SlideShare a Scribd company logo
1 of 18
Download to read offline
Communication
Networks
Network Layer Services
Variable Length Subnetting
Visit www.youtube.com/GURUKULA for Lecture Videos
Subnet Mask
Visit www.youtube.com/GURUKULA for Lecture Videos
Subnet Mask
• A Subnet mask is a 32-bit number that masks an IP
address, and divides the IP address into network
address and host address.
• Subnet Mask is made by setting
• network bits to all "1"s
• host bits to all "0"s.
Visit www.youtube.com/GURUKULA for Lecture Videos
Visit www.youtube.com/GURUKULA for Lecture Videos
Representation of Subnet Mask
• There are 3 types of representation
• Binary Representation
• Dotted Decimal Representation
• /n Representation or CIDR Representation
(n Defines #. Of bits allotted for Network)
Visit www.youtube.com/GURUKULA for Lecture Videos
Default Subnet Mask
Class NID - HID Binary
Class A NID – HID – HID – HID 11111111.00000000.00000000.00000000
Class B NID – NID – HID – HID 11111111.11111111.00000000.00000000
Class C NID – NID – NID – HID 11111111.11111111.11111111.00000000
Class Dotted Decimal /n
Class A 255.0.0.0 /8
Class B 255.255.0.0 /16
Class C 255.255.255.0 /24
Visit www.youtube.com/GURUKULA for Lecture Videos
Need for Subnet Mask
1. Given any IP Address, Subnet mask can be used to identify
the network ID
Visit www.youtube.com/GURUKULA for Lecture Videos
Need for Subnet Mask
2. To inform the router that subnetting is performed
Lets go back to the Example problem
200.1.2.0
200.1.2.127
200.1.2.0 /25
200.1.2.127 /25
11111111.11111111.11111111.10000000
255 . 255 . 255 . 128
Visit www.youtube.com/GURUKULA for Lecture Videos
Subnetting Master Table
Variable Length Subnetting
•There are certain drawbacks in fixed length
methods
• All subnets will have equal number of IP Address
64 64
6464
64
64
128
This scenario is called VLSM
(Variable Length Subnet Masking)
Visit www.youtube.com/GURUKULA for Lecture Videos
Variable Length – Example 1
• Divide the given address space 172.16.0.0 / 16 into 7 networks
whose requirement is given below
• Net 1 → 500 hosts
• Net 2 → 200 hosts
• Net 3 → 100 hosts
• Net 4 → 60 hosts
• Net 5 → 20 hosts
• Net 6 → 2 hosts
• Net 7 → 2 hosts
Visit www.youtube.com/GURUKULA for Lecture Videos
500
200
100
60
20
2
2
1. Arrange the required No. of hosts in Ascending Order
2. Allocate the No of bits required for Hosts in powers of 2
29 = 512
28 = 256
27 = 128
26 = 64
25 = 32
22 = 4
22 = 4
3. Write the given address space with required no of Host Bits
172.16.00000000.00000000
4. Count for required no of bits from right side ( ) and find the first and last address
172.16.00000001.11111111
5. Write the starting and ending address with subnet mask
172.16.0.0 / 23
172.16.1.255 / 23
6. Write the immediate next ip address for next subnet
172.16.00000010.00000000
7. Count the number of bits required for 2nd subnet
172.16.00000010.00000000
172.16.00000010.11111111
Write the first and last ip address with subnet mask
172.16.2.0 / 24
172.16.2.255 / 24
Repeat the procedure until last subnet
172.16.00000011.00000000
172.16.00000011.01111111
172.16.3.0 / 25
172.16.3.127 / 25
172.16.00000011.10000000
172.16.00000011.10111111
172.16.3.128 / 26
172.16.3.191 / 26
172.16.00000011.11000000
172.16.00000011.11011111
172.16.3.192 / 27
172.16.3.223 / 27
172.16.00000011.11100000
172.16.00000011.11100011
172.16.3.224 / 30
172.16.3.227 / 30
172.16.00000011.11100100
172.16.00000011.11100111
172.16.3.228 / 30
172.16.3.231 / 30
Visit www.youtube.com/GURUKULA for Lecture Videos
Variable Length – Example 2
Divide the address space 172.16.0.0 / 16 for 3
LANS as mentioned below
Lan 1 should have 50 address
Lan 2 should have 217 address
Lan 3 should have 300 address
Visit www.youtube.com/GURUKULA for Lecture Videos
Solution
NET #
No of Bits
Required
Address space
Address with subnet
mask
LAN 3 → 300 29 = 512
172.16.00000000.00000000 172.16.0.0 /23
172.16.00000001.11111111 172.16.1.255 /23
LAN 2 → 217 28 = 256
172.16.00000010.00000000 172.16.2.0 /24
172.16.00000010.11111111 172.16.2.255 /24
LAN 1 → 50 26 = 64
172.16.00000011.00000000 172.16.3.0 /26
172.16.00000011.00111111 172.16.3.63 /26
Visit www.youtube.com/GURUKULA for Lecture Videos
Mastering the Subnets Problem
Divide the address space 172.16.0.0 / 16 for 3 LANS as
mentioned below
• Lan 1 should have 50 address
• Lan 1.1 → 25 address
• Lan 1.2 → 12 address
• Lan 1.3 → 5 address
• Lan 1.4 → 5 address
• Lan 2 should have 217 address
• Lan 2.1 → 70 address
• Lan 2.2 → 30 address
• Lan 2.3 → 16 address
• Lan 2.4 → 10 address
• Lan 3 should have 300 address
• Lan 3.1 → 80 address
• Lan 3.2 → 42 address
• Lan 3.3 → 25 address
• Lan 3.4 → 15 address
• Lan 3.5 → all remaining address
Visit www.youtube.com/GURUKULA for Lecture Videos
Solution
net # Required Address no of bits Starting Address Ending Address
net 3 300 address 2^9 = 512 172.16.0.0 /23 172.16.1.255 /23
3.1 80 address 2^7 = 128 172.16.0.0 /25 172.16.0.127 /25
3.2 42 address 2^6 = 64 172.16.0.128 / 26 172.16.0.191 /26
3.3 25 address 2^5 = 32 172.16.0.192 /27 172.16.0.223 /27
3.4 15 address 2^5 = 32 172.16.0.224 /27 172.16.0.255/27
3.5 remaining 172.16.1.0 172.16.1.255
net 2 217 address 2^8 = 256 172.16.2.0 /24 172.16.2.255 /24
2.1 70 address 2^7 = 128 172.16.2.0 /25 172.16.2.127 /25
2.2 30 address 2^5 = 32 172.16.2.128 / 27 172.16.2.159 / 27
2.3 16 address 2^5 = 32 172.16.2.160 /27 172.16.2.191 /27
2.4 10 address 2^4 = 16 172.16.2.192 /28 172.16.2.207 /28
remaining 172.16.2.208 172.16.2.255
net 1 50 address 2^6 = 64 172.16.3.0 /26 172.16.3.63 /26
1.1 25 address 2^5 = 32 172.16.3.0 /27 172.16.3.31 /27
1.2 12 address 2^4 = 16 172.16.3.32 /28 172.16.3.47 /28
1.3 5 address 2^3 = 8 172.16.3.48 /29 172.16.3.55 /29
1.4 5 address 2^3 = 8 172.16.3.56 /29 172.16.3.63 /29
Rules for CIDR Blocks
• All IP address should be Contiguous
• The size of the requested IP should be in power of 2
• Meaning – you cannot ask for 500 IP address. You can get only 512 IP
Address as a block
Taking this further will have their applications in Operating Systems
So, I will leave it to your exercise
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)RaghulR21
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6Rekha Yadav
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Tn 310 vlan-trunking
Tn 310 vlan-trunkingTn 310 vlan-trunking
Tn 310 vlan-trunkingsali Ibrahimu
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its TypesNetwax Lab
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 

What's hot (20)

Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
OSPF
OSPF OSPF
OSPF
 
Tn 310 vlan-trunking
Tn 310 vlan-trunkingTn 310 vlan-trunking
Tn 310 vlan-trunking
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its Types
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
6lowpan
6lowpan6lowpan
6lowpan
 
VLAN
VLANVLAN
VLAN
 
Ipv6
Ipv6Ipv6
Ipv6
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
C I D R
C I D RC I D R
C I D R
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 

Similar to 2.10b network layer services i pv4 - variable length subnetting

Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnettingNanda Afif
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 

Similar to 2.10b network layer services i pv4 - variable length subnetting (20)

Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Subnetting
SubnettingSubnetting
Subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
Vlsm
VlsmVlsm
Vlsm
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Ip subnetting
Ip subnettingIp subnetting
Ip subnetting
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Mod10
Mod10Mod10
Mod10
 
Easy subnetting
Easy subnettingEasy subnetting
Easy subnetting
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
 
Day03
Day03 Day03
Day03
 
Subnetting
SubnettingSubnetting
Subnetting
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introductionJAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

2.10b network layer services i pv4 - variable length subnetting

  • 1. Communication Networks Network Layer Services Variable Length Subnetting Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. Subnet Mask • A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. • Subnet Mask is made by setting • network bits to all "1"s • host bits to all "0"s. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 5. Representation of Subnet Mask • There are 3 types of representation • Binary Representation • Dotted Decimal Representation • /n Representation or CIDR Representation (n Defines #. Of bits allotted for Network) Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Default Subnet Mask Class NID - HID Binary Class A NID – HID – HID – HID 11111111.00000000.00000000.00000000 Class B NID – NID – HID – HID 11111111.11111111.00000000.00000000 Class C NID – NID – NID – HID 11111111.11111111.11111111.00000000 Class Dotted Decimal /n Class A 255.0.0.0 /8 Class B 255.255.0.0 /16 Class C 255.255.255.0 /24 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7. Need for Subnet Mask 1. Given any IP Address, Subnet mask can be used to identify the network ID Visit www.youtube.com/GURUKULA for Lecture Videos
  • 8. Need for Subnet Mask 2. To inform the router that subnetting is performed Lets go back to the Example problem 200.1.2.0 200.1.2.127 200.1.2.0 /25 200.1.2.127 /25 11111111.11111111.11111111.10000000 255 . 255 . 255 . 128 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 10. Variable Length Subnetting •There are certain drawbacks in fixed length methods • All subnets will have equal number of IP Address 64 64 6464 64 64 128 This scenario is called VLSM (Variable Length Subnet Masking) Visit www.youtube.com/GURUKULA for Lecture Videos
  • 11. Variable Length – Example 1 • Divide the given address space 172.16.0.0 / 16 into 7 networks whose requirement is given below • Net 1 → 500 hosts • Net 2 → 200 hosts • Net 3 → 100 hosts • Net 4 → 60 hosts • Net 5 → 20 hosts • Net 6 → 2 hosts • Net 7 → 2 hosts Visit www.youtube.com/GURUKULA for Lecture Videos
  • 12. 500 200 100 60 20 2 2 1. Arrange the required No. of hosts in Ascending Order 2. Allocate the No of bits required for Hosts in powers of 2 29 = 512 28 = 256 27 = 128 26 = 64 25 = 32 22 = 4 22 = 4 3. Write the given address space with required no of Host Bits 172.16.00000000.00000000 4. Count for required no of bits from right side ( ) and find the first and last address 172.16.00000001.11111111 5. Write the starting and ending address with subnet mask 172.16.0.0 / 23 172.16.1.255 / 23 6. Write the immediate next ip address for next subnet 172.16.00000010.00000000 7. Count the number of bits required for 2nd subnet 172.16.00000010.00000000 172.16.00000010.11111111 Write the first and last ip address with subnet mask 172.16.2.0 / 24 172.16.2.255 / 24 Repeat the procedure until last subnet 172.16.00000011.00000000 172.16.00000011.01111111 172.16.3.0 / 25 172.16.3.127 / 25 172.16.00000011.10000000 172.16.00000011.10111111 172.16.3.128 / 26 172.16.3.191 / 26 172.16.00000011.11000000 172.16.00000011.11011111 172.16.3.192 / 27 172.16.3.223 / 27 172.16.00000011.11100000 172.16.00000011.11100011 172.16.3.224 / 30 172.16.3.227 / 30 172.16.00000011.11100100 172.16.00000011.11100111 172.16.3.228 / 30 172.16.3.231 / 30 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 13. Variable Length – Example 2 Divide the address space 172.16.0.0 / 16 for 3 LANS as mentioned below Lan 1 should have 50 address Lan 2 should have 217 address Lan 3 should have 300 address Visit www.youtube.com/GURUKULA for Lecture Videos
  • 14. Solution NET # No of Bits Required Address space Address with subnet mask LAN 3 → 300 29 = 512 172.16.00000000.00000000 172.16.0.0 /23 172.16.00000001.11111111 172.16.1.255 /23 LAN 2 → 217 28 = 256 172.16.00000010.00000000 172.16.2.0 /24 172.16.00000010.11111111 172.16.2.255 /24 LAN 1 → 50 26 = 64 172.16.00000011.00000000 172.16.3.0 /26 172.16.00000011.00111111 172.16.3.63 /26 Visit www.youtube.com/GURUKULA for Lecture Videos
  • 15. Mastering the Subnets Problem Divide the address space 172.16.0.0 / 16 for 3 LANS as mentioned below • Lan 1 should have 50 address • Lan 1.1 → 25 address • Lan 1.2 → 12 address • Lan 1.3 → 5 address • Lan 1.4 → 5 address • Lan 2 should have 217 address • Lan 2.1 → 70 address • Lan 2.2 → 30 address • Lan 2.3 → 16 address • Lan 2.4 → 10 address • Lan 3 should have 300 address • Lan 3.1 → 80 address • Lan 3.2 → 42 address • Lan 3.3 → 25 address • Lan 3.4 → 15 address • Lan 3.5 → all remaining address Visit www.youtube.com/GURUKULA for Lecture Videos
  • 16. Solution net # Required Address no of bits Starting Address Ending Address net 3 300 address 2^9 = 512 172.16.0.0 /23 172.16.1.255 /23 3.1 80 address 2^7 = 128 172.16.0.0 /25 172.16.0.127 /25 3.2 42 address 2^6 = 64 172.16.0.128 / 26 172.16.0.191 /26 3.3 25 address 2^5 = 32 172.16.0.192 /27 172.16.0.223 /27 3.4 15 address 2^5 = 32 172.16.0.224 /27 172.16.0.255/27 3.5 remaining 172.16.1.0 172.16.1.255 net 2 217 address 2^8 = 256 172.16.2.0 /24 172.16.2.255 /24 2.1 70 address 2^7 = 128 172.16.2.0 /25 172.16.2.127 /25 2.2 30 address 2^5 = 32 172.16.2.128 / 27 172.16.2.159 / 27 2.3 16 address 2^5 = 32 172.16.2.160 /27 172.16.2.191 /27 2.4 10 address 2^4 = 16 172.16.2.192 /28 172.16.2.207 /28 remaining 172.16.2.208 172.16.2.255 net 1 50 address 2^6 = 64 172.16.3.0 /26 172.16.3.63 /26 1.1 25 address 2^5 = 32 172.16.3.0 /27 172.16.3.31 /27 1.2 12 address 2^4 = 16 172.16.3.32 /28 172.16.3.47 /28 1.3 5 address 2^3 = 8 172.16.3.48 /29 172.16.3.55 /29 1.4 5 address 2^3 = 8 172.16.3.56 /29 172.16.3.63 /29
  • 17. Rules for CIDR Blocks • All IP address should be Contiguous • The size of the requested IP should be in power of 2 • Meaning – you cannot ask for 500 IP address. You can get only 512 IP Address as a block Taking this further will have their applications in Operating Systems So, I will leave it to your exercise
  • 18. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…