SlideShare una empresa de Scribd logo
1 de 16
Subnetting
What was that masked address?
Why Subnet?
 To break the network down into pieces, each
of which can be addressed separately.
 Controls network traffic
 Reduces broadcasts
 Can provide low level security with access lists
on the router
 Organization of IP address space
Subnetting a Default Class C
Network Address: 200.129.41.0
 Default Class C address is divided into
network and host portions as follows:
N . N . N . H
 To subnet we “borrow” bits from the host
portion of the address (8 bits for Class C)
N . N . N . x x x x x x x x
 Borrowing n bits yields 2n
– 2 subnets.
 Leaving n bits yields 2n
– 2 hosts.
 For a class C, we can borrow from 2 to 6 bits.
 Why not 1 bit? (How many usable subnets?)
 Why not 7 bits? (How many usable hosts?)
Subnetting a Default Class C
Network Address: 200.129.41.0
 Suppose we need 14 usable subnets, how
many bits do we borrow?
 Remember, borrowing n bits give us:
 2n
– 2 subnets
 Try borrowing 3 bits (n = 3):
 23
– 2 = 8 – 2
= 6 usable subnets (not enough)
 Try borrowing 4 bits
 24
– 2 = 16 – 2
= 14 usable subnets (enough)
Subnetting a Default Class C
Network Address: 200.129.41.0
 Write it with the network octet in binary:
200.129.41.0000 0000
break here
 Borrowing 4 bits yields 14 usable subnets
 How many usable hosts per subnet?
 Same formula as subnets (2n
– 2)
 4 host bits (n = 4)
 24
– 2 = 16 – 2
= 14 usable hosts per subnet
subnet bits host bits
Subnetting a Default Class C
Network Address: 200.129.41.0
 Examples:
 First usable 200.129.41.0001 ^ 0000
subnet address: 200.129.41.16
 First usable host 200.129.41.0001 ^ 0001
on the first subnet: 200.129.41.17
 Second usable host 200.129.41.0001 ^ 0010
on the first subnet: 200.129.41.18
.
.
.
 Last usable host 200.129.41.0001 ^ 1110
on the first subnet: 200.129.41.30
 Broadcast address 200.129.41.0001 ^ 1111
for the first subnet: 200.129.41.31
Subnetting a Default Class C
Network Address: 200.129.41.0
 Examples:
 Second usable 200.129.41.0010 ^ 0000
subnet address: 200.129.41.32
 Third usable 200.129.41.0011 ^ 0000
subnet address: 200.129.41.48
 Fourth usable 200.129.41.0100 ^ 0000
subnet address: 200.129.41.64
.
.
.
 Last usable 200.129.41.1110 ^ 0000
subnet address: 200.129.41.224
The Subnet Mask: How the
Router Determines the Subnet
 The subnet mask (in binary) has:
 all ones in the network and subnet portion of
the address
 all zeros in the host potion of the address
 The subnet mask for the previous example is:
255.255.255. 240
255.255.255. 1111^ 0000 (128 + 64 + 32 + 16 =240)
 ANDing this mask with any valid host address
on the network will always yield the subnet
address for that host.
The Subnet Mask: How the
Router Determines the Subnet
 Example (our subnet mask is 255.255.255.240)
IP host address: 200.129. 41.23
Last octet to binary: 200.129. 41.0001 0111
AND subnet mask: 255.255.255.1111 0000
200.129. 41.0001 0000
Subnet Address: 200.129. 41.16
So the host address 200.129. 41.23 is on the
200.129.41.16 subnet.
Subnetting a Default Class B
Network Address: 132.178.0.0
 Default Class B address is divided into
network and host portions as follows:
N . N . H . H
 To subnet we “borrow” bits from the host
portion of the address (16 bits for Class B)
N . N . x x x x x x x x . x x x x x x x x
 For a class B, we can borrow from 2 to 14
bits.
Subnetting a Default Class B
Network Address: 132.178.0.0
 Suppose we need 80 usable subnets, how
many bits do we borrow?
 Remember, borrowing n bits give us:
 2n
– 2 subnets
 Try borrowing 6 bits (n = 6):
 26
– 2 = 64 – 2
= 62 usable subnets (not enough)
 Try borrowing 7 bits
 27
– 2 = 128 – 2
= 126 usable subnets (enough)
Subnetting a Default Class B
Network Address: 132.178.0.0
 Write it with the network octets in binary:
132.178.0000000 0.00000000
break here
 Borrowing 7 bits yields 126 usable subnets
 How many usable hosts per subnet?
 Same formula as subnets (2n
– 2)
 9 host bits (n = 9)
 29
– 2 = 512 – 2
= 510 usable hosts per subnet
subnet bits host bits
Subnetting a Default Class B
Network Address: 132.178.0.0
 Examples:
 First usable 132.178.0000001 ^ 0.00000000
subnet address: 132.178.2.0
 First usable host 132.178.0000001 ^ 0.00000001
on the first subnet: 132.178.2.1
 Second usable host 132.178.0000001 ^ 0.00000010
on the first subnet: 132.178.2.2
.
.
.
 Last usable host 132.178.0000001 ^ 1.11111110
on the first subnet: 132.178.3.254
 Broadcast address 132.178.0000001 ^1.11111111
for the first subnet: 132.178.3.255
Subnetting a Default Class B
Network Address: 132.178.0.0
 Examples:
 Second usable 132.178.0000010 ^ 0.00000000
subnet address: 132.178.4.0
 Third usable 132.178.0000011 ^ 0.00000000
subnet address: 132.178.6.0
.
.
.
 Ninety-first usable 132.178.1011011 ^ 0.00000000
subnet address: 132.178.182.0
.
.
.
 Last usable 132.178.1111110 ^ 0.00000000
subnet address: 132.178.252.0
Subnetting a Default Class B
Network Address: 132.178.0.0
 The subnet mask for this example is:
255.255.254.0
255.255.1111111 ^ 0.00000000
 ANDing this mask with any valid host address
on this network will always yield the subnet
address.
Subnetting a Default Class B
Network Address: 132.178.0.0
 Example:
IP host address: 132.178.119.112
Last octets to binary: 132.178.0111011 ^ 1.01110000
AND subnet mask: 255.255.1111111 ^ 0.00000000
132.178.0111011 ^ 0.00000000
Subnet Address: 132.178.118.0
Which subnet is this. How can you tell?

Más contenido relacionado

La actualidad más candente (20)

Ch19
Ch19Ch19
Ch19
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Classless addressing
Classless addressingClassless addressing
Classless addressing
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
 
Routing
RoutingRouting
Routing
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Explaining ip address
Explaining ip addressExplaining ip address
Explaining ip address
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Ch4 2 v1
Ch4 2 v1Ch4 2 v1
Ch4 2 v1
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Data Representation
Data RepresentationData Representation
Data Representation
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 
About ip address
About ip addressAbout ip address
About ip address
 
transport layer
transport layertransport layer
transport layer
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 

Destacado

Subnetting
SubnettingSubnetting
Subnettingswascher
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Destacado (7)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar a Subnitting

A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjaysanjay kushwaha
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 
Lecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxLecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxssuserc1e786
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing ArchitectureShreehari Dhat
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesKrishna Mohan
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docxDIPESH30
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module IIIAjit Nayak
 

Similar a Subnitting (20)

A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjay
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
 
Lecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxLecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptx
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
 
Week7 final
Week7 finalWeek7 final
Week7 final
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Mod6
Mod6Mod6
Mod6
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module III
 
Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 

Más de Ramasubbu .P (20)

radar
radarradar
radar
 
Press
PressPress
Press
 
Milling 2
Milling 2Milling 2
Milling 2
 
MIlling 1
MIlling 1MIlling 1
MIlling 1
 
Drillings
DrillingsDrillings
Drillings
 
Holding
HoldingHolding
Holding
 
Saftey
SafteySaftey
Saftey
 
Harvesting
HarvestingHarvesting
Harvesting
 
Plough
PloughPlough
Plough
 
Tractor PTO
Tractor PTOTractor PTO
Tractor PTO
 
Tractor Components
Tractor ComponentsTractor Components
Tractor Components
 
MSAT
MSATMSAT
MSAT
 
GPS
GPSGPS
GPS
 
RTOS
RTOSRTOS
RTOS
 
Virus
VirusVirus
Virus
 
Hacker
HackerHacker
Hacker
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
RAID CONCEPT
RAID CONCEPTRAID CONCEPT
RAID CONCEPT
 
Network Security
Network SecurityNetwork Security
Network Security
 
Timer
TimerTimer
Timer
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Subnitting

  • 1. Subnetting What was that masked address?
  • 2. Why Subnet?  To break the network down into pieces, each of which can be addressed separately.  Controls network traffic  Reduces broadcasts  Can provide low level security with access lists on the router  Organization of IP address space
  • 3. Subnetting a Default Class C Network Address: 200.129.41.0  Default Class C address is divided into network and host portions as follows: N . N . N . H  To subnet we “borrow” bits from the host portion of the address (8 bits for Class C) N . N . N . x x x x x x x x  Borrowing n bits yields 2n – 2 subnets.  Leaving n bits yields 2n – 2 hosts.  For a class C, we can borrow from 2 to 6 bits.  Why not 1 bit? (How many usable subnets?)  Why not 7 bits? (How many usable hosts?)
  • 4. Subnetting a Default Class C Network Address: 200.129.41.0  Suppose we need 14 usable subnets, how many bits do we borrow?  Remember, borrowing n bits give us:  2n – 2 subnets  Try borrowing 3 bits (n = 3):  23 – 2 = 8 – 2 = 6 usable subnets (not enough)  Try borrowing 4 bits  24 – 2 = 16 – 2 = 14 usable subnets (enough)
  • 5. Subnetting a Default Class C Network Address: 200.129.41.0  Write it with the network octet in binary: 200.129.41.0000 0000 break here  Borrowing 4 bits yields 14 usable subnets  How many usable hosts per subnet?  Same formula as subnets (2n – 2)  4 host bits (n = 4)  24 – 2 = 16 – 2 = 14 usable hosts per subnet subnet bits host bits
  • 6. Subnetting a Default Class C Network Address: 200.129.41.0  Examples:  First usable 200.129.41.0001 ^ 0000 subnet address: 200.129.41.16  First usable host 200.129.41.0001 ^ 0001 on the first subnet: 200.129.41.17  Second usable host 200.129.41.0001 ^ 0010 on the first subnet: 200.129.41.18 . . .  Last usable host 200.129.41.0001 ^ 1110 on the first subnet: 200.129.41.30  Broadcast address 200.129.41.0001 ^ 1111 for the first subnet: 200.129.41.31
  • 7. Subnetting a Default Class C Network Address: 200.129.41.0  Examples:  Second usable 200.129.41.0010 ^ 0000 subnet address: 200.129.41.32  Third usable 200.129.41.0011 ^ 0000 subnet address: 200.129.41.48  Fourth usable 200.129.41.0100 ^ 0000 subnet address: 200.129.41.64 . . .  Last usable 200.129.41.1110 ^ 0000 subnet address: 200.129.41.224
  • 8. The Subnet Mask: How the Router Determines the Subnet  The subnet mask (in binary) has:  all ones in the network and subnet portion of the address  all zeros in the host potion of the address  The subnet mask for the previous example is: 255.255.255. 240 255.255.255. 1111^ 0000 (128 + 64 + 32 + 16 =240)  ANDing this mask with any valid host address on the network will always yield the subnet address for that host.
  • 9. The Subnet Mask: How the Router Determines the Subnet  Example (our subnet mask is 255.255.255.240) IP host address: 200.129. 41.23 Last octet to binary: 200.129. 41.0001 0111 AND subnet mask: 255.255.255.1111 0000 200.129. 41.0001 0000 Subnet Address: 200.129. 41.16 So the host address 200.129. 41.23 is on the 200.129.41.16 subnet.
  • 10. Subnetting a Default Class B Network Address: 132.178.0.0  Default Class B address is divided into network and host portions as follows: N . N . H . H  To subnet we “borrow” bits from the host portion of the address (16 bits for Class B) N . N . x x x x x x x x . x x x x x x x x  For a class B, we can borrow from 2 to 14 bits.
  • 11. Subnetting a Default Class B Network Address: 132.178.0.0  Suppose we need 80 usable subnets, how many bits do we borrow?  Remember, borrowing n bits give us:  2n – 2 subnets  Try borrowing 6 bits (n = 6):  26 – 2 = 64 – 2 = 62 usable subnets (not enough)  Try borrowing 7 bits  27 – 2 = 128 – 2 = 126 usable subnets (enough)
  • 12. Subnetting a Default Class B Network Address: 132.178.0.0  Write it with the network octets in binary: 132.178.0000000 0.00000000 break here  Borrowing 7 bits yields 126 usable subnets  How many usable hosts per subnet?  Same formula as subnets (2n – 2)  9 host bits (n = 9)  29 – 2 = 512 – 2 = 510 usable hosts per subnet subnet bits host bits
  • 13. Subnetting a Default Class B Network Address: 132.178.0.0  Examples:  First usable 132.178.0000001 ^ 0.00000000 subnet address: 132.178.2.0  First usable host 132.178.0000001 ^ 0.00000001 on the first subnet: 132.178.2.1  Second usable host 132.178.0000001 ^ 0.00000010 on the first subnet: 132.178.2.2 . . .  Last usable host 132.178.0000001 ^ 1.11111110 on the first subnet: 132.178.3.254  Broadcast address 132.178.0000001 ^1.11111111 for the first subnet: 132.178.3.255
  • 14. Subnetting a Default Class B Network Address: 132.178.0.0  Examples:  Second usable 132.178.0000010 ^ 0.00000000 subnet address: 132.178.4.0  Third usable 132.178.0000011 ^ 0.00000000 subnet address: 132.178.6.0 . . .  Ninety-first usable 132.178.1011011 ^ 0.00000000 subnet address: 132.178.182.0 . . .  Last usable 132.178.1111110 ^ 0.00000000 subnet address: 132.178.252.0
  • 15. Subnetting a Default Class B Network Address: 132.178.0.0  The subnet mask for this example is: 255.255.254.0 255.255.1111111 ^ 0.00000000  ANDing this mask with any valid host address on this network will always yield the subnet address.
  • 16. Subnetting a Default Class B Network Address: 132.178.0.0  Example: IP host address: 132.178.119.112 Last octets to binary: 132.178.0111011 ^ 1.01110000 AND subnet mask: 255.255.1111111 ^ 0.00000000 132.178.0111011 ^ 0.00000000 Subnet Address: 132.178.118.0 Which subnet is this. How can you tell?

Notas del editor

  1. See page 10 in the workbook and show students what happens with 255 octets in the mask when converted to binary for ANDing.