SlideShare a Scribd company logo
1 of 45
www.cyberlabzone.com
Introduction to
Computer
Networking
IP Addressing and subnetting
www.cyberlabzone.com
In This Session. . . .
 IP addressing
 Reserved addresses
 Network identity
 Host identity
 Subnetworking
 Subnet masks
2
www.cyberlabzone.com
Internet Layer - IP Addresses
 Hierarchical addressing scheme
 32 bit address
 Dotted decimal notation
 Used for addressing and routing
 Divided into 2 main sections
 Network identity
 Host identity
3
www.cyberlabzone.com
IP version 4
 4 bytes divided into 4 sections
 Each section can range from 0 to 255
 If any portion of the IP address contains a number
greater than 255 it is ILEGAL !
 Presented with dots in between 4 bytes
 e.g. 193.60.61.243
 11000001.00111100.00111101.11110011
4
www.cyberlabzone.com
For subnetting use BINARY
 Always work in Binary
 All solutions can be discovered in Binary
 Eventually you will see shortcuts
 Use Binary first
 It will take time to understand
 Practice makes perfect
5
www.cyberlabzone.com
Address Classes (a history
lesson)
 Classes A, B, C, D, E were created
 IP numbers that began with :
 1 to 126 are class A addresses
 128 to 191 are class B addresses
 192 to 223 are class C addresses
 224 to 239 are class D addresses
 240 to 254 are class E addresses.
6
www.cyberlabzone.com
Exercise 1 – ‘class’
identification
 To which class do the following IP numbers legally belong ?
 193.45.67.123
 22.23.24.25
 131.74.59.12
 210.217.12,98
 193.260.50.17
7
www.cyberlabzone.com
8
Class C addresses
 First 3 bytes is network portion
 Last byte for hosts on network
 How many hosts can class C have ?
C
www.cyberlabzone.com
Class B addresses
 First 2 bytes is network portion
 Last 2 bytes for hosts on network
 How many hosts can class B have ?
9
B
www.cyberlabzone.com
Class A addresses
 First byte is network portion
 last 3 bytes for hosts on network
 How many hosts can class A have ?
10
A
www.cyberlabzone.com
The end of Address class
system
 Classes wasted addresses through inflexibility
 A better way of dividing network space was sought
 This was known as Variable Length Subnet Masking or
VLSM
 Now we have to explicitly show the boundary of the
host and network portion of an address
11
www.cyberlabzone.com
Caveat to classless addressing
 Many people and textbooks still refer to the address class system
 No networks EVER use the class system in a production environment
 Be aware of the translations between the classful and classless system
 Remember ALWAYS to use the classless system despite the terminology
of the question
12
www.cyberlabzone.com
Subnet Mask identifies the
boundary
 Sometimes called the Extended Network Prefix
 Identifies the two sections of the IP address, network
and host fields
 Used by routers to work out the network a particular
host belongs to
 Written either as dotted decimal or slash notation
13
www.cyberlabzone.com
Subnet Mask – two notations
 Dotted decimal is one of the notations
 255.255.255.0
 In binary this is
11111111.11111111.11111111.00000000
 Slash is the second notation
 Count the number of ‘1’s
 There are 24 ‘1’s
 So another way of expressing this subnet
mask is /24
14
www.cyberlabzone.com
Network (or wire) Address
 This is the identity of the network and is used by routers
to deliver packets across networks
 No host is ever given this address
 To discover the network address, convert IP address from
decimal to binary
 Replace the host section with 0s
 Convert back to decimal
15
www.cyberlabzone.com
Finding the Network Identity
 175.13.155.121 /16
 10101111.00001101. 10011011. 01111001
 What address class was this ?
 Which is the host field ?
 Replace with 0s
 Convert back to dotted decimal
16
www.cyberlabzone.com
Broadcast Address RFC 919
 Each network needs a broadcast address
 No host is ever given this address
 A broadcast can message all hosts in a LAN
 Useful when a host needs to find information without
knowing exactly what other host can supply it e.g. ARP
 When a host wants to provide information to a large set
of hosts in a timely manner
17
www.cyberlabzone.com
Finding the Broadcast
Number
 Substitute the host section of the binary version of the
IP address with 1s
 Convert back to dotted decimal
 What is the broadcast address for the IP
175.13.155.121 /16
18
www.cyberlabzone.com
Reserved addressing numbers
 Host bits set to 0 are Network address
 Host bits set to 1 are Broadcast address
 127 network numbers reserved for loopback
 127.0.0.1 is ‘my NIC’
 192.168.x.x & 172.16-31.x.x & 10.x.x.x are non-
routable private addresses – for NAT and private
networks only
 defined in RFC 1918
19
www.cyberlabzone.com
Exercise 2
 Write the network & broadcast number
12.123.14.235 /24
177.177.177.177 /16
220.17.124.14 /24
277.14.13.86 /33
20
www.cyberlabzone.com
Host numbers on networks
 Original assignment of classes wasted many IP addresses
( 3 bears problem )
 Class A for governments with 224 hosts
 Class B can have 65 534 hosts
 more than most companies require
 Class C can have 254 hosts
 less than most companies require
21
www.cyberlabzone.com
Subnetworking
 Solution is to subdivide networks
 Take a network number
 Divide it into smaller networks
 These are called subnetworks
(subnets)
22
www.cyberlabzone.com
Subnetting
 Take a /24 (class C) address
 24 network bits & 8 host bits
 Company may need different departments
 We can borrow bits from host field to augment network field
23
www.cyberlabzone.com
Subnetting /24 (Class C)
address
 e.g. 198.234.125.0
 11000110.11101010.01111101.00000000
 Write network number
 10111100.11101010.00000000.00000000
 Borrow 4 bits from host field
 10111100.11101010.00000000.00000000
 4 bits remain for host identity
30/0
9/20
24
www.cyberlabzone.com
Subnetted /24 (Class C)
 How many hosts does this allow on each subnet ?
 How many subnetworks can we use ?
 First and last subnet numbers are reserved
 First and last host numbers are reserved
25
www.cyberlabzone.com
More Subnetting
 Can borrow 2 host bits minimum
 Maximum host bits that can be borrowed is all but the
rightmost 2 bits of the IP address
 Why is this so ?
26
www.cyberlabzone.com
Calculating subnet mask
1. Express the subnetwork IP address in binary form
2. Replace the network and subnet portion of the address
with all 1s
3. Replace the host portion of the address with all 0s
4. Now convert the binary expression back to dotted-
decimal notation
27
www.cyberlabzone.com
Example of subnet mask
 Calculate the subnet mask for the Subnetted
class C address 199.177.166.34 that has
borrowed 3 bits from the host field
11000111.10110001.10100110.00100010
 27 bits for network identity - substitute these
27 bits for 1s
 Change remaining 5 host bits to 0s
 Convert to dotted decimal
 255.255.255.224
28
www.cyberlabzone.com
Exercise 3
 Calculate subnet masks for class B that has borrowed 4
bits from host field
155.233.2.13
 Calculate subnet masks for class C that has borrowed 5
bits from host field
200.123.23.3
29
www.cyberlabzone.com
Use of Subnet Mask
 Mask is ANDed with IP address of host
 This gives network identity
 Can now be used to route the message
30
www.cyberlabzone.com
Example
 What is the network number for the IP address
199.177.166.34 given that the subnet mask is
255.255.255.224
 Convert to binary
 AND both numbers together
 Result is network identity
31
www.cyberlabzone.com
Exercise 3
IP network address 213.72.83.0. You require at
least 17 subnets. Calculate
1. The required subnet mask
2. The number of total subnets
3. The number of available host IP per subnet
4. The first four subnet addresses
5. The valid range of host addresses for the first
four subnets
6. The Broadcast address for each subnet
32
www.cyberlabzone.com
Conclusion
 3 Classes available, A, B, C
 Strictly not used any longer but well understood
 Flexibility gained by subnetting
 Subnets concealed from outside networks using subnet masks
 Masks are ANDed with IP address of host to discover network identity
33
www.cyberlabzone.com
Hosts on class A
 There are a possible 224 = 16 777 216 combinations
available for the last 24 bits
 Subtract the two combinations that cannot be used as
host addresses
 A class A address can have 16 777 216 - 2 = 16 777 214
different hosts
34
www.cyberlabzone.com
35
Hosts on class B
 There are a possible 216 = 65 536
combinations available for the last 16
bits
 Subtract the two combinations that
cannot be used as host addresses
 A class B address can have
65 536 - 2 = 65 534 different hosts
www.cyberlabzone.com
36
Hosts on class C
 There are a possible 28 = 256
combinations available for the last 8
bits
 Subtract the two combinations that
cannot be used as host addresses
 A class B address can have
256 - 2 = 254 different hosts
www.cyberlabzone.com
Network Address
 10101111.00001101. 00000000.00000000
 175.13.0.0
 It means ‘ this network ’
37
www.cyberlabzone.com
Broadcast number
 10101111.00001101. 11111111.11111111
 175.13.255.255
 Reaches all hosts on a network
 Will not reach other hosts on different network
38
www.cyberlabzone.com
Classes & numbers
12.123.14.0 12.123.14.255 (looks like Class A)
177.177.0.0 177.177.255.255 (Class B)
220.17.124.0 220.17.124.255 (Class C)
277.14.13.86 Illegal number
And illegal subnet mask
39
www.cyberlabzone.com
Subnetted Class C
 24 = 16 -2 = 14 hosts
 24 = 16 subnetworks
 Note that 14 hosts x 16 subnets is less than 256
 Why is this ?
40
www.cyberlabzone.com
Subnet masks
11111111.11111111.11110000.00000000
255.255.240.0
11111111.11111111.11111111.11111000
255.255.255.248
41
www.cyberlabzone.com
Network mask discovery
Convert to dotted decimal
199.177.166.32
How many hosts on this subnet ?
42
www.cyberlabzone.com
Exercise 3
 Need 17 subnets. Calculate bits required for 17 subnets
= 5
 Leaves 3 bits for host identity on subnets
 When calculating the first four subnet addresses, you
will begin with:
 00000000 = 0
 00001000 = 8
 00010000 = 16
 00011000 = 24
43
www.cyberlabzone.com
Exercise 3 contd
 3 bits for the host leaves 23 - 2 = 6 host addresses per
subnet
 Valid host range
 213.72.83.1 213.72.83.2
 213.72.83.3 213.72.83.4
 213.72.83.5 213.72.83.6
44
www.cyberlabzone.com
Thank You

More Related Content

What's hot

What's hot (20)

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_address
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
Explaining ip address
Explaining ip addressExplaining ip address
Explaining ip address
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Ipv4 Final
Ipv4 FinalIpv4 Final
Ipv4 Final
 

Viewers also liked

IP Addressing and Subnetting Basics
IP Addressing and Subnetting BasicsIP Addressing and Subnetting Basics
IP Addressing and Subnetting BasicsRowell Dionicio
 
บทที่ 2
บทที่ 2บทที่ 2
บทที่ 2teeraratWI
 
0525企業訓練
0525企業訓練0525企業訓練
0525企業訓練ebmgroup
 
Presentation EADL influence new technology learning
Presentation EADL influence new technology learningPresentation EADL influence new technology learning
Presentation EADL influence new technology learningWilfredRubens.com
 
Calculus 45S Slides February 5, 2008
Calculus 45S Slides February 5, 2008Calculus 45S Slides February 5, 2008
Calculus 45S Slides February 5, 2008Darren Kuropatwa
 
Wwv2015 robert reinder nederhoed bitmymoney
Wwv2015 robert reinder nederhoed bitmymoneyWwv2015 robert reinder nederhoed bitmymoney
Wwv2015 robert reinder nederhoed bitmymoneywebwinkelvakdag
 
Entorno gráfico word
Entorno gráfico wordEntorno gráfico word
Entorno gráfico wordzanethpineda
 
Timothy l. o’briena and shiri noyb
Timothy l. o’briena and shiri noybTimothy l. o’briena and shiri noyb
Timothy l. o’briena and shiri noybJosias Espinoza
 
Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...
Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...
Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...Netpeak
 
CETWorld- Mobile MediaCrossMedia
CETWorld- Mobile MediaCrossMediaCETWorld- Mobile MediaCrossMedia
CETWorld- Mobile MediaCrossMediaMatthew Snyder
 
FPMPAM Sarawak Medical Camp 2.4
FPMPAM Sarawak Medical Camp 2.4 FPMPAM Sarawak Medical Camp 2.4
FPMPAM Sarawak Medical Camp 2.4 John Ng
 
The growing pain of cloud computing
The growing pain of cloud computingThe growing pain of cloud computing
The growing pain of cloud computingXiaoqi YE
 
Rob And Simone
Rob And SimoneRob And Simone
Rob And Simonetbirdemily
 
Custom Google Maps Tutorial
Custom Google Maps TutorialCustom Google Maps Tutorial
Custom Google Maps Tutorialrlshapir
 

Viewers also liked (20)

IP Addressing and Subnetting Basics
IP Addressing and Subnetting BasicsIP Addressing and Subnetting Basics
IP Addressing and Subnetting Basics
 
Sql wksht-3
Sql wksht-3Sql wksht-3
Sql wksht-3
 
บทที่ 2
บทที่ 2บทที่ 2
บทที่ 2
 
0525企業訓練
0525企業訓練0525企業訓練
0525企業訓練
 
Presentation EADL influence new technology learning
Presentation EADL influence new technology learningPresentation EADL influence new technology learning
Presentation EADL influence new technology learning
 
All about you
All about youAll about you
All about you
 
Malasia
MalasiaMalasia
Malasia
 
Calculus 45S Slides February 5, 2008
Calculus 45S Slides February 5, 2008Calculus 45S Slides February 5, 2008
Calculus 45S Slides February 5, 2008
 
035 lesson 23
035 lesson 23035 lesson 23
035 lesson 23
 
Wwv2015 robert reinder nederhoed bitmymoney
Wwv2015 robert reinder nederhoed bitmymoneyWwv2015 robert reinder nederhoed bitmymoney
Wwv2015 robert reinder nederhoed bitmymoney
 
Entorno gráfico word
Entorno gráfico wordEntorno gráfico word
Entorno gráfico word
 
Timothy l. o’briena and shiri noyb
Timothy l. o’briena and shiri noybTimothy l. o’briena and shiri noyb
Timothy l. o’briena and shiri noyb
 
Spring portfolio
Spring portfolioSpring portfolio
Spring portfolio
 
Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...
Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...
Call tracking как ключевой ресурс аналитики и увеличения продаж для ecommerce...
 
CETWorld- Mobile MediaCrossMedia
CETWorld- Mobile MediaCrossMediaCETWorld- Mobile MediaCrossMedia
CETWorld- Mobile MediaCrossMedia
 
China Sporting Goods Industry Battle
China Sporting Goods Industry BattleChina Sporting Goods Industry Battle
China Sporting Goods Industry Battle
 
FPMPAM Sarawak Medical Camp 2.4
FPMPAM Sarawak Medical Camp 2.4 FPMPAM Sarawak Medical Camp 2.4
FPMPAM Sarawak Medical Camp 2.4
 
The growing pain of cloud computing
The growing pain of cloud computingThe growing pain of cloud computing
The growing pain of cloud computing
 
Rob And Simone
Rob And SimoneRob And Simone
Rob And Simone
 
Custom Google Maps Tutorial
Custom Google Maps TutorialCustom Google Maps Tutorial
Custom Google Maps Tutorial
 

Similar to CyberLab TCP/IP and IP Addressing & Subnetting

Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer NumericalsManisha Keim
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basicstmavroidis
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 
Ip addresses
Ip addressesIp addresses
Ip addressesAsif
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docxDIPESH30
 
Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)maamir farooq
 
NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP hamsa nandhini
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module IIIAjit Nayak
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sirsharifbdp
 

Similar to CyberLab TCP/IP and IP Addressing & Subnetting (20)

Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Day 5.5 subnetting
Day 5.5 subnettingDay 5.5 subnetting
Day 5.5 subnetting
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
Subnetting class C
Subnetting class CSubnetting class C
Subnetting class C
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
Subnetting
SubnettingSubnetting
Subnetting
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
 
Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)
 
NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP NP - Unit 2 - Internet Addressing, ARP and RARP
NP - Unit 2 - Internet Addressing, ARP and RARP
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module III
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 

More from Vivek chan

Deceptive Marketing.pdf
Deceptive Marketing.pdfDeceptive Marketing.pdf
Deceptive Marketing.pdfVivek chan
 
brain controled wheel chair.pdf
brain controled wheel chair.pdfbrain controled wheel chair.pdf
brain controled wheel chair.pdfVivek chan
 
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)Vivek chan
 
Manav dharma shashtra tatha shashan paddati munshiram jigyasu
Manav dharma shashtra tatha shashan paddati   munshiram jigyasuManav dharma shashtra tatha shashan paddati   munshiram jigyasu
Manav dharma shashtra tatha shashan paddati munshiram jigyasuVivek chan
 
Self driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking driversSelf driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking driversVivek chan
 
EEG Acquisition Device to Control Wheelchair Using Thoughts
EEG Acquisition Device to Control Wheelchair Using ThoughtsEEG Acquisition Device to Control Wheelchair Using Thoughts
EEG Acquisition Device to Control Wheelchair Using ThoughtsVivek chan
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)Vivek chan
 
Net framework session01
Net framework session01Net framework session01
Net framework session01Vivek chan
 
Net framework session03
Net framework session03Net framework session03
Net framework session03Vivek chan
 
Net framework session02
Net framework session02Net framework session02
Net framework session02Vivek chan
 
04 intel v_tune_session_05
04 intel v_tune_session_0504 intel v_tune_session_05
04 intel v_tune_session_05Vivek chan
 
03 intel v_tune_session_04
03 intel v_tune_session_0403 intel v_tune_session_04
03 intel v_tune_session_04Vivek chan
 
02 intel v_tune_session_02
02 intel v_tune_session_0202 intel v_tune_session_02
02 intel v_tune_session_02Vivek chan
 
01 intel v_tune_session_01
01 intel v_tune_session_0101 intel v_tune_session_01
01 intel v_tune_session_01Vivek chan
 
09 intel v_tune_session_13
09 intel v_tune_session_1309 intel v_tune_session_13
09 intel v_tune_session_13Vivek chan
 
07 intel v_tune_session_10
07 intel v_tune_session_1007 intel v_tune_session_10
07 intel v_tune_session_10Vivek chan
 
02 asp.net session02
02 asp.net session0202 asp.net session02
02 asp.net session02Vivek chan
 
01 asp.net session01
01 asp.net session0101 asp.net session01
01 asp.net session01Vivek chan
 

More from Vivek chan (20)

Deceptive Marketing.pdf
Deceptive Marketing.pdfDeceptive Marketing.pdf
Deceptive Marketing.pdf
 
brain controled wheel chair.pdf
brain controled wheel chair.pdfbrain controled wheel chair.pdf
brain controled wheel chair.pdf
 
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)
Mechanism of fullerene synthesis in the ARC REACTOR (Vivek Chan 2013)
 
Manav dharma shashtra tatha shashan paddati munshiram jigyasu
Manav dharma shashtra tatha shashan paddati   munshiram jigyasuManav dharma shashtra tatha shashan paddati   munshiram jigyasu
Manav dharma shashtra tatha shashan paddati munshiram jigyasu
 
Self driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking driversSelf driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking drivers
 
EEG Acquisition Device to Control Wheelchair Using Thoughts
EEG Acquisition Device to Control Wheelchair Using ThoughtsEEG Acquisition Device to Control Wheelchair Using Thoughts
EEG Acquisition Device to Control Wheelchair Using Thoughts
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)
Full Shri Ramcharitmanas in Hindi Complete With Meaning (Ramayana)
 
Net framework session01
Net framework session01Net framework session01
Net framework session01
 
Net framework session03
Net framework session03Net framework session03
Net framework session03
 
Net framework session02
Net framework session02Net framework session02
Net framework session02
 
04 intel v_tune_session_05
04 intel v_tune_session_0504 intel v_tune_session_05
04 intel v_tune_session_05
 
03 intel v_tune_session_04
03 intel v_tune_session_0403 intel v_tune_session_04
03 intel v_tune_session_04
 
02 intel v_tune_session_02
02 intel v_tune_session_0202 intel v_tune_session_02
02 intel v_tune_session_02
 
01 intel v_tune_session_01
01 intel v_tune_session_0101 intel v_tune_session_01
01 intel v_tune_session_01
 
09 intel v_tune_session_13
09 intel v_tune_session_1309 intel v_tune_session_13
09 intel v_tune_session_13
 
07 intel v_tune_session_10
07 intel v_tune_session_1007 intel v_tune_session_10
07 intel v_tune_session_10
 
02 asp.net session02
02 asp.net session0202 asp.net session02
02 asp.net session02
 
01 asp.net session01
01 asp.net session0101 asp.net session01
01 asp.net session01
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

CyberLab TCP/IP and IP Addressing & Subnetting

  • 2. www.cyberlabzone.com In This Session. . . .  IP addressing  Reserved addresses  Network identity  Host identity  Subnetworking  Subnet masks 2
  • 3. www.cyberlabzone.com Internet Layer - IP Addresses  Hierarchical addressing scheme  32 bit address  Dotted decimal notation  Used for addressing and routing  Divided into 2 main sections  Network identity  Host identity 3
  • 4. www.cyberlabzone.com IP version 4  4 bytes divided into 4 sections  Each section can range from 0 to 255  If any portion of the IP address contains a number greater than 255 it is ILEGAL !  Presented with dots in between 4 bytes  e.g. 193.60.61.243  11000001.00111100.00111101.11110011 4
  • 5. www.cyberlabzone.com For subnetting use BINARY  Always work in Binary  All solutions can be discovered in Binary  Eventually you will see shortcuts  Use Binary first  It will take time to understand  Practice makes perfect 5
  • 6. www.cyberlabzone.com Address Classes (a history lesson)  Classes A, B, C, D, E were created  IP numbers that began with :  1 to 126 are class A addresses  128 to 191 are class B addresses  192 to 223 are class C addresses  224 to 239 are class D addresses  240 to 254 are class E addresses. 6
  • 7. www.cyberlabzone.com Exercise 1 – ‘class’ identification  To which class do the following IP numbers legally belong ?  193.45.67.123  22.23.24.25  131.74.59.12  210.217.12,98  193.260.50.17 7
  • 8. www.cyberlabzone.com 8 Class C addresses  First 3 bytes is network portion  Last byte for hosts on network  How many hosts can class C have ? C
  • 9. www.cyberlabzone.com Class B addresses  First 2 bytes is network portion  Last 2 bytes for hosts on network  How many hosts can class B have ? 9 B
  • 10. www.cyberlabzone.com Class A addresses  First byte is network portion  last 3 bytes for hosts on network  How many hosts can class A have ? 10 A
  • 11. www.cyberlabzone.com The end of Address class system  Classes wasted addresses through inflexibility  A better way of dividing network space was sought  This was known as Variable Length Subnet Masking or VLSM  Now we have to explicitly show the boundary of the host and network portion of an address 11
  • 12. www.cyberlabzone.com Caveat to classless addressing  Many people and textbooks still refer to the address class system  No networks EVER use the class system in a production environment  Be aware of the translations between the classful and classless system  Remember ALWAYS to use the classless system despite the terminology of the question 12
  • 13. www.cyberlabzone.com Subnet Mask identifies the boundary  Sometimes called the Extended Network Prefix  Identifies the two sections of the IP address, network and host fields  Used by routers to work out the network a particular host belongs to  Written either as dotted decimal or slash notation 13
  • 14. www.cyberlabzone.com Subnet Mask – two notations  Dotted decimal is one of the notations  255.255.255.0  In binary this is 11111111.11111111.11111111.00000000  Slash is the second notation  Count the number of ‘1’s  There are 24 ‘1’s  So another way of expressing this subnet mask is /24 14
  • 15. www.cyberlabzone.com Network (or wire) Address  This is the identity of the network and is used by routers to deliver packets across networks  No host is ever given this address  To discover the network address, convert IP address from decimal to binary  Replace the host section with 0s  Convert back to decimal 15
  • 16. www.cyberlabzone.com Finding the Network Identity  175.13.155.121 /16  10101111.00001101. 10011011. 01111001  What address class was this ?  Which is the host field ?  Replace with 0s  Convert back to dotted decimal 16
  • 17. www.cyberlabzone.com Broadcast Address RFC 919  Each network needs a broadcast address  No host is ever given this address  A broadcast can message all hosts in a LAN  Useful when a host needs to find information without knowing exactly what other host can supply it e.g. ARP  When a host wants to provide information to a large set of hosts in a timely manner 17
  • 18. www.cyberlabzone.com Finding the Broadcast Number  Substitute the host section of the binary version of the IP address with 1s  Convert back to dotted decimal  What is the broadcast address for the IP 175.13.155.121 /16 18
  • 19. www.cyberlabzone.com Reserved addressing numbers  Host bits set to 0 are Network address  Host bits set to 1 are Broadcast address  127 network numbers reserved for loopback  127.0.0.1 is ‘my NIC’  192.168.x.x & 172.16-31.x.x & 10.x.x.x are non- routable private addresses – for NAT and private networks only  defined in RFC 1918 19
  • 20. www.cyberlabzone.com Exercise 2  Write the network & broadcast number 12.123.14.235 /24 177.177.177.177 /16 220.17.124.14 /24 277.14.13.86 /33 20
  • 21. www.cyberlabzone.com Host numbers on networks  Original assignment of classes wasted many IP addresses ( 3 bears problem )  Class A for governments with 224 hosts  Class B can have 65 534 hosts  more than most companies require  Class C can have 254 hosts  less than most companies require 21
  • 22. www.cyberlabzone.com Subnetworking  Solution is to subdivide networks  Take a network number  Divide it into smaller networks  These are called subnetworks (subnets) 22
  • 23. www.cyberlabzone.com Subnetting  Take a /24 (class C) address  24 network bits & 8 host bits  Company may need different departments  We can borrow bits from host field to augment network field 23
  • 24. www.cyberlabzone.com Subnetting /24 (Class C) address  e.g. 198.234.125.0  11000110.11101010.01111101.00000000  Write network number  10111100.11101010.00000000.00000000  Borrow 4 bits from host field  10111100.11101010.00000000.00000000  4 bits remain for host identity 30/0 9/20 24
  • 25. www.cyberlabzone.com Subnetted /24 (Class C)  How many hosts does this allow on each subnet ?  How many subnetworks can we use ?  First and last subnet numbers are reserved  First and last host numbers are reserved 25
  • 26. www.cyberlabzone.com More Subnetting  Can borrow 2 host bits minimum  Maximum host bits that can be borrowed is all but the rightmost 2 bits of the IP address  Why is this so ? 26
  • 27. www.cyberlabzone.com Calculating subnet mask 1. Express the subnetwork IP address in binary form 2. Replace the network and subnet portion of the address with all 1s 3. Replace the host portion of the address with all 0s 4. Now convert the binary expression back to dotted- decimal notation 27
  • 28. www.cyberlabzone.com Example of subnet mask  Calculate the subnet mask for the Subnetted class C address 199.177.166.34 that has borrowed 3 bits from the host field 11000111.10110001.10100110.00100010  27 bits for network identity - substitute these 27 bits for 1s  Change remaining 5 host bits to 0s  Convert to dotted decimal  255.255.255.224 28
  • 29. www.cyberlabzone.com Exercise 3  Calculate subnet masks for class B that has borrowed 4 bits from host field 155.233.2.13  Calculate subnet masks for class C that has borrowed 5 bits from host field 200.123.23.3 29
  • 30. www.cyberlabzone.com Use of Subnet Mask  Mask is ANDed with IP address of host  This gives network identity  Can now be used to route the message 30
  • 31. www.cyberlabzone.com Example  What is the network number for the IP address 199.177.166.34 given that the subnet mask is 255.255.255.224  Convert to binary  AND both numbers together  Result is network identity 31
  • 32. www.cyberlabzone.com Exercise 3 IP network address 213.72.83.0. You require at least 17 subnets. Calculate 1. The required subnet mask 2. The number of total subnets 3. The number of available host IP per subnet 4. The first four subnet addresses 5. The valid range of host addresses for the first four subnets 6. The Broadcast address for each subnet 32
  • 33. www.cyberlabzone.com Conclusion  3 Classes available, A, B, C  Strictly not used any longer but well understood  Flexibility gained by subnetting  Subnets concealed from outside networks using subnet masks  Masks are ANDed with IP address of host to discover network identity 33
  • 34. www.cyberlabzone.com Hosts on class A  There are a possible 224 = 16 777 216 combinations available for the last 24 bits  Subtract the two combinations that cannot be used as host addresses  A class A address can have 16 777 216 - 2 = 16 777 214 different hosts 34
  • 35. www.cyberlabzone.com 35 Hosts on class B  There are a possible 216 = 65 536 combinations available for the last 16 bits  Subtract the two combinations that cannot be used as host addresses  A class B address can have 65 536 - 2 = 65 534 different hosts
  • 36. www.cyberlabzone.com 36 Hosts on class C  There are a possible 28 = 256 combinations available for the last 8 bits  Subtract the two combinations that cannot be used as host addresses  A class B address can have 256 - 2 = 254 different hosts
  • 37. www.cyberlabzone.com Network Address  10101111.00001101. 00000000.00000000  175.13.0.0  It means ‘ this network ’ 37
  • 38. www.cyberlabzone.com Broadcast number  10101111.00001101. 11111111.11111111  175.13.255.255  Reaches all hosts on a network  Will not reach other hosts on different network 38
  • 39. www.cyberlabzone.com Classes & numbers 12.123.14.0 12.123.14.255 (looks like Class A) 177.177.0.0 177.177.255.255 (Class B) 220.17.124.0 220.17.124.255 (Class C) 277.14.13.86 Illegal number And illegal subnet mask 39
  • 40. www.cyberlabzone.com Subnetted Class C  24 = 16 -2 = 14 hosts  24 = 16 subnetworks  Note that 14 hosts x 16 subnets is less than 256  Why is this ? 40
  • 42. www.cyberlabzone.com Network mask discovery Convert to dotted decimal 199.177.166.32 How many hosts on this subnet ? 42
  • 43. www.cyberlabzone.com Exercise 3  Need 17 subnets. Calculate bits required for 17 subnets = 5  Leaves 3 bits for host identity on subnets  When calculating the first four subnet addresses, you will begin with:  00000000 = 0  00001000 = 8  00010000 = 16  00011000 = 24 43
  • 44. www.cyberlabzone.com Exercise 3 contd  3 bits for the host leaves 23 - 2 = 6 host addresses per subnet  Valid host range  213.72.83.1 213.72.83.2  213.72.83.3 213.72.83.4  213.72.83.5 213.72.83.6 44