SlideShare a Scribd company logo
1 of 30
Mahmmoud Mahdi
 Allows you to take one larger network and
  break it into a bunch of smaller networks.
 benefits:
  Reduced network traffic
  Optimized network performance
  Simplified management
  Facilitated spanning of large geographical
   distances
192.168.2.1   192.168.3.1




              192.168.3.2




192.168.2.2
              192.168.3.3
    A 32-bit value that allows the recipient of IP packets
    to distinguish between:
     The network ID portion of the IP address.
     The host ID portion of the IP address.
   The 1s in the subnet mask represent:
     the positions that refer to the network or subnet
      addresses.
   Not all networks need subnets:
     meaning they use the default subnet mask.
     These default masks cannot change.
      ▪ Class A network, you can’t change the first byte in a subnet mask;
        it must read 255.0.0.0 at a minimum.
      ▪ Class B: start with 255.255.0.0
      ▪ Class C: start with 255.255.255.0.
Class B address
                  Class B address

      Network address       Host address

               130.57.
                130.57.     1.56
                             1.56


1000 0010. 0011 1001.
 1000 0010. 0011 1001.       0000 0001. 0011 1000
                              0000 0001. 0011 1000


      Class B address with aasubnet address
       Class B address with subnet address

      Network address         Subnet   Host address


1000 0010. 0011 1001.
 1000 0010. 0011 1001.        0000 0001. 0011 1000
                               0000 0001. 0011 1000
 To create subnet:
  Take bits from the host portion of the IP address
   and reserve them to define the subnet address.
  This means fewer bits for hosts, so the more
   subnets, the fewer bits available for defining
   hosts.
192.168.2.1
                     255.255.255.0

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0

       192.168.2.1/24 (CIDR notation)


                 1 network                28-2=254
                                          addresses
192.168.2.32    192.168.2.128
                              192.168.2.1   192.168.2.64
                                            192.168.2.96
                                                            192.168.2.160
                                                            192.168.2.192
                                            192.168.2.128   192.168.2.234
                        255.255.255.224           23=8subnets



1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0

      192.168.2.1/27 (CIDR notation)

                                                       25-2=30
                       network                         addresses
 CIDR creates a hierarchical addressing
  structure by breaking the network address
  space into CIDR blocks
 CIDR notation:
  describes a network by specifying the base
   address and the number of bits used for the
   network portion
  i.e., 10.0.0.0/8
   ▪ a network using 24 bits for host numbering
   ▪ a maximum of 224 -2 possible host addresses.
 Method that ISPs use to allocate a number of
 addresses to a company, a home—a customer.
 192.168.10.32/28:
   Telling you what your subnet mask is.
   The slash notation (/)
    ▪ how many bits are turned on (1s).
 Keep in Mind:
   the largest subnet mask available (regardless of the
   class of address) can only be a /30.
    ▪ you’ve got to keep at least 2 bits for host bits.
 Example:
  A Class A default subnet mask:
   ▪ which is 255.0.0.0
     ▪ This means that the first byte of the subnet mask is all ones (1s), or
       11111111.
   ▪ A slash notation:
     ▪ you need to count all the 1s bits to figure out your mask.
   ▪ The 255.0.0.0 is considered a /8
  A Class B default mask:
   ▪ 255.255.0.0
     ▪ which is a /16 because 16 bits are ones (1s):
       11111111.11111111.00000000.00000000.
Network Class   Starting    Ending Address    CIDR    Bitmask
                Address                       Block
Class A         0.0.0.0     127.255.255.255   /8      255.0.0.0
Class B         128.0.0.0   191.255.255.255   /16     255.255.0.0
Class C         192.0.0.0   223.255.255.255   /24     255.255.255.0
Class D         224.0.0.0   239.255.255.251   /4
(multicast)
Class E         240.0.0.0   255.255.255.255   /4
(reserved)
Subnet Mask     CIDR Value   Subnet Mask       CIDR Value
255.0.0.0       /8           255.255.240.0     /20
255.128.0.0     /9           255.255.248.0     /21
255.192.0.0     /10          255.255.252.0     /22
255.224.0.0     /11          255.255.254.0     /23
255.240.0.0     /12          255.255.255.0     /24
255.248.0.0     /13          255.255.255.128   /25
255.252.0.0     /14          255.255.255.192   /26
255.254.0.0     /15          255.255.255.224   /27
255.255.0.0     /16          255.255.255.240   /28
255.255.128.0   /17          255.255.255.248   /29
255.255.192.0   /18          255.255.255.252   /30
255.255.224.0   /19
 The /8 through /15
   can only be used with Class A network addresses.
 The /16 through /23
   can be used by Class A and B network addresses.
 The /24 through /30
   can be used by Class A, B, and C network addresses.
 This is a big reason why most companies use
 Class A network addresses.
   Since they can use all subnet masks, they get the
   maximum flexibility in network design.
 Class C address, only 8 bits are available for defining
  the hosts.
 Class C subnet masks can be the following:
   Binary           Decimal          CIDR
   00000000         =0               /24
   10000000         = 128            /25
   11000000         = 192            /26
   11100000         = 224            /27
   11110000         = 240            /28
   11111000         = 248            /29
   11111100         = 252            /30
  ▪ We can’t use a /31 or /32 because we have to have at least 2
    host bits for assigning IP addresses to hosts.
 2x= number of subnets.
  ▪ x is the number of masked bits, or the 1s.
 For example:
  ▪ in 11000000, the number of 1s gives us 22 subnets.
  ▪ In this example, there are 4 subnets.
 2y – 2 = number of hosts per subnet.
  ▪ y is the number of unmasked bits, or the 0s.
 Example:
  ▪ in 11000000, the number of 0s gives us 26 – 2 hosts.
  ▪ In this example, there are 62 hosts per subnet.
  ▪ You need to subtract 2 for the subnet address and the
    broadcast address, which are not valid hosts.
 256 – subnet mask = block size, or increment
  number.
 Ex: 256 – 192 = 64:
  ▪ The block size of a 192 mask is always 64.
  ▪ Start counting at zero in blocks of 64 until you reach
    the subnet mask value.
    ▪ 0, 64, 128, 192.
 The broadcast address is always the number
  right before the next subnet.
 Example:
  ▪ The 0 subnet has a broadcast address of 63
    ▪ Because: the next subnet is 64.
  ▪ The 64 subnet has a broadcast address of 127
    ▪ because the next subnet is 128. And so on.
 Remember: the broadcast address of the last
 subnet is always 255.
 The numbers between the subnets, omitting the
  all 0s and all 1s.
  ▪ it’s always the numbers between the subnet address
    and the broadcast address.
 Example:
  ▪ if 64 is the subnet number and 127 is the broadcast
    address,
  ▪ then 65–126 is the valid host range.
 Subnet the Class C network address
 255.255.255.128 (/25)
  192.168.10.0 = Network address
  255.255.255.128 = Subnet mask
Subnet       192.168.10.0   192.168.10.128
First host   192.168.10.1   192.168.10.129
Last host    192.168.10.126 192.168.10.254
Broadcast    192.168.10.127 192.168.10.255
Contact Me: qursaan@yahoo.com

More Related Content

What's hot

IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
Ip addresses
Ip addressesIp addresses
Ip addressesAsif
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_addressrizwanaabassi
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 

What's hot (20)

IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Addressing
AddressingAddressing
Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Subneting
SubnetingSubneting
Subneting
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_address
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 

Viewers also liked

Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan SupernettingZainuddin Kurnia
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1Anant Lodha
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementKanishka Gopal
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)crm2life
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing PrintersMahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing FilesMahmmoud Mahdi
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing AMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Windump
WindumpWindump
Windumpjk847
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise SystemsSaurabh Goel
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemTushar B Kute
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning pptShivani Garg
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol AMahmmoud Mahdi
 

Viewers also liked (20)

Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan Supernetting
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Windump
WindumpWindump
Windump
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning ppt
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 

Similar to Lesson 2: Subnetting basics

Subnetting class
Subnetting classSubnetting class
Subnetting classFTC
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingneclinux
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 

Similar to Lesson 2: Subnetting basics (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Day03
Day03 Day03
Day03
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Assignment 1 iap
Assignment 1 iapAssignment 1 iap
Assignment 1 iap
 
Mod6
Mod6Mod6
Mod6
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 

More from Mahmmoud Mahdi

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptMahmmoud Mahdi
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge labMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionMahmmoud Mahdi
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsMahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 

More from Mahmmoud Mahdi (6)

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup script
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge lab
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 

Recently uploaded

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Lesson 2: Subnetting basics

  • 2.  Allows you to take one larger network and break it into a bunch of smaller networks.  benefits:  Reduced network traffic  Optimized network performance  Simplified management  Facilitated spanning of large geographical distances
  • 3. 192.168.2.1 192.168.3.1 192.168.3.2 192.168.2.2 192.168.3.3
  • 4. A 32-bit value that allows the recipient of IP packets to distinguish between:  The network ID portion of the IP address.  The host ID portion of the IP address.  The 1s in the subnet mask represent:  the positions that refer to the network or subnet addresses.  Not all networks need subnets:  meaning they use the default subnet mask.  These default masks cannot change. ▪ Class A network, you can’t change the first byte in a subnet mask; it must read 255.0.0.0 at a minimum. ▪ Class B: start with 255.255.0.0 ▪ Class C: start with 255.255.255.0.
  • 5.
  • 6.
  • 7. Class B address Class B address Network address Host address 130.57. 130.57. 1.56 1.56 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000 Class B address with aasubnet address Class B address with subnet address Network address Subnet Host address 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000
  • 8.  To create subnet:  Take bits from the host portion of the IP address and reserve them to define the subnet address.  This means fewer bits for hosts, so the more subnets, the fewer bits available for defining hosts.
  • 9.
  • 10.
  • 11. 192.168.2.1 255.255.255.0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 192.168.2.1/24 (CIDR notation) 1 network 28-2=254 addresses
  • 12. 192.168.2.32 192.168.2.128 192.168.2.1 192.168.2.64 192.168.2.96 192.168.2.160 192.168.2.192 192.168.2.128 192.168.2.234 255.255.255.224 23=8subnets 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 192.168.2.1/27 (CIDR notation) 25-2=30 network addresses
  • 13.  CIDR creates a hierarchical addressing structure by breaking the network address space into CIDR blocks  CIDR notation:  describes a network by specifying the base address and the number of bits used for the network portion  i.e., 10.0.0.0/8 ▪ a network using 24 bits for host numbering ▪ a maximum of 224 -2 possible host addresses.
  • 14.  Method that ISPs use to allocate a number of addresses to a company, a home—a customer.  192.168.10.32/28:  Telling you what your subnet mask is.  The slash notation (/) ▪ how many bits are turned on (1s).  Keep in Mind:  the largest subnet mask available (regardless of the class of address) can only be a /30. ▪ you’ve got to keep at least 2 bits for host bits.
  • 15.  Example:  A Class A default subnet mask: ▪ which is 255.0.0.0 ▪ This means that the first byte of the subnet mask is all ones (1s), or 11111111. ▪ A slash notation: ▪ you need to count all the 1s bits to figure out your mask. ▪ The 255.0.0.0 is considered a /8  A Class B default mask: ▪ 255.255.0.0 ▪ which is a /16 because 16 bits are ones (1s): 11111111.11111111.00000000.00000000.
  • 16. Network Class Starting Ending Address CIDR Bitmask Address Block Class A 0.0.0.0 127.255.255.255 /8 255.0.0.0 Class B 128.0.0.0 191.255.255.255 /16 255.255.0.0 Class C 192.0.0.0 223.255.255.255 /24 255.255.255.0 Class D 224.0.0.0 239.255.255.251 /4 (multicast) Class E 240.0.0.0 255.255.255.255 /4 (reserved)
  • 17. Subnet Mask CIDR Value Subnet Mask CIDR Value 255.0.0.0 /8 255.255.240.0 /20 255.128.0.0 /9 255.255.248.0 /21 255.192.0.0 /10 255.255.252.0 /22 255.224.0.0 /11 255.255.254.0 /23 255.240.0.0 /12 255.255.255.0 /24 255.248.0.0 /13 255.255.255.128 /25 255.252.0.0 /14 255.255.255.192 /26 255.254.0.0 /15 255.255.255.224 /27 255.255.0.0 /16 255.255.255.240 /28 255.255.128.0 /17 255.255.255.248 /29 255.255.192.0 /18 255.255.255.252 /30 255.255.224.0 /19
  • 18.  The /8 through /15  can only be used with Class A network addresses.  The /16 through /23  can be used by Class A and B network addresses.  The /24 through /30  can be used by Class A, B, and C network addresses.  This is a big reason why most companies use Class A network addresses.  Since they can use all subnet masks, they get the maximum flexibility in network design.
  • 19.  Class C address, only 8 bits are available for defining the hosts.  Class C subnet masks can be the following: Binary Decimal CIDR 00000000 =0 /24 10000000 = 128 /25 11000000 = 192 /26 11100000 = 224 /27 11110000 = 240 /28 11111000 = 248 /29 11111100 = 252 /30 ▪ We can’t use a /31 or /32 because we have to have at least 2 host bits for assigning IP addresses to hosts.
  • 20.
  • 21.
  • 22.  2x= number of subnets. ▪ x is the number of masked bits, or the 1s.  For example: ▪ in 11000000, the number of 1s gives us 22 subnets. ▪ In this example, there are 4 subnets.
  • 23.  2y – 2 = number of hosts per subnet. ▪ y is the number of unmasked bits, or the 0s.  Example: ▪ in 11000000, the number of 0s gives us 26 – 2 hosts. ▪ In this example, there are 62 hosts per subnet. ▪ You need to subtract 2 for the subnet address and the broadcast address, which are not valid hosts.
  • 24.  256 – subnet mask = block size, or increment number.  Ex: 256 – 192 = 64: ▪ The block size of a 192 mask is always 64. ▪ Start counting at zero in blocks of 64 until you reach the subnet mask value. ▪ 0, 64, 128, 192.
  • 25.  The broadcast address is always the number right before the next subnet.  Example: ▪ The 0 subnet has a broadcast address of 63 ▪ Because: the next subnet is 64. ▪ The 64 subnet has a broadcast address of 127 ▪ because the next subnet is 128. And so on.  Remember: the broadcast address of the last subnet is always 255.
  • 26.  The numbers between the subnets, omitting the all 0s and all 1s. ▪ it’s always the numbers between the subnet address and the broadcast address.  Example: ▪ if 64 is the subnet number and 127 is the broadcast address, ▪ then 65–126 is the valid host range.
  • 27.  Subnet the Class C network address 255.255.255.128 (/25)  192.168.10.0 = Network address  255.255.255.128 = Subnet mask
  • 28.
  • 29. Subnet 192.168.10.0 192.168.10.128 First host 192.168.10.1 192.168.10.129 Last host 192.168.10.126 192.168.10.254 Broadcast 192.168.10.127 192.168.10.255