IP Addressing And Subnetting For Beginners | Myra B | Skillshare

IP Addressing And Subnetting For Beginners

Myra B, Passionate Online Instructor

IP Addressing And Subnetting For Beginners

Myra B, Passionate Online Instructor

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
20 Lessons (1h 19m)
    • 1. Introduction & Course Agenda

    • 2. Important Terms: IP and Subnetting

    • 3. What is IP?

    • 4. Classes of IP

    • 5. Classes of IP examples and identification

    • 6. Default Gateway

    • 7. MAC Address

    • 8. Network and Host ID

    • 9. Examples of Network and Host ID

    • 10. Subnet mask

    • 11. Decimal to Binary

    • 12. Binary to Decimal

    • 13. What is Broadcast ID?

    • 14. What is subnetting?

    • 15. What is CIDR?

    • 16. Subnetting according to Host

    • 17. Subnetting according to Network

    • 18. VLSM

    • 19. What is a Server?

    • 20. What is a DHCP?

  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels
  • Beg/Int level
  • Int/Adv level

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.





About This Class

Jumping into the field of IT Networking and starting a career?

Welcome to the IP Addressing and Subnetting For Beginners class. This is an in-depth course for anyone who is willing to learn how to configure network.

If you are keen to learn IP addressing and Subnetting in depth or you are interested in learning more core concepts of Information Technology Networking Essentials, then this is the right course for you!

I have designed this course for all individuals who are in the IT industry or someone who wants to start his/her career in this ever growing field.

In this in-depth course, you will learn:

  • Learn fundamentals of IP address and Subnet mask

  • Understand IP address classes and why we use them

  • Create Network ID and Host ID. Decimal to binary conversion technique

  • Gain solid understanding of Default Gateway

  • See MAC Address in action

  • How DHCP works, LAN, WAN, TCP/IP and all other important concepts

  • Learn the basic concept of cloud computing and network typologies

  • Work with variable length subnet masks

  • Be able to successfully create Subnetting according to the Host

  • Create and configure Subnet masks on various networks and much more...

Enroll now in IP Addressing and Subnetting For Beginners course today and revolutionize your learning. To re-enforce learning, you will do several assignments and quizzes. Stay at the cutting edge of learning new skills - and enjoy bigger, brighter opportunities.

See you in class!


Meet Your Teacher

Teacher Profile Image

Myra B

Passionate Online Instructor


Hello guys,

My name is Myra and I am an Online Entrepreneur and Instructor.

I enjoy learning and teaching at the same time. 

My passion is Enterprise Cloud Computing - AWS, Azure, and Linux RedHat OpenShift. I manage cloud infrastructure of ClayDesk and other clients primarily as an AWS Cloud Solutions Architect.

I also have gained valuable hands-on experience in working with enterprise clients globally. I enjoy DevOps, Agile Transformation and focus on People-Process-Technology.

AWS Cloud Migration is currently my focus with enterprise organizations exponentially adopting the cloud with the ultimate goal of becoming an AWS Certified DevOps Engineer.

As an IT professional I give my best to make the perfect courses and br... See full profile

Class Ratings

Expectations Met?
  • Exceeded!
  • Yes
  • Somewhat
  • Not really
Reviews Archive

In October 2018, we updated our review system to improve the way we collect feedback. Below are the reviews written before that update.

Your creative journey starts here.

  • Unlimited access to every class
  • Supportive online creative community
  • Learn offline with Skillshare’s app

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.


1. Introduction & Course Agenda: if you are looking to dive into the IT industry and learn networking in the primary and four more skill you need to acquire is Ivy Address configuration and submitting along with networked apologies, no doubt I be addressing in submitting are a fundamental part off the idea Networking field Thescore concepts make the foundation off. Nectarine essentials are must have skill that you cannot bypassed. So welcome, toe this course on, I'd be I racing and submitting from scratch. My name is Byron Albie, Instructor for this course my team. Cletus and I are super excited to bring you the scores. Toby ableto walk you through complete I p address ing on submitting configuration would step by step hands on approach. Let me walk you through the courts agenda In this in depth course, you will learn fundamentals of ivy address and submit masks. I understand I be address classes and why we use them. Quit network and host I d. Again solid understanding off before Gateway See how magadha works. How did CP works? Who will also learn the basic concepts off networked apologies. You will work with variable length summit masks and be able to successfully create sub nets , according Toa course. And according to a network, I have designed this course for anyone with skin to learn I p address ing and submitting anyone who wishes to gain solid understanding or what its i p I dressing and how we can do some knitting or anyone who isn't ICT industry and wants to enhance knowledge, skills and abilities. So why should you take the scores? Well, like I mentioned earlier, thescore contacts make the very foundation off ICTY networking industry no matter where you go, which that form you work with, whether it is aws azure, Google Cloud Read had open shaved oracle, IBM or any other being able to successfully configure I P addresses on some unmasks is a key, so you need to master these skills. I've also designed the scores to be hands on and interactive to make it easier to provide several quizzes, labs and assignments. I value your feet back so early review. If you find the course value will and I regularly object my courses. So ask as many questions as you like. So what are you waiting for? Enrolling this court off? I'd be addressing and submitting from scratch and I will see you guys in cuss 2. Important Terms: IP and Subnetting: Hey guys, and welcome to this lesson on the important terms off I p and submitting. So we're going to learn some fundamental terms off I p and submitting, which will be needed throughout the course, so we should have a good understanding off what they mean. So first, let's see what a bit and what a bite is. So a bit is the smallest unit off data in a computer. Ah bit has a single by Navy value and is represented by either a zero or a one. So, for example, in computer languages, whenever you see a zero or a one, you know that it is a big So what is a bite? A bite is a term used to represent eight bits of data. We just learned that Bit is the smallest unit of data on a computer, so a bite a bite represents eight bits of data. One bite can hold about one letter, one number or one special character, so let's move on to sub Net Mosque. So what is this? Submit mask. A subject mosque is a number that defines a range of ivy addresses available within a network. Ah, single submit mask limits the number of valid I PS for a specific network, each section off the subject mask and contain a number from zero to do 55 So the minimum value is 20 and the maximum value is 255 We do not go beyond 255 in writing. Submit mask. Next, let's see what an octopus. So 32 big I P address is group aid with at the time each group off eight bits, which is one bite isn't opted. So each of the four rockets are separated by a dark and represented in decimal format, which is known as don't decimal notation. So the Ivy address consists off four off its. Moreover, let's move one toe. What a host and a what a net per case. So ah, host ah host is a computer or other device that other devices can connect toe for. Access to resources, which can be like files are services, which can be like any website, e mails or any databases and various network. A network is a collection of computers, cabled routers, switches and other devices that are connected together to access and share resources. So ah, host is a single computer or device. However, network a network is a collection of computers or cables, rubber switches and even any other device. So in a network, computers share information and resources together. However, of course, only collects toe another horse, another device, another single device to access any kind of information or resources. So this was the end offer lesson on the important terms that are needed in idea and submitting. I hope you guys got a good understanding, and now, once you was in my next lesson. 3. What is IP?: Hey, guys. And welcome to this. Testing on what is I p. So we're going to learn in death about what is I be water I P addresses and their types. So let's look at the definition first I p stands for Internet Protocol. The Internet protocol is the method or protocol by which data is sent from one computer to another on the Internet. Each computer, which is known as the host on the Internet, has at least one I p address that uniquely identifies it from all other computers on the Internet. The Internet protocol is the basic unit of data transferred I P Software performs the routing function so each computer has its own unique I p address. So now let's see what is an I P address? An I P address is a unique global address for network interface, which is a 32 bit long. Identify it. It includes a network Heidi on ah host I. D. These are also known as network number or host number in an I P address. So the I P addresses about the location off literally billions off digital devices that are connected to the Internet to were pinpointed and differentiated from other devices. Most commonly, the study I p v. Four wishes I'd be version for so as we just learned that each Internet has the specific I p. So every device connected to the Internet has a specific, unique I p address. So now let's see what I P version for IBV for is so and I picked Version four. Address consists off. Four numbers, each of which contains 123 digits with a single dot separating each number are set off digits. Each of the four numbers can range from 0 to 255 This worse Italian group off segmented numbers create the addresses that lets you on everyone around the globe to send and retrieve data over our Internet connections. Without this new medical protocol, sending and receiving data over the World Wide Web would be impossible. So I be version for I. P addresses are needed to send any kind of information or receive any kind of information here. Now let's look at the parts often I p virus. This is the I P. August 172.16 dot to 54.1. So here, as you can see the decimal numbers are converted toe vanity, and you can see that they are it bits in one bite. We just learned that in one of the previous lessons, So there are eight bits you can count them and eight pits goes to one bite and one bite is equal to one. Opted so therefore opted, divided by dots. So all the four bites combined have 32 bits in total. So let's see, what is I p version six. Now we study I be version for, but we also need to have a good understanding off version six. So the I beaver in four that we learned about supports a maximum approximately 4.3 billion unique I p addresses all of these having already used now. So that is why a new version was introduced, which was called the I P. Version six. The I D version six supports in 30 a maximum number that will never run out. So let's look at the format often. Ivy Version six and I be version six. Address consists off eight groups off four Hexi decimal digits. If a group consists off four zeros, the notation can be shortened using a Colon to replace the deals. Here's an example of I fee Version six address. I know it is a little complicated when you look at it. That's why we only study I p Version four, which is only four rockets and easy to understand. Now we're going to move on to the tights off I p addresses there. Two types. Private I P Address and Public I. P. Agger's. So First, let's see what this private I p accurate. So these are used inside a network, for example, the whole network that is used by tablets, WiFi cameras, violence, protests and extra PC's. These type of ivy irises provide a way for devices to communicate with the router and the other devices on the private home network Private I P addresses can be set manually, are assigned automatically by the rocker and public I P address. On the other side are used on the outside off a network and assigned by an I S B, which is an Internet service provider. It is the men address that ah, home or business network uses to communicate with the rest of the network devices around the world. It provides a way for the devices and a home, for example, to teach and i SP and allowing the devices to access websites and communicate directly with other computers and servers around the world. So private I p is only used informed brokers to communicate between service in a local home . However, the public I p iris is connected to the I S P. And whenever you want to access any website or what to send or receive any data from an external side, you will have to send the information so the eyes be first and from the SP, your information is transferred to the external site. So this was the and offer lesson. Hope you guys got a good understanding off what we learned. And now I'll see you guys in my next lesson. 4. Classes of IP: Hey guys, and welcome to this lesson on classes off I P addresses. So there are five type of classes. Cost A, B, C, D and E. Each class has a range of valid I p addresses. The value of the first opted determines the plus I P addresses from the 1st 3 classes. A, B and C can be used for hosts addresses. The other two classes are used for other purposes. Last E for multi cars and classy for experimental purposes. So the system of I P address classes was developed for the purpose off Internet I P addresses assignment. The classes created were based on the network size, for example, for the small number of networks with a very large number off hosts. The Class A was created and the classy was skated for numerous networks with small number off hosts. So let's look at class a first. So the first bid off the first opted is always set to zero in class it so that the first opted ranges from 1 to 1 27 so the minimum number off class they can be one and the maximum number can be won 27. The class a address only includes I P addresses starting from one dot exe or got extort X 1 26 guard extort, extort X So this is the range that we need to remember about Class A so that whenever you see an I P address and want to identify which class it belongs to, and if there's any number from one or 1 26 in the first orchid, you're going to know that you have to write about class it. It is I p address off class it the Iberians 1 27 but extort Extort X is reserved for Luke. Back addresses the defaults of McMaster Forecast A. I P addresses 255.0 dot 0.0. So we just mentioned Lou Back address. A loop back address is a type of I P address that is used to test the communication or transportation medium on a local network. Are and slash or for testing network applications. Data packets sent on a new pack address are rerouted back to the originating nor without any alteration or modification. You can also check your loop back address from the CMD command in your windows, so I will also have a lab bliss off the basic net for commands and in which I will also show you guys how to check your route back address now as we want to Class B. So in the Class B type of I p actress, the 1st 2 bits in the 1st 2 optics are set to zero. Class B. I. P addresses ranged from 1 28.0 dot extort XTO 1 $91.255 dot extort x So this is the range for plus B 1 2081 29 So you need to remember this, too, to the deformed Metric mosque for Class B is 255255 dot exe dot exe. Now let's look at Class D. So the first octave of this class has its 1st 3 bits said 210. Class C. I. P addresses ranged from 1 92 god 0.0 dot xto to $23 to 55255 dot Exe. So the range of classy you need to remember is that 1 92 til to 23. The default submit masterclass see is 255255255 dot Exe So now we're going to move on to class T to the 1st 4 bits off. The first opted in class D. I. P address are set to 1110 Nasty has I p address change from 24 cardio 0.0 dot zero toe to 39 to 55255255 to the rain for class. Do you need to remember is to 24 till 2 39 Last year's actually deserved for multicasting and multicasting. Data is not intended for a horse, but multiple ones. That is why there is no need to extract horse addresses from the class T. I. P addresses the Class D does not have any submit mask. And lastly, we have class E the classy I P artisans are reserved for experimental purposes only, for example, for any kind of research and development or any study. The I P addresses the CLAS. It ranges from 2 40.0 dot 0.0 toe to 55255255 to 54 This class to is not equipped with any submit mask, so This was the end off her lesson on the different classes off I P addresses, and now I'm going to see you guys in my next lesson. 5. Classes of IP examples and identification: Hey, guys. And welcome to this lesson on the classes off I'd be examples and identification. So this is kind, often activity lesson in which first, I will give you guys some examples of I p addresses. And then after that, I will give you a small quiz in which you guys will have to identify the I p addresses and tell me which class they belong to. So here are some examples off gas A, B, C D e off I p addresses. So I've given two examples off each class here, as you can see. So let's look at class a first. We have 12.0 dot $30.0 and another example is 100 got $11.15 dollars. 20. So the rule is this is the rule that you have to remember when identifying the classes of I P addresses. Whatever you're given an I p address, you're only you're only going to look at the first opted off the I P address. Just remember to look at the first often. So here the first doctor off the first example off class A I P address is grilled and after looking at, well, you're going to see that in what range it belongs to. So 12 belongs with the names off, plus a I P address. So you're going to know that this is a class A I p address. So here I've given to all the examples across it B, C, D and E. Just take a look at them and that's why you need to know. And remember the range off the I P addresses classes so that whatever you see, an I p address, you will be easily able to identify which class it belongs to. So now here is an identification quiz I've given you guys is I've written all of these. I p addresses myself there. 123456789 10 10 I p addresses in total. So cause the video Take your time and remember the rule toe only Look at the first octave in identifying the classes of i p addresses to the stick The first i p address which is the $19 e or God. $30.01 Look at the first update which is 90 and then remember which range 90 belongs to. And when you remember that easily going to know that which class it belongs to. So these are the answers off these I p addresses classes. I've written all the answers in front of them. So you can see the 1st 1 belongs to a class A. The 2nd 1 belongs to be than a D A and the D D c A c. So I hope you guys cool. Also identify some of the i p addresses off which classes they belong to. It's very easy. All you need do is again look at the first opted Remember the range off each class and then you easily identify which class it belongs to. So this was the end off our small activity kind of lesson. Hope you guys got a good understanding and now you will be able to identify any classes off I p addresses. NLC was in my next lesson 6. Default Gateway: Hey, guys, and welcome to this lesson on the four Gateway. So let's look at the concept of the fall. Get there first. A default. Kate makes it possible for devices in one network to communicate with devices in another network. If a computer, for example, requests a Web page, the request goes to the default great way before exiting the local network To reach the Internet, think off the forget me as an intermediate device between the local network and the Internet. The default gateway transferred internal data through the Internet and back again. The D fornicator device passes traffic from the local submit to devices on the other sub minutes and don't know that in most homes and small offices, the default gateway is a router that directs traffic from the local network. Do the cable or DSL modem would send it to the Internet service provider? So now let's see how traffic moves through a default gateway. All declines on a network point to a default gateway that routes their traffic. The default get rid device passes this traffic from the local submit to other devices on other sub nets. The default gate reconnects a local network to the Internet, although internal gateways for communication within a local network are used in corporate networks. The default I get very in a whole network, for example, understand specific routes that must be taken to move Internet requests from a computer out of the network and on to the next piece off equipment that can understand what needs to be done from there. The same process happens until the data reaches its destination with each network that the traffic hits that networks default, Get me feel is the information through the Internet and back to the computer, which requested it. This process is understood based on the I P address that the originating device requests. Moreover, now let's move on to the types of default Katie's. So there are actually two types off before Kate, Miss. One of them is that in home or small business networks with the broadband rocker who shared the Internet connection, the home router serves as the default get, and another type is that in home or small business networks without the rocker, such as for residences with dial up Internet access. A router at the Internet service provider location serves as the default gateway. So there two types. One of them is that if you have a router in your home or small business network, the other one is that when you don't have a router, so when you don't have a broker, your eyes be your Internet service provider. They have a server in their location, which acts as your default Get next. We're going to see how you confined your default. Get the I. P address. You need to know the I B iris off the default gateway. If there's a network problem, or you need to make changes to their out in Microsoft Windows, the I P address off a computers to forget May can be accessed. Toe command prompt CMD for short with the I P Conflict Command as well as through the control panel. I would also show you guys how to check your default Gateway I P address in the lab lesson off my basic macro commands, the Nets said, and I p round commands are used on Mac OS and Lennox for finding the default gateway address. So this was the end off her lesson on default. Gateway. I hope you guys got a good understanding or what? Before you get me, is how it works and what are its two types. And now, as you guys in my next lesson 7. MAC Address: Hey, guys, and welcome to this lesson on Mac address. So we're going to talk in depth about Mac address and how we can find it, What's it about and what its use. So let's take a look at the concept first, on the meaning behind Mac progress. So Mac Address Max stands for media access. Conclude. Mac addresses are unique. 48 bits Hardware number off a computer, which is embedded in tow. A network card, which is also known as network interface card during the time off. Manufacturing Mac addresses, also known as physical address off a network device. So each computer, when it is made, has a network interface card. And each network interface card has a unique Mac address, so this is a physical address off a computer. Now let's take a look at the form it off. Mac address. Mac addresses a 12 digit hex, a decimal number six bite bite. Any number, which is mostly represented by colon Hexi decimal notation. The 1st 6 digits, for example. 00 calling 40 calling 96 off a Mac address identified the manufacturer called as all you I , which is organizational unique. Identify it. Here are some o u Y off well known manufacturers. So for Cisco, the OU wise CC calling 46 calling D six for Google Inc. The O u r s e c colon five a colon Before for Hewlett Packard, the OU R is three c calling d nine colon to be. And who are we? Technology School Limited. The or You Are is yours you're calling nine a call and CD. So the right most sisters to present Network Interface controller, which is assigned by a manufacturer to the 1st 6 trees, are off the OU. Why? Which is from the manufacturer? The company. They're the same. But the right six days. It's represent network interface controller, which are different, but they're assigned by the manufacturer toe. So here is a picture off a network interface card. As you can see, this is the network interface card, and it is blood into your computer inside your computer. So this is the Mac address honored so you can see a date. Five b 32 344 Is the Mac ideas off this interface network interface card? Moreover, let's see the types of Mac address. So there are three types you need gas address multi as others and broadcast address. So in June August address the frame is only sent out to the interface, leading to a specific and I see so in unique as you only send it to a specific unique. And I see for multi God's address you allow the source to send a frame toe group off devices so you can send frames to a group of devices, not a single device like unique cast and then broadcast address. You send the frame to all the devices in the local area network, which is the land. So you *** is for a single device. Multicast is for group or devices, and broadcast is for all the devices in your land. Now let's see how to find her. Mac aggress the command for UNIX slash Linux is I pick and fig dash a. Then you go toe. I'd be linked list and then I p address show the command for Windows sources High peak and fix slash on. So I'm also go to show you guys how to find your Mac address and windows always using the command prompt in my basic pepper. Come on, lab. Listen and for macro issue. Right? TCP slash I be control panel. So this was the end off her lesson on Mac address. I hope you guys got a good understanding off what Mac address is and what it is used for. So now we'll see you guys in my next lesson. 8. Network and Host ID: Hey, guys, and welcome to this lesson or network and host I D. So in this lesson, we're going to look at what is network and host idee and why we use them and how are they used in I P addresses. So let's look at the definitions first. We've also done these definitions in our first lesson, so we're going to see what is the host and what is a network. So a host is a computer or other device that other devices can connect to for access to resources, which can be any files are services, which can be like a website, email or any kind of database, whereas Network A network is a collection of computers, cabled routers, switches and other devices that are connected together to access and share resources. So a host, for example, is like single device and network is a group of devices. Now let's take a look at the basic concepts off what a network I D is and what a host idea is to the network idee. It tells us which network the devices barker, while the whole study it identifies that unique device within the network. So think of the network I D as the suburb you live in and the north, which is also called the Host I d. As your street in that suburb. You can exactly tell where someone is if you have their suburb and street name in the same way, the network I d tells us toe which network a particular computer belongs to. And the host idea identifies that computer from all the rest that reside in the same network. So let's take a look at this picture to understand our concepts so you can see a small and network. We have assigned a class C I p range for this neck word. Remember that classy I P addresses are for small networks. So looking now what Host A. You will see that its I P address is 1 92.1 68 0.0 dot go toe the network idee portion off this I p address is in blue color which is 1 92.1 68 dot zeal and the host idea off this I p address is do so Now I suppose that the next question you were asking is how do I figure out which portion of the I P address is the network guiding and which is the host? Heidi. So that's what we're going to look at in the next side. So for each I p ideas class, we have a specific network and host I. D. So the network class helps us determine how the four bite or 32 bit I p address is divided between network and host portions. So, hey, as you conceive, you have cast a B, C D and eat the blue colored our Internet proprieties and the yellow colored RT host ID's so you can see. And you also have to remember this that for class it, the first opted is the network I D. And the rest three are the whole study for class be. The 1st 2 octaves are for Network I D. And the last to our kids are for host I. D Paris for Cassie. The 1st 3 aren't for net providing, and the last single one is for Host I. And there are no host idea for Class D and E because we use them for multicasting and for experimental purposes. Also noticed that they are only few class in networks, but many host ideas, whereas classy has a lot more networks and fewer host I ds. So this was the lesson on network and host. I d Hope you guys got a good understanding of what they mean and how they are implemented in an I p address and how we can identify networking host I d in the classes off I p addresses. And now I'm going to see you guys in my next lesson. 9. Examples of Network and Host ID: here, guys, and welcome to distress in on network and host idea examples. So we're going to look at some examples off network and host ideas with classes of I P addresses so we can have a solid understanding on how we can use them. So let's take a look at the class example. So any class here network has a total of seven bits for the net propriety, but it is always settles you and 24 bits for the host I d. So, as you can see in this picture, we have an I p. Address off, plus a so you can see that the blue one is for necro gaiety, and the yellow one is for host I d. Only seven bits are from Network I D. And 24 bids are for host I. D. So what now we do is that we need to find out that from thes bids, how maney networks are, how maney horse we can have. So it's really easy. So all you have to do is take the number of bits to let's do for the network I d. First so we can see we have seven available bits for network i D. And what we do is we just take the number and make it to the power off to. So to race through the power of seven is equals to 1 28 metrics. So we have won 28 net bricks with Class A I p address Network I D. And just with the horse. We have 24 available host bits. So what we do is to raise to the power of 24 we get 16777216 horse. So the more the bits use, the greater the number. This is why Class A networks can have so many hosts and therefore are large networks. So now let's take a look at Class B. So plus, B networks have 14 bits for the network. I D. It's 15. 16 are set and can't be changed, and 16 bits for the host i d. That means you can have upto through the power of 14 which is equals to 16,384 networks and through the power of 16 which equals to 65,536 holes in each network. For the more Let's take a Class C. Example. So plus, C networks have 21 bits for the network idea. As you can see, there are 21 bits with colored blue and bits 22 23. 24 are set and can't be changed and eight bits for the host i d. That means you can have upto due to the power of 21 which is equals to tow the or 97152 networks and to the power off it, which he goes to 56 holtz in each networks so easily. All you have to do is just take the number of bits and raise it to the power of to, and you'll get how many networks and how many holes you can get. All. So this is why classy networks have a large number of networks. But with only 2 56 hosts, Burnett for So this was a lesson on the examples off network and host idee how you can see and calculate how many networks and horse you can get from the bids often I p address and now well to you guys in my next lesson 10. Subnet mask: Hey, guys, And welcome to this lesson on sub net mask. So let's see what a concept off submit mask. It's a subject mask is a 32 bit number that makes an I P address and divides the I P address into network ADDers and host address. So a submit mosque is made by setting network. It's toe all ones and setting all horse bits to all zeros. So within a given network to host addresses are reserved for a special purpose and cannot be assigned to horse. The zero address is assigned a network address, and 255 is assigned to a broadcast adverse, and they could not be assigned to host. So the two special reserved hosts addresses are the 1st 1 reaches zero on the last one, which is 255 So here how submit musk are divided in tow. I p classes. First, let's take a look at Class A sub net mask, so we already know that for Class A, the first parties for network and the last three are for the host in class, be the first tour for network and the flash to our for host and for glassy the 1st 3 or four network, and the last one is for hosts. So all unique, remember about Submit Mosque is that whenever you see a net for gaiety, you're going to write to 5 500 And whenever you're going to see a host, I d. You're going to write zero laundry so it can be clearly seen over here. Under the network ID's, we have 255 And on the host idea, we have sealed its really easy. The Summit Mosque is really easy to understand. All they ever do is do 55 for Network and zero for horse. That's it. So this was the end off our quick lesson on submit masks and how they are divided into the I P addresses classes. Hope you guys got a good understanding or what they mean. And now we'll see you guys in my next lesson. 11. Decimal to Binary : here, guys, and welcome to this lesson. So we're going to see how you can convert a decimal number. Go a binary number from guru, demonstrate you step by step in depth so us can have a solid understanding, how to convert, and in decimal number, toe abiding diversion off it. So let's look at the first main thing that you need to remember when you converting any decimal number two Abyei number. So the first and probably the most important step is to put down this row off values. As you can see there eight numbers and you have to remember these eight numbers. So, in order to remember these values, start with number one girl from right to left and double. That number is seven times, for example, start with the one on the right side. So for your next number doubled the one so one into two is equal. Soto. So too, is your next number remembering Togo from right to left for 1/3 number, double the two so to in times two is equal to four. To continue the sequence, double the 44 times to his eagles to eight. Repeat this process until you double your original numbers seven times. So let's take a look at the concept now. So the key to remember this conversion is that every single one of the values we put in that room are going toe Have either number one or number zero assigned toward to convert the I. P address. We will take that string off numbers and start from left to right this time. So while writing the number ro values, you're going to start from right to left. But during the conversion, they're going start from left to right for each value, we can ask this question. Can I subtract this value from the decimal grooming? If the answer is no, then you put a zero under the binary value and that the answer is yes. Then you put one there. So now we're going to do ah, step by step example. So we will take the I P address 1 54.31 dot $16. 13 and start with the first part, which is 1 54 So we will dig each doctored and separately convert it's decimal number toe abaya in any form. So the first step is that you ask a question. Can I subtract 1 28 from 1 54? So the rule of doing is that you'll just take your number, which is 1 54 And keep on asking questions like this that can you subtract that number from the rule of the values one by one? So first we ask that can subtract one granted for 1 54 So the answer is yes. So we assigned one, 2120 it as you can see the Everton one under one going to eat for step two. We will see and asked that. Can I subtract 64 from 26? The answer is no. So we assigned 0 to 64. The third step would be that we will ask the question again. Can extract 32 from 26. The answer would be no. So we assign a 0 to 32 for question, for we will say cannot suppress 16 from 26. The answer is yes. So we assigned 1 to 16 that will give us a remainder off. 10 as 26 minus 16 is equal suit. 10. So next you should ask, Can I tried it from 10 the answer is yes. So we assign going toe it further for step six. People have a remainder off to a stand minus eight. Easy go to do so you go to ask the question Can I subtract four from toe? Answer is no. So we assigned zero before. Just remember this, too, that you will always take the remainder off the values. So Step seven is you'll ask the question. Can extract grew from two? Answer is yes. So we assign 10 and we will have a remainder of zero left. So the rest of the values in a row we can assign zero. So now we known the decimal number 1 54 is 10011010 Converted to buy new uniforms and group double Jack. We did the value assigned with one and add them together. So 1 28 plus 16 plus eight plus two is equal to 1 54 So in your I P address, the next number off the second octave is 31. So let's do all those steps for 31 now. So you're going to first ask, Can I subtract one Guaranteed from 31. The answer is no. So you will light Zito Steptoe, Can I subtract 64 from 31? The answer is no. So you're right. Zero Step three. Can I subscribe? 32 from 31? The answer is no. So you will write zero staff for Can I subtract 16 from 31? The answer is yes. So you're going to write one? So now you last Kenneth, attract air for 15 Remember, it's the remainder. So the answer is yes and you're going to write a one under eight. Further in step six, you will ask and subtract four from seven The answer is yes. So you're going to write one Step seven cannot subtract two from three. The answer is yes. So you'll write one and step it, which is a last step you can ask can extract one from one The answer is yes. So you liked one under one. So the decimal number 31 is 00011111 Converted to his vanity form. Andrew Double J 16 plus eight plus four plus two plus one is equal to 31. So are trying. Doctor number is 16 but this time we will form the conversion in one step now so you can see what we've done is the number is 16. We started from 1 28 Remember? Left or right? Who can you subtract? 1 28 from 16? No. Can you subtract 54 from 16? No. Can you subtract 32 from 16? No. Can you subtract 15 from 16? The answer is yes. So you will write a one under 16 on. We have Nora mentor left, so the rest values will be zero. So the decimal number of 16 is 00010000 Converted what? To buy any reform. And the last arcade number is 13. So you go to do the same steps again. Start from left, right, and you'll see that we only get ones under it for anyone. The decimal number 13 is 00001101 in Spanish reform and the double deck You'll again, though a plus four plus one which is equal to Turkey. So now finally, the I P address 1 34.31 dot 16 Got 13. Has its finally form it living off 10011010.11111 dot 00010000 Dordt 00001101 So, guys, this was the end of her lesson on the conversion of decimal toe fine iti. And if you want to do the conversion of binary regressive, all users do the vice worse off this. So I hope you guys got a good understanding off how we can do the conversion. Hope you guys could easily understand my example and were able to understand how you can actually convert a decimal number two. It's finally version and now we'll see you guys in my next lesson. 12. Binary to Decimal : here, guys, and welcome to the session on convergent from a bunny number two, a decimal number. So the fundamental learning off this concept is that the first and probably most important step is to put down this rule of values, which is 1248 16 32 64 1 28 So, in order to remember these values, start with number one go from right to left and double that number seven times. So one times two is 22 times two is 44 times two is 88 times to its 16. 15 times two is 32 32 times two is 64 on 64 times two is one guarantee it. So this is an easy way to remember it. And the key to remember is to place the number rule values under the Byerly numbers from right to left. So let's take a look at an example. We will take the body number for example. 1001101 point. So I have written in bold over here and under that we have written the number rule values, as you can see from right to left so. 1248 16 32 64 1 country. It is exactly under divine ity number. So the second step is that you put a line below the number of values and only put the number or values under the body number which has one. So wherever there is one, you will only tried it again at the bottom. So as you can see, under the zero values, there is nothing but under the one values I have written the same value of that from the number of value. And the next step you do is you add those number one value. So as you can see, I've just added ah plus mark after 1 28 16 and after it to one. So you goto add them. So once we add there, you will get your answer. 1 50 fights. So 1 55 is the decimal version off this binary conversion. So this conversion is really easy to understand. All you need to do is write the number of values under your vanity number only. Write the numbers under one, add them and you'll get the total value. And that will be your decimal number off that vanity number. And now with you guys in my next lesson 13. What is Broadcast ID?: Hey, guys. And welcome to lesson on what is broadcast I d. So let's take a look at the concept first. So, for example, your government off a small area on you want to send the same message toe everyone living inside that area. So what you're going to do is use a broadcast system and send that message toe everyone to with that broadcast address. Same thing goes with network. So what you do is that a simple message is sent toe all the clients on a local area network village through a broadcast actress. So a broadcast address is an address used to indicate that information being sent out should we deliver toe every client on the local area network. These addresses are always the highest number possible in a network address or subject. So how do you find a broadcast? Heidi? The Barca's address Foreign I P Version four host can be obtained by taking the compliment off the submit mask and then performing an operation with the host I P address. Did the host I'd be address and said the one any bit positions which hold a zero in the submit mask. So now let's see example or broadcast idea with I p classes. So what you're going to do is replace each horse portion with the highest number you can create with eight bits, which is 255 So let's take a net for class example, and the network address off that class A would be 1 92.0 dot 0.0, and all you have to do is to convert it into a broadcast address is exchanged. Zeros 2 to 55 So 1 $92 to 55255255 with the broadcast at the same, a glass being at work So the network address would be 1 92 got 1 68.0 dot zero and the broadcast address will be 1 92.1 68 or 255 to 75 So are you going to do is convert zeros 2 to 55 And for Class C, the network address will be 1 92 About 1 68 got 16.0, and the broadcast ideally, would just be you convert 0 to 55 so it would be 1 92.1 68.16 got to five. This was a good lesson on broadcast Heidi, which is also called Broadcast Address, so hope you'll has called a good understanding of what it means, how we can easily get the broadcast address after Net providers and now lets you guys in my next lesson. 14. What is subnetting?: Hey guys, and welcome to this lesson on what is submitting. So we're going tohave an overview, or what submitting is and in my further since we will study it in detail. So let's take a look at the concept first. So sub netting is the strategy used to partition a single physical network into more than one smaller, logical sub net Briggs, which are also called submits. So the sub nets are designed by accepting bids from the I P addresses horse part and using these bits toe assign several smaller sub networks inside the original network submits were initially designed for solving the shortage of I P addresses over the Internet. So a brief summary submitting is that you take an I P address and divided into further sub networks or further sub nets, so that could be easier for you to get more I P addresses. So here are some benefits off. Submitting. Submitting reduces the network traffic by reducing the volume of broadcasts. It also helps to surpass the constraints in a local area network. Lan, for example, the maximum number off permitted hosts as it allows us to get more hosts and submitting, also enables users to access the work net break from their homes. So there is no need to open the complete network. Here I have a picture of explaining submitting. So, as you can see before submitting, we haven't I P address that is divided into its net provide into fire and its host identifier to the blue part of network and host is yellow, but offer submitting. You concede that the net for high under fire remains seem. But the holes I unifier is divided into two further part. One of part is remaining. The host died in the fire and the middle part gets to be the subject. I didn't of fire. So in my next lessons within to study in detail how weaken submit by using the hosts part and weaken Submit using the network parts. So this was the end of this lesson on submitting and else you guys, in my next lesson 15. What is CIDR?: here, guys. And welcome to this lesson on what is C i D e r. So let's take a look at the concept first, So C I d r stands for classless inter Dominion. Rowdy. So the C I d. E. R. Was invented to keep the internet from running out of I P addresses the class full address scheme, which is Class A, B and C off. Allocating I P addresses in eight bit increments can be very wasteful with class Full address ing scheme. Ah, minimal number of I P addresses allocated to an organization is to 56. For Class C Class B allocates only 65,536 i p addresses and class in network, which is a little big, which allocates 16.7 million i p addresses. But these have also run out. So this type of I p address allocation is very wasteful. So what is the use off? See idea with C i. D e. R. A network off I P addresses is allocated in one bit increments as opposed to eight bits and class full network. So the use off the c i d are notated address can easily. A present glassful addresses Plus is represented by slash it. Crosby is represented by slash 16 and classy is represented by slash 24. These are their bits numbers the number next to the slash that is, for example, eight slash eight represents the number of bits signed to the network address. So for Glass, if we have eight bits for network class BV of 16 bits for Net Bergen for classy, we have 24 bits for network. So let's take a look at an example off. See Idea. So see idea in rotation. Off a network address is 1 92 guards. It'll got toe darcy o slash 18 18. What represents is that it seems that the 1st 18 bits are the network part off the I P address. So the number offer the slash always gives us the number of bits in the network part of the I P address for the more Why use? See idea within a reduction off C i d are address ing scheme. I P addresses are more efficiently allocated and hence there is less risk off I P addresses running out any time soon. The I p version four additives with C idea address ING scheme will eventually run out to solve shortage of I B Version four addresses the I P version six, which is the 1 28 bit others that we have studied Address scheme was introduced in 1993 So this was the end of her lesson on C idea. Hope you guys got a good understanding of what it means and what are its benefits and how we can prevent the based off I p addresses and now let us in my next lesson. 16. Subnetting according to Host: here, guys. And welcome to this lesson on submitting according to host. So we're going to go step by step in depth and do submitting according to the host. So we're actually going to study with an example? I've made this example myself. So what we're going to do is take an I P address. Firstly, So we have this I p address of Class C, which is 1 97 dot n dot n So this is our I p address and we will take this and do our further submitting. So now, as you can see, we have to rockers Rocker one and Router. So with this example, you can also see we have four other departments connected toward one is the 10 30 2040 more . As you can see, we have numbers 12345 label. So these represent how many's submitting. We will have to do so we will have a new seven waiting for number one, which is for 10 computers. Number two wishes for 30 computers. Number three, which is for 20 computers, and number four, which is worth 40 computers, and number five is a submit. We will need between router one and rockets. So remember that is always a sub net needed for the Doubters, too. So let's start with Step one. So Step one would be to just write your i p address and identify which is the network part and which is the host part off it. This is a classy I p address. So network part would be 1 $97.10 dollars, 10 and God deal would be the host part. So as we're starting, submitting, using the host part step would be to write the network part as it is. But the horse part, you convert it to bind the We've done the conversion off decimal to buy 80 in our lessons, so you will not have any problem converting it in a bind. A diversion. So as you can see, I've just converted it and wrote 80 which is eight bits and one bite. So step three in step three. You need to remember this formula. The formula is to restore the power off n minus toe is greater than or equal to. So this is the formula you need to remember and next. What we do is we put the number, which is the maximum number off sub nets we need so 40 in our previous example, as you just saw, 40 is the maximum number. So in front of the former, you're going to write that maximum value, which is our 40 and end and would be 1234567 X sector. So it goes on. So what we actually do is we take this formula, right, the maximum value in front off it, and we keep putting values off end off 1234 and so on until they get a number that is greater than an equal toe 40 or our maximum value. So as you can see if I've done it to wish you, the power of four minus two is not equals for 40 or greater than who wish to. The driver of five minus two was also not nourish. The power of six minus two is greater than and equal to 40 as 54 minus two is equal to 62 to 62 is equal to or greater than 40. So we will take a number off, and from this and easy goes to six so in step for what you're actually going to do is again right. Your I p address with the whole spark loaded into the binding diversion. And you won't go this time. Start from the right side. As you can see, the airwave label, it's from the right side. You're going to count six bits or the number off and you cock. So we got anything goes to six. So you're going to count. 123456 And until you get six bits, just market the rest off the bits that you will be left with you will give them to the network. So, as you can see if I've labeled them so we have counted six bits. These are for the host and the rest remaining two are really gave it to the network. So how will you give it to the network? Or do we do is just convert those numbers into one. So you're just going to write 11 in place off those two zeros as well or network represents one and host represents zero. So 1 97.10 dot and 0.11 and then we will write six zeros And then what you further do is remember the values we did in the conversion off decimal to vanity. You will write those under your it bits off the host park. So you've seen I've written them. So we have 1248 16 32 64 1 28 You also need to remember this. And I've also showed you guys quote technique, how you can do that and remember it in one of my lessons. So you're going to write those number valued rose under that vanity converted version and you're only going toe. Add the two values that come under your network, one parts. So, as you can see, we have 1 2018 64 coming under our two once, so you will add them. And after adding them, you will just write that value. So 1 97 not 10 dot and got 1 92 as 1 28 position for because 1 92 that will be our further decimal value. So once you're done with step for, we're going to move on to our Step five, which is that you will make the submit mask off the submit. We just made presidency by the fourth submit Mask offer Classy is 255255 year 2550 We've already learned this, but the submit mosque after would be 255.255255 Got 1 92 to write the network parts as 255 and in place off the horse zero We just write the 1 92 The number we just calculated above this number in this decimal value were righted in our submit mosque. So Step six is the main part and we start making the sub nets. So as you can see, the submit one I've ridden is 1 97 dot dot then don't deal slash 26. So why did you write slash 26 occuring as you know that in our see ideally lesson, we learned that classy has a C idea off slash 24 which is standard for Kasey. But why didn't I slash 26 over here? Then what actually did Waas? I took the 24 which is the basic one per class C and I added last Ludwick, why did I had to do it? So we're going to go back or step for. And as you can see that that we give to offer bitch to the network park. And as you remember, C. I. D. R is always the total offer, Network admits. So we added two more necr if it's so that those two never bits were added in are going before, which gave us 26. So also remember this that whenever you see I p address with slash any other number than 8 16 and 24 you're going to know it is subject often I p address. So the first submit will always be 1 97 dot n dot n dot deal slash 26 dinner cubits will be added to the i p address class normalcy. I'd er, until next you can see that submit Do is 1 97 dot then got then got 64. So again, you're now going to ask me that. How did the 64 game So this the little tricky But you will need toe learn this by practice and you will get it easily once you do more questions and more examples. So we're going to go back to our step for and you can see that there's a 64 written somewhere on this step. So as you can see, 64 is under the 1st 1 bit from the right side, it is under stack. So the rule that you need to remember is that you going to always start from the right side and the first bit you changed the first bit from the right side. As you can see, the first, but who changed from the right side, is this one which had a 64 under it. So this one, you will take the value under it, which is 64 as you can see. So we're going to go back to our Step six and after that, in our second submit, we will add 64 meaning that number two R zero presidency. I wrote the same thing, except I just added 64 to the last zero. So let's going to new the Step six by making more submits and let's see how many subjects we can make. So the referred that issue. Just keep on adding 64 or that number. We decide by the rule and we keep on adding it until village a maximum number. And what is that maximum number? Let's look at that too. So our third sub net would be 1 97 Got 10 got 10 bought 1 28 at 64 plus 64 is 1 28 Our submit four would be 1 97 dot dot 97.0.1 92 slash 26. So 1 92 Why? Because we added 64 to 1 28 So this was our fourth submit. And now we're going to add 64 to 2192. But what do we get? We get 1 $97.10 dollars, $10 to 56. But remember, our maximum value in a decimal number often opt. It can be to 55256 is greater than 255 So there will be no submit five off this one. So this was the end of my lesson on submitting with the host part. Hope you guys got a good understanding. And again, if you have any questions to time in the comments, and I will try to answer them all and also do Jakti steps again and against you guys know clearly how and what we do to make some nets. And now also in my next lesson 17. Subnetting according to Network: Hey guys! And welcome to the session on submitting according to Network. So in the previous session we did see everything according to the host. And this doesn't really want to do how we can make subjects according to the network. So we're also going to study with an example. This time the I p address people to take this time is upper class B I. P anchors. Diapered address would be 1 57.100 then 0.88 dot c. The steps are almost same as some burning according to the host one. So if you really know and understand how you can make submits, according to the host, were easily able to do the submitting according to network. Because the steps are almost the same, there's only one single difference that we will see. So step one, you just going to write the I P address and identify which part is the network part and which part is the host part for? Step through, we would write the next Rick Park. Same toe 1 57.110 You'll write steam, but for the host part, you just right go by nadie version What does 16 bits off? Zero first Step three If you remember the former, we use a form like to work through the power and minus two is greater than or equal, and you use the maximum value you need in front off it. So thirties or maximum value, for example, So you're going to use and as 12345678 so on. And unless you get a number that is greater than or equal to 30 so too, is the par four. Minus two is not equal to or greater than 30 but tourists in the power five minus two is equal to or greater than 30. So 34 minus two is, which is usually 32 is greater than 30 so end value would be five. So now comes the main difference between submitting according to horse and between submitting according to network. So in step for you're going to write the same thing as it is. But this time you're going to go from left to right. So you're going to count zeros from left to right and mark five bits because our end value is five. You're going to mark the five pits. So as you can see, I've marked them five. It's a post, and these we will give to the network in the senate in guarding the host one. Just remember that you go from right to left in submitting according network, You go from left to right. So again, you're doing great. The same I p address. But instead of the zeros you march, you're going to write ones. Next, you will just write your default submit mask, which is 255255.0 Godzilla, which is a class B standard. Submit mosque and then you would write a submit mosque after. So that would be 255255 the net requirement same. And next you will just quite to $48 0 And how did we get to 48? Why did we die to 48 over here? So as you remember the submitting According to the host one, we wrote the values over there on top of them. As you can see, 1248 16 32 64 1 20 I'm goingto add the values that come above the ones so you can see when we add 8 16 32 64 1 28 We get to 48 next is our step five. So in step five, our first submit would be 1 57 110 dot c o got slash 21. So why didn't even I 21 over here, even though a class B I B hydrates has a C idea off slash 16 we added 21 this time because we added all the network bits. And when you count the net perverts you see 16 last five which is 21. So next you're just going to make further sub nets. But what will you at this time? So again you would go up your step for and you're going to go from right to left. This is the same river separating according to host The first number. You change the first bit. You changed the number value above it. You will choose that so we can see we have it. So it will go back to stuff five and see that we will keep on adding it to our last office . You can see summer two has eight. The subject country as 16. Then someone four has 32. We'll keep on adding eight. Submit. Five has 47 of six, has 48 then we keep on adding its last opted until religion number, which is a maximum number. So our last summer it would be 1 57 110 dot dot to 48 and total. When you write all of them and you count them, you will see you will get 32 sub nets hair. A small question. So the question is how Maney number of hosts for Submit so to find that order going to do is a writer formal averages to restore the power and minus two. Just doing to write that. And in the end value, you're going to put the number off host bits. So our host bits, as you can see, let's go up and you can see that our host bits left are 123456789 10 11. So you go to write that as n, and you will get your answer to how many hosts for submit you can get. So this was the end of her lesson on submitting, according to network. Hope you guys got a good understanding and know how you can make submits from an I P address. And now? Well, she was in my next class. 18. VLSM: Hey, guys. And welcome to this lesson on re l S m. So what is we? Ls em real? Sm stands for valuable length. Submit mask in realist them. The subject design uses more than one mosque in the same network. It is used to increase the usability off sub nets as they can be a valuable size. It is also defined as process off submitting off a summit. So we learned that submitting is when we divide in I p errors. But when we further submit off sub net me meaning when we further divide a sub net, it is VLS and readable and submit mosque. So what are the benefits off real sm Real Sm provides the flexibility that reduces the number of vested I P addresses in each submit by basting fewer addresses, more space. That means to allocate more sub nets. Realism can also be helpful for both public and private I p addresses, but the benefits are more dramatic with the public networks. So let's take a look at the implementation off realism with an example. So suppose there's an administrator that is four departments to manage. These are sales and purchase department with 1 20 computers development Department with 50 computers, Accounts Department with 26 computers and management department with five computers. So if the administrator has I p address, 1 92 got 1 68.1 God zero slash 24. Remember and see idea. I would learn that that's the idea is the number offers last, which is 24 so we can see that is clearly a Class C I. P. Address. So the department wise eyepiece can be allocated by following these steps in the next light . So for each segments, let the block size that is greater than are equal to the actual requirement, which is some off hosts addresses, broadcast addresses and network addresses. So you make a list off possible sub nets. So as you can see, we have the slash notations and host subjects. So the notations are Sachin 45617 30 to 9 30 So these are the different notations. See a deer slash and there the whole subjects, which are 2 54 1 46 62 30 14 6 and two. So next what you're going to do is arrange all the segments in descending order based on the block size that is from highest to lowest requirement. So sales and projections the biggest one, but is 1 20 than development, which is 50. That accounts, which is 26 then management, which is five. So the highest I'd be available must be allocated to the highest requirement. So the sales and purchase department, which is the highest one, gets gets 1 92 We got 1 68.1 dot gov slash 25 which is 1 26 village addresses that can easily be available. Her 1 20 hosts So some did. Mask uses 255.2552551 28. So it's really easy, as you can understand, and you allocate the I P address because the most valid addresses to the highest number off requirement. So the next segment requires an ivy to handle 50 hosts. The I B submit with network number 1 92 got 1 68.1 got 1 28 slash 26 is the next highest, which can be assigned to 60 to host, thus fulfilling the requirement for development department. The subject mask uses 255255255.1 92. Similarly, the next i p submit 1 92.1 68 got one, but 1 92 slash 27 can fulfill the requirements Off Accounts departments as it has 30 valid hosts i P, which can be assigned with 26 1 porters easily. The mask uses 255.255255 dot 2 24 and the last segment requires five valid hosts I P, which can be fulfilled by the submit 1 92.1 68.1 Got to 24 slash 29 which has the mosque. As to 55255255 to 48. It's chosen as for the requirement, so the i B with the mask to 55255255 to 40 could be chosen. But it has 14 valid hosts I P's, and the requirement is less in comparison. So the one that is compatible with the requirement is chosen. So this was the end of her lesson on VLS him. Hope you has got a good understanding off what it means how we implement realism and how we can use your SM to submit for their submits. So this was the end of her lesson else. You was in my next one. 19. What is a Server?: Hey, guys, and welcome to this lesson on server. So we're going to look at what is a server and how it is used and what its function and types. So what is a server? A server is a computer or system that provides resources, data services or programs to other computers. No nous Klein's over a network it accepts and responds to requests made by the client. Servers are commonly used to deliver services that are constantly required. More servers are never turned off, so servers are like the main unit. From there, all the information is send on received and and it accepts and responds any requests made by the client. So in a network, all the computers which known as clients, are connected, toe the server. So how a server works to function as a server are device must be configured to listen to requests from clients on a network connection. When a client requires data or functionality from a server, it sends requests over the network. The server receives the sequester and response with appropriate information, so a server often performed newest additional tasks as part of a single request and response, including verifying the identity off the requester, ensuring that the client has permission to access the data or resources requested and properly formatting or returning the required response in an expected way. So here are some common types of servers. Their file servers, print servers, application servers, Web servers, DNS, servers, mail servers, database server squared zero servers and many more. But these are the few common types. So this was the end of her lesson on servers. Hope you guys caught a good basic understanding of servers, how they are used as the main unit from which all the activity takes place in a network, and now we'll see you guys in my next lesson. 20. What is a DHCP?: here, guys, and welcome to the session on the HCP. So what is D h c p d h c p stands for dynamic host configuration? Porter Got It is a network protocol. Use R I. P Networks with a D H C P server automatically signs an I P address and other information toe each host on the network so they can communicate efficiently with other endpoints did. CP also assigns the Summit Masked Ball, Gateway Address, Domain Name Service, which is Deanna's address and other pertinent configuration parameters. So did CP is actually a configuration protocol that automatically assigns the I P addresses and different kinds of information needed So you don't have a separately assign and select all these things. The recipe does it all for you automatically. So what is the use of D etc? P did. CP is needed to simplify the management off I P addresses on networks, nor to hosts can have the same I P address, and configuring them manually will likely lead to errors even on small networks. Manually. Assigning I P addresses can be confusing. Automating this process makes life easier for users and the network administrator. So if you try to assign I P addresses manually or make submits manually. It's really time taking, and it can also lead to errors because there's so much decimal work. So did sippy. Does it all for you automatically? Here are some benefits off the etc. Be so one of them is that there's acquitted. I'd be configuration. Your I P could always be accurate. Without any errors, there would be reduced i p address conflicts. There will be automation of i p Address administration. Yet City were also administrator Go I p addresses automatically and lasted this efficient change management as there's no time taken, did CP quickly just automatically assigns you all the information you need. So this was the end of her lesson on d eight c p o. P. Was got a good understanding or what did. C P means how it is used and why it is used. It is used to automatically assign I P addresses and any kind of information so people don't have to do it manually, and it will take less time, so it is more efficient. And this was the end of her lesson