IPV4 ADDRESS SUB-NETTING PROCESS
Estibenson Arévalo Mesa
WHAT IS SUBNETTING?
Is to divide an IP address or physical network in
logical subnets (network smaller), these work at
sending and receiving packets as the single
network. The subnets permit an administration,
flow control and segment good.
Given an IP address of 184.108.40.206/24,
with 2 bits borrowed for subnets.
1. determine IP class, this allow to
know that bits can use.
2. last octet convert from decimal to
binary, identify bits of network and
bits of host allows.
3. Networks and host for subnet
• Subnets number
• Host for subnet number
Subnets = 2^n In this case 2^2 = 4
Host = 2^n-2 In this case 2^6-2 = 62 Host for
ID SUBNET: 220.127.116.11
FIRST HOST: 18.104.22.168
LAST HOST: 22.214.171.124
ID SUBNET: 126.96.36.199
FIRST HOST: 188.8.131.52
LAST HOST: 184.108.40.206
4. It writes sgnificant
values of subnets.
ID SUBNET: 220.127.116.11
FIRST HOST: 18.104.22.168
LAST HOST: 22.214.171.124
ID SUBNET: 126.96.36.199
FIRST HOST: 188.8.131.52
LAST HOST: 184.108.40.206
1. APPLICATIONS: A complete software
program designed for end users.
2. BINARY: A numbering system characterized
by ones and zeros (1= On, 0= off).
3. BINARY VALUES: A combination of binary
digits that represent a certain value.
4. BITS: A bit is a binary digit, taking a value of
either 0 or 1. Binary digits are units of
information storage and communications in
5. BROADCAST: A from of transmission
whereupon one device transmits to all
devices wirithin the network or on another
6. CHANNEL: The medium used to transport
information from a sender to a receiver.
7. CLASSFUL ADDRESSING: in the early days
of IPv4, IP address are divided into 5 classes,
namely, Class A, Class B, Class C, Class D
and Class E
8. CLASSLESS ADDRESSING: IPv4
addressing scheme that uses a subnet mask
that does not follow classful addressing rules.
It provides incresed flexibility when dividing
ranges of IP address into separate networks.
9. COMPUTER VIRUS: A computer virus is a
computer program that can copy itself and
infect a computer without permission or
knowledge of the user.
10. DATA NETWORKS: digital networks used to
send data between computers.
11. DOWNLOAD: Transfering data (usually a
file) from another computer to the computer
you are using.
12. END DEVICES: A device such as e desktop
or movile device that is used by an end user.
13. FIBER OPTICS: Physical medium that uses
glass or plastic threads to transmit data. A
fiber optic cable consists of a bundle of these
threads, each of which is capable of
transmitting electric signals into light waves.
14. FIREWALL: A firewall is a hardware or a
softwre application designed to protect
network devices from outside networks users
and/or malicious applications and files.
15. GBPS: Gigabits (a billion bits) per
16. HARDWARE: hardware are physical
components of a computer, such as the hard
drive, memory chip, motherboard, CPU, etc.
17. INTERNET: Is a publicly accessible network
of interconect computer networks that transmit
data by using IP, the internet protocol.
18. IPv4: Short the internet protocol version 4.
it is the current version of internet protocol.
19. LINUX: A Linux-like computer operating
system family. some versions of Linux are free
with underlying source code available for
anyone to use.
20. MAC ADDRESS: Standarized data link layer
address that is required for every port or
device that conects to a LAN.
21. MEDIUM: A physical medium in which date
is tranfered for example, UTP is a from of
22. NETWORK: A network is multiple
computers connected together using a
communications System. them porpuse of a
network is for computers to communicate and
23. OCTET: A group of 8 binary bits. Is similar,
but not the same, to byte. one application in
computer networking is to use octet to divide
IPv4 addresses into 4 components.
24. PDA: A PDA (Personal Digital Assistant) is
a hand-held device normally used to help keep
a personal organized.
25. ROUTER: Network leyer device that uses
one more metrics to determine the optimal
path along which network traffic should be
26. SINTAX: The rules governing the form of
27. TRAILER: The control information opperated
to date when date is encapsulated for network
28. UPLOAD: To transmit data to a server or to
another receiving device.
29. VIRTUAL TERMINAL VTY: A command line
interface created in a router for a telnet session.
30. WELL KNOWN PORTS: Ports that range from
0 - 1023.