SlideShare a Scribd company logo
1 of 18
Easy Sub netting
By
Saravanan K
IP ver. 4 Address Classifications and
Range
Class Range
From
Range
To
Subnet Mask
A 1.0.0.0 126.255.255.255 255.0.0.0
B 128.0.0.0 191.255.255.255 255.255.0.0
C 192.0.0.0 223.255.255.255 255.255.255.0
The Range 127.0.0.0 to 127.255.255.255 Reserved for loopback address
Class D Range 224.0.0.0 – 239.255.255.255 Reserved for Multicasting
Class E Range 240.0.0.0 – 255.255.255.255 Reserved for Research and Development
0.0.0.0 – Network Address
255.255.255.255 – Broadcast Address 2Author Saravanan K
The Host Portion-Network portion
And Subnet mask
• Each IP Address has two portions
– The Network portion
– The Host Portion
• This portions are determined by the IP
Classification and the subnet mask.
• Example :
10.10.10.10 172.16.0.10 192.168.1.10
N. H.H.H N.N.H.H N.N.N.H
255.0.0.0 255.255.0.0 255.255.255.0
Where N – Network Portion H – Host Portion
3Author Saravanan K
Number of hosts per network in Class
A,B,C
IP Class Example Network Subnet Mask Total Host IP
Addresses /
Network
Class A
10.0.0.0
10.255.255.255
255.0.0.0 1,67,77,216
Class B
172.16.0.0
172.16.255.255
255.255.0.0 65,536
Class C
192.168.10.0
192.168.10.255
255.255.255.0 256
The total number of hosts / network can be calculated with reference to the
subnet mask.
In the subnet mask the 255 indicates the Network part and the 0 s indicates
the host part. 4Author Saravanan K
Subnetting
• Subnetting is the process of dividing a class C
network into sub networks.
• To understand this let us consider a scenario
– Your company has 250 hosts (may be a combination of
systems and IP phones, IP printers etc.)
– You are asked to divide this 250 hosts into two
different networks.
– That is 125 hosts in each network.
– How to do that?
5Author Saravanan K
Subnetting
• The straight approach is take two different
network IP in class C.
• Assign IP addresses to the hosts as follows
Network 1 Network 2
Network IP 192.168.1.0 Network IP 192.168.2.0
First Host IP 192.168.1.1 First Host IP 192.168.2.1
Last Host IP 192.168.1.254 Last Host IP 192.168.2.254
Broadcast IP 192.168.1.255 Broadcast IP 192.168.2.255
Subnet Mask 255.255.255.0 Subnet Mask 255.255.255.0
6Author Saravanan K
Subnetting
• In this example each network has 256 IP addresses
and the valid host addresses are 254.
(256 – 2 (Network IP + Broadcast IP) =254)
• As per the scenario each network you need only 125
hosts and total IP available are 254.
• The remaining 129 IP address are left unhandled in
each network.
• That means you are wasting total 258 IP (129 +129) in
both the networks.
• You can make use of the 129 IP (those are left unused
in the first network) for the second network.
• This approach is called Sub netting.
7Author Saravanan K
Subnetting
IP Addresses in one Class C
network
Total IP 256
Subnetted networks
Network 1 with 128
IP
Network 2 with 128
IP
8Author Saravanan K
The Class C subnet mask
• The subnet mask 255.255.255.0, has the first
three octets as network portions and the last
octet is the host portion.
• The decimal form and the binary format are
255.255.255.0
11111111.11111111.11111111.00000000
• If you convert the first bit 0 as 1 in the fourth
octet, then you make two networks out of the
above one network.
9Author Saravanan K
Steps in Subnetting - /25 Mask
Step 1: Change the subnet mask since you are occupying the
host bit as subnet bit
11111111.11111111.11111111.10000000 then the subnet
mask is
255.255.255.128
11111111.11111111.11111111.10000000
11111111.11111111.11111111.(27+26+25+24+23+22+21+20)
11111111.11111111.11111111. (128+0+0+0+0+0+0+0)
Note:
27 (128)+26 (64)+25 (32)+24(16)+23(8)+22(4)+21(2)+20(1) = 255
10Author Saravanan K
Steps in Subnetting - /25 Mask
Step 2: Now find the number of hosts per
network after sub netting.
The total number of IP in the class C network is
256.
As per step 1 you occupied the host bit as
network bit and got the subnet mask 128 in the
last octet. (255.255.255.128)
Now subtract 128 from 256 you will get the
number of host IP per subnet.
That is 256 – 128 = 128 IP / sub network.
11Author Saravanan K
Sub nets in /25 Mask
Network 1 Network 2
Network IP 192.168.1.0 Network IP 192.168.1.128
First Host IP 192.168.1.1 First Host IP 192.168.1.129
Last Host IP 192.168.1.126 Last Host IP 192.168.1.254
Broadcast IP 192.168.1.127 Broadcast IP 192.168.1.255
Subnet Mask 255.255.255.128 Subnet Mask 255.255.255.128
12Author Saravanan K
Now you have separate Network IP and Broadcast IP for each subnet
The /mask
The class C network with a subnet mask 255.255.255.0 may
use the / mask as /24 since all the network bits in the first
three are 1 s.
That is 11111111. 11111111. 11111111.00000000
(8) + (8) + (8) = 24
(Total number of 1 s)
Since you changed the 0 bit as 1 in the fourth octet it
becomes /25
That is 11111111. 11111111. 11111111.10000000
(8) + (8) + (8) + 1 = 25
(Total number of 1 s)
As per the scenario by sub netting you could create two
networks with 128 IP in each network, from a class C
network. 13Author Saravanan K
The /26 mask
Author Saravanan K 14
Step 1: Change the subnet mask since you are occupying the host bit as subnet bit
11111111.11111111.11111111.11000000 then the subnet mask is
255.255.255.192
11111111.11111111.11111111.11000000
11111111.11111111.11111111.(27+26+25+24+23+22+21+20)
11111111.11111111.11111111. (128+64+0+0+0+0+0+0)
Step 2: Now find the number of hosts per network after sub netting.
The total number of IP in the class C network is 256.
As per step 1 you occupied the host bit as network bit and got the subnet mask192
(128+64) in the last octet. (255.255.255.192)
Now subtract 192 from 256 you will get the number of host IP per subnet.
That is 256 – 192 = 64 IP / sub network.
Refer the table in the next slide.
Author Saravanan K 15
Sub nets in /26 Mask
Name of IP Network 1 Network 2 Network 3 Network 4
Network IP 192.168.1.0 192.168.1.64 192.168.1.128 192.168.1.192
First Host IP 192.168.1.1 192.168.1.65 192.168.2.129 192.168.1.193
Last Host IP 192.168.1.62 192.168.1.126 192.168.2.190 192.168.1.254
Broadcast IP 192.168.1.63 192.168.1.127 192.168.2.191 192.168.1.255
Subnet Mask 255.255.255.192 255.255.255.192 255.255.255.192 255.255.255.192
IP Address
Total 4 networks
With 64 Host in each
network.
Valid Hosts are
64-2 =62
Sub netting - up to /30 mask
• The sub netting is possible up to /30 in this
you will get 64 Networks and 4 Host IP in each
network.
• Refer the table in the next slide for all sub
netting details of /25, /26, /27, /28, /29, /30
masks.
Author Saravanan K 16
Sub netting table
Author Saravanan K 17
Mask bits
occupi
ed in
4 th
octet
Value of Bit occupied 4 th Octet
in binary
format
The Bit value Subnet mask Networ
ks
No
Of
host
IP
Valid
Host
IP
/25 1 27 10000000 128
255.255.255.128 2 128 126
/26 2 27 + 26 11000000 (128+64)=192
255.255.255.192 4 64 62
/27 3 27 + 26 +25 11100000 (128+64+32) = 224
255.255.255.224 8 32 30
/28 4 27 + 26 +25+24 11110000 (128+64+32+16) = 240
255.255.255.240 16 16 14
/29 5 27 +26 +25+24+23 11111000 (128+64+32+16+8)=248
255.255.255.248 32 8 6
/30 6 27+26+25+24+23+22 11111100 (128+64+32+16+8+4)=252
255.255.255.252 64 4 2
Thank you
Author Saravanan K 18

More Related Content

What's hot

Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingBisrat Girma
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting Saad Tanvir
 
Ip addresses
Ip addressesIp addresses
Ip addressesAsif
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 

What's hot (20)

Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Subnetting
SubnettingSubnetting
Subnetting
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Ip address
Ip address Ip address
Ip address
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 

Similar to Easy subnetting

Similar to Easy subnetting (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Vlsm
VlsmVlsm
Vlsm
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Mod6
Mod6Mod6
Mod6
 
Subnetting ked
Subnetting kedSubnetting ked
Subnetting ked
 
Ip subnetting
Ip subnettingIp subnetting
Ip subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Soal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan KomputerSoal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan Komputer
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
1.IPv4.pptx
1.IPv4.pptx1.IPv4.pptx
1.IPv4.pptx
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
Subnetting
SubnettingSubnetting
Subnetting
 
Network Layer
Network LayerNetwork Layer
Network Layer
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Easy subnetting

  • 2. IP ver. 4 Address Classifications and Range Class Range From Range To Subnet Mask A 1.0.0.0 126.255.255.255 255.0.0.0 B 128.0.0.0 191.255.255.255 255.255.0.0 C 192.0.0.0 223.255.255.255 255.255.255.0 The Range 127.0.0.0 to 127.255.255.255 Reserved for loopback address Class D Range 224.0.0.0 – 239.255.255.255 Reserved for Multicasting Class E Range 240.0.0.0 – 255.255.255.255 Reserved for Research and Development 0.0.0.0 – Network Address 255.255.255.255 – Broadcast Address 2Author Saravanan K
  • 3. The Host Portion-Network portion And Subnet mask • Each IP Address has two portions – The Network portion – The Host Portion • This portions are determined by the IP Classification and the subnet mask. • Example : 10.10.10.10 172.16.0.10 192.168.1.10 N. H.H.H N.N.H.H N.N.N.H 255.0.0.0 255.255.0.0 255.255.255.0 Where N – Network Portion H – Host Portion 3Author Saravanan K
  • 4. Number of hosts per network in Class A,B,C IP Class Example Network Subnet Mask Total Host IP Addresses / Network Class A 10.0.0.0 10.255.255.255 255.0.0.0 1,67,77,216 Class B 172.16.0.0 172.16.255.255 255.255.0.0 65,536 Class C 192.168.10.0 192.168.10.255 255.255.255.0 256 The total number of hosts / network can be calculated with reference to the subnet mask. In the subnet mask the 255 indicates the Network part and the 0 s indicates the host part. 4Author Saravanan K
  • 5. Subnetting • Subnetting is the process of dividing a class C network into sub networks. • To understand this let us consider a scenario – Your company has 250 hosts (may be a combination of systems and IP phones, IP printers etc.) – You are asked to divide this 250 hosts into two different networks. – That is 125 hosts in each network. – How to do that? 5Author Saravanan K
  • 6. Subnetting • The straight approach is take two different network IP in class C. • Assign IP addresses to the hosts as follows Network 1 Network 2 Network IP 192.168.1.0 Network IP 192.168.2.0 First Host IP 192.168.1.1 First Host IP 192.168.2.1 Last Host IP 192.168.1.254 Last Host IP 192.168.2.254 Broadcast IP 192.168.1.255 Broadcast IP 192.168.2.255 Subnet Mask 255.255.255.0 Subnet Mask 255.255.255.0 6Author Saravanan K
  • 7. Subnetting • In this example each network has 256 IP addresses and the valid host addresses are 254. (256 – 2 (Network IP + Broadcast IP) =254) • As per the scenario each network you need only 125 hosts and total IP available are 254. • The remaining 129 IP address are left unhandled in each network. • That means you are wasting total 258 IP (129 +129) in both the networks. • You can make use of the 129 IP (those are left unused in the first network) for the second network. • This approach is called Sub netting. 7Author Saravanan K
  • 8. Subnetting IP Addresses in one Class C network Total IP 256 Subnetted networks Network 1 with 128 IP Network 2 with 128 IP 8Author Saravanan K
  • 9. The Class C subnet mask • The subnet mask 255.255.255.0, has the first three octets as network portions and the last octet is the host portion. • The decimal form and the binary format are 255.255.255.0 11111111.11111111.11111111.00000000 • If you convert the first bit 0 as 1 in the fourth octet, then you make two networks out of the above one network. 9Author Saravanan K
  • 10. Steps in Subnetting - /25 Mask Step 1: Change the subnet mask since you are occupying the host bit as subnet bit 11111111.11111111.11111111.10000000 then the subnet mask is 255.255.255.128 11111111.11111111.11111111.10000000 11111111.11111111.11111111.(27+26+25+24+23+22+21+20) 11111111.11111111.11111111. (128+0+0+0+0+0+0+0) Note: 27 (128)+26 (64)+25 (32)+24(16)+23(8)+22(4)+21(2)+20(1) = 255 10Author Saravanan K
  • 11. Steps in Subnetting - /25 Mask Step 2: Now find the number of hosts per network after sub netting. The total number of IP in the class C network is 256. As per step 1 you occupied the host bit as network bit and got the subnet mask 128 in the last octet. (255.255.255.128) Now subtract 128 from 256 you will get the number of host IP per subnet. That is 256 – 128 = 128 IP / sub network. 11Author Saravanan K
  • 12. Sub nets in /25 Mask Network 1 Network 2 Network IP 192.168.1.0 Network IP 192.168.1.128 First Host IP 192.168.1.1 First Host IP 192.168.1.129 Last Host IP 192.168.1.126 Last Host IP 192.168.1.254 Broadcast IP 192.168.1.127 Broadcast IP 192.168.1.255 Subnet Mask 255.255.255.128 Subnet Mask 255.255.255.128 12Author Saravanan K Now you have separate Network IP and Broadcast IP for each subnet
  • 13. The /mask The class C network with a subnet mask 255.255.255.0 may use the / mask as /24 since all the network bits in the first three are 1 s. That is 11111111. 11111111. 11111111.00000000 (8) + (8) + (8) = 24 (Total number of 1 s) Since you changed the 0 bit as 1 in the fourth octet it becomes /25 That is 11111111. 11111111. 11111111.10000000 (8) + (8) + (8) + 1 = 25 (Total number of 1 s) As per the scenario by sub netting you could create two networks with 128 IP in each network, from a class C network. 13Author Saravanan K
  • 14. The /26 mask Author Saravanan K 14 Step 1: Change the subnet mask since you are occupying the host bit as subnet bit 11111111.11111111.11111111.11000000 then the subnet mask is 255.255.255.192 11111111.11111111.11111111.11000000 11111111.11111111.11111111.(27+26+25+24+23+22+21+20) 11111111.11111111.11111111. (128+64+0+0+0+0+0+0) Step 2: Now find the number of hosts per network after sub netting. The total number of IP in the class C network is 256. As per step 1 you occupied the host bit as network bit and got the subnet mask192 (128+64) in the last octet. (255.255.255.192) Now subtract 192 from 256 you will get the number of host IP per subnet. That is 256 – 192 = 64 IP / sub network. Refer the table in the next slide.
  • 15. Author Saravanan K 15 Sub nets in /26 Mask Name of IP Network 1 Network 2 Network 3 Network 4 Network IP 192.168.1.0 192.168.1.64 192.168.1.128 192.168.1.192 First Host IP 192.168.1.1 192.168.1.65 192.168.2.129 192.168.1.193 Last Host IP 192.168.1.62 192.168.1.126 192.168.2.190 192.168.1.254 Broadcast IP 192.168.1.63 192.168.1.127 192.168.2.191 192.168.1.255 Subnet Mask 255.255.255.192 255.255.255.192 255.255.255.192 255.255.255.192 IP Address Total 4 networks With 64 Host in each network. Valid Hosts are 64-2 =62
  • 16. Sub netting - up to /30 mask • The sub netting is possible up to /30 in this you will get 64 Networks and 4 Host IP in each network. • Refer the table in the next slide for all sub netting details of /25, /26, /27, /28, /29, /30 masks. Author Saravanan K 16
  • 17. Sub netting table Author Saravanan K 17 Mask bits occupi ed in 4 th octet Value of Bit occupied 4 th Octet in binary format The Bit value Subnet mask Networ ks No Of host IP Valid Host IP /25 1 27 10000000 128 255.255.255.128 2 128 126 /26 2 27 + 26 11000000 (128+64)=192 255.255.255.192 4 64 62 /27 3 27 + 26 +25 11100000 (128+64+32) = 224 255.255.255.224 8 32 30 /28 4 27 + 26 +25+24 11110000 (128+64+32+16) = 240 255.255.255.240 16 16 14 /29 5 27 +26 +25+24+23 11111000 (128+64+32+16+8)=248 255.255.255.248 32 8 6 /30 6 27+26+25+24+23+22 11111100 (128+64+32+16+8+4)=252 255.255.255.252 64 4 2