- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Emphasize: A range of addresses is needed to allocate address space. A valid range of addresses is between subnet zero and the directed broadcast. These RFCs provide more information about broadcasts: RFC 919, Broadcasting Internet Datagrams RFC 922, Broadcasting IP Datagrams in the Presence of Subnets Cisco’s support for broadcasts generally complies with these two RFCs. It does not support multisubnet broadcasts that are defined in RFC 922. Layer 1 of 9: Purpose: This example summarizes The IP addressing that was covered earlier in this chapter. Emphasize: In layer 1, convert the address to a binary host address. Layer 2 of 9: Emphasize: In layer 2, write the subnet mask in binary. Layer 3 of 9: Emphasize: In layer 3, draw a line after the recursive ones in the subnet mask. Layer 4 of 9: Emphasize: In layer 4, fill in zeros beyond the vertical line for the subnet. Layer 5 of 9: Emphasize: In layer 5, fill in ones beyond the vertical line for the broadcast address. Layer 6 of 9: Emphasize: In layer 6, fill in 0s beyond the vertical line except for the last bit. Make that bit a 1. This is the first usable host address. Layer 7 of 9: Emphasize: In layer 7, fill in 1s beyond the vertical line except for the last bit. Make that bit a 0. This is the last usable host address. Layer 8 of 9: Emphasize: In layer 8, copy the binary network and subnetwork address from the top row into the lower rows. Layer 9 of 9: Emphasize: In layer 9, convert binary back to dotted decimal. Layer 1 of 2: Purpose: Have the students calculate the subnet numbers and the broadcast address for each subnet from the given IP addresses and subnet masks. Layer 2 of 2: Purpose: This answers to the exercise are given in the figure. Note: Students can also find the answers to this exercise in the “Answers” appendix. Layer 2 of 3: Host B sends an ACK and acknowledges the SYN it received from host A. Host B also sends a SYN. Note that the acknowledgment field indicates host B
您可能关注的文档
- 1-4传染病的预防分析报告.ppt
- 2an、ang分析报告.pptx
- 1-4第四章抑癌基因分析报告.ppt
- 2antigen分析报告.ppt
- 2-C2第三节细胞通过分裂产生新细胞分析报告.ppt
- 1-4电子功能与元器件半导体超晶格材料分析报告.pptx
- 2cellculturebiology-细胞培养分析报告.ppt
- 2DNA的复制分析报告.ppt
- 1-4研究匀变速直线运动分析报告.ppt
- 1-5第五章信号传导与肿瘤分析报告.ppt
- 多点监督与特征融合校准:目标检测算法的创新与突破.docx
- 南宁市门诊HIV_AIDS患者抑郁状况剖析与影响因素探究.docx
- 医疗过失犯罪中客观归责理论的精准适用与深度解析.docx
- 南宁市低碳经济发展研究.docx
- 清解瘀毒胶囊对脑出血大鼠血红蛋白毒性作用及机制探究.docx
- 内蒙古赤峰市元宝山区农村小学教师培训:现状、问题与突破路径.docx
- 泉州开发区国有资产投资经营有限公司发展战略研究:基于区域经济与市场环境的分析.docx
- 能源利用效率与经济增长方式的深度耦合及中国战略抉择.docx
- 分布式信号波达方向 - 时延联合估计算法的深度剖析与创新探索.docx
- 新媒体环境下大学校园精神传播的创新变革.docx
文档评论(0)