If one has a class B IP address such as the Network ID 130.200.0.0 require more than one network ID, then he must apply to Internic to get a new IP address. But inventories at the current IP address is very limited because of the mushrooming number of websites on the internet. To overcome these difficulties and avoid you to have to submit a new request to Internic, revealing a technique to reproduce the network ID of a network ID that already exists. This is called subnetting, where the used host ID sacrificed for use in making additional network ID.
Explanation and completion of the process of subnetworks ;
IP address 130 .200 .0 .0
10000010.11001000.0000000.0000000 (bit) By default subnet mask 255.255.0.0

Now you want to have 2 network ID from the IP address that you currently have. For that you mask the top 2 bits from the host ID. By covering (mask) 2 bits from the host ID, then you have 4 combinations; 00,01,10,11 which can be used for the subnet. But 00 and 11 can not be used because all 0 or all 1 are not allowed in the regulations IP address. Therefore, only two combinations of 01 and 10 are known to be used for the subnet

Applies to the default subnet mask that was originally 255.255.0.0
1111111.1111111.0000000.0000000 (bits)


So after the mask a (modified into 1111111.1111111.11000000.0000000 (where the top 2 bits in the host ID on his mask to become part of the initial network ID number 16 now to 18 so that the new subnet mask becomes 255.255.192.0

From the above calculation process then you get 2 subnets with a subnet mask of the new
10000010.11001000.01XXXXXX.XXXXXX and 10000010.11001000.10XXXXXX.XXXXXXXX (where X is the number 0 or 1)

With the new subnet mask 11111111.11111111.11000000.00000000 or 255.255.192.0
So the first group (subnet 1) is read more... and see on page
TCP / IP (Transmission Control Protocol / Internet Protocol)

keynote :
TCP / IP (Transmission Control Protocol / Internet Protocol) , class

An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.
An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. With tunneling, companies can send private messages through the public network, using the public network with special encryption/decryption and other security safeguards to connect one part of their intranet to another.

Typically, larger enterprises allow users within their intranet to access the public Internet through firewall servers that have the ability to screen messages in both directions so that company security is maintained. When part of an intranet is made accessible to customers, partners, suppliers, or others outside the company, that part becomes part of an extranet. (see on page Lecture Materials)

keynote : extranet, company security, access, TCP/IP, HTTP, encryption/decryption, intranet, private network, purpose of an intranet


TCP / IP (Transmission Control Protocol / Internet Protocol) is a group of protocols

Manage computer data communications on the Internet. In computer networks we can use many kinds of protocols but in order for computers to communicate, both must use the same protocol. In other words, the protocol functions such as language. Because using the same language, namely TCP / IP, protocol type difference does not matter. A set of TCP / IP protocol is modeled by four layer TCP / IP, as shown in the picture read more...
Understanding TCP / IP with example problems par_1, Understanding TCP / IP part_2, Understanding TCP / IP part_3,
read more... next and other

Before discussing the network device ROUTER then recognize network layer models the concept you need to understand very well because it is widely used in the subsequent discussion.

An information created by someone from a computer can be delivered to other computers via the computer network. The information was experiencing a long process through the various layers of computer networks. First of all the information processed into the data which is processed into segments. Furthermore reprocessed into packets, then into the frame, and last into bits that can be sent through the network cable to another computer for processing in order to get the information back home. Therefore, so a network to function properly, we need a clear definition for the processes that occur in the network.

To facilitate understanding, use and design of data processing have uniformity among network equipment manufacturers, the International Standards Organization (ISO) issued a model network layer reference model called Open Systems Interconnection (OSI). Seven layer has its own function. Therefore often also referred to as the OSI network architecture.

OSI model does not discuss in detail the workings of the OSI layers, but only provides a concept in determining what process must happen, and what protocols can be used in a particular layer. By Because many benefits, including the OSI model in the category of so-called de jure standard.
read more...