SlideShare a Scribd company logo
1 of 30
Mahmmoud Mahdi
 Allows you to take one larger network and
  break it into a bunch of smaller networks.
 benefits:
  Reduced network traffic
  Optimized network performance
  Simplified management
  Facilitated spanning of large geographical
   distances
192.168.2.1   192.168.3.1




              192.168.3.2




192.168.2.2
              192.168.3.3
    A 32-bit value that allows the recipient of IP packets
    to distinguish between:
     The network ID portion of the IP address.
     The host ID portion of the IP address.
   The 1s in the subnet mask represent:
     the positions that refer to the network or subnet
      addresses.
   Not all networks need subnets:
     meaning they use the default subnet mask.
     These default masks cannot change.
      ▪ Class A network, you can’t change the first byte in a subnet mask;
        it must read 255.0.0.0 at a minimum.
      ▪ Class B: start with 255.255.0.0
      ▪ Class C: start with 255.255.255.0.
Class B address
                  Class B address

      Network address       Host address

               130.57.
                130.57.     1.56
                             1.56


1000 0010. 0011 1001.
 1000 0010. 0011 1001.       0000 0001. 0011 1000
                              0000 0001. 0011 1000


      Class B address with aasubnet address
       Class B address with subnet address

      Network address         Subnet   Host address


1000 0010. 0011 1001.
 1000 0010. 0011 1001.        0000 0001. 0011 1000
                               0000 0001. 0011 1000
 To create subnet:
  Take bits from the host portion of the IP address
   and reserve them to define the subnet address.
  This means fewer bits for hosts, so the more
   subnets, the fewer bits available for defining
   hosts.
192.168.2.1
                     255.255.255.0

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0

       192.168.2.1/24 (CIDR notation)


                 1 network                28-2=254
                                          addresses
192.168.2.32    192.168.2.128
                              192.168.2.1   192.168.2.64
                                            192.168.2.96
                                                            192.168.2.160
                                                            192.168.2.192
                                            192.168.2.128   192.168.2.234
                        255.255.255.224           23=8subnets



1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0

      192.168.2.1/27 (CIDR notation)

                                                       25-2=30
                       network                         addresses
 CIDR creates a hierarchical addressing
  structure by breaking the network address
  space into CIDR blocks
 CIDR notation:
  describes a network by specifying the base
   address and the number of bits used for the
   network portion
  i.e., 10.0.0.0/8
   ▪ a network using 24 bits for host numbering
   ▪ a maximum of 224 -2 possible host addresses.
 Method that ISPs use to allocate a number of
 addresses to a company, a home—a customer.
 192.168.10.32/28:
   Telling you what your subnet mask is.
   The slash notation (/)
    ▪ how many bits are turned on (1s).
 Keep in Mind:
   the largest subnet mask available (regardless of the
   class of address) can only be a /30.
    ▪ you’ve got to keep at least 2 bits for host bits.
 Example:
  A Class A default subnet mask:
   ▪ which is 255.0.0.0
     ▪ This means that the first byte of the subnet mask is all ones (1s), or
       11111111.
   ▪ A slash notation:
     ▪ you need to count all the 1s bits to figure out your mask.
   ▪ The 255.0.0.0 is considered a /8
  A Class B default mask:
   ▪ 255.255.0.0
     ▪ which is a /16 because 16 bits are ones (1s):
       11111111.11111111.00000000.00000000.
Network Class   Starting    Ending Address    CIDR    Bitmask
                Address                       Block
Class A         0.0.0.0     127.255.255.255   /8      255.0.0.0
Class B         128.0.0.0   191.255.255.255   /16     255.255.0.0
Class C         192.0.0.0   223.255.255.255   /24     255.255.255.0
Class D         224.0.0.0   239.255.255.251   /4
(multicast)
Class E         240.0.0.0   255.255.255.255   /4
(reserved)
Subnet Mask     CIDR Value   Subnet Mask       CIDR Value
255.0.0.0       /8           255.255.240.0     /20
255.128.0.0     /9           255.255.248.0     /21
255.192.0.0     /10          255.255.252.0     /22
255.224.0.0     /11          255.255.254.0     /23
255.240.0.0     /12          255.255.255.0     /24
255.248.0.0     /13          255.255.255.128   /25
255.252.0.0     /14          255.255.255.192   /26
255.254.0.0     /15          255.255.255.224   /27
255.255.0.0     /16          255.255.255.240   /28
255.255.128.0   /17          255.255.255.248   /29
255.255.192.0   /18          255.255.255.252   /30
255.255.224.0   /19
 The /8 through /15
   can only be used with Class A network addresses.
 The /16 through /23
   can be used by Class A and B network addresses.
 The /24 through /30
   can be used by Class A, B, and C network addresses.
 This is a big reason why most companies use
 Class A network addresses.
   Since they can use all subnet masks, they get the
   maximum flexibility in network design.
 Class C address, only 8 bits are available for defining
  the hosts.
 Class C subnet masks can be the following:
   Binary           Decimal          CIDR
   00000000         =0               /24
   10000000         = 128            /25
   11000000         = 192            /26
   11100000         = 224            /27
   11110000         = 240            /28
   11111000         = 248            /29
   11111100         = 252            /30
  ▪ We can’t use a /31 or /32 because we have to have at least 2
    host bits for assigning IP addresses to hosts.
 2x= number of subnets.
  ▪ x is the number of masked bits, or the 1s.
 For example:
  ▪ in 11000000, the number of 1s gives us 22 subnets.
  ▪ In this example, there are 4 subnets.
 2y – 2 = number of hosts per subnet.
  ▪ y is the number of unmasked bits, or the 0s.
 Example:
  ▪ in 11000000, the number of 0s gives us 26 – 2 hosts.
  ▪ In this example, there are 62 hosts per subnet.
  ▪ You need to subtract 2 for the subnet address and the
    broadcast address, which are not valid hosts.
 256 – subnet mask = block size, or increment
  number.
 Ex: 256 – 192 = 64:
  ▪ The block size of a 192 mask is always 64.
  ▪ Start counting at zero in blocks of 64 until you reach
    the subnet mask value.
    ▪ 0, 64, 128, 192.
 The broadcast address is always the number
  right before the next subnet.
 Example:
  ▪ The 0 subnet has a broadcast address of 63
    ▪ Because: the next subnet is 64.
  ▪ The 64 subnet has a broadcast address of 127
    ▪ because the next subnet is 128. And so on.
 Remember: the broadcast address of the last
 subnet is always 255.
 The numbers between the subnets, omitting the
  all 0s and all 1s.
  ▪ it’s always the numbers between the subnet address
    and the broadcast address.
 Example:
  ▪ if 64 is the subnet number and 127 is the broadcast
    address,
  ▪ then 65–126 is the valid host range.
 Subnet the Class C network address
 255.255.255.128 (/25)
  192.168.10.0 = Network address
  255.255.255.128 = Subnet mask
Subnet       192.168.10.0   192.168.10.128
First host   192.168.10.1   192.168.10.129
Last host    192.168.10.126 192.168.10.254
Broadcast    192.168.10.127 192.168.10.255
Contact Me: qursaan@yahoo.com

More Related Content

What's hot

What's hot (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Vlsm
VlsmVlsm
Vlsm
 
Subneting
SubnetingSubneting
Subneting
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Easy subnetting
Easy subnettingEasy subnetting
Easy subnetting
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 

Viewers also liked

Subnetting
SubnettingSubnetting
Subnettingswascher
 
Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan SupernettingZainuddin Kurnia
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1Anant Lodha
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementKanishka Gopal
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)crm2life
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing PrintersMahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing FilesMahmmoud Mahdi
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing AMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Windump
WindumpWindump
Windumpjk847
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise SystemsSaurabh Goel
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemTushar B Kute
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning pptShivani Garg
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol AMahmmoud Mahdi
 

Viewers also liked (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan Supernetting
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Windump
WindumpWindump
Windump
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning ppt
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 

Similar to Lesson 2: Subnetting basics

Subnetting class
Subnetting classSubnetting class
Subnetting classFTC
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingneclinux
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 

Similar to Lesson 2: Subnetting basics (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Day03
Day03 Day03
Day03
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Assignment 1 iap
Assignment 1 iapAssignment 1 iap
Assignment 1 iap
 
Mod6
Mod6Mod6
Mod6
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 

More from Mahmmoud Mahdi

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptMahmmoud Mahdi
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge labMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionMahmmoud Mahdi
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsMahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 

More from Mahmmoud Mahdi (6)

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup script
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge lab
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Lesson 2: Subnetting basics

  • 2.  Allows you to take one larger network and break it into a bunch of smaller networks.  benefits:  Reduced network traffic  Optimized network performance  Simplified management  Facilitated spanning of large geographical distances
  • 3. 192.168.2.1 192.168.3.1 192.168.3.2 192.168.2.2 192.168.3.3
  • 4. A 32-bit value that allows the recipient of IP packets to distinguish between:  The network ID portion of the IP address.  The host ID portion of the IP address.  The 1s in the subnet mask represent:  the positions that refer to the network or subnet addresses.  Not all networks need subnets:  meaning they use the default subnet mask.  These default masks cannot change. ▪ Class A network, you can’t change the first byte in a subnet mask; it must read 255.0.0.0 at a minimum. ▪ Class B: start with 255.255.0.0 ▪ Class C: start with 255.255.255.0.
  • 5.
  • 6.
  • 7. Class B address Class B address Network address Host address 130.57. 130.57. 1.56 1.56 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000 Class B address with aasubnet address Class B address with subnet address Network address Subnet Host address 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000
  • 8.  To create subnet:  Take bits from the host portion of the IP address and reserve them to define the subnet address.  This means fewer bits for hosts, so the more subnets, the fewer bits available for defining hosts.
  • 9.
  • 10.
  • 11. 192.168.2.1 255.255.255.0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 192.168.2.1/24 (CIDR notation) 1 network 28-2=254 addresses
  • 12. 192.168.2.32 192.168.2.128 192.168.2.1 192.168.2.64 192.168.2.96 192.168.2.160 192.168.2.192 192.168.2.128 192.168.2.234 255.255.255.224 23=8subnets 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 192.168.2.1/27 (CIDR notation) 25-2=30 network addresses
  • 13.  CIDR creates a hierarchical addressing structure by breaking the network address space into CIDR blocks  CIDR notation:  describes a network by specifying the base address and the number of bits used for the network portion  i.e., 10.0.0.0/8 ▪ a network using 24 bits for host numbering ▪ a maximum of 224 -2 possible host addresses.
  • 14.  Method that ISPs use to allocate a number of addresses to a company, a home—a customer.  192.168.10.32/28:  Telling you what your subnet mask is.  The slash notation (/) ▪ how many bits are turned on (1s).  Keep in Mind:  the largest subnet mask available (regardless of the class of address) can only be a /30. ▪ you’ve got to keep at least 2 bits for host bits.
  • 15.  Example:  A Class A default subnet mask: ▪ which is 255.0.0.0 ▪ This means that the first byte of the subnet mask is all ones (1s), or 11111111. ▪ A slash notation: ▪ you need to count all the 1s bits to figure out your mask. ▪ The 255.0.0.0 is considered a /8  A Class B default mask: ▪ 255.255.0.0 ▪ which is a /16 because 16 bits are ones (1s): 11111111.11111111.00000000.00000000.
  • 16. Network Class Starting Ending Address CIDR Bitmask Address Block Class A 0.0.0.0 127.255.255.255 /8 255.0.0.0 Class B 128.0.0.0 191.255.255.255 /16 255.255.0.0 Class C 192.0.0.0 223.255.255.255 /24 255.255.255.0 Class D 224.0.0.0 239.255.255.251 /4 (multicast) Class E 240.0.0.0 255.255.255.255 /4 (reserved)
  • 17. Subnet Mask CIDR Value Subnet Mask CIDR Value 255.0.0.0 /8 255.255.240.0 /20 255.128.0.0 /9 255.255.248.0 /21 255.192.0.0 /10 255.255.252.0 /22 255.224.0.0 /11 255.255.254.0 /23 255.240.0.0 /12 255.255.255.0 /24 255.248.0.0 /13 255.255.255.128 /25 255.252.0.0 /14 255.255.255.192 /26 255.254.0.0 /15 255.255.255.224 /27 255.255.0.0 /16 255.255.255.240 /28 255.255.128.0 /17 255.255.255.248 /29 255.255.192.0 /18 255.255.255.252 /30 255.255.224.0 /19
  • 18.  The /8 through /15  can only be used with Class A network addresses.  The /16 through /23  can be used by Class A and B network addresses.  The /24 through /30  can be used by Class A, B, and C network addresses.  This is a big reason why most companies use Class A network addresses.  Since they can use all subnet masks, they get the maximum flexibility in network design.
  • 19.  Class C address, only 8 bits are available for defining the hosts.  Class C subnet masks can be the following: Binary Decimal CIDR 00000000 =0 /24 10000000 = 128 /25 11000000 = 192 /26 11100000 = 224 /27 11110000 = 240 /28 11111000 = 248 /29 11111100 = 252 /30 ▪ We can’t use a /31 or /32 because we have to have at least 2 host bits for assigning IP addresses to hosts.
  • 20.
  • 21.
  • 22.  2x= number of subnets. ▪ x is the number of masked bits, or the 1s.  For example: ▪ in 11000000, the number of 1s gives us 22 subnets. ▪ In this example, there are 4 subnets.
  • 23.  2y – 2 = number of hosts per subnet. ▪ y is the number of unmasked bits, or the 0s.  Example: ▪ in 11000000, the number of 0s gives us 26 – 2 hosts. ▪ In this example, there are 62 hosts per subnet. ▪ You need to subtract 2 for the subnet address and the broadcast address, which are not valid hosts.
  • 24.  256 – subnet mask = block size, or increment number.  Ex: 256 – 192 = 64: ▪ The block size of a 192 mask is always 64. ▪ Start counting at zero in blocks of 64 until you reach the subnet mask value. ▪ 0, 64, 128, 192.
  • 25.  The broadcast address is always the number right before the next subnet.  Example: ▪ The 0 subnet has a broadcast address of 63 ▪ Because: the next subnet is 64. ▪ The 64 subnet has a broadcast address of 127 ▪ because the next subnet is 128. And so on.  Remember: the broadcast address of the last subnet is always 255.
  • 26.  The numbers between the subnets, omitting the all 0s and all 1s. ▪ it’s always the numbers between the subnet address and the broadcast address.  Example: ▪ if 64 is the subnet number and 127 is the broadcast address, ▪ then 65–126 is the valid host range.
  • 27.  Subnet the Class C network address 255.255.255.128 (/25)  192.168.10.0 = Network address  255.255.255.128 = Subnet mask
  • 28.
  • 29. Subnet 192.168.10.0 192.168.10.128 First host 192.168.10.1 192.168.10.129 Last host 192.168.10.126 192.168.10.254 Broadcast 192.168.10.127 192.168.10.255