SlideShare uma empresa Scribd logo
1 de 17
Why Subnet?
• To break the network down into pieces, each of
which can be addressed separately.
• Controls network traffic
• Reduces broadcasts
• Can provide low level security with access lists on the
router
• Organization of IP address space
Subnetting a Default Class C
Network Address: 200.129.41.0
• Default Class C address is divided into network and
host portions as follows:
N . N . N . H
• To subnet we “borrow” bits from the host portion
of the address (8 bits for Class C)
N . N . N . x x x x x x x x
• Borrowing n bits yields 2n
– 2 subnets.
• Leaving n bits yields 2n
– 2 hosts.
• For a class C, we can borrow from 2 to 6 bits.
• Why not 1 bit? (How many usable subnets?)
• Why not 7 bits? (How many usable hosts?)
Subnetting a Default Class C
Network Address: 200.129.41.0
• Suppose we need 14 usable subnets, how many
bits do we borrow?
• Remember, borrowing n bits give us:
• 2n
– 2 subnets
• Try borrowing 3 bits (n = 3):
• 23
– 2 = 8 – 2
= 6 usable subnets (not enough)
• Try borrowing 4 bits
• 24
– 2 = 16 – 2
= 14 usable subnets (enough)
Subnetting a Default Class C
Network Address: 200.129.41.0
• Write it with the network octet in binary:
200.129.41.0000 0000
breakhere
• Borrowing 4 bits yields 14 usable subnets
• How many usable hosts per subnet?
• Same formula as subnets (2n
– 2)
• 4 host bits (n = 4)
• 24
– 2 = 16 – 2
= 14 usable hosts per subnet
subnet bits host bits
Subnetting a Default Class C
Network Address: 200.129.41.0
• Examples:
• First usable 200.129.41.0001 ^ 0000
subnet address: 200.129.41.16
• First usable host 200.129.41.0001 ^ 0001
on the first subnet: 200.129.41.17
• Second usable host 200.129.41.0001 ^ 0010
on the first subnet: 200.129.41.18
.
.
.
• Last usable host 200.129.41.0001 ^ 1110
on the first subnet: 200.129.41.30
• Broadcast address 200.129.41.0001 ^ 1111
for the first subnet: 200.129.41.31
Subnetting a Default Class C
Network Address: 200.129.41.0
• Examples:
• Second usable 200.129.41.0010 ^ 0000
subnet address: 200.129.41.32
• Third usable 200.129.41.0011 ^ 0000
subnet address: 200.129.41.48
• Fourth usable 200.129.41.0100 ^ 0000
subnet address: 200.129.41.64
.
.
.
• Last usable 200.129.41.1110 ^ 0000
subnet address: 200.129.41.224
The Subnet Mask: How the
Router Determines the Subnet
• The subnet mask (in binary) has:
• all ones in the network and subnet portion of the
address
• all zeros in the host potion of the address
• The subnet mask for the previous example is:
255.255.255. 240
255.255.255. 1111^ 0000 (128 + 64 + 32 + 16 =240)
• ANDing this mask with any valid host address on the
network will always yield the subnet address for that
host, where if both bits are 1 you get a 1 otherwise its a 0.
The Subnet Mask: How the
Router Determines the Subnet
• Example (our subnet mask is 255.255.255.240)
IP host address: 200.129. 41.23
Last octet to binary: 200.129. 41.0001 0111
AND subnet mask: 255.255.255.1111 0000
200.129. 41.0001 0000
Subnet Address: 200.129. 41.16
So the host address 200.129. 41.23 is on the
200.129.41.16 subnet.
Subnetting a Default Class B
Network Address: 132.178.0.0
• Default Class B address is divided into network and
host portions as follows:
N . N . H . H
• To subnet we “borrow” bits from the host portion
of the address (16 bits for Class B)
N . N . x x x x x x x x . x x x x x x x x
• For a class B, we can borrow from 2 to 14 bits.
Subnetting a Default Class B
Network Address: 132.178.0.0
• Suppose we need 80 usable subnets, how many
bits do we borrow?
• Remember, borrowing n bits give us:
• 2n
– 2 subnets
• Try borrowing 6 bits (n = 6):
• 26
– 2 = 64 – 2
= 62 usable subnets (not enough)
• Try borrowing 7 bits
• 27
– 2 = 128 – 2
= 126 usable subnets (enough)
Subnetting a Default Class B
Network Address: 132.178.0.0
• Write it with the network octets in binary:
132.178.0000000 0.00000000
breakhere
• Borrowing 7 bits yields 126 usable subnets
• How many usable hosts per subnet?
• Same formula as subnets (2n
– 2)
• 9 host bits (n = 9)
• 29
– 2 = 512 – 2
= 510 usable hosts per subnet
subnet bits host bits
Subnetting a Default Class B
Network Address: 132.178.0.0
• Examples:
• First usable 132.178.0000001 ^ 0.00000000
subnet address: 132.178.2.0
• First usable host 132.178.0000001 ^ 0.00000001
on the first subnet: 132.178.2.1
• Second usable host 132.178.0000001 ^ 0.00000010
on the first subnet: 132.178.2.2
.
.
.
• Last usable host 132.178.0000001 ^ 1.11111110
on the first subnet: 132.178.3.254
• Broadcast address 132.178.0000001 ^1.11111111
for the first subnet: 132.178.3.255
Subnetting a Default Class B
Network Address: 132.178.0.0
• Examples:
• Second usable 132.178.0000010 ^ 0.00000000
subnet address: 132.178.4.0
• Third usable 132.178.0000011 ^ 0.00000000
subnet address: 132.178.6.0
.
.
.
• Ninety-first usable 132.178.1011011 ^ 0.00000000
subnet address: 132.178.182.0
.
.
.
• Last usable 132.178.1111110 ^ 0.00000000
subnet address: 132.178.252.0
Subnetting a Default Class B
Network Address: 132.178.0.0
• The subnet mask for this example is:
255.255.254.0
255.255.1111111 ^ 0.00000000
• ANDing this mask with any valid host address on
this network will always yield the subnet address.
• Where if both bits are 1 you get a 1 otherwise its a
0.
Subnetting a Default Class B
Network Address: 132.178.0.0
• Example:
IP host address: 132.178.119.112
Last octets to binary: 132.178.0111011 ^ 1.01110000
AND subnet mask: 255.255.1111111 ^ 0.00000000
132.178.0111011 ^ 0.00000000
Subnet Address: 132.178.118.0
Subnetting

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Ip addressing
Ip addressingIp addressing
Ip addressing
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
ccna
ccnaccna
ccna
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
 
CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Radius1
Radius1Radius1
Radius1
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
Icmp
IcmpIcmp
Icmp
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
DNS server config on cisco packet tracer
DNS server config on cisco packet tracerDNS server config on cisco packet tracer
DNS server config on cisco packet tracer
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
 

Destaque (19)

A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
INTEGRATED CIRCUIT
INTEGRATED CIRCUITINTEGRATED CIRCUIT
INTEGRATED CIRCUIT
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Subnitting
SubnittingSubnitting
Subnitting
 
configure IP address in command mode
configure IP address in command modeconfigure IP address in command mode
configure IP address in command mode
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
Storage device
Storage deviceStorage device
Storage device
 
Processor
ProcessorProcessor
Processor
 
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
 
01.number systems
01.number systems01.number systems
01.number systems
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Raid Levels
Raid LevelsRaid Levels
Raid Levels
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Semelhante a Subnetting

A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjaysanjay kushwaha
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
Fixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptxFixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptxShaqib3
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesKrishna Mohan
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 

Semelhante a Subnetting (20)

A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjay
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
Fixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptxFixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptx
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Subnetting

  • 1.
  • 2. Why Subnet? • To break the network down into pieces, each of which can be addressed separately. • Controls network traffic • Reduces broadcasts • Can provide low level security with access lists on the router • Organization of IP address space
  • 3. Subnetting a Default Class C Network Address: 200.129.41.0 • Default Class C address is divided into network and host portions as follows: N . N . N . H • To subnet we “borrow” bits from the host portion of the address (8 bits for Class C) N . N . N . x x x x x x x x • Borrowing n bits yields 2n – 2 subnets. • Leaving n bits yields 2n – 2 hosts. • For a class C, we can borrow from 2 to 6 bits. • Why not 1 bit? (How many usable subnets?) • Why not 7 bits? (How many usable hosts?)
  • 4. Subnetting a Default Class C Network Address: 200.129.41.0 • Suppose we need 14 usable subnets, how many bits do we borrow? • Remember, borrowing n bits give us: • 2n – 2 subnets • Try borrowing 3 bits (n = 3): • 23 – 2 = 8 – 2 = 6 usable subnets (not enough) • Try borrowing 4 bits • 24 – 2 = 16 – 2 = 14 usable subnets (enough)
  • 5. Subnetting a Default Class C Network Address: 200.129.41.0 • Write it with the network octet in binary: 200.129.41.0000 0000 breakhere • Borrowing 4 bits yields 14 usable subnets • How many usable hosts per subnet? • Same formula as subnets (2n – 2) • 4 host bits (n = 4) • 24 – 2 = 16 – 2 = 14 usable hosts per subnet subnet bits host bits
  • 6. Subnetting a Default Class C Network Address: 200.129.41.0 • Examples: • First usable 200.129.41.0001 ^ 0000 subnet address: 200.129.41.16 • First usable host 200.129.41.0001 ^ 0001 on the first subnet: 200.129.41.17 • Second usable host 200.129.41.0001 ^ 0010 on the first subnet: 200.129.41.18 . . . • Last usable host 200.129.41.0001 ^ 1110 on the first subnet: 200.129.41.30 • Broadcast address 200.129.41.0001 ^ 1111 for the first subnet: 200.129.41.31
  • 7. Subnetting a Default Class C Network Address: 200.129.41.0 • Examples: • Second usable 200.129.41.0010 ^ 0000 subnet address: 200.129.41.32 • Third usable 200.129.41.0011 ^ 0000 subnet address: 200.129.41.48 • Fourth usable 200.129.41.0100 ^ 0000 subnet address: 200.129.41.64 . . . • Last usable 200.129.41.1110 ^ 0000 subnet address: 200.129.41.224
  • 8. The Subnet Mask: How the Router Determines the Subnet • The subnet mask (in binary) has: • all ones in the network and subnet portion of the address • all zeros in the host potion of the address • The subnet mask for the previous example is: 255.255.255. 240 255.255.255. 1111^ 0000 (128 + 64 + 32 + 16 =240) • ANDing this mask with any valid host address on the network will always yield the subnet address for that host, where if both bits are 1 you get a 1 otherwise its a 0.
  • 9. The Subnet Mask: How the Router Determines the Subnet • Example (our subnet mask is 255.255.255.240) IP host address: 200.129. 41.23 Last octet to binary: 200.129. 41.0001 0111 AND subnet mask: 255.255.255.1111 0000 200.129. 41.0001 0000 Subnet Address: 200.129. 41.16 So the host address 200.129. 41.23 is on the 200.129.41.16 subnet.
  • 10. Subnetting a Default Class B Network Address: 132.178.0.0 • Default Class B address is divided into network and host portions as follows: N . N . H . H • To subnet we “borrow” bits from the host portion of the address (16 bits for Class B) N . N . x x x x x x x x . x x x x x x x x • For a class B, we can borrow from 2 to 14 bits.
  • 11. Subnetting a Default Class B Network Address: 132.178.0.0 • Suppose we need 80 usable subnets, how many bits do we borrow? • Remember, borrowing n bits give us: • 2n – 2 subnets • Try borrowing 6 bits (n = 6): • 26 – 2 = 64 – 2 = 62 usable subnets (not enough) • Try borrowing 7 bits • 27 – 2 = 128 – 2 = 126 usable subnets (enough)
  • 12. Subnetting a Default Class B Network Address: 132.178.0.0 • Write it with the network octets in binary: 132.178.0000000 0.00000000 breakhere • Borrowing 7 bits yields 126 usable subnets • How many usable hosts per subnet? • Same formula as subnets (2n – 2) • 9 host bits (n = 9) • 29 – 2 = 512 – 2 = 510 usable hosts per subnet subnet bits host bits
  • 13. Subnetting a Default Class B Network Address: 132.178.0.0 • Examples: • First usable 132.178.0000001 ^ 0.00000000 subnet address: 132.178.2.0 • First usable host 132.178.0000001 ^ 0.00000001 on the first subnet: 132.178.2.1 • Second usable host 132.178.0000001 ^ 0.00000010 on the first subnet: 132.178.2.2 . . . • Last usable host 132.178.0000001 ^ 1.11111110 on the first subnet: 132.178.3.254 • Broadcast address 132.178.0000001 ^1.11111111 for the first subnet: 132.178.3.255
  • 14. Subnetting a Default Class B Network Address: 132.178.0.0 • Examples: • Second usable 132.178.0000010 ^ 0.00000000 subnet address: 132.178.4.0 • Third usable 132.178.0000011 ^ 0.00000000 subnet address: 132.178.6.0 . . . • Ninety-first usable 132.178.1011011 ^ 0.00000000 subnet address: 132.178.182.0 . . . • Last usable 132.178.1111110 ^ 0.00000000 subnet address: 132.178.252.0
  • 15. Subnetting a Default Class B Network Address: 132.178.0.0 • The subnet mask for this example is: 255.255.254.0 255.255.1111111 ^ 0.00000000 • ANDing this mask with any valid host address on this network will always yield the subnet address. • Where if both bits are 1 you get a 1 otherwise its a 0.
  • 16. Subnetting a Default Class B Network Address: 132.178.0.0 • Example: IP host address: 132.178.119.112 Last octets to binary: 132.178.0111011 ^ 1.01110000 AND subnet mask: 255.255.1111111 ^ 0.00000000 132.178.0111011 ^ 0.00000000 Subnet Address: 132.178.118.0

Notas do Editor

  1. See page 10 in the workbook and show students what happens with 255 octets in the mask when converted to binary for ANDing.