Cidr presentation, Computer Networking

Inside a device, every address mask is stored as a 32-bit number. When we submit a prefix and an address mask they use a changed form of dotted decimal addressing known CIDR addressing, which is called as CIDR Presentation.

As an example how CIDR includes flexibility, consider a single class B prefix (e.g. i.e. 216 host addresses 16-bit CIDR mask shows as:

That is, by creating CIDR mask corresponds same to the old Classful interpretation. It will be ok if 216 receivers are attached. If it does have two clients with only twelve devices each, the ISP can need CIDR to partition the address into three parts.

  • Two of them each large enough for one of two clients.
  • Remainder available for future clients.

For example one client can be given and the other client can be given Both client have similar mask size, the prefix differs i.e. each and every client has a unique prefix.


The example below in the diagram denotes the CIDR host addresses:

248_CIDR Presentation.png

Posted Date: 7/31/2012 8:45:58 AM | Location : United States

Related Discussions:- Cidr presentation, Assignment Help, Ask Question on Cidr presentation, Get Answer, Expert's Help, Cidr presentation Discussions

Write discussion on Cidr presentation
Your posts are moderated
Related Questions
What is client/server? Client/server is a type of network wherein one or more computers act as servers. Servers give a centralized repository of resources like printers and fil

NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch. The current IP address is the new IP address

Q. How to connect Remote LANs? - Remote bridges acting as connecting devices to connect LANs and point-to-point networks such as leased telephone lines or ADSL lines

802.11 DSSS a) Direct sequence spread spectrum in a 2.4 GHz band b) Each bit is replaced by a sequence of bits called a chip code, implemented at the physical layer c) Se

Q. What do you understand by OSI? Ans: The Open System Interconnection (OSI) reference model illustrates how information from a software application in one computer goes throug

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

State the Nyquist theorem The Nyquist theorem is thermo of mathematics and has nothing to deal with technology. It says that if you have the function whose Fourier spectrum doe