SlideShare a Scribd company logo
1 of 13
Download to read offline
Communication
Networks
Network Layer Services
Fixed Length Subnetting
Subnets and Subnet Mask
• What are subnets?
• Dividing the large address space into smaller blocks of IP Address
• Why do we go for subnets?
• If the blocks of IP address are used as such millions of IP address are
wasted.
• Managing the Large block of IP Address is also difficult
• What are the types of subnets?
• Fixed Length Subnetting
• Variable Length Subnetting
• Subnet Mask
• Will be discussed few slides later
Visit www.youtube.com/GURUKULA for Lecture Videos
Fixed Length Subnetting
• Lets consider an Organization and the entire organization has different
departments / Sections
I
II III
IVECE
EEE
CSE
MECH
Visit www.youtube.com/GURUKULA for Lecture Videos
Fixed Length – Example 1
Divide the address block 200.1.2.0 into 2 subnets
Given address block is Class C → 24 bits for NID and 8 bits for HID
200.1.2.00000000
200.1.2.11111111
200.1.2.0
200.1.2.255 200.1.2.X0000000
X = 0 X = 1
Network ID : 200.1.2.0
Broadcast ID: 200.1.2.255
1 bit is required
to make 2 parts
Get Back
Visit www.youtube.com/GURUKULA for Lecture Videos
200.1.2.X0000000
X = 0 X = 1
200.1.2.0_ _ _ _ _ _ _
Runs from
200.1.2.00000000
200.1.2.00000001
200.1.2.00000010
200.1.2.00000011
.
.
200.1.2.01111111
200.1.2.1_ _ _ _ _ _ _
Runs from
200.1.2.10000000
200.1.2.10000001
200.1.2.10000010
200.1.2.10000011
.
.
200.1.2.11111111
200.1.2.0
200.1.2.127
200.1.2.128
200.1.2.255
Network ID : 200.1.2.0
Broadcast ID: 200.1.2.127
Network ID : 200.1.2.128
Broadcast ID: 200.1.2.255
27 = 128
Address in Each Subnet
Get Back
Visit www.youtube.com/GURUKULA for Lecture Videos
Fixed Length – Example 2
Divide the address block 200.1.2.0 into 4 subnets
Given address block is Class C → 24 bits for NID and 8 bits for HID
200.1.2.00000000
200.1.2.11111111
200.1.2.0
200.1.2.255 200.1.2.XX000000
XX = 00
Network ID : 200.1.2.0
Broadcast ID: 200.1.2.255
XX = 01 XX = 10
XX = 11
2 bits are required
to make 4 parts
Visit www.youtube.com/GURUKULA for Lecture Videos
200.1.2.XX000000
XX = 00
XX = 01 XX = 10
XX = 11
200.1.2.00 _ _ _ _ _ _
Runs from
200.1.2.00000000
to
200.1.2.00111111
200.1.2.01 _ _ _ _ _ _
Runs from
200.1.2.01000000
to
200.1.2.01111111
200.1.2.11 _ _ _ _ _ _
Runs from
200.1.2.11000000
to
200.1.2.11111111
200.1.2.10 _ _ _ _ _ _
Runs from
200.1.2.10000000
to
200.1.2.10111111
200.1.2.0 → Network ID
200.1.2.63 → Broadcast ID
200.1.2.128 → Network ID
200.1.2.191 → Broadcast ID
200.1.2.192 → Network ID
200.1.2.255 → Broadcast ID
200.1.2.64 → Network ID
200.1.2.127 → Broadcast ID
26 = 64
Address in Each Subnet
Visit www.youtube.com/GURUKULA for Lecture Videos
Fixed Length – Exercise 1
Divide the address block 192.168.9.0 into 5 networks
Given address block is Class C → 24 bits for NID and 8 bits for HID
192.168.9.00000000
192.168.9.11111111
192.168.9.0
192.168.9.255 192.168.9.XXX00000
Network ID : 192.168.9.0
Broadcast ID: 192.168.9.255
3 bits are required
to make 8 parts
000
001
010
011 100
101
110
111
Visit www.youtube.com/GURUKULA for Lecture Videos
NET 1
192.168.9.00000000 192.168.9.0
192.168.9.00011111 192.168.9.31
NET 2
192.168.9.00100000 192.168.9.32
192.168.9.00111111 192.168.9.63
NET 3
192.168.9.01000000 192.168.9.64
192.168.9.01011111 192.168.9.95
NET 4
192.168.9.01100000 192.168.9.96
192.168.9.01111111 192.168.9.127
NET 5
192.168.9.10000000 192.168.9.128
192.168.9.10011111 192.168.9.159
NET 6
192.168.9.10100000 192.168.9.160
192.168.9.10111111 192.168.9.191
NET 7
192.168.9.11000000 192.168.9.192
192.168.9.11011111 192.168.9.223
NET 8
192.168.9.11100000 192.168.9.224
192.168.9.11111111 192.168.9.255
Fixed Length – Exercise 2
Divide the address space 172.16.0.0 into 3 networks
Given address block is Class B → 16 bits for NID and 16 bits for HID
172.16.00000000.00000000
To
172.16.11111111.11111111
172.16.XX000000.00000000
XX = 00
Network ID : 172.16.0.0
Broadcast ID: 172.16.255.255
XX = 01 XX = 10
XX = 11
2 bits are required
to make 4 parts
Visit www.youtube.com/GURUKULA for Lecture Videos
NET 1
172.16.00000000.00000000 172.16.0.0
172.16.00111111.11111111 172.16.63.255
NET 2
172.16.01000000.00000000 172.16.64.0
172.16.01111111.11111111 172.16.127.255
NET 3
172.16.10000000.00000000 172.16.128.0
172.16.10111111.11111111 172.16.191.255
NET 4
172.16.11000000.00000000 172.16.192.0
172.16.11111111.11111111 172.16.255.255
Visit www.youtube.com/GURUKULA for Lecture Videos
Fixed Length – Exercise 3
• Divide the address space 192.168.9.0 into suitable number of
networks so that each network can handle at least 10 hosts
In each subnet 2 address are not usable
so total no of address required is 12
2? Gives 12 address → This is not possible
24 Gives 16 address → This is the nearest possible value
192.168.9.XXXX_ _ _ _
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot (20)

Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Subnetting
SubnettingSubnetting
Subnetting
 
ELEC - Lecture 2
ELEC - Lecture 2ELEC - Lecture 2
ELEC - Lecture 2
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
 
Subnetting
SubnettingSubnetting
Subnetting
 
Solve Ip Address Problem By Yapa Wijeratne
Solve Ip Address Problem By Yapa WijeratneSolve Ip Address Problem By Yapa Wijeratne
Solve Ip Address Problem By Yapa Wijeratne
 
Assignment 1 iap
Assignment 1 iapAssignment 1 iap
Assignment 1 iap
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Subneting
SubnetingSubneting
Subneting
 

Similar to Network Layer Services and Fixed Length Subnetting

Similar to Network Layer Services and Fixed Length Subnetting (20)

Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Chap3. i pv4
Chap3. i pv4Chap3. i pv4
Chap3. i pv4
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Mod6
Mod6Mod6
Mod6
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.ppt
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
Day03
Day03 Day03
Day03
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTE
 
Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 
Computer Networks CCNA 10 Problem
Computer Networks CCNA 10 ProblemComputer Networks CCNA 10 Problem
Computer Networks CCNA 10 Problem
 
Ip addressing and subnetting workbook
Ip addressing and subnetting workbookIp addressing and subnetting workbook
Ip addressing and subnetting workbook
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Network Layer Services and Fixed Length Subnetting

  • 2. Subnets and Subnet Mask • What are subnets? • Dividing the large address space into smaller blocks of IP Address • Why do we go for subnets? • If the blocks of IP address are used as such millions of IP address are wasted. • Managing the Large block of IP Address is also difficult • What are the types of subnets? • Fixed Length Subnetting • Variable Length Subnetting • Subnet Mask • Will be discussed few slides later Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. Fixed Length Subnetting • Lets consider an Organization and the entire organization has different departments / Sections I II III IVECE EEE CSE MECH Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. Fixed Length – Example 1 Divide the address block 200.1.2.0 into 2 subnets Given address block is Class C → 24 bits for NID and 8 bits for HID 200.1.2.00000000 200.1.2.11111111 200.1.2.0 200.1.2.255 200.1.2.X0000000 X = 0 X = 1 Network ID : 200.1.2.0 Broadcast ID: 200.1.2.255 1 bit is required to make 2 parts Get Back Visit www.youtube.com/GURUKULA for Lecture Videos
  • 5. 200.1.2.X0000000 X = 0 X = 1 200.1.2.0_ _ _ _ _ _ _ Runs from 200.1.2.00000000 200.1.2.00000001 200.1.2.00000010 200.1.2.00000011 . . 200.1.2.01111111 200.1.2.1_ _ _ _ _ _ _ Runs from 200.1.2.10000000 200.1.2.10000001 200.1.2.10000010 200.1.2.10000011 . . 200.1.2.11111111 200.1.2.0 200.1.2.127 200.1.2.128 200.1.2.255 Network ID : 200.1.2.0 Broadcast ID: 200.1.2.127 Network ID : 200.1.2.128 Broadcast ID: 200.1.2.255 27 = 128 Address in Each Subnet Get Back Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Fixed Length – Example 2 Divide the address block 200.1.2.0 into 4 subnets Given address block is Class C → 24 bits for NID and 8 bits for HID 200.1.2.00000000 200.1.2.11111111 200.1.2.0 200.1.2.255 200.1.2.XX000000 XX = 00 Network ID : 200.1.2.0 Broadcast ID: 200.1.2.255 XX = 01 XX = 10 XX = 11 2 bits are required to make 4 parts Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7. 200.1.2.XX000000 XX = 00 XX = 01 XX = 10 XX = 11 200.1.2.00 _ _ _ _ _ _ Runs from 200.1.2.00000000 to 200.1.2.00111111 200.1.2.01 _ _ _ _ _ _ Runs from 200.1.2.01000000 to 200.1.2.01111111 200.1.2.11 _ _ _ _ _ _ Runs from 200.1.2.11000000 to 200.1.2.11111111 200.1.2.10 _ _ _ _ _ _ Runs from 200.1.2.10000000 to 200.1.2.10111111 200.1.2.0 → Network ID 200.1.2.63 → Broadcast ID 200.1.2.128 → Network ID 200.1.2.191 → Broadcast ID 200.1.2.192 → Network ID 200.1.2.255 → Broadcast ID 200.1.2.64 → Network ID 200.1.2.127 → Broadcast ID 26 = 64 Address in Each Subnet Visit www.youtube.com/GURUKULA for Lecture Videos
  • 8. Fixed Length – Exercise 1 Divide the address block 192.168.9.0 into 5 networks Given address block is Class C → 24 bits for NID and 8 bits for HID 192.168.9.00000000 192.168.9.11111111 192.168.9.0 192.168.9.255 192.168.9.XXX00000 Network ID : 192.168.9.0 Broadcast ID: 192.168.9.255 3 bits are required to make 8 parts 000 001 010 011 100 101 110 111 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 9. NET 1 192.168.9.00000000 192.168.9.0 192.168.9.00011111 192.168.9.31 NET 2 192.168.9.00100000 192.168.9.32 192.168.9.00111111 192.168.9.63 NET 3 192.168.9.01000000 192.168.9.64 192.168.9.01011111 192.168.9.95 NET 4 192.168.9.01100000 192.168.9.96 192.168.9.01111111 192.168.9.127 NET 5 192.168.9.10000000 192.168.9.128 192.168.9.10011111 192.168.9.159 NET 6 192.168.9.10100000 192.168.9.160 192.168.9.10111111 192.168.9.191 NET 7 192.168.9.11000000 192.168.9.192 192.168.9.11011111 192.168.9.223 NET 8 192.168.9.11100000 192.168.9.224 192.168.9.11111111 192.168.9.255
  • 10. Fixed Length – Exercise 2 Divide the address space 172.16.0.0 into 3 networks Given address block is Class B → 16 bits for NID and 16 bits for HID 172.16.00000000.00000000 To 172.16.11111111.11111111 172.16.XX000000.00000000 XX = 00 Network ID : 172.16.0.0 Broadcast ID: 172.16.255.255 XX = 01 XX = 10 XX = 11 2 bits are required to make 4 parts Visit www.youtube.com/GURUKULA for Lecture Videos
  • 11. NET 1 172.16.00000000.00000000 172.16.0.0 172.16.00111111.11111111 172.16.63.255 NET 2 172.16.01000000.00000000 172.16.64.0 172.16.01111111.11111111 172.16.127.255 NET 3 172.16.10000000.00000000 172.16.128.0 172.16.10111111.11111111 172.16.191.255 NET 4 172.16.11000000.00000000 172.16.192.0 172.16.11111111.11111111 172.16.255.255 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 12. Fixed Length – Exercise 3 • Divide the address space 192.168.9.0 into suitable number of networks so that each network can handle at least 10 hosts In each subnet 2 address are not usable so total no of address required is 12 2? Gives 12 address → This is not possible 24 Gives 16 address → This is the nearest possible value 192.168.9.XXXX_ _ _ _ Visit www.youtube.com/GURUKULA for Lecture Videos
  • 13. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…