SlideShare uma empresa Scribd logo
1 de 35
Subnetting Made Easy?Subnetting Made Easy?
The “moving stick” and the “magic number”The “moving stick” and the “magic number”
Jim BlancoJim Blanco
Aparicio-Levy Technical CenterAparicio-Levy Technical Center
Subnetting Made EasySubnetting Made Easy
•First let’s look at the overall requirement.
•A class C network consists of 4 octets totaling 32 bits.
•If we use a Class C network such as 192.168.12.0, we can only
make use of the last octet or 8 bits.
•There are 256 possible combinations of bits “on” or “off” in one octet.
Subnetting Made EasySubnetting Made Easy
•256 addresses would result in a very large collision domain.
•256 hosts using the “wire” one at a time would render the LAN
unusable.
•In business environments, host addresses are usually divided
into groups or subnets for management and security reasons.
•In addition the first address is reserved for the subnet address
and the last for a broadcast address.
•So we really have 254 available host addresses.
Subnetting Made EasySubnetting Made Easy
 We could just divide the addresses in the last octet into more manageable
blocks or “subnets”:
256/4 = 64 or 4 subnets each with 64 addresses
256/8 = 32 or 8 subnets each with 32 addresses
256/16 = 16 or 16 subnets each with 16 addresses
 But this is too simple. We must also keep track of subnet and broadcast
addresses.
Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•First convert the last octet, represented by the decimal number “0”,
into 8 binary “0”s to represent 8 bits.
Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 000000000000000
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
• By just utilizing the last bit, we have two possible IP addresses.
Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 000000000000000 bit offbit off
192192 168168 1212 00 IP addressIP address
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•First, with the bit remaining at “0” or off, the IP address is 192.168.12.0
Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000 bit offbit off
192192 168168 1212 00 IP addressIP address
192192 168168 1212 000000000000001 bit onbit on
192192 168168 1212 11 IP addressIP address
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•Second, when the bit is “1” or turned on, the IP address is 192.168.12.1
•Thus we have 2 possible IP addresses just utilizing the last bit
Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000 bit offbit off
192192 168168 1212 00 .0.0
192192 168168 1212 0000000100000001 bit onbit on
192192 168168 1212 11 .1.1
192192 168168 1212 00000000000000 .0.0
192192 168168 1212 00000000000001 .1.1
192192 168168 1212 00000000000010 .2.2
192192 168168 1212 00000000000011 .3.3
•If we use the two last bits, in the on an off positions, we have four possible IP
addresses.
•We could continue with combinations of 3, 4 and more bits up to 8 which
would result in 256 combinations of 1 and 0 or potential IP addresses.
•Remember “0” is a number.
Subnetting: Class CSubnetting: Class C hosthost addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000000 bit offbit off
192192 168168 1212 00 .0.0
192192 168168 1212 0000000100000001 bit onbit on
192192 168168 1212 11 .1.1
192192 168168 1212 00000000000000 .0.0
192192 168168 1212 00000000000001 .1.1
192192 168168 1212 00000000000010 .2.2
192192 168168 1212 00000000000011 .3.3
•Since we cannot use the first address (subnet), 0 or the last address 255
(broadcast) we have 256-2=254 usable addresses.
•That’s one big collision domain.
•We need to divide it up into smaller blocks or “subnets”.
Subnetting: Class CSubnetting: Class C hosthost addressaddress
 Hold on. Thought we had 256 addresses?Hold on. Thought we had 256 addresses?
Or is it 254?Or is it 254?
 There are 256 combinations of 1 and 0.There are 256 combinations of 1 and 0.
 Possible addresses run from .0 to .255.Possible addresses run from .0 to .255.
 ““0” is a number.0” is a number.
 0-255 yields 256 addresses.0-255 yields 256 addresses.
 The first “0” is reserved for the subnet andThe first “0” is reserved for the subnet and
the last “255” is the broadcast address.the last “255” is the broadcast address.
Subnetting: Class CSubnetting: Class C hosthost addressaddress
 So that’s 256 – 2 or 254 usable addressesSo that’s 256 – 2 or 254 usable addresses
in our one big subnet.in our one big subnet.
 Next we need to decide how manyNext we need to decide how many
subnets will meet our networkingsubnets will meet our networking
requirement.requirement.
Subnetting: Class CSubnetting: Class C subnetsubnet addressaddress
192192 168168 1212 00
192192 168168 1212 0000000000000 bit offbit off
192192 168168 1212 00 11stst
subnetsubnet
192192 168168 1212 100000000000000 bit onbit on
192192 168168 1212 11 22eded
subnetsubnet
192192 168168 1212
192192 168168 1212
192192 168168 1212
192192 168168 1212
•The same rule applies to borrowing bits for subnet addresses.
•Start at the left side.
•The first bit can be borrowed and turned on or off resulting in 2 subnets.
Subnetting: Class CSubnetting: Class C subnetsubnet addressaddress
192192 168168 1212 00
192192 168168 1212 00000000000000
192192 168168 1212 00
192192 168168 1212 1000000010000000
192192 168168 1212 11
192192 168168 1212 00000000000000 00
192192 168168 1212 10000000000000 11
192192 168168 1212 01000000000000 22
192192 168168 1212 11000000000000 33
•Borrowing two bits yields four combinations of bits on and off, or four
different combinations and 4 possible subnets
The moving stickThe moving stick
0 0 0 0 0 0 0 0
192.168.12.0
•Now let’s put it all together with our “moving stick” method
•Write the last octet in binary
The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible host addresses
0 0 0 0 0 0 0 0
•Start on the right.
•Number to the left to show possible numbers of host addresses.
The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
Start on the left.
Number to the right to show possible numbers of subnets.
The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•Draw the “moving stick.”
•You could have a combination of 4 subnets with 64 addresses each.
The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
Move the “stick” to the right.
You could have a combination of 8 subnets with 32 addresses each.
The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
Move it again.
You could have a combination of 16 subnets with 16 addresses each.
Calculate the subnetsCalculate the subnets
Use this IP addressUse this IP address
192.168.12.0192.168.12.0
Our company requires at least 3 subnets withOur company requires at least 3 subnets with
more than 50 hosts per subnet.more than 50 hosts per subnet.
The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•Look back to our first example.
•We borrowed two bits.
•This fits the requirement of our company – 4 subnets each with up to 64 addresses.
The moving stickThe moving stick
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•We could move the “stick” to the right.
•But a combination of 8 subnets with 32 addresses each
does not meet our company’s requirement.
The moving stickThe moving stick
add the “add the “magic numbermagic number””
256 128 64 32 16 8 4 2 possible number of host addresses
0 0 0 0 0 0 0 0
2 4 8 16 32 64 128 256 possible number of subnets
•We move the stick back to the left.
•64 is our “magic” number”.
Calculate the subnetsCalculate the subnets
SubnetSubnet RangeRange BroadcastBroadcast
addressaddress
192.168.12.0192.168.12.0
192.168.12.192.168.12.64
192.168.12.192.168.12.128
192.168.12.192.168.12.1192
•Add to the “0” subnet by increments of 64, our magic number.
•We find our 4 subnet addresses.
Calculate the subnetsCalculate the subnets
SubnetSubnet RangeRange BroadcastBroadcast
addressaddress
192.168.12.0192.168.12.0 192.168.12.1 - 192.168.12.62 192.168.12.63
192.168.12.64192.168.12.64
192.168.12.128192.168.12.128
192.168.12.192192.168.12.192
•The first usable address is 192.168.12.1 in our first subnet
•The last usable address is 192.168.12.62
•The broadcast address is 192.168.12.63
•.0 through .63 totals 64 addresses, our “magic number”
Calculate the subnetsCalculate the subnets
SubnetSubnet RangeRange BroadcastBroadcast
addressaddress
192.168.12.0192.168.12.0 192.168.12.1 - 192.168.12.62192.168.12.1 - 192.168.12.62 192.168.12.63192.168.12.63
192.168.12.64192.168.12.64 192.168.12.65 - 192.168.12.126192.168.12.65 - 192.168.12.126 192.168.12.127192.168.12.127
192.168.12.128192.168.12.128 192.168.12.129 - 192.168.12.191192.168.12.129 - 192.168.12.191 192.168.12.192192.168.12.192
192.168.12.192192.168.12.192 192.168.12.193 - 192.168.12.254192.168.12.193 - 192.168.12.254 192.168.12.255192.168.12.255
•Fill in the remaining columns
Ok, I lied. You still haveOk, I lied. You still have
to figure out that peskyto figure out that pesky
subnet mask.subnet mask.
•Just because you graphJust because you graph
subnets on a piece of papersubnets on a piece of paper
doesn’t mean your router ordoesn’t mean your router or
PC has any idea what you did.PC has any idea what you did.
•We need a subnet mask toWe need a subnet mask to
enter into the router CLI or yourenter into the router CLI or your
PC’s local area connectionPC’s local area connection
propertiesproperties
Subnet MaskSubnet Mask
128 64 32 16 8 4 2 1 binary numbers
0 0 0 0 0 0 0 0
•Renumber your last 8 bits to show the binary equivalent.
•Draw your stick to show the two borrowed bits.
•Your subnet mask is 128 + 64 = 192.
Subnet MaskSubnet Mask
128 64 32 16 8 4 2 1 binary numbers
0 0 0 0 0 0 0 0
•If you had borrowed 3 bits.
•Your subnet mask would be 128 + 64 + 32 = 224.
Subnet MaskSubnet Mask
128 64 32 16 8 4 2 1 binary numbers
0 0 0 0 0 0 0 0
•Move the stick to borrow 4 bits.
•Your subnet mask would be 128 + 64 + 16 + = 240.
Problem completedProblem completed
 Our company required us to borrow 2 bitsOur company required us to borrow 2 bits
so our IP address and subnet mask is:so our IP address and subnet mask is:
192.168. 12. 0192.168. 12. 0
255.255.255.192255.255.255.192
Subnetting a class_c_address

Mais conteúdo relacionado

Mais procurados

CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTNishant Goel
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6Chaing Ravuth
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)Joud Khattab
 

Mais procurados (20)

CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
C I D R
C I D RC I D R
C I D R
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
Subnetting
SubnettingSubnetting
Subnetting
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 

Semelhante a Subnetting a class_c_address

Semelhante a Subnetting a class_c_address (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
I Paddress
I PaddressI Paddress
I Paddress
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Networking notes 2
Networking notes 2Networking notes 2
Networking notes 2
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Cisco ip-addressing
Cisco ip-addressingCisco ip-addressing
Cisco ip-addressing
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.ppt
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
Day03
Day03 Day03
Day03
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
How to subnet
How to subnetHow to subnet
How to subnet
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
 
IP_Addressing_and Subnetting.pdf
IP_Addressing_and Subnetting.pdfIP_Addressing_and Subnetting.pdf
IP_Addressing_and Subnetting.pdf
 

Mais de rizwanaabassi

Mais de rizwanaabassi (10)

Deadlocks2
Deadlocks2Deadlocks2
Deadlocks2
 
Memory management1
Memory management1Memory management1
Memory management1
 
Io (2)
Io (2)Io (2)
Io (2)
 
Deadlocks1
Deadlocks1Deadlocks1
Deadlocks1
 
Concurrency
ConcurrencyConcurrency
Concurrency
 
Hci lecture set_03_00
Hci lecture set_03_00Hci lecture set_03_00
Hci lecture set_03_00
 
Hci lecture 01_00
Hci lecture 01_00Hci lecture 01_00
Hci lecture 01_00
 
Oslecture1
Oslecture1Oslecture1
Oslecture1
 
Data com lec1
Data com lec1Data com lec1
Data com lec1
 
Pesentation of formal
Pesentation of formalPesentation of formal
Pesentation of formal
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Subnetting a class_c_address

  • 1. Subnetting Made Easy?Subnetting Made Easy? The “moving stick” and the “magic number”The “moving stick” and the “magic number” Jim BlancoJim Blanco Aparicio-Levy Technical CenterAparicio-Levy Technical Center
  • 2. Subnetting Made EasySubnetting Made Easy •First let’s look at the overall requirement. •A class C network consists of 4 octets totaling 32 bits. •If we use a Class C network such as 192.168.12.0, we can only make use of the last octet or 8 bits. •There are 256 possible combinations of bits “on” or “off” in one octet.
  • 3. Subnetting Made EasySubnetting Made Easy •256 addresses would result in a very large collision domain. •256 hosts using the “wire” one at a time would render the LAN unusable. •In business environments, host addresses are usually divided into groups or subnets for management and security reasons. •In addition the first address is reserved for the subnet address and the last for a broadcast address. •So we really have 254 available host addresses.
  • 4. Subnetting Made EasySubnetting Made Easy  We could just divide the addresses in the last octet into more manageable blocks or “subnets”: 256/4 = 64 or 4 subnets each with 64 addresses 256/8 = 32 or 8 subnets each with 32 addresses 256/16 = 16 or 16 subnets each with 16 addresses  But this is too simple. We must also keep track of subnet and broadcast addresses.
  • 5. Subnetting: Class CSubnetting: Class C hosthost addressaddress 192192 168168 1212 00 192192 168168 1212 0000000000000000 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 •First convert the last octet, represented by the decimal number “0”, into 8 binary “0”s to represent 8 bits.
  • 6. Subnetting: Class CSubnetting: Class C hosthost addressaddress 192192 168168 1212 00 192192 168168 1212 000000000000000 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 • By just utilizing the last bit, we have two possible IP addresses.
  • 7. Subnetting: Class CSubnetting: Class C hosthost addressaddress 192192 168168 1212 00 192192 168168 1212 000000000000000 bit offbit off 192192 168168 1212 00 IP addressIP address 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 •First, with the bit remaining at “0” or off, the IP address is 192.168.12.0
  • 8. Subnetting: Class CSubnetting: Class C hosthost addressaddress 192192 168168 1212 00 192192 168168 1212 0000000000000000 bit offbit off 192192 168168 1212 00 IP addressIP address 192192 168168 1212 000000000000001 bit onbit on 192192 168168 1212 11 IP addressIP address 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 •Second, when the bit is “1” or turned on, the IP address is 192.168.12.1 •Thus we have 2 possible IP addresses just utilizing the last bit
  • 9. Subnetting: Class CSubnetting: Class C hosthost addressaddress 192192 168168 1212 00 192192 168168 1212 0000000000000000 bit offbit off 192192 168168 1212 00 .0.0 192192 168168 1212 0000000100000001 bit onbit on 192192 168168 1212 11 .1.1 192192 168168 1212 00000000000000 .0.0 192192 168168 1212 00000000000001 .1.1 192192 168168 1212 00000000000010 .2.2 192192 168168 1212 00000000000011 .3.3 •If we use the two last bits, in the on an off positions, we have four possible IP addresses. •We could continue with combinations of 3, 4 and more bits up to 8 which would result in 256 combinations of 1 and 0 or potential IP addresses. •Remember “0” is a number.
  • 10. Subnetting: Class CSubnetting: Class C hosthost addressaddress 192192 168168 1212 00 192192 168168 1212 0000000000000000 bit offbit off 192192 168168 1212 00 .0.0 192192 168168 1212 0000000100000001 bit onbit on 192192 168168 1212 11 .1.1 192192 168168 1212 00000000000000 .0.0 192192 168168 1212 00000000000001 .1.1 192192 168168 1212 00000000000010 .2.2 192192 168168 1212 00000000000011 .3.3 •Since we cannot use the first address (subnet), 0 or the last address 255 (broadcast) we have 256-2=254 usable addresses. •That’s one big collision domain. •We need to divide it up into smaller blocks or “subnets”.
  • 11. Subnetting: Class CSubnetting: Class C hosthost addressaddress  Hold on. Thought we had 256 addresses?Hold on. Thought we had 256 addresses? Or is it 254?Or is it 254?  There are 256 combinations of 1 and 0.There are 256 combinations of 1 and 0.  Possible addresses run from .0 to .255.Possible addresses run from .0 to .255.  ““0” is a number.0” is a number.  0-255 yields 256 addresses.0-255 yields 256 addresses.  The first “0” is reserved for the subnet andThe first “0” is reserved for the subnet and the last “255” is the broadcast address.the last “255” is the broadcast address.
  • 12. Subnetting: Class CSubnetting: Class C hosthost addressaddress  So that’s 256 – 2 or 254 usable addressesSo that’s 256 – 2 or 254 usable addresses in our one big subnet.in our one big subnet.  Next we need to decide how manyNext we need to decide how many subnets will meet our networkingsubnets will meet our networking requirement.requirement.
  • 13. Subnetting: Class CSubnetting: Class C subnetsubnet addressaddress 192192 168168 1212 00 192192 168168 1212 0000000000000 bit offbit off 192192 168168 1212 00 11stst subnetsubnet 192192 168168 1212 100000000000000 bit onbit on 192192 168168 1212 11 22eded subnetsubnet 192192 168168 1212 192192 168168 1212 192192 168168 1212 192192 168168 1212 •The same rule applies to borrowing bits for subnet addresses. •Start at the left side. •The first bit can be borrowed and turned on or off resulting in 2 subnets.
  • 14. Subnetting: Class CSubnetting: Class C subnetsubnet addressaddress 192192 168168 1212 00 192192 168168 1212 00000000000000 192192 168168 1212 00 192192 168168 1212 1000000010000000 192192 168168 1212 11 192192 168168 1212 00000000000000 00 192192 168168 1212 10000000000000 11 192192 168168 1212 01000000000000 22 192192 168168 1212 11000000000000 33 •Borrowing two bits yields four combinations of bits on and off, or four different combinations and 4 possible subnets
  • 15. The moving stickThe moving stick 0 0 0 0 0 0 0 0 192.168.12.0 •Now let’s put it all together with our “moving stick” method •Write the last octet in binary
  • 16. The moving stickThe moving stick 256 128 64 32 16 8 4 2 possible host addresses 0 0 0 0 0 0 0 0 •Start on the right. •Number to the left to show possible numbers of host addresses.
  • 17. The moving stickThe moving stick 256 128 64 32 16 8 4 2 possible number of host addresses 0 0 0 0 0 0 0 0 2 4 8 16 32 64 128 256 possible number of subnets Start on the left. Number to the right to show possible numbers of subnets.
  • 18. The moving stickThe moving stick 256 128 64 32 16 8 4 2 possible number of host addresses 0 0 0 0 0 0 0 0 2 4 8 16 32 64 128 256 possible number of subnets •Draw the “moving stick.” •You could have a combination of 4 subnets with 64 addresses each.
  • 19. The moving stickThe moving stick 256 128 64 32 16 8 4 2 possible number of host addresses 0 0 0 0 0 0 0 0 2 4 8 16 32 64 128 256 possible number of subnets Move the “stick” to the right. You could have a combination of 8 subnets with 32 addresses each.
  • 20. The moving stickThe moving stick 256 128 64 32 16 8 4 2 possible number of host addresses 0 0 0 0 0 0 0 0 2 4 8 16 32 64 128 256 possible number of subnets Move it again. You could have a combination of 16 subnets with 16 addresses each.
  • 21. Calculate the subnetsCalculate the subnets Use this IP addressUse this IP address 192.168.12.0192.168.12.0 Our company requires at least 3 subnets withOur company requires at least 3 subnets with more than 50 hosts per subnet.more than 50 hosts per subnet.
  • 22. The moving stickThe moving stick 256 128 64 32 16 8 4 2 possible number of host addresses 0 0 0 0 0 0 0 0 2 4 8 16 32 64 128 256 possible number of subnets •Look back to our first example. •We borrowed two bits. •This fits the requirement of our company – 4 subnets each with up to 64 addresses.
  • 23. The moving stickThe moving stick 256 128 64 32 16 8 4 2 possible number of host addresses 0 0 0 0 0 0 0 0 2 4 8 16 32 64 128 256 possible number of subnets •We could move the “stick” to the right. •But a combination of 8 subnets with 32 addresses each does not meet our company’s requirement.
  • 24. The moving stickThe moving stick add the “add the “magic numbermagic number”” 256 128 64 32 16 8 4 2 possible number of host addresses 0 0 0 0 0 0 0 0 2 4 8 16 32 64 128 256 possible number of subnets •We move the stick back to the left. •64 is our “magic” number”.
  • 25. Calculate the subnetsCalculate the subnets SubnetSubnet RangeRange BroadcastBroadcast addressaddress 192.168.12.0192.168.12.0 192.168.12.192.168.12.64 192.168.12.192.168.12.128 192.168.12.192.168.12.1192 •Add to the “0” subnet by increments of 64, our magic number. •We find our 4 subnet addresses.
  • 26. Calculate the subnetsCalculate the subnets SubnetSubnet RangeRange BroadcastBroadcast addressaddress 192.168.12.0192.168.12.0 192.168.12.1 - 192.168.12.62 192.168.12.63 192.168.12.64192.168.12.64 192.168.12.128192.168.12.128 192.168.12.192192.168.12.192 •The first usable address is 192.168.12.1 in our first subnet •The last usable address is 192.168.12.62 •The broadcast address is 192.168.12.63 •.0 through .63 totals 64 addresses, our “magic number”
  • 27. Calculate the subnetsCalculate the subnets SubnetSubnet RangeRange BroadcastBroadcast addressaddress 192.168.12.0192.168.12.0 192.168.12.1 - 192.168.12.62192.168.12.1 - 192.168.12.62 192.168.12.63192.168.12.63 192.168.12.64192.168.12.64 192.168.12.65 - 192.168.12.126192.168.12.65 - 192.168.12.126 192.168.12.127192.168.12.127 192.168.12.128192.168.12.128 192.168.12.129 - 192.168.12.191192.168.12.129 - 192.168.12.191 192.168.12.192192.168.12.192 192.168.12.192192.168.12.192 192.168.12.193 - 192.168.12.254192.168.12.193 - 192.168.12.254 192.168.12.255192.168.12.255 •Fill in the remaining columns
  • 28.
  • 29. Ok, I lied. You still haveOk, I lied. You still have to figure out that peskyto figure out that pesky subnet mask.subnet mask.
  • 30. •Just because you graphJust because you graph subnets on a piece of papersubnets on a piece of paper doesn’t mean your router ordoesn’t mean your router or PC has any idea what you did.PC has any idea what you did. •We need a subnet mask toWe need a subnet mask to enter into the router CLI or yourenter into the router CLI or your PC’s local area connectionPC’s local area connection propertiesproperties
  • 31. Subnet MaskSubnet Mask 128 64 32 16 8 4 2 1 binary numbers 0 0 0 0 0 0 0 0 •Renumber your last 8 bits to show the binary equivalent. •Draw your stick to show the two borrowed bits. •Your subnet mask is 128 + 64 = 192.
  • 32. Subnet MaskSubnet Mask 128 64 32 16 8 4 2 1 binary numbers 0 0 0 0 0 0 0 0 •If you had borrowed 3 bits. •Your subnet mask would be 128 + 64 + 32 = 224.
  • 33. Subnet MaskSubnet Mask 128 64 32 16 8 4 2 1 binary numbers 0 0 0 0 0 0 0 0 •Move the stick to borrow 4 bits. •Your subnet mask would be 128 + 64 + 16 + = 240.
  • 34. Problem completedProblem completed  Our company required us to borrow 2 bitsOur company required us to borrow 2 bits so our IP address and subnet mask is:so our IP address and subnet mask is: 192.168. 12. 0192.168. 12. 0 255.255.255.192255.255.255.192