Subnet Masking And Addressing Essay

This essay has a total of 674 words and 4 pages.

Subnet Masking And Addressing


Ok, this explains subnet addressing which is useful if you run a scanner, a firewall, a
router or anything else that is bound to IP subnet addressing. Note that this only
describes IPv4 subnets. Reading binary values




Normally, you read binary numbers bytewise (8 bit wise). Start at the last bit, bit 0. If
it is 1, add 2^0 to your number, else add 0. Then the next bit, bit 1, If it is 1, add 2^1
(2) to your number, If bit 3 is 1 add 2^2 (4) to your number, if bit 4 is 1 add 2^3 (8) to
your number ... if bit 8 is 1 add 2^7 (128) to your number. You see, the base is always 2
because it can be either 0 or 1. Example 1: 10100100 = 2^7 0 2^5 0 0 0 2^2 0 0 = 164
Example 2: 11111111 = 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 = 255 Thats it! Now to subnet
addressing.


When you state a host including a subnet (example: nmap), you do it like this: 1.2.3.4/24,
where /24 is the subnet. Lets have a look at what this means: an IP address is a 32 bit
address. It is divided into 4 bytes (each 8 bits meaning they can be 0 to 255) in general
notation:


00000001 00000010 00000011 00000100 = "1.2.3.4"

now, IP uses one part of this address to specify which Net it is on. Most of the time,
this is a physical Net like an ethernet LAN that is linked to the internet. Nets that link
to the internet get dedicated IPs for each of their hosts from the IANA.org. /24 means
that the first 24 bits are the Net address and the remaining 8 bits are the Host address.
This looks like this: Net: 000000010000001000000011 Host: 00000100 Meaning, we are on the
net 1.2.3.0 (0 used as a wildcard here) and on the host 4 of 256.


SUBNET MASK: In this case, the subnet mask would be 255.255.255.0. A subnet mask is
created simply by filling all NET address bits with 1 and the HOST bits with 0. (11111111
= 255). There are 4 "Classes" on the Internet, which are the standard Subnets. *Class
A: "0" 7 net bits 24 host bits, hosts 0.0.0.0 to 126.255.255.255 Net IDs: 0 0000000 to
0 1111111 (which is 127 => 127.0.0.0 reserved for local loopback)


*Class B: "10" 14 net bits 14 host bits, hosts 128.1.0.0 to 191.254.0.0 Net IDs: 10
00000000000000 to 10 11111111111111

Continues for 2 more pages >>




  • Boeing case Study
    Boeing case Study Keeping Boeing Flying Higher and Higher Case Study Introduction Boeing has been building commercial airliners since 1927 with the first Boeing commercial jet airliner, the 7O7, introduced in l955. As discussed in the article on page 172 of the text. This success is even more remarkable when one realizes that the Boeing "Design/ Build" process had not changed very much during the past three decades. The system was antiquated, cumbersome, and inefficient creating production delay
  • CocaCola
    CocaCola History "Coca-Cola enterprises Incorporated, employees 66,199 operates, 444 facilities, 47,235 vehicles, 1.9 million pieces of cold drink equipment and sold 3.8billion unit cases in 46 states in the united states, all 10 provinces of Canada and portions of Europe including Belgium, France, Great Britain, Luxembourg and the Netherlands" (Coca-Cola facts 99). An, Atlanta Pharmacist Dr. John Slyth Pemberton founded Coca-Cola on May 8, 1886. The carmel colored ingredients, Coca leaves and k
  • MANAGEMENT POLICY
    MANAGEMENT POLICY OPERATION AND OPERATIONS MANAGEMENT All organizations have operations.” A manufacturing company may conduct operations in a foundry, mill, or factory. Our interest is in the management of operations, or operations management (OM), including the usual management cycle of planning, implementing, and monitoring/controlling. The driving force for OM must be an overriding goal of continually improving service to customers, where customer means the next process as well as the final,
  • Cisco
    cisco A Chapter 1 - Introduction: ------------------------- - No pertinent information in this chapter to note. Chapter 2 - Introduction to Switching Concepts: ----------------------------------------------- Shared Networks, Advantages/Disadvantages: ------------------------------------------ Traditional FDDI Networks: - PROS: - Faster shared medium network - Dual ring safeguards against downtime - CONS: - High latency (due to FDDI -* Ethernet/Ethernet -* FDDI Translation) - No full duplex - Exp
  • Modems and connections
    modems and connections The issues discussed here often overlook the very basic things you need to get a modem connection - if you\'ve never used a modem, or you are doing a new installation, you may want to seek more basic help and troubleshooting information first. There are MANY factors that affect modem connection speed. A 33.6 modem will rarely get 33.6 connections (it requires a very clean line and clean routing to the server modem); 28.8 and 26.4 are more common. Similarly, a 56k modem wil
  • Network Degn
    Network Degn Table of Contents 1. Executive Summary 1.1. Purpose of the Project 3 1.2. Strategic Recommendation 3 1.3. Implementation Consideration 3 1.4. Benefits of the Solution 4 2. Designing Requirements 2.1. Existing Network 5 2.2. Network Requirements 5 3. Design Solution 3.1. Proposed Network Topology 6 3.2. Hardware and Media Recommendation for the LAN 6 3.3. Hardware and Media Recommendation for the WAN 7 3.4. Network Layer Addressing and Naming Model 8 3.5. Routing and Bridging Protoco
  • NT Server
    NT Server NT Server 4.0 study notes How do you move a PDC or a BDC to a new domain? Change the Domain Name System Policy Editor will allow you to restrict logon times - true or false? False What is the correct syntax to start a program such as Network Monitor with a low priority start /low netmon A local group is located in each computers account database Why would you run Win16 apps in a separate NTVDMS? To allow a Win16 app to interoperate with other apps in a separate memory space Will it min
  • TCPIP Security
    TCPIP Security TCP/IP Security The TCP/IP protocols, the basis for today\'s Internet, lack even the most basic mechanisms for security, such as authentication or encryption. As usage of the Internet and TCP/IP protocols increases, their lack of built-in security has become more and more problematic. This paper describes a variety of basic flaws in TCP/IP protocols and their implementations, and discusses solutions and work-arounds to these problems. Also covered is the new IPv6, the next-generat
  • The Cyber War
    The Cyber War The Internet is a wondrous place. Practically anything you could ever want is available on the Net. It’s like a big city, it has distinguished areas, and the sex- ridden slums. It has the upstanding citizens, and it has the criminals. On the Net there really is more crime than in a large city, though, mainly because of the difficulties in tracking and prosecuting offenders. Even from its beginnings the Internet has been a battlefield between phreaks and administrators. The Internet
  • How a check is processed
    how a check is processed Checks are written everyday at almost every place of business. At age 18 anyone with the adequate amount of money can open a checking account of his or her own. One aspect of checking account functions that many account owners are not familiar with is the processing of their checks after they have been written. When grocery shopping at a place such as Winn Dixie the customer many times thinks to his or herself whether he or she should pay cash, charge it, or pay for the
  • Napoleon Bonaparte
    Napoleon Bonaparte Napoleon Bonaparte Napoleon Bonaparte was born on August 15, 1769. He was born on the small Italian Island of Corsica in the Mediterranean Sea. He was born at a very hectic time. Corsica was trying to gain independence when French troops invaded. He was born during a war, and he will die because of one. When he turned ten his parents sent him to a military school, just outside of Paris. He devoted himself to learning and gaining experience to military tactics. All of this work
  • Napoleon Bonaparte
    Napoleon Bonaparte Napoleon Bonaparte Napoleon Bonaparte was born on August 15, 1769. He was born on the small Italian Island of Corsica in the Mediterranean Sea. He was born at a very hectic time. Corsica was trying to gain independence when French troops invaded. He was born during a war, and he will die because of one. When he turned ten his parents sent him to a military school, just outside of Paris. He devoted himself to learning and gaining experience to military tactics. All of this work
  • Teleeducation
    Teleeducation 1.0 INTRODUCTION 1.1 Background of Tele-education Tele-education has a long history beginning with systems like that for teaching children in Australian Outback, the British Open University and other such organizations. These built on the idea of correspondence courses where course materials are sent periodically by post and augmented the experience with broadcasts either on radio or on TV. The problem of student isolation was addressed partially through techniques such as telepho
  • Anwar Sadat
    Anwar Sadat Born into a family of 13 children in 1918, Anwar al-Sadat grew up among average Egyptian villagers in the town of Mit Abul Kom 40 miles to the north of Cairo. Having completed a grade school education, Sadat\'s father worked as a clerk in the local military hospital. By the time of his birth, Anwar\'s Egypt had become a British colony. Crippling debt had forced the Egyptian government to sell the British government its interests in the French engineered Suez Canal linking the Mediter
  • Dr Jekyll and Mr Hyde
    Dr Jekyll and Mr Hyde Dr. Jekyll and Mr. Hyde Written by: Robert Louis Stevenson Jordan Servos The title of my I.S.U novel is Dr. Jekyll and Mr. Hyde. Robert Louis Stevenson wrote this novel. In the beginning, a little girl is trampled by a grotesque man in the middle of the night. The problem this situation presents is a fear for this heartless mad man running around the streets of London. An important event that happens in the novel would be when Mr. Hyde kills a man by the name of Sir Danvers
  • History of the computer
    history of the computer Konrad Zuse, a German engineer, completes the first general purpose progammable calculator in 1941. He pioneers the use of binary math and boolean logic in electronic calculation. Colossus, a British computer used for code-breaking, is operational by December of 1943. ENIAC, or Electronic Numerical Integrator Analyzor and Computer,is developed by the Ballistics Research Laboratory in Maryland to assist in the preparation of firing tables for artillery. It is built at the
  • How DSL Works
    How DSL Works How a Digital Subscriber Line works… Asynchronous Digital Subscriber Line (ADSL) uses two pieces of equipment, one on the customer end, and one at the Internet Service Provider, Telephone Company or other provider of Digital Subscriber Line (DSL) services. At the customer\'s location there is a DSL transceiver, which may also provide other services. The DSL service provider has a DSL Access Multiplexer, or DSLAM to receive customer connections. Most residential customers will call
  • Internet History
    Internet History The Internet began by a vision of a psychologist named, SCR Licwriter in the 1950’s. Lickwriter was a professor at the Massachusetts Institute of Technology. His vision was to connect all the computers together so they would be more useful in sharing information. This vision was just a thought of imagination then. In 1958 US forms the Advanced Research Projects Agency (ARPA), within the Department of Defense (DoD) to establish US lead in science and technology applicable to the
  • Internet security overview
    internet security overview 1 Introduction The recent acceleration in the uptake of electronic commerce (e-commerce) over the Internet has focused the need for methods to be developed by which to securely transfer data over what amounts to a worldwide public network. The most commonly cited example of this requirement is the ability of customers to make electronic purchases from company Web sites using debit cards such as VISA cards. Public confidence in e-commerce has to be high for it to succee
  • November 13, 2000
    Mr4 November 13, 2000 TCP-IP TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on
  • November 13, 2000
    Mr4 November 13, 2000 TCP-IP TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on
  • A holy nation
    a holy nation A Holy Nation After creating the world, a paradise for human kind, God is forced to banish Adam and Eve because they disobey His orders to not eat fruit from the tree of wisdom. This results ultimately in the fall of man to earth. Immediately from the beginning of his time on Earth, man chooses not to follow the path set before him by God but instead spreads evil throughout the world. Therefore, the inherent problem humans face is the pressure to judge between good and evil, the ne
  • Banking
    banking You are here: Home * Education * 18th Century History * Guide Extra Mon, Dec 6, 1999 Rick Brainard - your About.com Guide to: 18th Century History Content: Welcome | Netlinks | Articles | Guide Bio | Search | Related | About College TalkAbout: Forums | Chat | Events | Newsletter | Share This Site | Join Shopping: ShopNow | Books | Videos | Jobs | ShoppingAbout On War by General Carl von Clausewitz Volume I TRANSLATED BY COLONEL J.J. GRAHAM 1874 was 1st edition of this translation. 1909 w
  • Clinton Scandal
    Clinton Scandal The Clinton Sex Scandal Rare is a person that crosses the path of the White House without some emotion of envy or awe. This building epitomizes world leadership and unprecedented power. This renowned leadership may be the only association made by certain countries, while in the United States many see an other significance: Watergate, Whitewater, Kennedy\'s brutal and mysterious assassination, and today, Clinton\'s "zippergate" scandal. When the President of the United States take
  • Convergence
    Convergence TABLE OF CONTENTS Executive Summary 1 Introduction 2 Part I Business Factors 3 What is Convergence? 3 Toll Bypass 3 Utilization – Getting Your Money’s Worth 3 Part II Technical Overview 4 Mixed-Media Requirements 4 Problems: - Delay 4 - Packet Loss 5 - Jitter 5 Network Technology 5 Voice over ATM 5 Voice over Frame Relay 6 Voice over IP 7 Inter-Vendor Support 8 H.323 8 Part III Implementations 10 Types of VoIP Implementations VoIP through a router 10 LAN Telephones 10 IP PBX 11 VoIP
  • E911
    E911 The FCC E911 Regulation is Essential for Consumers and Telecommunications Industry In June of 1996, the FCC proposed a mandate for E-911 services. The wireless E911 order provides value-added service for all cellular phone users and consumers. This regulation has designed to implement 911 requirements for cellular, PCS and SMR carriers. The FCC has established telecommunication regulations to provide 911 access to consumers. The requirements have been planned in a three-stage deployment pro
  • File Sharing Systems
    File Sharing Systems Universität St. Gallen Hochschule für Wirtschafts- Rechts- und Sozialwissenschaften ITM / MCM Wahlteil Neue Medien / Medienarchitektur Prof. Dr. Beat Schmid FILE SHARING SYSTEME P2P Von Philipp Brunner Hans Geiser Roman Högg Stefan Kress Beat Meier Olivier Salamin Abgabetermin: 5. Dezember 2000 Inhaltsverzeichnis Einführung Seite 3 1. Theoretische Grundlagen 3 1.1. Netzarchitekturen 3 1.1.1. Client Server 3 1.1.2. Peer to Peer 4 1.1.3. Verzeichnisserver 4 1.2. Netzwerkprotok
  • Implikasi Strategis dari Teknologi Baru
    Implikasi Strategis dari Teknologi Baru BAB 5 IMPLIKASI STRATEGIS DARI TEKNOLOGI BARU PENDAHULUAN Sampai saat ini, hanya beberapa perusahaan mulai menyadari kebutuhan akan strategi dan teknologi aliansi, dan masih banyak yang belum mengerti dan menyadari pentingnya strategi ini. Namun perusahaan yang menyadari akan kebutuhan ini, belum sepenuhnya menghargai semua isu yang terlibat. Hal ini disebabkan karena konsep dari teknologi ini masih relatif baru dan belum dikembangkan. Bab ini akan membaha
  • Teleeducation
    teleeducation 1.0 INTRODUCTION 1.1 Background of Tele-education Tele-education has a long history beginning with systems like that for teaching children in Australian Outback, the British Open University and other such organizations. These built on the idea of correspondence courses where course materials are sent periodically by post and augmented the experience with broadcasts either on radio or on TV. The problem of student isolation was addressed partially through techniques such as telephon
  • The Internet1
    The Internet1 In the early 1960\'s, the U.S. Department of Defense (DOD) became very concerned about the possible effects of nuclear attack on its computing facilities. As a result, it began to examine ways to connect their computers to each other and to weapons installations that were distributed all over the world. The DOD charged the Defense Advanced Research Projects Agency (now known as DARPA) to fund research that would lead to the creation of a worldwide network. The Advanced Research Pro
  • Country Risk Assessment on Japanese Imports of Dru
    Country Risk Assessment on Japanese Imports of Drugs History Japan, being the world’s most dynamically competitive nation, is facing an ironic balance in trade with the U.S. The Japanese economy relies too heavily on exports, especially to the U.S., causing increasing trade surpluses. They have been in a repetitive cycle for the last 25 years in which the government allows the yen to fall against the dollar to boost exports and restrict domestic growth to dampen imports. The Japanese government
  • Money Laundering
    Money Laundering INTRODUCTION In a recent movie Mickey Blue Eyes, there is a comical scene in which an unknown artist’s painting is sold to a buyer for ,000. It seems as though a restaurant owner owed the mafia a large sum of money and he paid them by bidding an absurd amount of money for a horrid painting. The movie made this scene seem quite innocent and funny (See Appendix 1 for more examples). Unfortunately money laundering is a serious crime that is still prevalent in the United States
  • Reverse logistics as an integral part of Supply Ch
    Reverse logistics as an integral part of Supply Chain Management TABLE OF CONTENTS 1.Introduction 2 - What is reverse logistics? - Why reverse logistics is so important? 2. Body 4 - Components - International Reverse Logistics - Outsourcing 3. Conclusion 11 References 12 Introduction Most of us think of logistics as a one-way street. Products are manufactured, packaged, stored in a warehouse, sold, and then shipped off to the customer ... end of story. Yet for many logistics managers today, tha
  • History of the coputer
    History of the coputer COMPUTER Generally, a computer is any device that can perform numerical Calculations --even an adding machine, an abacus, or a slide rule. Currently, however, the term usually refers to an electronic device that can use a list of instructions, called a program, to perform calculations or to store, manipulate, and retrieve information. Today\'s computers are marvels of miniaturization. Machines that once weighed 30 tons and occupied warehouse-size rooms now may weigh as li
  • --------------------------------------------------
    HR -------------------------------------------------------------------------------- Hot Jobs Senior Systems Engineer--IP Telephony SEATTLE, WA Duties will include: Testing & Validation of VoIP on EDGE modulation, as well as verifying the performance of internet based applications in a wireless environment. Basic research and implementation of VoIP protocols within a verification test bed. Planning requires basic project management skill sets utilized in a verification test bed environment. Mini
  • Internet Protocols and Infra Structure
    Internet Protocols and Infra Structure Introduction: Network: Anything reticulated or decussated at equal distances, with interstices between the intersections. - A Dictionary of the English Language SECTION : 1 1.1 WHAT IS A NETWORK? A) What is a network? A network is simply a collection of machines connected in some way that allows them to communicate with each other and share information. To do this the machines have to be connected in some way that allows communication, and have an agreed u
  • Ip history
    ip history Recent years saw huge increase in Internet growth there were 40,073 networks on Internet (as of 10/4/94) and it was doubling approximately every 12 months. The current version (IPv4) of Internet Protocol was sufficient for 20 years, but if Internet will continue to grow, pretty soon we will run out of addresses for all connections because IPv4 can handle only 32 bit addresses (which are millions of connections). This is the major drawback of IPv4. The other issues is that IPv4 was no
  • MCSE Analyisis
    MCSE Analyisis Job Task MCSE Analysis: Report to Participants Michael Angelo Southern Illinois University June 1999 Overview and Summary In preparation for new MCSE examinations, between February 19th and March 16th of 1999 more than 2,800 computer professionals completed a survey via the web. The purpose of the survey was a job analysis--a description of the on-the-job activities necessary for positions that MCSEs fill. Both employment tests and certifications must be based on job analyses . B
  • Introduction
    NT Introduction When mainframe and minicomputers provided the backbone of business computing, there were essentially networked environments in the sense that "dumb" terminals shared access to a single processor (the minicomputer or mainframe), printer (or printers) and other peripheral devices. Files could be shared among users because they were stored on the same machine. Electrical and operational connections were available in common and shared applications, and implementation of new hardware
  • Introduction
    NT Introduction When mainframe and minicomputers provided the backbone of business computing, there were essentially networked environments in the sense that "dumb" terminals shared access to a single processor (the minicomputer or mainframe), printer (or printers) and other peripheral devices. Files could be shared among users because they were stored on the same machine. Electrical and operational connections were available in common and shared applications, and implementation of new hardware
  • ROUTING INFORMATION PROTOCOL
    ROUTING INFORMATION PROTOCOL ROUTING INFORMATION PROTOCOL INTRODUCTION: I will summarize Request For Comments (RFC) 1058, Routing Information Protocol (RIP), by discussing RIPs basic algorithm/distance vector algorithm, protocol, message format, protocol limitations, and new improvements to RIP. RIP is very important to internetworking, since it passes information about routes between networks and hosts. It allows hosts and gateways to exchange information for the purpose of computing routes. B
  • TCPIP
    TCPIP Until recently, computer systems were isolated workstations that communicated with each other only with difficulty. Either it was a stand-alone unit, or if it was bought to be part of a system, you had to buy a network communication system to go with it. In the 1970s and 1980s, more sophisticated networks began to become more common. Dozens of architectures populated the networks of this time, with companies such as IBM, Digital, Sperry, Burroughs, and Honeywell being largely involved i
  • The OSI Model and The Pony Express
    The OSI Model and The Pony Express The Open Systems Interconnection (OSI) reference model is essential to the world of computer networking. The model was created in 1977 by the International Standards Committee, in response to a difficulty that was facing computer networkers at the time (Shelly, Cashman, and Serwatka 142). In order to understand the difficulty, one must first realize that computer networks consist of computer hardware, the software that is to be used in conjunction with this ha
  • What does the HP Teramac have to do with the molet
    What does the HP Teramac have to do with the moletronics documentstyle[11pt,psfig]article} pagestylemyheadings} markboth}} setlengthtopmargin}0in} setlengthoddsidemargin}0in} setlengthevensidemargin}0in} setlengthtextwidth}6.5in} setlengthtextheight}8.5in} bibliographystyleieeetr} newcommandspacedouble}renewcommandbaselinestretch}1.40}Hugenormalsize} newcommandspacesingle}renewcommandbaselinestretch}1.0}Hugenormalsize} %renewcommandthesection}Romansection}} newtheoremdefinition}Definition} newt
  • Buyer behaviour
    buyer behaviour 1.0 Introduction The purpose of this report is to analyse and evaluate the decision-making process consumers go through when purchasing health supplements and formal clothing. The objective is to compare the differences between the two processes and identify the implications each has on marketing strategy. This has been achieved through both secondary and primary research. The secondary analysis involved research using the textbooks and articles on health supplements and formal
  • Hackers Black book
    Hackers Black book Hacker\'s Black book 13:20 23.06.99 (c)1999Frank Owens&l@tz@rus Hacker\'s Black Book Dieser Report ist in zweierlei Hinsicht hilfreich. Er soll Menschen, die ihr Passwort verloren haben, die Möglichkeit geben, es durch Anwendung einfacher Techniken ohne lange Wartezeiten zurückzubekommen und Besitzern von Websites mit geschütztem Inhalt ermöglichen, diese Inhalte zu schützen. Webmaster, die die in diesem Report beschriebenen Techniken kennen, haben wesentlich bessere Aussicht
  • Jola Initiation Ritual
    Jola Initiation Ritual JOLA INITIATION RITUAL: MAPPING NO-1 The phenomenon of folkloric festivals and cultural identity in the contemporary Senegal region of the Casamance provides a unique opportunity to experience and describe customs that have dictated creative and functional experiences for over a thousand years in the western mid enclave of African continent. In seeking to understand this subject we are made aware of the changing textures of time and space and the beauty of physical univer
  • Sendmail
    sendmail The Sendmail Tutorial / written by yours truly, R a v e N (blacksun.box.sk) *============================================================================* version 2.1, 22/9/99 Note: whenever you see something like this: blah(1), it means that if you don\'t understand the meaning of the word blah there\'s an explanation for it just for you, located at the newbies corner on section 1. Note 2: if you\'re having a hard time reading this page because you have to scroll to the right whenever
  • The Fall of Napster
    The Fall of Napster The Fall of Napster A & M RECORDS, INC.,v. NAPSTER, INC., Defendant(s). No. C 99-05183 MHP UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA 2000 U.S. Dist. LEXIS 6243; 54 U.S.P.Q.2D (BNA) 1746; Copy. L. Rep. (CCH) P28,072 May 5, 2000, Decided May 5, 2000, Filed On December 6, 1999, plaintiff record companies filed suit alleging contributory and vicarious federal copyright infringement and related state law violations by defendant Napster, Inc. ("Napster")
  • Fdfdfdfd
    fdfdfdfd routers By: tom kelley A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A router has the ability to make intelligent decisions regarding the best path for delivery of data on the network. In this chapter, you will learn how routers use a Layer 3 addressing scheme to make forwarding decisions. In addition, you will learn how devices on local-area networks (LANs) use Address Resolution Protocol (ARP) before forwarding data