The network administrator is needed to understand Subneting in network implementation. Subneting used to economize on the IP range. In addition Subnating also used for computer network security by limiting the number of IP addresses that can be used on a computer or host.
Why subneting need to be used to economize on the IP and network security? Because the range of a network, as an example of class C (remember the first tutorial) has a host range or number as many as 254 in one network. This is very inefficient if used for small networks that require a smaller number of computers. Subneting then used to minimize the number of networks to save digunkaan IP also. If you have receipts Subnating it was out of a full class and then called with less class.
For example:
1. 192.168.1.2 / 26
- To find subnetmask:
Notice / 26 is called the network previk, meaning binary 1 on the total number of 26 and 32 bit binary 0 numbered six.
Binary 11111111 11111111 11111111 11000000
Decimal 255 255 255 192
So it is subnetmask: 255 255 255 192
- To find the number of hosts:
The calculations to find the number of hosts is by using the formula:
Sh = 2n-2
Description formulas
Sh = Number of hosts in one network
n = number of binary 0 in the netmask
-2 = Less 2 because there are two IP that should not be used because it is used for IP hosts and IP Broadcast Network.
Given: n = 6 (corresponding to the example above)
Sh = 2n-2
= 26-2
= 64-2
= 62
So the number of hosts to 192.168.1.2 / 26 is the 62 host
- Here's the IP that is used:
Network 1:
192.168.1.0 (should not be used because the IP Network)
192.168.1.1 to 192.168.1.62 (the IP range is used as a host)
192.168.1.63 (may not be used because the IP Broadcast)
Network 2:
192.168.1.64 (may not be used because the IP Network)
192.168.1.65 to 192.168.1.126 (the IP range is used as a host)
192.168.1.127 (should not be used because the IP Broadcast)
And so on ....
2. 202.10.10.3 / 30
- To find subnetmask:
/ 30 when arranged in binary:
Binary 11111111 11111111 11111111 11111100
Decimal 255 255 255 252
So it is subnetmask: 255 255 255 252
- To find the number of hosts:
Note: n = 2 (corresponding to the example number 2)
Sh = 2n-2
= 22-2
= 4-2
= 2
So the number of hosts for the 202.10.10.3 / 30 is the second host.
- Here's the IP in use:
Network 1:
202.10.10.0 (may not be used because the IP Network)
202.10.10.1 to 202.10.10.2 (the IP range is used as a host)
202.10.10.3 (may not be used because the IP Broadcast)
Network 2:
202.10.10.4 (may not be used because the IP Network)
202.10.10.5 to 202.10.10.6 (the IP range is used as a host)
202.10.10.7 (may not be used because the IP Broadcast)
And so on ....
From the two examples above actually comes from a class C, but later in subneting. In class C, there were 254 hosts, while after dilakuakan subneting then the number of hosts would be minimized, with the network previk / 26 the number of hosts to 62 hosts with the network while previk / 30 the number of host to two hosts only. You can do subnating accordance with the number of host computers or the amount you need.
Hopefully useful
28 Jun 2010
Data Base Systems
The system is an order (integration), which consists of a number of functional components (with the unit / function specific tasks) that are interconnected and together aim to satisfy a process / job.
Base is the headquarters / hangout / nesting / warehouse.
Data is a representation of the facts of the world that represent an object recorded in the form of numbers, letters, symbols, text, images, sounds or combinations.
Destination Database System
1. Speed and Ease
Namely that the database users can:
-Saving Data
-Make changes / manipulation of data
-Displays the data more quickly and easily compared with the normal way (either manually or electronically).
2. Storage Space Efficiency
With our data base capable of suppression of redundancy (repetition) of data, either by applying a number of encoding or by creating relationships between groups of interconnected data.
3. Accuracy
In order for the data according to certain rules and restrictions by utilizing the coding or the formation of relationships among the data along with the application of the rules / limits (constraints) data type, data domain, the uniqueness of the data and so on.
4. Availability
So the data can be accessed by any user in need, with the application of network technology as well as moving / deletion of data that have not been used / expired to save storage space.
5. Completeness
In order to complete the data is always well managed relative to the needs of users as well as with respect to time, by adding rows of data or make changes to the database structure, namely by adding a field in the table or add new tables.
6. Security
In order for the data that is confidential or vital process that does not fall into the people / users who are not entitled, namely with the use of your account (username and password) and apply a distinction between the rights of each user access to data that can be read or process that can be done.
7. Togetherness
So that the data is managed by the system supports multiuser environments (many users), to maintain / avoid the emergence of new problems such as inconsistency of data (because data changes made by multiple users at the same time), or the condition of deadlocks (because there are many users waiting for another to use the data).
Base is the headquarters / hangout / nesting / warehouse.
Data is a representation of the facts of the world that represent an object recorded in the form of numbers, letters, symbols, text, images, sounds or combinations.
Destination Database System
1. Speed and Ease
Namely that the database users can:
-Saving Data
-Make changes / manipulation of data
-Displays the data more quickly and easily compared with the normal way (either manually or electronically).
2. Storage Space Efficiency
With our data base capable of suppression of redundancy (repetition) of data, either by applying a number of encoding or by creating relationships between groups of interconnected data.
3. Accuracy
In order for the data according to certain rules and restrictions by utilizing the coding or the formation of relationships among the data along with the application of the rules / limits (constraints) data type, data domain, the uniqueness of the data and so on.
4. Availability
So the data can be accessed by any user in need, with the application of network technology as well as moving / deletion of data that have not been used / expired to save storage space.
5. Completeness
In order to complete the data is always well managed relative to the needs of users as well as with respect to time, by adding rows of data or make changes to the database structure, namely by adding a field in the table or add new tables.
6. Security
In order for the data that is confidential or vital process that does not fall into the people / users who are not entitled, namely with the use of your account (username and password) and apply a distinction between the rights of each user access to data that can be read or process that can be done.
7. Togetherness
So that the data is managed by the system supports multiuser environments (many users), to maintain / avoid the emergence of new problems such as inconsistency of data (because data changes made by multiple users at the same time), or the condition of deadlocks (because there are many users waiting for another to use the data).
Langganan:
Komentar (Atom)