- •Warning and Disclaimer
- •Feedback Information
- •Trademark Acknowledgments
- •About the Author
- •About the Technical Reviewers
- •Dedication
- •Acknowledgments
- •Contents at a Glance
- •Contents
- •Icons Used in This Book
- •Command Syntax Conventions
- •Cisco’s Motivation: Certifying Partners
- •Format of the CCNA Exams
- •What’s on the CCNA Exams
- •ICND Exam Topics
- •Cross-Reference Between Exam Topics and Book Parts
- •CCNA Exam Topics
- •INTRO and ICND Course Outlines
- •Objectives and Methods
- •Book Features
- •How This Book Is Organized
- •Part I: LAN Switching
- •Part II: TCP/IP
- •Part III: Wide-Area Networks
- •Part IV: Network Security
- •Part V: Final Preparation
- •Part VI: Appendixes
- •How to Use These Books to Prepare for the CCNA Exam
- •For More Information
- •Part I: LAN Switching
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Brief Review of LAN Switching
- •The Forward-Versus-Filter Decision
- •How Switches Learn MAC Addresses
- •Forwarding Unknown Unicasts and Broadcasts
- •LAN Switch Logic Summary
- •Basic Switch Operation
- •Foundation Summary
- •Spanning Tree Protocol
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Spanning Tree Protocol
- •What IEEE 802.1d Spanning Tree Does
- •How Spanning Tree Works
- •Electing the Root and Discovering Root Ports and Designated Ports
- •Reacting to Changes in the Network
- •Spanning Tree Protocol Summary
- •Optional STP Features
- •EtherChannel
- •PortFast
- •Rapid Spanning Tree (IEEE 802.1w)
- •RSTP Link and Edge Types
- •RSTP Port States
- •RSTP Port Roles
- •RSTP Convergence
- •Edge-Type Behavior and PortFast
- •Link-Type Shared
- •Link-Type Point-to-Point
- •An Example of Speedy RSTP Convergence
- •Basic STP show Commands
- •Changing STP Port Costs and Bridge Priority
- •Foundation Summary
- •Foundation Summary
- •Virtual LANs and Trunking
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Review of Virtual LAN Concepts
- •Trunking with ISL and 802.1Q
- •ISL and 802.1Q Compared
- •VLAN Trunking Protocol (VTP)
- •How VTP Works
- •VTP Pruning
- •Foundation Summary
- •Part II: TCP/IP
- •IP Addressing and Subnetting
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •IP Addressing Review
- •IP Subnetting
- •Analyzing and Interpreting IP Addresses and Subnets
- •Math Operations Used to Answer Subnetting Questions
- •Converting IP Addresses from Decimal to Binary and Back Again
- •The Boolean AND Operation
- •How Many Hosts and How Many Subnets?
- •What Is the Subnet Number, and What Are the IP Addresses in the Subnet?
- •Finding the Subnet Number
- •Finding the Subnet Broadcast Address
- •Finding the Range of Valid IP Addresses in a Subnet
- •Finding the Answers Without Using Binary
- •Easier Math with Easy Masks
- •Which Subnet Masks Meet the Stated Design Requirements?
- •What Are the Other Subnet Numbers?
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Extended ping Command
- •Distance Vector Concepts
- •Distance Vector Loop-Avoidance Features
- •Route Poisoning
- •Split Horizon
- •Split Horizon with Poison Reverse
- •Hold-Down Timer
- •Triggered (Flash) Updates
- •RIP and IGRP
- •IGRP Metrics
- •Examination of RIP and IGRP debug and show Commands
- •Issues When Multiple Routes to the Same Subnet Exist
- •Administrative Distance
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Link-State Routing Protocol and OSPF Concepts
- •Steady-State Operation
- •Loop Avoidance
- •Scaling OSPF Through Hierarchical Design
- •OSPF Areas
- •Stub Areas
- •Summary: Comparing Link-State and OSPF to Distance Vector Protocols
- •Balanced Hybrid Routing Protocol and EIGRP Concepts
- •EIGRP Loop Avoidance
- •EIGRP Summary
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Route Summarization and Variable-Length Subnet Masks
- •Route Summarization Concepts
- •VLSM
- •Route Summarization Strategies
- •Sample “Best” Summary on Seville
- •Sample “Best” Summary on Yosemite
- •Classless Routing Protocols and Classless Routing
- •Classless and Classful Routing Protocols
- •Autosummarization
- •Classful and Classless Routing
- •Default Routes
- •Classless Routing
- •Foundation Summary
- •Advanced TCP/IP Topics
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Scaling the IP Address Space for the Internet
- •CIDR
- •Private Addressing
- •Network Address Translation
- •Static NAT
- •Dynamic NAT
- •Overloading NAT with Port Address Translation (PAT)
- •Translating Overlapping Addresses
- •Miscellaneous TCP/IP Topics
- •Internet Control Message Protocol (ICMP)
- •ICMP Echo Request and Echo Reply
- •Destination Unreachable ICMP Message
- •Time Exceeded ICMP Message
- •Redirect ICMP Message
- •Secondary IP Addressing
- •FTP and TFTP
- •TFTP
- •MTU and Fragmentation
- •Foundation Summary
- •Part III: Wide-Area Networks
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Review of WAN Basics
- •Physical Components of Point-to-Point Leased Lines
- •Data-Link Protocols for Point-to-Point Leased Lines
- •HDLC and PPP Compared
- •Looped Link Detection
- •Enhanced Error Detection
- •Authentication Over WAN Links
- •PAP and CHAP Authentication
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •ISDN Protocols and Design
- •Typical Uses of ISDN
- •ISDN Channels
- •ISDN Protocols
- •ISDN BRI Function Groups and Reference Points
- •ISDN PRI Function Groups and Reference Points
- •BRI and PRI Encoding and Framing
- •PRI Encoding
- •PRI Framing
- •BRI Framing and Encoding
- •DDR Step 1: Routing Packets Out the Interface to Be Dialed
- •DDR Step 2: Determining the Subset of the Packets That Trigger the Dialing Process
- •DDR Step 3: Dialing (Signaling)
- •DDR Step 4: Determining When the Connection Is Terminated
- •ISDN and DDR show and debug Commands
- •Multilink PPP
- •Foundation Summary
- •Frame Relay
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Frame Relay Protocols
- •Frame Relay Standards
- •Virtual Circuits
- •LMI and Encapsulation Types
- •DLCI Addressing Details
- •Network Layer Concerns with Frame Relay
- •Layer 3 Addressing with Frame Relay
- •Frame Relay Layer 3 Addressing: One Subnet Containing All Frame Relay DTEs
- •Frame Relay Layer 3 Addressing: One Subnet Per VC
- •Frame Relay Layer 3 Addressing: Hybrid Approach
- •Broadcast Handling
- •Frame Relay Service Interworking
- •A Fully-Meshed Network with One IP Subnet
- •Frame Relay Address Mapping
- •A Partially-Meshed Network with One IP Subnet Per VC
- •A Partially-Meshed Network with Some Fully-Meshed Parts
- •Foundation Summary
- •Part IV: Network Security
- •IP Access Control List Security
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Standard IP Access Control Lists
- •IP Standard ACL Concepts
- •Wildcard Masks
- •Standard IP ACL: Example 2
- •Extended IP Access Control Lists
- •Extended IP ACL Concepts
- •Extended IP Access Lists: Example 1
- •Extended IP Access Lists: Example 2
- •Miscellaneous ACL Topics
- •Named IP Access Lists
- •Controlling Telnet Access with ACLs
- •ACL Implementation Considerations
- •Foundation Summary
- •Part V: Final Preparation
- •Final Preparation
- •Suggestions for Final Preparation
- •Preparing for the Exam Experience
- •Final Lab Scenarios
- •Scenario 1
- •Scenario 1, Part A: Planning
- •Solutions to Scenario 1, Part A: Planning
- •Scenario 2
- •Scenario 2, Part A: Planning
- •Solutions to Scenario 2, Part A: Planning
- •Part VI: Appendixes
- •Glossary
- •Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
- •Chapter 1
- •“Do I Know This Already?” Quiz
- •Chapter 2
- •“Do I Know This Already?” Quiz
- •Chapter 3
- •“Do I Know This Already?” Quiz
- •Chapter 4
- •“Do I Know This Already?” Quiz
- •Chapter 5
- •“Do I Know This Already?” Quiz
- •Chapter 6
- •“Do I Know This Already?” Quiz
- •Chapter 7
- •“Do I Know This Already?” Quiz
- •Chapter 8
- •“Do I Know This Already?” Quiz
- •Chapter 9
- •“Do I Know This Already?” Quiz
- •Chapter 10
- •“Do I Know This Already?” Quiz
- •Chapter 11
- •“Do I Know This Already?” Quiz
- •Chapter 12
- •“Do I Know This Already?” Quiz
- •Using the Simulation Software for the Hands-on Exercises
- •Accessing NetSim from the CD
- •Hands-on Exercises Available with NetSim
- •Scenarios
- •Labs
- •Listing of the Hands-on Exercises
- •How You Should Proceed with NetSim
- •Considerations When Using NetSim
- •Routing Protocol Overview
- •Comparing and Contrasting IP Routing Protocols
- •Routing Through the Internet with the Border Gateway Protocol
- •RIP Version 2
- •The Integrated IS-IS Link State Routing Protocol
- •Summary of Interior Routing Protocols
- •Numbering Ports (Interfaces)
546 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
Chapter 12
“Do I Know This Already?” Quiz
1.Barney is a host with IP address 10.1.1.1 in subnet 10.1.1.0/24. Which of the following are things that a standard IP ACL could be configured to do?
Answer: A, C. Standard ACLs check the source IP address. Option B is not possible with a single command. You would need multiple commands to match that set of IP addresses.
2.Which of the following fields cannot be compared based on an extended IP ACL?
Answer: E, F. Named extended ACLs can look for the same fields.
3.Which of the following fields can be compared using a named IP ACL but not a numbered extended IP ACL?
Answer: H. Named extended IP ACLs can match the exact same set of fields, as can numbered extended IP ACLs.
4.Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.255.0?
Answer: D. 0.0.0.255 matches all packets that have the same first three octets. This is useful when you want to match a subnet in which the subnet part comprises the first three octets, as in this case.
5.Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.240.0?
Answer: E. 0.0.15.255 matches all packets with the same first 20 bits. This is useful when you want to match a subnet in which the subnet part comprises the first 20 bits, as in this case.
6.Which of the following access-list commands permit traffic that matches packets going to a web server from 10.1.1.1 for all web servers whose IP addresses begin with 172.16.5?
Answer: A, E. The correct range of ACL numbers for extended IP access lists is 100 to 199 and 2000 to 2699.
Chapter 12 547
7.Which of the following access-list commands permits traffic that matches packets going to a web client from all web servers whose IP addresses begin with 172.16.5?
Answer: E. Because the packet is going toward a web client, you need to check for the web server’s port number as a source port. The client IP address range is not specified in the question, but the servers are, so the source address beginning with 172.16.5 is the correct answer.
8.What general guideline should be followed when placing IP ACLs, at least according to the ICND course on which CCNA is based?
Answer: C. Cisco makes this suggestion mainly for extended IP ACLs.
Q&A
1.Configure a numbered IP access list that stops packets from subnet 134.141.7.0 255.255.255.0 from exiting serial 0 on a router. Allow all other packets.
access-list 4 deny 134.141.7.0 0.0.0.255 access-list 4 permit any
interface serial 0 ip access-group 4 out
Answer: The first access-list statement denies packets from that subnet. The other statement is needed because the default action to deny packets is not explicitly matched in an access-list statement.
2.Configure an IP access list that allows only packets from subnet 193.7.6.0 255.255.255.0, going to hosts in network 128.1.0.0 and using a web server in 128.1.0.0, to enter serial 0 on a router.
access-list 105 permit tcp 193.7.6.0 0.0.0.255 128.1.0.0 0.0.255.255 eq www
!
interface serial 0
ip access-group 105 in
Answer: A deny all is implied at the end of the list.
3.How would a user who does not have the enable password find out what access lists have been configured and where they are enabled?
Answer: The show access-list command lists all access lists. The show ip interfaces command identify interfaces on which the access lists are enabled.
548 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
4.Configure and enable an IP access list that stops packets from subnet 10.3.4.0/24 from exiting serial interface S0 and that stops packets from 134.141.5.4 from entering S0. Permit all other traffic.
access-list 1 deny 10.3.4.0 0.0.0.255 access-list 1 permit any
access-list 2 deny host 134.141.5.4 access-list 2 permit any
interface serial 0 ip access-group 1 out ip access-group 2 in
5.Configure and enable an IP access list that allows packets from subnet 10.3.4.0/24, to any web server, to exit serial interface S0. Also allow packets from 134.141.5.4 going to all TCP-based servers using a well-known port to enter serial 0. Deny all other traffic.
access-list 101 permit tcp 10.3.4.0 0.0.0.255 any eq www access-list 102 permit tcp host 134.141.5.4 any lt 1023 interface serial 0
ip access-group 101 out ip access-group 102 in
Answer: Two extended access lists are required. List 101 permits packets in the first of the two criteria, in which packets exiting S0 are examined. List 102 permits packets for the second criterion, in which packets entering S0 are examined.
6.Can standard IP access lists be used to check the source IP address when enabled with the ip access-group 1 in command, and can they check the destination IP addresses when using the ip access-group 1 out command?
Answer: No. Standard IP access lists check only the source IP address, regardless of whether the packets are checked when inbound or outbound.
7.True or false: If all IP access-list statements in a particular list define the deny action, the default action is to permit all other packets.
Answer: False. The default action at the end of any IP access list is to deny all other packets.
Chapter 12 549
8.How many IP access lists of either type can be active on an interface at the same time?
Answer: Only one IP access list per interface, per direction, can be active. In other words, one inbound and one outbound are allowed, but no more.
For questions 9 through 11, assume that all parts of the network shown in Figure A-3 are up and working. IGRP is the IP routing protocol in use. Answer the questions following Example A-1, which contains an additional configuration in the Mayberry router.
Figure A-3 Network Diagram for Questions 9 Through 11
Andy Opie
180.3.5.13180.3.5.14
|
Subnet 180.3.5.0/24 |
|
Mayberry |
s0 |
|
|
Frame Relay |
|
Full Mesh |
Subnet 180.3.6.0/24 |
|
s0 |
s0 |
Mount Pilot |
Raleigh |
Subnet 180.3.7.0/24 |
Subnet 144.155.3.0/24 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Beatrice |
|
Floyd |
Barney |
|
Governor |
|||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
144.155.3.99 |
Example A-1 Access List at Mayberry
access-list 44 permit 180.3.5.13 0.0.0.0
!
interface serial 0
ip access-group 44 out
550Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
9.Describe the types of packets that this filter discards, and specify at what point they are discarded.
Answer: Only packets coming from Andy exit Mayberry’s serial 0 interface. Packets originating inside the Mayberry router—such as a ping command issued from Mayberry—work because the Cisco IOS software does not filter packets originating in that router. Opie is still out of luck—he’ll never get (a packet) out of Mayberry!
10.Does the access list shown in Example A-1 stop packets from getting to web server Governor? Why or why not?
Answer: Packets from Andy can get to web server Governor. Packets from Mount Pilot can be delivered to Governor if the route points directly from Mount Pilot to Raleigh so that the packets do not pass through Mayberry. Therefore, the access list, as coded, stops only hosts other than Andy on the Mayberry Ethernet from reaching web server Governor.
11.Referring to Figure A-3, create and enable access lists so that access to web server Governor is allowed from hosts at any site and so that no other access to hosts in Raleigh is allowed.
! this access list is enabled on the Raleigh router
access-list 130 permit tcp 180.3.5.0 0.0.0.255 host 144.155.3.99 eq www access-list 130 permit tcp 180.3.7.0 0.0.0.255 host 144.155.3.99 eq www
!
interface serial 0
ip access-group 130 in
Answer: This access list performs the function and also filters IGRP updates. That is part of the danger of inbound access lists. With outbound lists, the router does not filter packets originating in that router. With inbound access lists, all packets entering the interface are examined and can be filtered. An IGRP protocol type is allowed in the extended access-list command; therefore, this problem can be easily solved by matching IGRP updates. The command access-list 130 permit igrp any any performs the needed matching of IGRP updates, permitting those packets. (This command needs to appear before any statements in list 130 that might match IGRP updates.)
12.Name all the items that a standard IP access list can examine to make a match.
Answer:
Source IP address
Subset of the entire source address (using a mask)
Chapter 12 551
13.Name all the items that an extended IP access list can examine to make a match.
Answer: Protocol type Source port Source IP address
Subset of the entire source address (using a mask) Destination port
Destination IP address
Subset of the entire destination address (using a mask)
14.True or false: When you use extended IP access lists to restrict vty access, the matching logic is a best match of the list rather than a first match in the list.
Answer: False. Access list logic is always a first match for any application of the list.
15.In a standard numbered IP access list with three statements, a no version of the first statement is issued in configuration mode. Immediately following, another access list configuration command is added for the same access list. How many statements are in the list now, and in what position is the newly added statement?
Answer: Only one statement remains in the list: the newly added statement. The no access-list x command deletes the entire access list, even if you enter all the parameters in an individual command when issuing the no version of the command.
16.In a standard named IP access list with three statements, a no version of the first statement is issued in configuration mode. Immediately following, another access list configuration command is added for the same access list. How many statements are in the list now, and in what position is the newly added statement?
Answer: Three statements remain in the list, with the newly added statement at the end of the list. The no deny | permit... command deletes only that single named access list subcommand in named lists. However, when the command is added again, it cannot be placed anywhere except at the end of the list.
17.Name all the items that a named standard IP access list can examine to make a match.
Answer:
Source IP address
Subset of the entire source address (using a mask)
Named standard IP access lists match the same items that numbered IP access lists match.
552 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
18.Configure a named IP access list that stops packets from subnet 134.141.7.0 255.255.255.0 from exiting serial 0 on a router. Allow all other packets.
ip access-list standard fred deny 134.141.7.0 0.0.0.255 permit any
!
interface serial 0
ip access-group fred out
Answer: The first access-list statement denies packets from that subnet. The other statement is needed because the default action to deny packets is not explicitly matched in an access-list statement.
19.Configure a named IP access list that allows only packets from subnet 193.7.6.0 255.255.255.0, going to hosts in network 128.1.0.0 and using a web server in 128.1.0.0, to enter serial 0 on a router.
ip access-list extended barney
permit tcp 193.7.6.0 0.0.0.255 128.1.0.0 0.0.255.255 eq www
!
interface serial 0
ip access-group barney in
Answer: A deny all is implied at the end of the list.
20.List the types of IP access lists (numbered standard, numbered extended, named standard, named extended) that can be enabled to prevent Telnet access into a router.
What commands would be used to enable this function, assuming that access-list 2 was already configured to match the right packets?
Answer: Any type of IP access list can be enabled to prevent vty access. The command line vty 0 4, followed by ip access-class 2 in, enables the feature using access list 2. Because ACLs used for preventing Telnet access into a router check only the source IP address, there is no need for an extended ACL in this case, anyway.
21.What command lists the IP extended access lists enabled on serial 1 without showing other interfaces?
Answer: The show ip interface serial 1 command lists the names and numbers of the IP access lists enabled on serial 1.
Chapter 12 553
22.Name all the items that a named extended IP access list can examine to make a match.
Answer: Protocol type Source port Source IP address
Subset of the entire source address (using a mask) Destination port
Destination IP address
Subset of the entire destination address (using a mask)
These are the same things that can be matched with a numbered extended IP access list.
A P P E N D I X B
Decimal to Binary
Conversion Table
Decimal Value |
Binary Value |
Decimal Value |
Binary Value |
|
|
|
|
0 |
0000 0000 |
23 |
0001 0111 |
|
|
|
|
1 |
0000 0001 |
24 |
0001 1000 |
|
|
|
|
2 |
0000 0010 |
25 |
0001 1001 |
|
|
|
|
3 |
0000 0011 |
26 |
0001 1010 |
|
|
|
|
4 |
0000 0100 |
27 |
0001 1011 |
|
|
|
|
5 |
0000 0101 |
28 |
0001 1100 |
|
|
|
|
6 |
0000 0110 |
29 |
0001 1101 |
|
|
|
|
7 |
0000 0111 |
30 |
0001 1110 |
|
|
|
|
8 |
0000 1000 |
31 |
0001 1111 |
|
|
|
|
9 |
0000 1001 |
32 |
0010 0000 |
|
|
|
|
10 |
0000 1010 |
33 |
0010 0001 |
|
|
|
|
11 |
0000 1011 |
34 |
0010 0010 |
|
|
|
|
12 |
0000 1100 |
35 |
0010 0011 |
|
|
|
|
13 |
0000 1101 |
36 |
0010 0100 |
|
|
|
|
14 |
0000 1110 |
37 |
0010 0101 |
|
|
|
|
15 |
0000 1111 |
38 |
0010 0110 |
|
|
|
|
16 |
0001 0000 |
39 |
0010 0111 |
|
|
|
|
17 |
0001 0001 |
40 |
0010 1000 |
|
|
|
|
18 |
0001 0010 |
41 |
0010 1001 |
|
|
|
|
19 |
0001 0011 |
42 |
0010 1010 |
|
|
|
|
20 |
0001 0100 |
43 |
0010 1011 |
|
|
|
|
21 |
0001 0101 |
44 |
0010 1100 |
|
|
|
|
22 |
0001 0110 |
45 |
0010 1101 |
|
|
|
|
continues
556 Appendix B: Decimal to Binary Conversion Table
Decimal Value |
Binary Value |
Decimal Value |
Binary Value |
|
|
|
|
46 |
0010 1110 |
76 |
0100 1100 |
|
|
|
|
47 |
0010 1111 |
77 |
0100 1101 |
|
|
|
|
48 |
0011 0000 |
78 |
0100 1110 |
|
|
|
|
49 |
0011 0001 |
79 |
0100 1111 |
|
|
|
|
50 |
0011 0010 |
80 |
0101 0000 |
|
|
|
|
51 |
0011 0011 |
81 |
0101 0001 |
|
|
|
|
52 |
0011 0100 |
82 |
0101 0010 |
|
|
|
|
53 |
0011 0101 |
83 |
0101 0011 |
|
|
|
|
54 |
0011 0110 |
84 |
0101 0100 |
|
|
|
|
55 |
0011 0111 |
85 |
0101 0101 |
|
|
|
|
56 |
0011 1000 |
86 |
0101 0110 |
|
|
|
|
57 |
0011 1001 |
87 |
0101 0111 |
|
|
|
|
58 |
0011 1010 |
88 |
0101 1000 |
|
|
|
|
59 |
0011 1011 |
89 |
0101 1001 |
|
|
|
|
60 |
0011 1100 |
90 |
0101 1010 |
|
|
|
|
61 |
0011 1101 |
91 |
0101 1011 |
|
|
|
|
62 |
0011 1110 |
92 |
0101 1100 |
|
|
|
|
63 |
0011 1111 |
93 |
0101 1101 |
|
|
|
|
64 |
0100 0000 |
94 |
0101 1110 |
|
|
|
|
65 |
0100 0001 |
95 |
0101 1111 |
|
|
|
|
66 |
0100 0010 |
96 |
0110 0000 |
|
|
|
|
67 |
0100 0011 |
97 |
0110 0001 |
|
|
|
|
68 |
0100 0100 |
98 |
0110 0010 |
|
|
|
|
69 |
0100 0101 |
99 |
0110 0011 |
|
|
|
|
70 |
0100 0110 |
100 |
0110 0100 |
|
|
|
|
71 |
0100 0111 |
101 |
0110 0101 |
|
|
|
|
72 |
0100 1000 |
102 |
0110 0110 |
|
|
|
|
73 |
0100 1001 |
103 |
0110 0111 |
|
|
|
|
74 |
0100 1010 |
104 |
0110 1000 |
|
|
|
|
75 |
0100 1011 |
105 |
0110 1001 |
|
|
|
|
Decimal to Binary Conversion Table 557
Decimal Value |
Binary Value |
Decimal Value |
Binary Value |
|
|
|
|
106 |
0110 1010 |
136 |
1000 1000 |
|
|
|
|
107 |
0110 1011 |
137 |
1000 1001 |
|
|
|
|
108 |
0110 1100 |
138 |
1000 1010 |
|
|
|
|
109 |
0110 1101 |
139 |
1000 1011 |
|
|
|
|
110 |
0110 1110 |
140 |
1000 1100 |
|
|
|
|
111 |
0110 1111 |
141 |
1000 1101 |
|
|
|
|
112 |
0111 0000 |
142 |
1000 1110 |
|
|
|
|
113 |
0111 0001 |
143 |
1000 1111 |
|
|
|
|
114 |
0111 0010 |
144 |
1001 0000 |
|
|
|
|
115 |
0111 0011 |
145 |
1001 0001 |
|
|
|
|
116 |
0111 0100 |
146 |
1001 0010 |
|
|
|
|
117 |
0111 0101 |
147 |
1001 0011 |
|
|
|
|
118 |
0111 0110 |
148 |
1001 0100 |
|
|
|
|
119 |
0111 0111 |
149 |
1001 0101 |
|
|
|
|
120 |
0111 1000 |
150 |
1001 0110 |
|
|
|
|
121 |
0111 1001 |
151 |
1001 0111 |
|
|
|
|
122 |
0111 1010 |
152 |
1001 1000 |
|
|
|
|
123 |
0111 1011 |
153 |
1001 1001 |
|
|
|
|
124 |
0111 1100 |
154 |
1001 1010 |
|
|
|
|
125 |
0111 1101 |
155 |
1001 1011 |
|
|
|
|
126 |
0111 1110 |
156 |
1001 1100 |
|
|
|
|
127 |
0111 1111 |
157 |
1001 1101 |
|
|
|
|
128 |
1000 0000 |
158 |
1001 1110 |
|
|
|
|
129 |
1000 0001 |
159 |
1001 1111 |
|
|
|
|
130 |
1000 0010 |
160 |
1010 0000 |
|
|
|
|
131 |
1000 0011 |
161 |
1010 0001 |
|
|
|
|
132 |
1000 0100 |
162 |
1010 0010 |
|
|
|
|
133 |
1000 0101 |
163 |
1010 0011 |
|
|
|
|
134 |
1000 0110 |
164 |
1010 0100 |
|
|
|
|
135 |
1000 0111 |
165 |
1010 0101 |
|
|
|
|
continues
558 Appendix B: Decimal to Binary Conversion Table
Decimal Value |
Binary Value |
Decimal Value |
Binary Value |
|
|
|
|
166 |
1010 0110 |
196 |
1100 0100 |
|
|
|
|
167 |
1010 0111 |
197 |
1100 0101 |
|
|
|
|
168 |
1010 1000 |
198 |
1100 0110 |
|
|
|
|
169 |
1010 1001 |
199 |
1100 0111 |
|
|
|
|
170 |
1010 1010 |
200 |
1100 1000 |
|
|
|
|
171 |
1010 1011 |
201 |
1100 1001 |
|
|
|
|
172 |
1010 1100 |
202 |
1100 1010 |
|
|
|
|
173 |
1010 1101 |
203 |
1100 1011 |
|
|
|
|
174 |
1010 1110 |
204 |
1100 1100 |
|
|
|
|
175 |
1010 1111 |
205 |
1100 1101 |
|
|
|
|
176 |
1011 0000 |
206 |
1100 1110 |
|
|
|
|
177 |
1011 0001 |
207 |
1100 1111 |
|
|
|
|
178 |
1011 0010 |
208 |
1101 0000 |
|
|
|
|
179 |
1011 0011 |
209 |
1101 0001 |
|
|
|
|
180 |
1011 0100 |
210 |
1101 0010 |
|
|
|
|
181 |
1011 0101 |
211 |
1101 0011 |
|
|
|
|
182 |
1011 0110 |
212 |
1101 0100 |
|
|
|
|
183 |
1011 0111 |
213 |
1101 0101 |
|
|
|
|
184 |
1011 1000 |
214 |
1101 0110 |
|
|
|
|
185 |
1011 1001 |
215 |
1101 0111 |
|
|
|
|
186 |
1011 1010 |
216 |
1101 1000 |
|
|
|
|
187 |
1011 1011 |
217 |
1101 1001 |
|
|
|
|
188 |
1011 1100 |
218 |
1101 1010 |
|
|
|
|
189 |
1011 1101 |
219 |
1101 1011 |
|
|
|
|
190 |
1011 1110 |
220 |
1101 1100 |
|
|
|
|
191 |
1011 1111 |
221 |
1101 1101 |
|
|
|
|
192 |
1100 0000 |
222 |
1101 1110 |
|
|
|
|
193 |
1100 0001 |
223 |
1101 1111 |
|
|
|
|
194 |
1100 0010 |
224 |
1110 0000 |
|
|
|
|
195 |
1100 0011 |
225 |
1110 0001 |
|
|
|
|
Decimal to Binary Conversion Table 559
Decimal Value |
Binary Value |
Decimal Value |
Binary Value |
|
|
|
|
226 |
1110 0010 |
|
|
|
|
|
|
227 |
1110 0011 |
|
|
|
|
|
|
228 |
1110 0100 |
|
|
|
|
|
|
229 |
1110 0101 |
|
|
|
|
|
|
230 |
1110 0110 |
|
|
|
|
|
|
231 |
1110 0111 |
|
|
|
|
|
|
232 |
1110 1000 |
|
|
|
|
|
|
233 |
1110 1001 |
|
|
|
|
|
|
234 |
1110 1010 |
|
|
|
|
|
|
235 |
1110 1011 |
|
|
|
|
|
|
236 |
1110 1100 |
|
|
|
|
|
|
237 |
1110 1101 |
|
|
|
|
|
|
238 |
1110 1110 |
|
|
|
|
|
|
239 |
1110 1111 |
|
|
|
|
|
|
240 |
1111 0000 |
|
|
|
|
|
|
241 |
1111 0001 |
|
|
|
|
|
|
242 |
1111 0010 |
|
|
|
|
|
|
243 |
1111 0011 |
|
|
|
|
|
|
244 |
1111 0100 |
|
|
|
|
|
|
245 |
1111 0101 |
|
|
|
|
|
|
246 |
1111 0110 |
|
|
|
|
|
|
247 |
1111 0111 |
|
|
|
|
|
|
248 |
1111 1000 |
|
|
|
|
|
|
249 |
1111 1001 |
|
|
|
|
|
|
250 |
1111 1010 |
|
|
|
|
|
|
251 |
1111 1011 |
|
|
|
|
|
|
252 |
1111 1100 |
|
|
|
|
|
|
253 |
1111 1101 |
|
|
|
|
|
|
254 |
1111 1110 |
|
|
|
|
|
|
255 |
1111 1111 |
|
|
|
|
|
|