SlideShare a Scribd company logo
1 of 12
CONTINUOUS ASSESMENT-(CA1)
AY-2022-2023(EVEN SEM)
(MAKAUT EXAMINATION)
Assessment Type- Presentation
1
BUDGE BUDGE INSTITUTE OF TECHNOLOGY
Affiliated to MAKAUT(formerly WBUT)& Approved by AICTE, NAAC Accredited
Kolkata - 700 137, West Bengal, India
Phone : 033 2482 0676 / 0670
http://www.bbit.edu.in
Department of Computer Science and Engineering
NBA (National Board of Accreditation) valid from Academic Year 2021-2022 TO 2023-2024 i.e. upto 30-06-2024.
University Roll Number: 27600120126
Name of the Student: SWAPNAMAY SAMUI
Course Code: PCC-CS602
Course Name: COMPUTER NETWORK
Semester 6th
Year 3rd
Department Computer Science and Engineering
Topic of Presentation SUBNET MASK
2
In class A full addressing most of the IP
addressing are wasted, whereas in class C IP
address are not available. So, in order to
utilize the IP address concept of subnet is
introduce.
Subnet support3-level of hierarchy-
Level-3
Level-2
Level-1 Network_Id
Subnet-1
Host-1 Host-2
Host-
K
Subnet-2
Host-1
Host-
m
Subnet-
n
Host
-1
Host
-l
Introduction:
3
Literature Survey:
Each host in a LAN has a subnet mask. The
subnet mask is an octet that uses the number 255 to
represent the network address portion of the IP
address and a zero to identify the host portion of
the address . For example, the subnet mask
255.255.255.0 is used by each host to determine
which LAN or class it belongs to. The zero at the end
of the subnet mask represents a unique host within
that network.
4
During the era of classful addressing,
subnetting was introduced. If an organization
was granted a large block in class A or B, it
could divide the addresses into several
contiguous groups and assign each group to
smaller networks (called subnets) or, in rare
cases share part of the addresses with
neighbors.
The job of the subnet is to carry messages
from host to host.
Subnet masking :
5
Subnet masks apply only to Class A, class B
or Class C IP addresses.
The subnet Mask is like a filter that is
applied to a message’s destination IP
address.
Its objective is to determine if the local
network is the destination network.
Subnet masking :
6
Subnet masking :
7
Applying a subnet mask allows you to identify
the network and Host parts of the address. A router will
then determine whether the address is local or remote.
Network bits are masked as 1s
Host bits are masked as 0s
Class A – 255.0.0.0
11111111.00000000.00000000.00000000
Class B – 255.255.0.0
11111111.11111111.00000000.00000000
Class C – 255.255.255.0
11111111.11111111.11111111.00000000
Subnet masking :
8
Performing a bitwise logical AND between the
IP address and the subnet mask results in the
network address
Ex: Class - B 140.179.240.200
10001100.10110011.11110000.11001000
11111111.11111111.00000000.00000000
10001100.10110011.00000000.00000000
Network Address = 140.179.000.000
Subnet masking :
9
Using /24 subnet...
190.52.1.2
190.52.2.2
190.52.3.2
Network Network Subnet Host
But internal routers think all
these addresses are on different
networks, called subnetworks
Internet routers still “see” this net as 190.52.0.0
Class B Network Network Host Host
Given the Class B address 190.52.0.0
Subnet Example
10
With the rapid growth of internet & the ever-
increasing demand for new addresses, the standard
address class structure has been expanded by borrowing
bits from the host portion to allow for more networks.
Under this addressing scheme ,called Subnetting,
separating the network & Host requires a special process
called Subnet Masking.
Conclusion:
11
Reference:
 https://mvrk2016.files.wordpress.com/2016/02/3-ip-
address-subnet-mask-final.ppt
 https://www.javatpoint.com/dbms-tutorial
 https://www.tutorialspoint.com/dbms/index.htm
 https://www.geeksforgeeks.org/dbms/
12

More Related Content

What's hot

IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
IP Address
IP AddressIP Address
IP AddressRahul P
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressingSourav Jyoti Das
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 

What's hot (20)

IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
IP Address
IP AddressIP Address
IP Address
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip address
Ip addressIp address
Ip address
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Cis82 e2-1-packet forwarding
Cis82 e2-1-packet forwardingCis82 e2-1-packet forwarding
Cis82 e2-1-packet forwarding
 
Basic network training1
Basic network training1Basic network training1
Basic network training1
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Subnetting
SubnettingSubnetting
Subnetting
 

Similar to subnet mask.ppt

CISCO Exact Questions By: Konard
CISCO Exact Questions By: KonardCISCO Exact Questions By: Konard
CISCO Exact Questions By: KonardEng. Emad Al-Atoum
 
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338qCisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338qkeiko277
 
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and SimulationAutomation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulationinventionjournals
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)keiko277
 
CCNAX 200 120 dumps
CCNAX 200 120 dumpsCCNAX 200 120 dumps
CCNAX 200 120 dumpsabdulquyyum
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxManojGowdaKb
 
Microsoft windows server 2003
Microsoft windows server 2003Microsoft windows server 2003
Microsoft windows server 2003bishal mahat
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingBisrat Girma
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting MechanicsImranulHasan6
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumpsslotiopo
 
Introduction-to-IP-address-classes (1).pptx
Introduction-to-IP-address-classes (1).pptxIntroduction-to-IP-address-classes (1).pptx
Introduction-to-IP-address-classes (1).pptxSANJAYKUMAR SENMA
 
CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)Anis Mizi
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulatorccnaguide
 

Similar to subnet mask.ppt (20)

CCNA Icnd110 s04l03
CCNA Icnd110 s04l03CCNA Icnd110 s04l03
CCNA Icnd110 s04l03
 
CISCO Exact Questions By: Konard
CISCO Exact Questions By: KonardCISCO Exact Questions By: Konard
CISCO Exact Questions By: Konard
 
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338qCisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
 
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and SimulationAutomation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
 
CCNAX 200 120 dumps
CCNAX 200 120 dumpsCCNAX 200 120 dumps
CCNAX 200 120 dumps
 
CCNA DUMPS 200-120
CCNA DUMPS 200-120CCNA DUMPS 200-120
CCNA DUMPS 200-120
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Microsoft windows server 2003
Microsoft windows server 2003Microsoft windows server 2003
Microsoft windows server 2003
 
CCNA Exam Question
CCNA Exam QuestionCCNA Exam Question
CCNA Exam Question
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Ccna1v3 mod10
Ccna1v3 mod10Ccna1v3 mod10
Ccna1v3 mod10
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting Mechanics
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
Introduction-to-IP-address-classes (1).pptx
Introduction-to-IP-address-classes (1).pptxIntroduction-to-IP-address-classes (1).pptx
Introduction-to-IP-address-classes (1).pptx
 
Vlsm
VlsmVlsm
Vlsm
 
CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulator
 
Subnetting
SubnettingSubnetting
Subnetting
 

Recently uploaded

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 

Recently uploaded (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 

subnet mask.ppt

  • 1. CONTINUOUS ASSESMENT-(CA1) AY-2022-2023(EVEN SEM) (MAKAUT EXAMINATION) Assessment Type- Presentation 1 BUDGE BUDGE INSTITUTE OF TECHNOLOGY Affiliated to MAKAUT(formerly WBUT)& Approved by AICTE, NAAC Accredited Kolkata - 700 137, West Bengal, India Phone : 033 2482 0676 / 0670 http://www.bbit.edu.in Department of Computer Science and Engineering NBA (National Board of Accreditation) valid from Academic Year 2021-2022 TO 2023-2024 i.e. upto 30-06-2024. University Roll Number: 27600120126 Name of the Student: SWAPNAMAY SAMUI Course Code: PCC-CS602 Course Name: COMPUTER NETWORK Semester 6th Year 3rd Department Computer Science and Engineering Topic of Presentation SUBNET MASK
  • 2. 2 In class A full addressing most of the IP addressing are wasted, whereas in class C IP address are not available. So, in order to utilize the IP address concept of subnet is introduce. Subnet support3-level of hierarchy- Level-3 Level-2 Level-1 Network_Id Subnet-1 Host-1 Host-2 Host- K Subnet-2 Host-1 Host- m Subnet- n Host -1 Host -l Introduction:
  • 3. 3 Literature Survey: Each host in a LAN has a subnet mask. The subnet mask is an octet that uses the number 255 to represent the network address portion of the IP address and a zero to identify the host portion of the address . For example, the subnet mask 255.255.255.0 is used by each host to determine which LAN or class it belongs to. The zero at the end of the subnet mask represents a unique host within that network.
  • 4. 4 During the era of classful addressing, subnetting was introduced. If an organization was granted a large block in class A or B, it could divide the addresses into several contiguous groups and assign each group to smaller networks (called subnets) or, in rare cases share part of the addresses with neighbors. The job of the subnet is to carry messages from host to host. Subnet masking :
  • 5. 5 Subnet masks apply only to Class A, class B or Class C IP addresses. The subnet Mask is like a filter that is applied to a message’s destination IP address. Its objective is to determine if the local network is the destination network. Subnet masking :
  • 7. 7 Applying a subnet mask allows you to identify the network and Host parts of the address. A router will then determine whether the address is local or remote. Network bits are masked as 1s Host bits are masked as 0s Class A – 255.0.0.0 11111111.00000000.00000000.00000000 Class B – 255.255.0.0 11111111.11111111.00000000.00000000 Class C – 255.255.255.0 11111111.11111111.11111111.00000000 Subnet masking :
  • 8. 8 Performing a bitwise logical AND between the IP address and the subnet mask results in the network address Ex: Class - B 140.179.240.200 10001100.10110011.11110000.11001000 11111111.11111111.00000000.00000000 10001100.10110011.00000000.00000000 Network Address = 140.179.000.000 Subnet masking :
  • 9. 9 Using /24 subnet... 190.52.1.2 190.52.2.2 190.52.3.2 Network Network Subnet Host But internal routers think all these addresses are on different networks, called subnetworks Internet routers still “see” this net as 190.52.0.0 Class B Network Network Host Host Given the Class B address 190.52.0.0 Subnet Example
  • 10. 10 With the rapid growth of internet & the ever- increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the host portion to allow for more networks. Under this addressing scheme ,called Subnetting, separating the network & Host requires a special process called Subnet Masking. Conclusion:
  • 12. 12