Cidr presentation, Computer Networking

Inside a device, every address mask is stored as a 32-bit number. When we submit a prefix and an address mask they use a changed form of dotted decimal addressing known CIDR addressing, which is called as CIDR Presentation.

As an example how CIDR includes flexibility, consider a single class B prefix (e.g. 128.201.0.0) i.e. 216 host addresses 16-bit CIDR mask shows as: 128.211.0.0/16

That is, by creating CIDR mask corresponds same to the old Classful interpretation. It will be ok if 216 receivers are attached. If it does have two clients with only twelve devices each, the ISP can need CIDR to partition the address into three parts.

  • Two of them each large enough for one of two clients.
  • Remainder available for future clients.

For example one client can be given 128.211.0.16/28 and the other client can be given 128.211.0.32/28. Both client have similar mask size, the prefix differs i.e. each and every client has a unique prefix.

CIDR HOST ADDRESSES:

The example below in the diagram denotes the CIDR host addresses:

248_CIDR Presentation.png

Posted Date: 7/31/2012 8:45:58 AM | Location : United States







Related Discussions:- Cidr presentation, Assignment Help, Ask Question on Cidr presentation, Get Answer, Expert's Help, Cidr presentation Discussions

Write discussion on Cidr presentation
Your posts are moderated
Related Questions
bus topology disadvantage?

what is the differnce between noise and distortion

Q. Define transport layer of osi model? - The transport layer regulates information flow to makes sure end-to-end connectivity between host applications reliably and accurately

- Light source is LED (light-emitting diode) or a laser - LEDs are cheaper however not as precise (unfocused) limited to short-distance use - Lasers is able to have a narrow

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

Demarcation is the point in which responsibility changes hands.

The three phase of PPP session establishment are:-  A. Link establishment phase  B. Authentication phase  C. Network layer protocol phase

What are the five major technologies that can be used to create Client/Server applications? Database Servers Groupware TP Monitors Distributed Objects Intranets.

What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.

Middleware is distributed software required to support interaction among clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it