SlideShare a Scribd company logo
1 of 35
Sybex CCNA 640-803
Chapter 3: Subnetting, VLSM and
Troubleshooting
Instructor & Todd Lammle
Chapter 3 Objectives
The CCNA Topics Covered in this chapter
include:
-Subnetting basics
-How to create subnets
-Subnet masks and CIDR
•Class C subnetting
•Class B subnetting
•VLSM
•Summarization
•Troubleshooting IP addressing
Subnetting Basics
• Benefits of subnetting include:
– Reduced network traffic
– Optimized network performance
– Simplified management
– Facilitated spanning of large
geographical distances.
How To Create Subnets
Take bits from the host portion
of the IP address and reserve the
to divine the subnet address.
Understanding the Powers of
2
Subnet Masks
• Used to define which part of the
host address will be used as the
subnet address.
• A 32-bit value that allows the
recipient of IP packets to
distinguish the network ID portion
of the IP address from the host ID
portion.
Default Subnet Masks
Classless Inter-Domain
Routing (CIDR)
Used to allocate an amount of IP address space to a given entityUsed to allocate an amount of IP address space to a given entity
(company, home, customer, etc).(company, home, customer, etc).
Example: 192.168.10.32/28Example: 192.168.10.32/28
The slash notation (/) means how many bits are turned on (1s) andThe slash notation (/) means how many bits are turned on (1s) and
tells you what your subnet mask is.tells you what your subnet mask is.
CIDR Values
Subnetting Class C Addresses
In a Class C address, only 8 bits are available for defining the hosts.
Remember that subnet bits start at the left and go to the right, without
skipping bits. This means that the only Class C subnet masks can be
the following:
Binary Decimal CIDR
---------------------------------------------------------
10000000 = 128 /25
11000000 = 192 /26
11100000 = 224 /27
11110000 = 240 /28
11111000 = 248 /29
11111100 = 252 /30
Class C 192 mask examples
Subnet Host Meaning
00 000000 = 0 The network (do this first)
00 000001 = 1 The first valid host
00 111110 = 62 The last valid host
00 111111 = 63 The broadcast address (do this
second)
Subnet Host Meaning
01 000000 = 64 The network
01 000001 = 65 The first valid host
01 111110 = 126 The last valid host
01 111111 = 127 The broadcast address
Class C 192 mask examples
Subnet
Host Meaning
10 000000 = 128 The subnet address
10 000001 = 129 The first valid host
10 111110 = 190 The last valid host
10 111111 = 191 The broadcast address
Subnet
Host Meaning
11 000000 = 192 The subnet address
11 000001 = 193 The first valid host
11 111110 = 254 The last valid host
11 111111 = 255 The broadcast address
Subnetting Class C Addresses
– Fast Method
Answer Five Simple Questions:Answer Five Simple Questions:
How Many Subnets?
22
= number of subnets.
 X is the number of masked bits, or
the 1s.
 For example, in 11000000, the
number of ones gives us 22
subnets. In this example there are
4 subnets.
How Many Hosts Per Subnet?
2y
-2 = number of hosts per subnet.
• Y is the number of unmasked bits,
or the 0s.
• For example, in 11000000, the
number of zeros gives us 26
-2
hosts. In this example, there are 62
hosts per subnet.
What Are The Valid Subnets?
• 256-subnet mask = block size, or
base number.
• For example 256-192=64. 64 is
the first subnet. The next subnet
would be the base number plus
itself or 64+64=128, (the second
subnet).
What’s The Broadcast
Address For Each Subnet?
• The broadcast address is all
host bits turned on, which is
the number immediately
preceding the next subnet.
What Are The Valid Hosts?
• Valid hosts are the number
between the subnets,
omitting all 0s and all 1s.
Variable Length Subnet Masks
(VLSM)
Subnets with no VLSM
applied
Subnets with VLSM applied
VSLM, Example 1
VLSM, Example 2
Which IP address will be placed in each
router’s FastEthernet 0/0 interface and serial
0/1 of RouterB?
Answer
Summary Example
Why can’t the Sales LAN
get to Server A?
Why can’t hosts in the Sales
LAN get to Server B?
What can the host address be?
Which addresses can you
assign to the hosts?
Which IP addresses can you
assign?
Summary
• Go through all written and review
questions
• Review answers in class
35

More Related Content

Similar to Ceyccna3

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.pptssuserf7cd2b
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting MechanicsImranulHasan6
 
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdfSILVIUSyt
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)Nusrat Jahan Nisha
 

Similar to Ceyccna3 (20)

Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subnetting
SubnettingSubnetting
Subnetting
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.ppt
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Subnetting
SubnettingSubnetting
Subnetting
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Day03
Day03 Day03
Day03
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting Mechanics
 
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
6a52807edaf99ecbfafb8ecf2439b542b3623dea-1647242881015.pdf
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 

More from Lakshan Perera (11)

Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 
Chapter13ccna
Chapter13ccnaChapter13ccna
Chapter13ccna
 
Chapter11ccna
Chapter11ccnaChapter11ccna
Chapter11ccna
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter8ccna
Chapter8ccnaChapter8ccna
Chapter8ccna
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
 
Chapter4ccna
Chapter4ccnaChapter4ccna
Chapter4ccna
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Ceyccna3

  • 1. Sybex CCNA 640-803 Chapter 3: Subnetting, VLSM and Troubleshooting Instructor & Todd Lammle
  • 2. Chapter 3 Objectives The CCNA Topics Covered in this chapter include: -Subnetting basics -How to create subnets -Subnet masks and CIDR •Class C subnetting •Class B subnetting •VLSM •Summarization •Troubleshooting IP addressing
  • 3. Subnetting Basics • Benefits of subnetting include: – Reduced network traffic – Optimized network performance – Simplified management – Facilitated spanning of large geographical distances.
  • 4. How To Create Subnets Take bits from the host portion of the IP address and reserve the to divine the subnet address.
  • 6. Subnet Masks • Used to define which part of the host address will be used as the subnet address. • A 32-bit value that allows the recipient of IP packets to distinguish the network ID portion of the IP address from the host ID portion.
  • 8. Classless Inter-Domain Routing (CIDR) Used to allocate an amount of IP address space to a given entityUsed to allocate an amount of IP address space to a given entity (company, home, customer, etc).(company, home, customer, etc). Example: 192.168.10.32/28Example: 192.168.10.32/28 The slash notation (/) means how many bits are turned on (1s) andThe slash notation (/) means how many bits are turned on (1s) and tells you what your subnet mask is.tells you what your subnet mask is.
  • 10. Subnetting Class C Addresses In a Class C address, only 8 bits are available for defining the hosts. Remember that subnet bits start at the left and go to the right, without skipping bits. This means that the only Class C subnet masks can be the following: Binary Decimal CIDR --------------------------------------------------------- 10000000 = 128 /25 11000000 = 192 /26 11100000 = 224 /27 11110000 = 240 /28 11111000 = 248 /29 11111100 = 252 /30
  • 11. Class C 192 mask examples Subnet Host Meaning 00 000000 = 0 The network (do this first) 00 000001 = 1 The first valid host 00 111110 = 62 The last valid host 00 111111 = 63 The broadcast address (do this second) Subnet Host Meaning 01 000000 = 64 The network 01 000001 = 65 The first valid host 01 111110 = 126 The last valid host 01 111111 = 127 The broadcast address
  • 12. Class C 192 mask examples Subnet Host Meaning 10 000000 = 128 The subnet address 10 000001 = 129 The first valid host 10 111110 = 190 The last valid host 10 111111 = 191 The broadcast address Subnet Host Meaning 11 000000 = 192 The subnet address 11 000001 = 193 The first valid host 11 111110 = 254 The last valid host 11 111111 = 255 The broadcast address
  • 13. Subnetting Class C Addresses – Fast Method Answer Five Simple Questions:Answer Five Simple Questions:
  • 14. How Many Subnets? 22 = number of subnets.  X is the number of masked bits, or the 1s.  For example, in 11000000, the number of ones gives us 22 subnets. In this example there are 4 subnets.
  • 15. How Many Hosts Per Subnet? 2y -2 = number of hosts per subnet. • Y is the number of unmasked bits, or the 0s. • For example, in 11000000, the number of zeros gives us 26 -2 hosts. In this example, there are 62 hosts per subnet.
  • 16. What Are The Valid Subnets? • 256-subnet mask = block size, or base number. • For example 256-192=64. 64 is the first subnet. The next subnet would be the base number plus itself or 64+64=128, (the second subnet).
  • 17. What’s The Broadcast Address For Each Subnet? • The broadcast address is all host bits turned on, which is the number immediately preceding the next subnet.
  • 18. What Are The Valid Hosts? • Valid hosts are the number between the subnets, omitting all 0s and all 1s.
  • 19. Variable Length Subnet Masks (VLSM)
  • 20. Subnets with no VLSM applied
  • 21. Subnets with VLSM applied
  • 22.
  • 24.
  • 26.
  • 27. Which IP address will be placed in each router’s FastEthernet 0/0 interface and serial 0/1 of RouterB?
  • 30. Why can’t the Sales LAN get to Server A?
  • 31. Why can’t hosts in the Sales LAN get to Server B?
  • 32. What can the host address be?
  • 33. Which addresses can you assign to the hosts?
  • 34. Which IP addresses can you assign?
  • 35. Summary • Go through all written and review questions • Review answers in class 35