SlideShare a Scribd company logo
1 of 23
Presentation
On
VLSM & Supernetting
Presented by:
BUG FREE
Group Members:
1. Md. Omor Faruk ID: 151-15-5444
2. Nahian Ahmed ID: 151-15-5137
3. Monsur Ahmed Shafiq ID: 151-15-5439
4. Md. Sajibul Hasan ID: 151-15-4986
5. Md. Taikul Islam ID: 151-15-5144
4/9/2017 VLSM & Supernetting
Contains:
• Introduction
• History of VLSM
• Basic knowledge about Subnet Masking
• Process of Subnet Masking
• Steps of Variable Length Subnet Masking(VLSM)
• Implementing VLSM
• History of Supernetting
• Basic knowledge about Supernetting
• Steps of Supernetting
• Implementation of Supernetting
4/9/2017 VLSM & Supernetting
History of VLSM
Classless Inter-Domain Routing (CIDR) is a method for
allocating IP addresses and IP routing. The Internet Engineering
Task Force introduced CIDR in 1993 to replace the previous
addressing architecture of classful network design in the
Internet.
Classless Inter-Domain Routing is based on variable-length subnet
masking (VLSM), which allows a network to be divided into variously
sized subnets, providing the opportunity to size a network more
appropriately for local needs.
What is VLSM ?
• Subnetting of a subnet.
• The more realistic way of Subnetting.
• To make the most efficient use of all the bits of a
network.
• Prevent network and host from waste.
4/9/2017 VLSM & Supernetting
•Steps of VLSM:
• Find the largest segment which need largest number of hosts address.
• Do Subnetting to fulfill the requirement of largest segment.
• Assign the appropriate subnet mask for the largest segment.
• For second largest segments, take one of these newly created subnets and
use different subnet mask for this one.
• It will cover from the large number host first.
• Repeat this process until the last network.
4/9/2017 VLSM & Supernetting
VLSM Examples
VLSM Examples(cont.)
• We have 192.168.1.1/24
192.168.1.1/24192.168.1.1/24
192.168.1.0/25
126 Hosts
192.168.1.128/25
126 Hosts
VLSM Examples(cont.)
• We have 192.168.1.0/25
192.168.1.0/25
192.168.1.0/26
62 Hosts
192.168.1.64/26
62 Hosts
Assign To A which need 50 hosts Assign To B which need 50 hosts
VLSM Examples(cont.)
• We have 192.168.1.128/25
192.168.1.128/25
192.168.1.128/26
62 Hosts
192.168.1.192/26
62 Hosts
Assign To C which need 40 hosts We can assign in D but ……
VLSM Examples(cont.)
• We have 192.168.1.192/26
192.168.1.192/26
192.168.1.192/27
30 Hosts
192.168.1.224/27
30 Hosts
Assign To D which need 20 hosts May be in future……
Why use VLSM
• Because of Addressing crisis.
• The Internet Engineering Task Force identified two problems in
1992
----IPv4 may not enough in future
----Rapid increase of internet user.
**Freedom to use different subnet masks for networks within a single
autonomous system.
Advantage of VLSM
• We can divide our Network in to many area.
• It helps ISP to allocate more host.
• Save our Host IP Addresses.
• VLSM is supported by :
1.OSPF
2.Integrated IS-IS
3.RIPv2
4.Static Routing
VLSM VS CIDR
VLSM: 1 bit subnetting of Network address.
CIDR : IP network is represented by a prefix, which is an IP
address and some indication of the length of the mask
VLSM VS Supernetting
Introduction of Supernetting
4/9/2017 VLSM & Supernetting
• Reverse process of VLSM
• Creating larger network.
• Combination of two or more networks (or subnets).
• This method facilitates regional route aggregation.
Basic Knowledge of Supernetting:
• Need two or more Network or Subnets.
• Make the decimal network into binary value.
• Counting 0 and 1.
• Supernetting requires the use of routing protocols
that support Classless Inter-Domain Routing (CIDR).
4/9/2017 VLSM & Supernetting
Steps of Supernetting:
• Contain many IP or network.
• Write down IP serially then convert into binary.
• Find matching from left site and underline upto match.
• Write upto match and make “0” zero upto end.
• Put dot (.) after the (8) eight interval.
• Make decimal from the binay of each portion which
will be the new network address.
• Make all (1) upto match and zero upto end which will
be the musk.
4/9/2017 VLSM & Supernetting
Supernetting Scenario
Implementation of Supernetting:
Make a Summation of the following network:
192.168.98.0 , 192.168.99.0 , 192.168.100.0 , 192.168.101.0, 192.168.102.0 , 192.168.105.0
Firstly, the addresses are converted to binary format and aligned in a list:
4/9/2017 VLSM & Supernetting
4/9/2017 VLSM & Supernetting
Results:
Secondly, the bits at which the common pattern of digits
ends are located. These common bits are shown in red.
Lastly, the number of common bits is counted.
The summary route is found by setting the remaining
bits to zero, as shown below. It is followed by a slash
and then the number of common bits.
The summarized route is 192.168.96.0/20.
The subnet mask is 255.255.240.0.
Advantages & Disadvantage of Supernetting:
Advantages:
• Control and reduce the network traffic.
• Helpful to solve the problem of lacking IP addresses.
• To minimize the size of the routing tables.
In the near future the newer Wireless Scalable Access System models will use smart
supernetting device.
Disadvantages:
• It cannot cover different area of a network when combined.
• All the networks should be in the same class.
Thank You!
If You Have any Question

More Related Content

What's hot

CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4Vuz Dở Hơi
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus networkAalap Tripathy
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATMDr Rajiv Srivastava
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routingteknetir
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 

What's hot (20)

CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routing
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 

Similar to Vlsm and supernetting

network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptxaida alsamawi
 
08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdfPilarAlulema2
 
08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdfRobinRohit2
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptanwarkade1
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptEsubesisay
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxManojGowdaKb
 
CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxVishalThakor19
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptxkmjanjua19
 
Configuring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEMConfiguring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEMJohnny Jean Tigas
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8Waqas Ahmed Nawaz
 
acn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfacn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfQual4
 
Ccna3 mod1-classless routing
Ccna3 mod1-classless routingCcna3 mod1-classless routing
Ccna3 mod1-classless routingdborsan
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersĐồng Quốc Vương
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 

Similar to Vlsm and supernetting (20)

network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptx
 
08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf
 
08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptx
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 
QSpiders - Variable Length-Subnet-Masks
QSpiders - Variable Length-Subnet-MasksQSpiders - Variable Length-Subnet-Masks
QSpiders - Variable Length-Subnet-Masks
 
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
 
Configuring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEMConfiguring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEM
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
acn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfacn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdf
 
Ccna3 mod1-classless routing
Ccna3 mod1-classless routingCcna3 mod1-classless routing
Ccna3 mod1-classless routing
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
CCNP Routing
CCNP Routing CCNP Routing
CCNP Routing
 

More from Nahian Ahmed

House Price Prediction An AI Approach.
House Price Prediction An AI Approach.House Price Prediction An AI Approach.
House Price Prediction An AI Approach.Nahian Ahmed
 
A presentation on android OS
A presentation on android OSA presentation on android OS
A presentation on android OSNahian Ahmed
 
Presentation on DNA Sequencing Process
Presentation on DNA Sequencing ProcessPresentation on DNA Sequencing Process
Presentation on DNA Sequencing ProcessNahian Ahmed
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 MicroprocessorNahian Ahmed
 
Applocation of Numerical Methods
Applocation of Numerical MethodsApplocation of Numerical Methods
Applocation of Numerical MethodsNahian Ahmed
 
Presentation on-exception-handling
Presentation on-exception-handlingPresentation on-exception-handling
Presentation on-exception-handlingNahian Ahmed
 
Presentation on Flip Flop
Presentation  on Flip FlopPresentation  on Flip Flop
Presentation on Flip FlopNahian Ahmed
 

More from Nahian Ahmed (11)

House Price Prediction An AI Approach.
House Price Prediction An AI Approach.House Price Prediction An AI Approach.
House Price Prediction An AI Approach.
 
IOT Smart House
IOT Smart HouseIOT Smart House
IOT Smart House
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
A presentation on android OS
A presentation on android OSA presentation on android OS
A presentation on android OS
 
Presentation on DNA Sequencing Process
Presentation on DNA Sequencing ProcessPresentation on DNA Sequencing Process
Presentation on DNA Sequencing Process
 
Delta Modulation
Delta ModulationDelta Modulation
Delta Modulation
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
 
Applocation of Numerical Methods
Applocation of Numerical MethodsApplocation of Numerical Methods
Applocation of Numerical Methods
 
Presentation on-exception-handling
Presentation on-exception-handlingPresentation on-exception-handling
Presentation on-exception-handling
 
Presentation on Flip Flop
Presentation  on Flip FlopPresentation  on Flip Flop
Presentation on Flip Flop
 
Game Architect
Game ArchitectGame Architect
Game Architect
 

Recently uploaded

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Vlsm and supernetting

  • 2. Presented by: BUG FREE Group Members: 1. Md. Omor Faruk ID: 151-15-5444 2. Nahian Ahmed ID: 151-15-5137 3. Monsur Ahmed Shafiq ID: 151-15-5439 4. Md. Sajibul Hasan ID: 151-15-4986 5. Md. Taikul Islam ID: 151-15-5144 4/9/2017 VLSM & Supernetting
  • 3. Contains: • Introduction • History of VLSM • Basic knowledge about Subnet Masking • Process of Subnet Masking • Steps of Variable Length Subnet Masking(VLSM) • Implementing VLSM • History of Supernetting • Basic knowledge about Supernetting • Steps of Supernetting • Implementation of Supernetting 4/9/2017 VLSM & Supernetting
  • 4. History of VLSM Classless Inter-Domain Routing (CIDR) is a method for allocating IP addresses and IP routing. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous addressing architecture of classful network design in the Internet. Classless Inter-Domain Routing is based on variable-length subnet masking (VLSM), which allows a network to be divided into variously sized subnets, providing the opportunity to size a network more appropriately for local needs.
  • 5. What is VLSM ? • Subnetting of a subnet. • The more realistic way of Subnetting. • To make the most efficient use of all the bits of a network. • Prevent network and host from waste. 4/9/2017 VLSM & Supernetting
  • 6. •Steps of VLSM: • Find the largest segment which need largest number of hosts address. • Do Subnetting to fulfill the requirement of largest segment. • Assign the appropriate subnet mask for the largest segment. • For second largest segments, take one of these newly created subnets and use different subnet mask for this one. • It will cover from the large number host first. • Repeat this process until the last network. 4/9/2017 VLSM & Supernetting
  • 8. VLSM Examples(cont.) • We have 192.168.1.1/24 192.168.1.1/24192.168.1.1/24 192.168.1.0/25 126 Hosts 192.168.1.128/25 126 Hosts
  • 9. VLSM Examples(cont.) • We have 192.168.1.0/25 192.168.1.0/25 192.168.1.0/26 62 Hosts 192.168.1.64/26 62 Hosts Assign To A which need 50 hosts Assign To B which need 50 hosts
  • 10. VLSM Examples(cont.) • We have 192.168.1.128/25 192.168.1.128/25 192.168.1.128/26 62 Hosts 192.168.1.192/26 62 Hosts Assign To C which need 40 hosts We can assign in D but ……
  • 11. VLSM Examples(cont.) • We have 192.168.1.192/26 192.168.1.192/26 192.168.1.192/27 30 Hosts 192.168.1.224/27 30 Hosts Assign To D which need 20 hosts May be in future……
  • 12. Why use VLSM • Because of Addressing crisis. • The Internet Engineering Task Force identified two problems in 1992 ----IPv4 may not enough in future ----Rapid increase of internet user. **Freedom to use different subnet masks for networks within a single autonomous system.
  • 13. Advantage of VLSM • We can divide our Network in to many area. • It helps ISP to allocate more host. • Save our Host IP Addresses. • VLSM is supported by : 1.OSPF 2.Integrated IS-IS 3.RIPv2 4.Static Routing
  • 14. VLSM VS CIDR VLSM: 1 bit subnetting of Network address. CIDR : IP network is represented by a prefix, which is an IP address and some indication of the length of the mask
  • 16. Introduction of Supernetting 4/9/2017 VLSM & Supernetting • Reverse process of VLSM • Creating larger network. • Combination of two or more networks (or subnets). • This method facilitates regional route aggregation.
  • 17. Basic Knowledge of Supernetting: • Need two or more Network or Subnets. • Make the decimal network into binary value. • Counting 0 and 1. • Supernetting requires the use of routing protocols that support Classless Inter-Domain Routing (CIDR). 4/9/2017 VLSM & Supernetting
  • 18. Steps of Supernetting: • Contain many IP or network. • Write down IP serially then convert into binary. • Find matching from left site and underline upto match. • Write upto match and make “0” zero upto end. • Put dot (.) after the (8) eight interval. • Make decimal from the binay of each portion which will be the new network address. • Make all (1) upto match and zero upto end which will be the musk. 4/9/2017 VLSM & Supernetting
  • 20. Implementation of Supernetting: Make a Summation of the following network: 192.168.98.0 , 192.168.99.0 , 192.168.100.0 , 192.168.101.0, 192.168.102.0 , 192.168.105.0 Firstly, the addresses are converted to binary format and aligned in a list: 4/9/2017 VLSM & Supernetting
  • 21. 4/9/2017 VLSM & Supernetting Results: Secondly, the bits at which the common pattern of digits ends are located. These common bits are shown in red. Lastly, the number of common bits is counted. The summary route is found by setting the remaining bits to zero, as shown below. It is followed by a slash and then the number of common bits. The summarized route is 192.168.96.0/20. The subnet mask is 255.255.240.0.
  • 22. Advantages & Disadvantage of Supernetting: Advantages: • Control and reduce the network traffic. • Helpful to solve the problem of lacking IP addresses. • To minimize the size of the routing tables. In the near future the newer Wireless Scalable Access System models will use smart supernetting device. Disadvantages: • It cannot cover different area of a network when combined. • All the networks should be in the same class.
  • 23. Thank You! If You Have any Question