SlideShare a Scribd company logo
1 of 30
Mahmmoud Mahdi
 Allows you to take one larger network and
  break it into a bunch of smaller networks.
 benefits:
  Reduced network traffic
  Optimized network performance
  Simplified management
  Facilitated spanning of large geographical
   distances
192.168.2.1   192.168.3.1




              192.168.3.2




192.168.2.2
              192.168.3.3
    A 32-bit value that allows the recipient of IP packets
    to distinguish between:
     The network ID portion of the IP address.
     The host ID portion of the IP address.
   The 1s in the subnet mask represent:
     the positions that refer to the network or subnet
      addresses.
   Not all networks need subnets:
     meaning they use the default subnet mask.
     These default masks cannot change.
      ▪ Class A network, you can’t change the first byte in a subnet mask;
        it must read 255.0.0.0 at a minimum.
      ▪ Class B: start with 255.255.0.0
      ▪ Class C: start with 255.255.255.0.
Class B address
                  Class B address

      Network address       Host address

               130.57.
                130.57.     1.56
                             1.56


1000 0010. 0011 1001.
 1000 0010. 0011 1001.       0000 0001. 0011 1000
                              0000 0001. 0011 1000


      Class B address with aasubnet address
       Class B address with subnet address

      Network address         Subnet   Host address


1000 0010. 0011 1001.
 1000 0010. 0011 1001.        0000 0001. 0011 1000
                               0000 0001. 0011 1000
 To create subnet:
  Take bits from the host portion of the IP address
   and reserve them to define the subnet address.
  This means fewer bits for hosts, so the more
   subnets, the fewer bits available for defining
   hosts.
192.168.2.1
                     255.255.255.0

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0

       192.168.2.1/24 (CIDR notation)


                 1 network                28-2=254
                                          addresses
192.168.2.32    192.168.2.128
                              192.168.2.1   192.168.2.64
                                            192.168.2.96
                                                            192.168.2.160
                                                            192.168.2.192
                                            192.168.2.128   192.168.2.234
                        255.255.255.224           23=8subnets



1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0

      192.168.2.1/27 (CIDR notation)

                                                       25-2=30
                       network                         addresses
 CIDR creates a hierarchical addressing
  structure by breaking the network address
  space into CIDR blocks
 CIDR notation:
  describes a network by specifying the base
   address and the number of bits used for the
   network portion
  i.e., 10.0.0.0/8
   ▪ a network using 24 bits for host numbering
   ▪ a maximum of 224 -2 possible host addresses.
 Method that ISPs use to allocate a number of
 addresses to a company, a home—a customer.
 192.168.10.32/28:
   Telling you what your subnet mask is.
   The slash notation (/)
    ▪ how many bits are turned on (1s).
 Keep in Mind:
   the largest subnet mask available (regardless of the
   class of address) can only be a /30.
    ▪ you’ve got to keep at least 2 bits for host bits.
 Example:
  A Class A default subnet mask:
   ▪ which is 255.0.0.0
     ▪ This means that the first byte of the subnet mask is all ones (1s), or
       11111111.
   ▪ A slash notation:
     ▪ you need to count all the 1s bits to figure out your mask.
   ▪ The 255.0.0.0 is considered a /8
  A Class B default mask:
   ▪ 255.255.0.0
     ▪ which is a /16 because 16 bits are ones (1s):
       11111111.11111111.00000000.00000000.
Network Class   Starting    Ending Address    CIDR    Bitmask
                Address                       Block
Class A         0.0.0.0     127.255.255.255   /8      255.0.0.0
Class B         128.0.0.0   191.255.255.255   /16     255.255.0.0
Class C         192.0.0.0   223.255.255.255   /24     255.255.255.0
Class D         224.0.0.0   239.255.255.251   /4
(multicast)
Class E         240.0.0.0   255.255.255.255   /4
(reserved)
Subnet Mask     CIDR Value   Subnet Mask       CIDR Value
255.0.0.0       /8           255.255.240.0     /20
255.128.0.0     /9           255.255.248.0     /21
255.192.0.0     /10          255.255.252.0     /22
255.224.0.0     /11          255.255.254.0     /23
255.240.0.0     /12          255.255.255.0     /24
255.248.0.0     /13          255.255.255.128   /25
255.252.0.0     /14          255.255.255.192   /26
255.254.0.0     /15          255.255.255.224   /27
255.255.0.0     /16          255.255.255.240   /28
255.255.128.0   /17          255.255.255.248   /29
255.255.192.0   /18          255.255.255.252   /30
255.255.224.0   /19
 The /8 through /15
   can only be used with Class A network addresses.
 The /16 through /23
   can be used by Class A and B network addresses.
 The /24 through /30
   can be used by Class A, B, and C network addresses.
 This is a big reason why most companies use
 Class A network addresses.
   Since they can use all subnet masks, they get the
   maximum flexibility in network design.
 Class C address, only 8 bits are available for defining
  the hosts.
 Class C subnet masks can be the following:
   Binary           Decimal          CIDR
   00000000         =0               /24
   10000000         = 128            /25
   11000000         = 192            /26
   11100000         = 224            /27
   11110000         = 240            /28
   11111000         = 248            /29
   11111100         = 252            /30
  ▪ We can’t use a /31 or /32 because we have to have at least 2
    host bits for assigning IP addresses to hosts.
 2x= number of subnets.
  ▪ x is the number of masked bits, or the 1s.
 For example:
  ▪ in 11000000, the number of 1s gives us 22 subnets.
  ▪ In this example, there are 4 subnets.
 2y – 2 = number of hosts per subnet.
  ▪ y is the number of unmasked bits, or the 0s.
 Example:
  ▪ in 11000000, the number of 0s gives us 26 – 2 hosts.
  ▪ In this example, there are 62 hosts per subnet.
  ▪ You need to subtract 2 for the subnet address and the
    broadcast address, which are not valid hosts.
 256 – subnet mask = block size, or increment
  number.
 Ex: 256 – 192 = 64:
  ▪ The block size of a 192 mask is always 64.
  ▪ Start counting at zero in blocks of 64 until you reach
    the subnet mask value.
    ▪ 0, 64, 128, 192.
 The broadcast address is always the number
  right before the next subnet.
 Example:
  ▪ The 0 subnet has a broadcast address of 63
    ▪ Because: the next subnet is 64.
  ▪ The 64 subnet has a broadcast address of 127
    ▪ because the next subnet is 128. And so on.
 Remember: the broadcast address of the last
 subnet is always 255.
 The numbers between the subnets, omitting the
  all 0s and all 1s.
  ▪ it’s always the numbers between the subnet address
    and the broadcast address.
 Example:
  ▪ if 64 is the subnet number and 127 is the broadcast
    address,
  ▪ then 65–126 is the valid host range.
 Subnet the Class C network address
 255.255.255.128 (/25)
  192.168.10.0 = Network address
  255.255.255.128 = Subnet mask
Subnet       192.168.10.0   192.168.10.128
First host   192.168.10.1   192.168.10.129
Last host    192.168.10.126 192.168.10.254
Broadcast    192.168.10.127 192.168.10.255
Contact Me: qursaan@yahoo.com

More Related Content

What's hot

What's hot (20)

Subnetting
SubnettingSubnetting
Subnetting
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
IPv4
IPv4IPv4
IPv4
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Subnetting
SubnettingSubnetting
Subnetting
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 

Viewers also liked

Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan SupernettingZainuddin Kurnia
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1Anant Lodha
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementKanishka Gopal
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)crm2life
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing PrintersMahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing FilesMahmmoud Mahdi
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing AMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Windump
WindumpWindump
Windumpjk847
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise SystemsSaurabh Goel
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemTushar B Kute
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning pptShivani Garg
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol AMahmmoud Mahdi
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planningAmit Singh
 

Viewers also liked (20)

Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan Supernetting
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Windump
WindumpWindump
Windump
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning ppt
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
 

Similar to Lesson 2: Subnetting basics

Subnetting class
Subnetting classSubnetting class
Subnetting classFTC
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingneclinux
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 

Similar to Lesson 2: Subnetting basics (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Day03
Day03 Day03
Day03
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Assignment 1 iap
Assignment 1 iapAssignment 1 iap
Assignment 1 iap
 
Mod6
Mod6Mod6
Mod6
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 

More from Mahmmoud Mahdi

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptMahmmoud Mahdi
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge labMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionMahmmoud Mahdi
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsMahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 

More from Mahmmoud Mahdi (6)

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup script
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge lab
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Lesson 2: Subnetting basics

  • 2.  Allows you to take one larger network and break it into a bunch of smaller networks.  benefits:  Reduced network traffic  Optimized network performance  Simplified management  Facilitated spanning of large geographical distances
  • 3. 192.168.2.1 192.168.3.1 192.168.3.2 192.168.2.2 192.168.3.3
  • 4. A 32-bit value that allows the recipient of IP packets to distinguish between:  The network ID portion of the IP address.  The host ID portion of the IP address.  The 1s in the subnet mask represent:  the positions that refer to the network or subnet addresses.  Not all networks need subnets:  meaning they use the default subnet mask.  These default masks cannot change. ▪ Class A network, you can’t change the first byte in a subnet mask; it must read 255.0.0.0 at a minimum. ▪ Class B: start with 255.255.0.0 ▪ Class C: start with 255.255.255.0.
  • 5.
  • 6.
  • 7. Class B address Class B address Network address Host address 130.57. 130.57. 1.56 1.56 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000 Class B address with aasubnet address Class B address with subnet address Network address Subnet Host address 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000
  • 8.  To create subnet:  Take bits from the host portion of the IP address and reserve them to define the subnet address.  This means fewer bits for hosts, so the more subnets, the fewer bits available for defining hosts.
  • 9.
  • 10.
  • 11. 192.168.2.1 255.255.255.0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 192.168.2.1/24 (CIDR notation) 1 network 28-2=254 addresses
  • 12. 192.168.2.32 192.168.2.128 192.168.2.1 192.168.2.64 192.168.2.96 192.168.2.160 192.168.2.192 192.168.2.128 192.168.2.234 255.255.255.224 23=8subnets 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 192.168.2.1/27 (CIDR notation) 25-2=30 network addresses
  • 13.  CIDR creates a hierarchical addressing structure by breaking the network address space into CIDR blocks  CIDR notation:  describes a network by specifying the base address and the number of bits used for the network portion  i.e., 10.0.0.0/8 ▪ a network using 24 bits for host numbering ▪ a maximum of 224 -2 possible host addresses.
  • 14.  Method that ISPs use to allocate a number of addresses to a company, a home—a customer.  192.168.10.32/28:  Telling you what your subnet mask is.  The slash notation (/) ▪ how many bits are turned on (1s).  Keep in Mind:  the largest subnet mask available (regardless of the class of address) can only be a /30. ▪ you’ve got to keep at least 2 bits for host bits.
  • 15.  Example:  A Class A default subnet mask: ▪ which is 255.0.0.0 ▪ This means that the first byte of the subnet mask is all ones (1s), or 11111111. ▪ A slash notation: ▪ you need to count all the 1s bits to figure out your mask. ▪ The 255.0.0.0 is considered a /8  A Class B default mask: ▪ 255.255.0.0 ▪ which is a /16 because 16 bits are ones (1s): 11111111.11111111.00000000.00000000.
  • 16. Network Class Starting Ending Address CIDR Bitmask Address Block Class A 0.0.0.0 127.255.255.255 /8 255.0.0.0 Class B 128.0.0.0 191.255.255.255 /16 255.255.0.0 Class C 192.0.0.0 223.255.255.255 /24 255.255.255.0 Class D 224.0.0.0 239.255.255.251 /4 (multicast) Class E 240.0.0.0 255.255.255.255 /4 (reserved)
  • 17. Subnet Mask CIDR Value Subnet Mask CIDR Value 255.0.0.0 /8 255.255.240.0 /20 255.128.0.0 /9 255.255.248.0 /21 255.192.0.0 /10 255.255.252.0 /22 255.224.0.0 /11 255.255.254.0 /23 255.240.0.0 /12 255.255.255.0 /24 255.248.0.0 /13 255.255.255.128 /25 255.252.0.0 /14 255.255.255.192 /26 255.254.0.0 /15 255.255.255.224 /27 255.255.0.0 /16 255.255.255.240 /28 255.255.128.0 /17 255.255.255.248 /29 255.255.192.0 /18 255.255.255.252 /30 255.255.224.0 /19
  • 18.  The /8 through /15  can only be used with Class A network addresses.  The /16 through /23  can be used by Class A and B network addresses.  The /24 through /30  can be used by Class A, B, and C network addresses.  This is a big reason why most companies use Class A network addresses.  Since they can use all subnet masks, they get the maximum flexibility in network design.
  • 19.  Class C address, only 8 bits are available for defining the hosts.  Class C subnet masks can be the following: Binary Decimal CIDR 00000000 =0 /24 10000000 = 128 /25 11000000 = 192 /26 11100000 = 224 /27 11110000 = 240 /28 11111000 = 248 /29 11111100 = 252 /30 ▪ We can’t use a /31 or /32 because we have to have at least 2 host bits for assigning IP addresses to hosts.
  • 20.
  • 21.
  • 22.  2x= number of subnets. ▪ x is the number of masked bits, or the 1s.  For example: ▪ in 11000000, the number of 1s gives us 22 subnets. ▪ In this example, there are 4 subnets.
  • 23.  2y – 2 = number of hosts per subnet. ▪ y is the number of unmasked bits, or the 0s.  Example: ▪ in 11000000, the number of 0s gives us 26 – 2 hosts. ▪ In this example, there are 62 hosts per subnet. ▪ You need to subtract 2 for the subnet address and the broadcast address, which are not valid hosts.
  • 24.  256 – subnet mask = block size, or increment number.  Ex: 256 – 192 = 64: ▪ The block size of a 192 mask is always 64. ▪ Start counting at zero in blocks of 64 until you reach the subnet mask value. ▪ 0, 64, 128, 192.
  • 25.  The broadcast address is always the number right before the next subnet.  Example: ▪ The 0 subnet has a broadcast address of 63 ▪ Because: the next subnet is 64. ▪ The 64 subnet has a broadcast address of 127 ▪ because the next subnet is 128. And so on.  Remember: the broadcast address of the last subnet is always 255.
  • 26.  The numbers between the subnets, omitting the all 0s and all 1s. ▪ it’s always the numbers between the subnet address and the broadcast address.  Example: ▪ if 64 is the subnet number and 127 is the broadcast address, ▪ then 65–126 is the valid host range.
  • 27.  Subnet the Class C network address 255.255.255.128 (/25)  192.168.10.0 = Network address  255.255.255.128 = Subnet mask
  • 28.
  • 29. Subnet 192.168.10.0 192.168.10.128 First host 192.168.10.1 192.168.10.129 Last host 192.168.10.126 192.168.10.254 Broadcast 192.168.10.127 192.168.10.255