- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
计算机网络技术基础单元3网络的体系结构与协议3ip协议
* * * * * * Purpose: This figure explains how to plan subnet numbers. Emphasize: What if this were a Class B address? How many bits would we have for subnetting then? Where do you want to draw the line now? Alternatives to review: Creating the subnet at the octet boundary is easier to work with—more host bits and more subnet bits. Explain that the decision is really a guess on how you think your network will grow—will it have more subnets or more hosts? RFC 1219 Mirroring: Mirroring hedges the subnetting decision by buying time. Do not use mirroring if you intend to use route summarization or variable-length subnet masking (VLSM); they are incompatible with mirroring. * * * * * * * * * * * * * * * * * * * * * * * * * * * Emphasize: Highlight the fixed values that start each class address. The first octet rule states that when an address falls into a specified range, it belongs to a certain class. Students should soon be able to recognize the address class of any IP address on sight. Note: If time or interest permits, you can use the initial bit patterns in the first octet and show how a class of IP network derives the range of network numbers for that IP address class. * * Purpose: This figure explains how to calculate the number of available hosts in a network. Emphasize: 2N-2 is the calculation to determine available hosts. N is the number of binary digits in the host field. Subtract 2 because a host cannot be all 0s or 1s. The same principal applies when determining the number of available networks. * * Purpose: This figure presents an overview of host and network address conventions. Emphasize: In the example, and refer to the wires at each end of the router. Explain how the routing table is used. Entries in the routing table refer to the network only. The router does not know the location of hosts—it knows the location of networks. . * * * * * * * * * * * * * * * * Purpose: This figure explains what networks look like without subnets. Without
您可能关注的文档
最近下载
- 汽轮发电机设备制造监理工作细则.doc VIP
- 第二单元《德奥音乐之旅》第1课时《德奥之声》课件 人教版三年级音乐上册.pptx VIP
- 完整版山茶花文化鉴赏.ppt VIP
- 《家庭教育视角下小学生亲子课外阅读指导策略研究》开题报告.docx VIP
- 《婴幼儿生活照护》教案 第九讲 婴幼儿生长发育状况的监测与评价.pdf VIP
- 2025年第三季度消毒药械和一次性无菌医疗用品检查情况总结.docx VIP
- 基于DS1302实时时钟系统的设计论文.pdf VIP
- 基于大数据分析的2025年农作物病虫害预警模型构建.pptx VIP
- 重症5c培训试题及答案.doc VIP
- 重症5c培训试题及答案.doc VIP
文档评论(0)