background preloader

IP subnetting made easy

IP subnetting made easy
George Ou explains IP subnetting using his own graphical approach. It's a great primer for students and a nice refresher for others. IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. Over the years, I've watched students needlessly struggle through school and in practice when dealing with subnetting because it was never explained to them in an easy-to-understand way. I've helped countless individuals learn what subnetting is all about using my own graphical approach and calculator shortcuts, and I've put all that experience into this article. IP addresses and subnets Although IP stands for Internet Protocol, it's a communications protocol used from the smallest private network to the massive global Internet. ...increment 252 hosts... ...increment 4+ billion hosts... The word subnet is short for sub network--a smaller network within a larger one. The graphical subnet ruler

Related:  Network+Random NetworkingwarushCisco

High Performance Cloud Computing Networks - [Infographic] Explosive Internet growth, beginning in the mid-late 1990’s, has had a dramatic affect on the evolution of computer networking. Some new network technologies and initiatives boomed, but faded rapidly into oblivion. Others, notably Ethernet, invented by Bob Metcalfe at Xerox PARC, became the standard and a commodity. While new technologies emerged in the 2000’s to solve many of the performance and latency problems associated with Ethernet, notably Mellanox’s InfiniBand which is rapidly becoming the preferred networking interconnect technology in the Cloud Computing space. InfiniBand offers speeds of 80Gbps between cloud servers and between cloud servers and cloud storage. This extreme performance is driving big data implementations and cloud deployments that rival the performance of High Performance Computing environments.

Top 5 IT Certifications of 2014 - Infographic To embed this infographic on your site or within a blog post (Copy and paste this code): <a href=" target="_blank"><img src=" border="0" alt="Top 5 IT Certifications of 2014 - Infographic" /></a><p style="text-align:center;"><a href=" to you by Western Governors University</a></p> Did you find this helpful? Check out Top IT Certifications of 2014 Western Governors University is a nonprofit, accredited, online university.

Cheat Sheets Download All (.zip) Wall Posters (36" x 24") Interior Gateway Protocols v1.0 (1 page) Packet Tracer Cisco Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts. Packet Tracer supplements physical equipment in the classroom by allowing students to create a network with an almost unlimited number of devices, encouraging practice, discovery, and troubleshooting. The simulation-based learning environment helps students develop 21st century skills such as decision making, creative and critical thinking, and problem solving.

CompTIA Network+ Certification for Network Administrators The information technology is ruling the real world quite broadly; these days’ people are using computers, smartphones and other digital devices to perform their professional and personal tasks. One of the most important and effective aspect of IT is computer networking. Today, internet is the most widely used element of IT, countless people use internet to perform several personal and organizational operations and internet itself is a network of networks. But as compare to that organizational computer network is much more simple but effective, these days most enterprises have established their own computer network which allow their employees to share information and communicate with each other securely. Different enterprises have different network requirements for instance if a company have 200 employees so they have to design network keeping physical infrastructure and number of employees in mind.

Routing versus routed protocols and the CCNA Many networking professionals don't really know what a routing protocol is or does. There are those who also couldn't tell you the difference between a routing protocol and a routed protocol. If you are working as a network engineer or preparing to take the CCNA, you need to understand the distinction between routing and routed protocols, as well as how these protocols function on the network. Routing protocols

What Is a Packet Sniffer? (with pictures) A packet sniffer is a device or program that allows the user to eavesdrop on traffic traveling between networked computers. The program will capture data that is addressed to other machines, saving it for later analysis. All information that travels across a network is sent in "packets." 5 Killer Tricks to Get the Most Out of Wireshark Wireshark has quite a few tricks up its sleeve, from capturing remote traffic to creating firewall rules based on captured packets. Read on for some more advanced tips if you want to use Wireshark like a pro. We’ve already covered basic usage of Wireshark, so be sure to read our original article for an introduction to this powerful network analysis tool. Network Name Resolution

How To Install and Configure OpenVPN On Your DD-WRT Router We’ve already covered installing Tomato on your router and how to connect to your home network with OpenVPN and Tomato. Now we are going to cover installing OpenVPN on your DD-WRT enabled router for easy access to your home network from anywhere in the world! What is OpenVPN? Bluesnarfing Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant.). This allows access to a calendar, contact list, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge.