
Class D (multicast) | 1110 | not defined | not defined | not defined | not defined | 224.0.0.0 | 239.255.255.255 |
Class E (reserved) | 1111 | not defined | not defined | not defined | not defined | 240.0.0.0 | 255.255.255.255 |
Configure the routers with class full network with RIP1
Description:
The Routing Information Protocol (RIP)
is a distance-vector protocol that uses hop count as it’s metric. RIP is widely
used for routing traffic in the global Internet and is an interior gateway
protocol, which means that it performs routing within a single autonomous
system. Using RIP, a gateway host (with a router) sends its entire routing table to its closest
neighbour host every 30 seconds. The neighbour host in turn will pass the
information on to its next neighbour and so on until all hosts within the
network have the same knowledge of routing paths, a state known as network
convergence. RIP uses a hop count as a way to determine network distance.
Solution:
The given topology is:
Steps:
Configuring steps for router0:
Router>enable
Router#config
t
Router(config)#interface
fa0/0
Router(config-if)#ip
address 10.0.0.1 255.0.0.0
Router(config-if)#no
shutdown
Router(config-if)#exit
Router(config)#interface
se2/0
Router(config-if)#ip
address 20.0.0.1 255.0.0.0
Router(config-if)#no
shutdown
Router(config-if)#exit
Router(config)#router
rip
Router(config-router)#network
10.0.0.0
Router(config-router)#network
20.0.0.0
Router(config-router)#exit
Configuring steps for router1:
Router>enable
Router#config
t
Router(config)#interface
fa0/0
Router(config-if)#ip
address 30.0.0.1 255.0.0.0
Router(config-if)#no
shutdown
Router(config-if)#exit
Router(config)#interface
se2/0
Router(config-if)#ip
address 20.0.0.2 255.0.0.0
Router(config-if)#no
shutdown
Router(config-if)#exit
Router(config)#router
rip
Router(config-router)#network
20.0.0.0
Router(config-router)#network
30.0.0.0
Router(config-router)#exit
Configuring steps for router2:
Router>enable
Router#config
t
Router(config)#interface
fa0/0
Router(config-if)#ip
address 50.0.0.1 255.0.0.0
Router(config-if)#no
shutdown
Router(config-if)#exit
Router(config)#interface
se2/0
Router(config-if)#ip
address 40.0.0.2 255.0.0.0
Router(config-if)#no
shutdown
Router(config-if)#exit
Router(config)#router
rip
Router(config-router)#network
40.0.0.0
Router(config-router)#network
50.0.0.0
Router(config-router)#exit
Output:
Ping
command from PC5 to PC1
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment