SlideShare a Scribd company logo
1 of 11
CONTENTS
What is Sub netting?
Why Sub netting?
HOW?
Subnet Mask.
Conclusion.
What is Subnetting?
Allows Creating multiple network from a
single address block.
Subnetting is a process of breaking large networkin
small networks known as subnets.
Diagra
m
Why Subnetting?
Maximise addressing efficiency.
Extend the life of IPV4.
Public IPV4 Addresses are scare.
Easy to manage.
Subnetting reduces network traffic by removing
collision and broadcast traffic, that overall
improve performance.
Subnetting allows you to apply network security
polices at the interconnection between subnets
How?
CIDR [ Classless Inter Domain Routing]
CIDR is a slash notation of subnet mask. CIDR
tells us number of on bits in a network address
CIDR Decimal Binary
/25 128 10000000
/26 192 11000000
/27 224 11100000
/28 240 11110000
/29 248 11111000
/30 252 11111100
Formulas & Variables
h=number of host bits
n=number of host bit use in network bits
Number of new networks reulting from the
subnetting: =2^n
Number of hosts per new network: =2^h-2
One is network another is broadcast
Broadcast address is the last address of subnet.
Block size or increment number is used to calculate the valid
subnets
Example:-1
Subnet base address
New CIDR length /25
255.255.255.128(Subnet Mask)
n = 1 [Number of host bit used in network] n
h = 7 [Remaining host bits]
192 168 1 0/24
11111111 11111111 11111111 00000000
N N N H
192 168 1 0/25
11111111 11111111 11111111 10000000
Example:-1
Total subnets ( 2^n ) :- 2^1 = 2.
Block size (256 - subnet mask) :- 256 - 128 = 128
Valid subnets 0,128
Valid host per subnets (2^h-2)=2^7-2=126
Subnets Subnet 1 Subnet 2
Network ID 192.168.1.0 192.168.1.128
First host 192.168.1.1 192.168.1.129
Last host 192.168.1.126 192.168.1.254
Broadcast ID 192.168.1.127 192.168.1.255
Example:-2
New Perfix length /26
255.255.255.192(Subnet Mask)
n = 2 [Number of host bit used in network] n
n = 6 [Remaining host bits]
Total subnets ( 2^n ) :- 22 = 4.
Block size (256 - subnet mask) :- 256 - 192 = 64.
Valid subnets ( Count blocks from 0) :-
0,64,128,192
192 168 1 0/26
11111111 11111111 11111111 11000000
Example:-
2
Total hosts (2h) :- 26 = 64
Valid hosts per subnet ( 2^h- 2 ) :- 64 - 2 = 62
Subnets Subnet 1 Subnet 2 Subnet 3 Subnet 4
Network ID 0 64 128 192
First host 1 65 129 193
Last host 62 126 190 254
Broadcast ID 63 127 191 255
Subnet Mask
 Subnet mask is a 32 bits long address used to distinguish between
network address and host address in IP address. Subnet mask is
always used with IP address. Subnet maskhas only one purpose, to
identify which part of an IP address is network address and which
part is host address.
IP 192 168 1 1
Subnet mask 255 255 255 128

More Related Content

What's hot

NFV VNF Architecture
NFV VNF ArchitectureNFV VNF Architecture
NFV VNF Architecturejungbh
 
JUNOS - Monitoring and Troubleshooting
JUNOS - Monitoring and TroubleshootingJUNOS - Monitoring and Troubleshooting
JUNOS - Monitoring and TroubleshootingZenith Networks
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Canada
 
Dhcp server configuration
Dhcp server configurationDhcp server configuration
Dhcp server configurationUttamAgarwal9
 
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021I Putu Hariyadi
 
What is Subnet Mask.pptx
What is Subnet Mask.pptxWhat is Subnet Mask.pptx
What is Subnet Mask.pptxVignesh kumar
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Cisco Canada
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsVuz Dở Hơi
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov UpdateThe Linux Foundation
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-FiCisco Canada
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commandsRobin Rohit
 
makefiles tutorial
makefiles tutorialmakefiles tutorial
makefiles tutorialvsubhashini
 
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Igalia
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3NGINX, Inc.
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 

What's hot (20)

NFV VNF Architecture
NFV VNF ArchitectureNFV VNF Architecture
NFV VNF Architecture
 
JUNOS - Monitoring and Troubleshooting
JUNOS - Monitoring and TroubleshootingJUNOS - Monitoring and Troubleshooting
JUNOS - Monitoring and Troubleshooting
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
Dhcp server configuration
Dhcp server configurationDhcp server configuration
Dhcp server configuration
 
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021
Soal Network Actual & Future Network - ITNSA LKS SMK Tingkat Provinsi NTB 2021
 
What is Subnet Mask.pptx
What is Subnet Mask.pptxWhat is Subnet Mask.pptx
What is Subnet Mask.pptx
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commands
 
Sockets and Socket-Buffer
Sockets and Socket-BufferSockets and Socket-Buffer
Sockets and Socket-Buffer
 
makefiles tutorial
makefiles tutorialmakefiles tutorial
makefiles tutorial
 
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 

Similar to Subnetting (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subneting
SubnetingSubneting
Subneting
 
VLSM.pptx
VLSM.pptxVLSM.pptx
VLSM.pptx
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting
 
Day03
Day03 Day03
Day03
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting Mechanics
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
 
Tugas komjar 4
Tugas komjar 4Tugas komjar 4
Tugas komjar 4
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Subnetting
SubnettingSubnetting
Subnetting
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
CCNA Icnd110 s04l03
CCNA Icnd110 s04l03CCNA Icnd110 s04l03
CCNA Icnd110 s04l03
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Subnetting

  • 1. CONTENTS What is Sub netting? Why Sub netting? HOW? Subnet Mask. Conclusion.
  • 2. What is Subnetting? Allows Creating multiple network from a single address block. Subnetting is a process of breaking large networkin small networks known as subnets.
  • 4. Why Subnetting? Maximise addressing efficiency. Extend the life of IPV4. Public IPV4 Addresses are scare. Easy to manage. Subnetting reduces network traffic by removing collision and broadcast traffic, that overall improve performance. Subnetting allows you to apply network security polices at the interconnection between subnets
  • 5. How? CIDR [ Classless Inter Domain Routing] CIDR is a slash notation of subnet mask. CIDR tells us number of on bits in a network address CIDR Decimal Binary /25 128 10000000 /26 192 11000000 /27 224 11100000 /28 240 11110000 /29 248 11111000 /30 252 11111100
  • 6. Formulas & Variables h=number of host bits n=number of host bit use in network bits Number of new networks reulting from the subnetting: =2^n Number of hosts per new network: =2^h-2 One is network another is broadcast Broadcast address is the last address of subnet. Block size or increment number is used to calculate the valid subnets
  • 7. Example:-1 Subnet base address New CIDR length /25 255.255.255.128(Subnet Mask) n = 1 [Number of host bit used in network] n h = 7 [Remaining host bits] 192 168 1 0/24 11111111 11111111 11111111 00000000 N N N H 192 168 1 0/25 11111111 11111111 11111111 10000000
  • 8. Example:-1 Total subnets ( 2^n ) :- 2^1 = 2. Block size (256 - subnet mask) :- 256 - 128 = 128 Valid subnets 0,128 Valid host per subnets (2^h-2)=2^7-2=126 Subnets Subnet 1 Subnet 2 Network ID 192.168.1.0 192.168.1.128 First host 192.168.1.1 192.168.1.129 Last host 192.168.1.126 192.168.1.254 Broadcast ID 192.168.1.127 192.168.1.255
  • 9. Example:-2 New Perfix length /26 255.255.255.192(Subnet Mask) n = 2 [Number of host bit used in network] n n = 6 [Remaining host bits] Total subnets ( 2^n ) :- 22 = 4. Block size (256 - subnet mask) :- 256 - 192 = 64. Valid subnets ( Count blocks from 0) :- 0,64,128,192 192 168 1 0/26 11111111 11111111 11111111 11000000
  • 10. Example:- 2 Total hosts (2h) :- 26 = 64 Valid hosts per subnet ( 2^h- 2 ) :- 64 - 2 = 62 Subnets Subnet 1 Subnet 2 Subnet 3 Subnet 4 Network ID 0 64 128 192 First host 1 65 129 193 Last host 62 126 190 254 Broadcast ID 63 127 191 255
  • 11. Subnet Mask  Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet maskhas only one purpose, to identify which part of an IP address is network address and which part is host address. IP 192 168 1 1 Subnet mask 255 255 255 128