SlideShare a Scribd company logo
1 of 20
Download to read offline
1
A Report
On
Ip Addressing & Subnetting for a given scenario
Prepared By:
Group-05 (Bots)
Nomanur Rahman (19103034)
Fahiman Muntasirm (18303047)
Md. Ruhul Amin (18303061)
Course: Data Communication and Computer Networks Lab
Course Number: CSC-466
Department: CSE
Submitted to:
Dr. Md. Hasibur Rashid chayon
Co-ordinator, Dept. of Computer Science & Engineering
International University of Business Agriculture and Technology
2
ABSTRACT
As computer-networks grow steadily Network management becomes more and more important. IP
Subnetting is a critical skill for any network administrator or security admin that supports a network
environment. Subnetting allows us to break a large network into smaller networks. If an organization is
large or if its computers are geographically dispersed, it makes good sense to divide networks into
smaller ones connected together by routers. Subnetting is important for several reasons such as,
Reduced Network Traffic, optimized network performance, Simplified management, security, facilitates
spanning of large Geographical distance, etc. In short IP Subnetting is an important skill to acquire
because it offers many benefits in any network environment.
3
Table of contents
Chapter 1: INTRODUCTION
Background of project scenario....................................................................................... page 6
Methodology implemented for solving the
problem.............................................................................................................................page 7
Chapter 2: PROJECT DEVELOPMENT
IP Address Calculation….................................................................................................. page 8-12
Project Description ......................................................................................................... page 13-16
Chapter 3: EXPERIMENTS AND RESULTS
Results......................................................................................................................... page 17-19
Chapter 4: CONCLUSION
4.1 Conclusion....................................................................................................................page 20
4
List of Figures
Figure 1….............................................................................................................page 6
Figure 2….............................................................................................................page 13
Figure 3….............................................................................................................page 14
Figure 4….............................................................................................................page 15
Figure 5….............................................................................................................page 15
Figure 6….............................................................................................................. page 16
Figure 7…..............................................................................................................page 17
Figure 8…..............................................................................................................page 18
5
List of Tables
Table 1…............................................................................................................ page 10-12
6
Chapter 1
INTRODUCTION
Background of Project Scenario:
The given scenario includes a combination of total 14 networks. The scenario includes 5 routers
and 1 wireless router for specifying the route for the movement of data. The scenario also
contains 1 access point switch. Switches enable connected devices to share information and talk
to each other. The devices that are connected in the distributed networks are PCs and servers.
There is total 8 PCs and 1 server. The IP address that is to be distributed among the networks is
192.168.100.0/24.
Figure 1: Project Scenario
7
Methodology implemented for solving the problem:
The problem given is distribution of the given IP address to different networks of the given
scenario. The methodology that is used for solving the problem is Subnetting.
Subnetting:
The process of dividing a large network into smaller networks is called subnetting. It allows
creating multiple logical networks that exist within a single class. Subnetting splits the host field
into subnet and host fields. The smaller networks that are generated through subnetting are
called sub networks or subnet.
To create subnets bits from host portion of the IP address is taken and reserve them to define
the subnet address. In other words, in order to subnet a network, extend the natural mask using
some of the bits from the host ID portion of the address to create a sub network ID.
Subnet Mask:
The subnet mask determines how the IP address is split.
A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits
to all 1s. In this way, the subnet mask separates the IP address into the network and host
addresses.
The “255” address is always assigned to a broadcast address, and the “0” address is always
assigned to a network address. Neither can be assigned to hosts, as they are reserved for these
special purposes.
A 32-bit IP address uniquely identifies a single device on an IP network. The 32 binary bits are
divided into the host and network sections by the subnet mask but they are also broken into four
8-bit octets.
8
Chapter 2
Project Development
IP address calculation:
We are going to perform subnetting for distributing the IP address. Given IP
Address is 192.168.100.0/24
By performing the following steps, we calculated the IP address,
➢ Step 1: Convert to binary
After converting the given IP address into its equivalent binary form, we get
the following,
IP Address in Decimal: 192 168 100 0
IP Address in Binary: 11000000 10101000 01100100 00000000
➢ Step 2: Determining Number bits that needs to be borrowed:
In the given IP address, we can see that 24 bits are already reserved. So, there remain only 8
bits (last octet) from which bits can be borrowed for doing subnetting.
In the given scenario there are total 14 networks. So, we need to borrow 4 bits for distributing
the IP address among 14 different networks (as 2^4=16 but we only need to use 14 network
address).
After borrowing 4 bits for network portion the IP Address becomes,
192.168.100.0/28
(Since 4 more bits got reserved for network portion)
9
➢ Step 3: Calculating Subnet Mask:
As from step 2 we know that we have borrowed 4 bits from the last octet of the given IP address
so total 28 bits now gets reserved for network portion of the IP address. For calculating subnet
mask, after converting the IP address into binary we take all the binary digits of the network
portion as “1” and host portion as “0”.
By doing so we the subnet mask. The subnet mask of the given IP address is calculated in the
following way
IP Address in Decimal: 192 168 100 0
IP Address in Binary: 11000000 10101000 01100100 00000000
Subnet Mask in Binary: 11111111 11111111 11111111 1111000
Subnet mask in Decimal: 255 255 255 240
So, the subnet mask for the given IP address is 255.255.255.240
➢ Step 4: Finding total host number:
Since we have 4 bits for host portion, the number of hosts for each network will be,
2^4-2= 14 hosts in each network
We deduct 2 from the total number because the 1st and the last address is reserved for network
and broadcast address respectively.
➢ Step 5: Calculating Sub network address:
IP Address in Decimal: 192 168 100 0
IP Address in Binary: 11000000 10101000 01100100 00000000
From the last octet of the address, we have borrowed the 1st 4 bits for network portion and rest
of the 4 bits are for host portion. We can calculate the 1st network in the following way,
10
IP Address of 1st network in Binary: 11000000 10101000 01100100 00000000
IP Address of 1st network in Decimal: 192 168 100 0
IP Address of 1st Host in Binary: 11000000 10101000 01100100 00000001
IP Address of 1st Host in Decimal: 192 168 100 1
IP Address of 1st Host in Binary: 11000000 10101000 01100100 00001110
IP Address of 1st Last in Decimal: 192 168 100 14
Broadcast address in Binary: 11000000 10101000 01100100 00001111
Broadcast in Decimal: 192 168 100 15
Similarly, we can calculate all the addresses for all the 10 networks. All addresses of the 10
networks are given in the table below,
SL
NO
Network 1st
host Last host
1 Binary 11000000.10101000.0110
0100. 00000000
11000000.10101000.01100
100. 00000001
11000000.10101000.0110
0100. 00001110
Decimal 192.168.100.0/28 192.168.100.1/28 192.168.100.14/28
2 Binary 11000000.10101000.0110
0100. 00010000
11000000.10101000.01100
100. 00010001
11000000.10101000.0110
0100. 00011110
Decimal 192.168.100.16/28 192.168.100.17/28 192.168.100.30/28
3 Binary 11000000.10101000.0110
0100. 00100000
11000000.10101000.01100
100. 00100001
11000000.10101000.0110
0100. 00101110
Decimal 192.168.100.32/28 192.168.100.33/28 192.168.100.46/28
11
4 Binary 11000000.10101000.0110
0100. 00110000
11000000.10101000.01100
100. 00110001
11000000.10101000.0110
0100. 00111110
Decimal 192.168.100.48/28 192.168.100.49/28 192.168.100.62/28
5 Binary 11000000.10101000.0110
0100. 01000000
11000000.10101000.01100
100. 01000001
11000000.10101000.0110
0100. 01001110
Decimal 192.168.100.64/28 192.168.100.65/28 192.168.100.78/28
6 Binary 11000000.10101000.0110
0100. 01010000
11000000.10101000.01100
100. 01010001
11000000.10101000.0110
0100. 01011110
Decimal 192.168.100.80/28 192.168.100.81/28 192.168.100.94/28
7 Binary 11000000.10101000.0110
0100. 01100000
11000000.10101000.01100
100. 01100001
11000000.10101000.0110
0100. 01101110
Decimal 192.168.100.96/28 192.168.100.97/28 192.168.100.110/28
8 Binary 11000000.10101000.0110
0100. 01110000
11000000.10101000.01100
100. 01110000
11000000.10101000.0110
0100. 01110000
Decimal 192.168.100.112/28 192.168.100.113/28 192.168.100.126/28
9 Binary 11000000.10101000.0110
0100. 10000000
11000000.10101000.01100
100. 10000001
11000000.10101000.0110
0100. 10001110
Decimal 192.168.100.128/28 192.168.100.129/28 192.168.100.142/28
10 Binary 11000000.10101000.0110
0100. 10010000
11000000.10101000.01100
100. 10010001
11000000.10101000.0110
0100. 10011110
Decimal 192.168.100.144/28 192.168.100.145/28 192.168.100.158/28
12
11 Binary 11000000.10101000.0110
0100. 10100000
11000000.10101000.01100
100. 10100001
11000000.10101000.0110
0100. 10101110
Decimal 192.168.100.160/28 192.168.100.161/28 192.168.100.174/28
12 Binary 11000000.10101000.0110
0100. 10110000
11000000.10101000.0110
0100. 10110000
11000000.10101000.0110
0100. 10110000
Decimal 192.168.100.176/28 192.168.100.177/28 192.168.100.190/28
13 Binary 11000000.10101000.0110
0100. 11000000
11000000.10101000.0110
0100. 11000000
11000000.10101000.0110
0100. 11000000
Decimal 192.168.100.192/28 192.168.100.193/28 192.168.100.206/28
14 Binary 11000000.10101000.0110
0100. 11010000
11000000.10101000.0110
0100. 11010000
11000000.10101000.0110
0100. 11010000
Decimal 192.168.100.208 /28 192.168.100.209/28 192.168.100.222/28
Table 1: List of IP Addresses
13
Project Description:
➢ IP address Distribution:
The following network addresses are distributed among the 14 networks as given in the project
scenario.
1. 192.168.100.0/28
2. 192.168.100.16/28
3. 192.168.100.32/28
4. 192.168.100.48/28
5. 192.168.100.64/28
6. 192.168.100.80/28
7. 192.168.100.16/28
8. 192.168.100.112/28
9. 192.168.100.128/28
10. 192.168.100.144/28
11. 192.168.100.160/28
12. 192.168.100.176/28
13. 192.168.100.192/28
14. 192.168.100.208/28
➢ RIP Routing:
For Routing, RIP routing has been used.
Figure 2: RIP Routing
14
➢ Web Server configuration:
The web server configuration is done by creating a new html file and editing the index.html file
of the HTTP portion in the services of the server. Then by using the IP address of the server if a
search is made is the web browser all the files will appear.
Figure 3: Web Server Configuration
➢ File Server Configuration:
The FTP server is configured by creating a user name and password in the FTP portion of the
services of the servers. Then the IP address is given as the command in the command prompt
and thus by logging into the server by using the given username and password we can transfer
files. File transfer includes uploading a file into the server from any device in any network. And
also includes downloading the files from the server.
15
Figure 4: FTP server Configuration
➢ Email Server Configuration:
Email server configuration is done by creating a domain name in the Email portion of the services
of the server. We also created user names and passwords for different users. In the emails of any
device by using the user’s name and password along with the IP address of the Email server the
device is configured. After that it was possible to send and receive emails from one configured
device to another configured device by using the user’s name along with the domain name.
Figure 5: Email Server Configuration
16
➢ Wireless Router Configuration:
Figure 6: Wireless router Configuration
For access wireless router we have to configure pc wireless network.
17
Chapter 3
Experiments and Results
Results:
➢ Packet Sending:
After the Subnetting was done and RIP routing is done packets of data was successfully
sent from all possible sources to destinations.
Figure 7: Successful Packet sending
18
➢ Web server:
After configuring web server by doing search in wed browser using the IP address of the
web server, we can’t find the files configured in the HTTP server because server doesn’t
connect with network tree.
Figure 8: Successful HTTP server configuration
19
➢ Email server:
After configuring email server, it wasn’t possible to send and receive emails among the
generated users by using the email ids along with the domain name.
➢ File server:
After configuring file server, it was possible to upload but wasn’t possible download files
from the server that is file transferring was possible.
Chapter 3
Conclusion
By using subletting the IP address is distributed among the given 14 networks
of the given scenario. After configuring RIP routing packets, it was possible to
send packets from all possible sources to destinations. The server was
configured and the servers was not working because it was not connected with
the network tree.

More Related Content

Similar to Bots.pdf

NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting Saad Tanvir
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnetstmavroidis
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnettingRavi namboori
 

Similar to Bots.pdf (20)

NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
ELEC - Lecture 2
ELEC - Lecture 2ELEC - Lecture 2
ELEC - Lecture 2
 
Mod6
Mod6Mod6
Mod6
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
CCNA CHAPTER 2 BY jetarvind kumar madhukar
CCNA CHAPTER 2 BY jetarvind kumar madhukarCCNA CHAPTER 2 BY jetarvind kumar madhukar
CCNA CHAPTER 2 BY jetarvind kumar madhukar
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnets
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnetting
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnetting
 
I Paddress
I PaddressI Paddress
I Paddress
 
Ccna1v3 mod10
Ccna1v3 mod10Ccna1v3 mod10
Ccna1v3 mod10
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Bots.pdf

  • 1. 1 A Report On Ip Addressing & Subnetting for a given scenario Prepared By: Group-05 (Bots) Nomanur Rahman (19103034) Fahiman Muntasirm (18303047) Md. Ruhul Amin (18303061) Course: Data Communication and Computer Networks Lab Course Number: CSC-466 Department: CSE Submitted to: Dr. Md. Hasibur Rashid chayon Co-ordinator, Dept. of Computer Science & Engineering International University of Business Agriculture and Technology
  • 2. 2 ABSTRACT As computer-networks grow steadily Network management becomes more and more important. IP Subnetting is a critical skill for any network administrator or security admin that supports a network environment. Subnetting allows us to break a large network into smaller networks. If an organization is large or if its computers are geographically dispersed, it makes good sense to divide networks into smaller ones connected together by routers. Subnetting is important for several reasons such as, Reduced Network Traffic, optimized network performance, Simplified management, security, facilitates spanning of large Geographical distance, etc. In short IP Subnetting is an important skill to acquire because it offers many benefits in any network environment.
  • 3. 3 Table of contents Chapter 1: INTRODUCTION Background of project scenario....................................................................................... page 6 Methodology implemented for solving the problem.............................................................................................................................page 7 Chapter 2: PROJECT DEVELOPMENT IP Address Calculation….................................................................................................. page 8-12 Project Description ......................................................................................................... page 13-16 Chapter 3: EXPERIMENTS AND RESULTS Results......................................................................................................................... page 17-19 Chapter 4: CONCLUSION 4.1 Conclusion....................................................................................................................page 20
  • 4. 4 List of Figures Figure 1….............................................................................................................page 6 Figure 2….............................................................................................................page 13 Figure 3….............................................................................................................page 14 Figure 4….............................................................................................................page 15 Figure 5….............................................................................................................page 15 Figure 6….............................................................................................................. page 16 Figure 7…..............................................................................................................page 17 Figure 8…..............................................................................................................page 18
  • 5. 5 List of Tables Table 1…............................................................................................................ page 10-12
  • 6. 6 Chapter 1 INTRODUCTION Background of Project Scenario: The given scenario includes a combination of total 14 networks. The scenario includes 5 routers and 1 wireless router for specifying the route for the movement of data. The scenario also contains 1 access point switch. Switches enable connected devices to share information and talk to each other. The devices that are connected in the distributed networks are PCs and servers. There is total 8 PCs and 1 server. The IP address that is to be distributed among the networks is 192.168.100.0/24. Figure 1: Project Scenario
  • 7. 7 Methodology implemented for solving the problem: The problem given is distribution of the given IP address to different networks of the given scenario. The methodology that is used for solving the problem is Subnetting. Subnetting: The process of dividing a large network into smaller networks is called subnetting. It allows creating multiple logical networks that exist within a single class. Subnetting splits the host field into subnet and host fields. The smaller networks that are generated through subnetting are called sub networks or subnet. To create subnets bits from host portion of the IP address is taken and reserve them to define the subnet address. In other words, in order to subnet a network, extend the natural mask using some of the bits from the host ID portion of the address to create a sub network ID. Subnet Mask: The subnet mask determines how the IP address is split. A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to all 1s. In this way, the subnet mask separates the IP address into the network and host addresses. The “255” address is always assigned to a broadcast address, and the “0” address is always assigned to a network address. Neither can be assigned to hosts, as they are reserved for these special purposes. A 32-bit IP address uniquely identifies a single device on an IP network. The 32 binary bits are divided into the host and network sections by the subnet mask but they are also broken into four 8-bit octets.
  • 8. 8 Chapter 2 Project Development IP address calculation: We are going to perform subnetting for distributing the IP address. Given IP Address is 192.168.100.0/24 By performing the following steps, we calculated the IP address, ➢ Step 1: Convert to binary After converting the given IP address into its equivalent binary form, we get the following, IP Address in Decimal: 192 168 100 0 IP Address in Binary: 11000000 10101000 01100100 00000000 ➢ Step 2: Determining Number bits that needs to be borrowed: In the given IP address, we can see that 24 bits are already reserved. So, there remain only 8 bits (last octet) from which bits can be borrowed for doing subnetting. In the given scenario there are total 14 networks. So, we need to borrow 4 bits for distributing the IP address among 14 different networks (as 2^4=16 but we only need to use 14 network address). After borrowing 4 bits for network portion the IP Address becomes, 192.168.100.0/28 (Since 4 more bits got reserved for network portion)
  • 9. 9 ➢ Step 3: Calculating Subnet Mask: As from step 2 we know that we have borrowed 4 bits from the last octet of the given IP address so total 28 bits now gets reserved for network portion of the IP address. For calculating subnet mask, after converting the IP address into binary we take all the binary digits of the network portion as “1” and host portion as “0”. By doing so we the subnet mask. The subnet mask of the given IP address is calculated in the following way IP Address in Decimal: 192 168 100 0 IP Address in Binary: 11000000 10101000 01100100 00000000 Subnet Mask in Binary: 11111111 11111111 11111111 1111000 Subnet mask in Decimal: 255 255 255 240 So, the subnet mask for the given IP address is 255.255.255.240 ➢ Step 4: Finding total host number: Since we have 4 bits for host portion, the number of hosts for each network will be, 2^4-2= 14 hosts in each network We deduct 2 from the total number because the 1st and the last address is reserved for network and broadcast address respectively. ➢ Step 5: Calculating Sub network address: IP Address in Decimal: 192 168 100 0 IP Address in Binary: 11000000 10101000 01100100 00000000 From the last octet of the address, we have borrowed the 1st 4 bits for network portion and rest of the 4 bits are for host portion. We can calculate the 1st network in the following way,
  • 10. 10 IP Address of 1st network in Binary: 11000000 10101000 01100100 00000000 IP Address of 1st network in Decimal: 192 168 100 0 IP Address of 1st Host in Binary: 11000000 10101000 01100100 00000001 IP Address of 1st Host in Decimal: 192 168 100 1 IP Address of 1st Host in Binary: 11000000 10101000 01100100 00001110 IP Address of 1st Last in Decimal: 192 168 100 14 Broadcast address in Binary: 11000000 10101000 01100100 00001111 Broadcast in Decimal: 192 168 100 15 Similarly, we can calculate all the addresses for all the 10 networks. All addresses of the 10 networks are given in the table below, SL NO Network 1st host Last host 1 Binary 11000000.10101000.0110 0100. 00000000 11000000.10101000.01100 100. 00000001 11000000.10101000.0110 0100. 00001110 Decimal 192.168.100.0/28 192.168.100.1/28 192.168.100.14/28 2 Binary 11000000.10101000.0110 0100. 00010000 11000000.10101000.01100 100. 00010001 11000000.10101000.0110 0100. 00011110 Decimal 192.168.100.16/28 192.168.100.17/28 192.168.100.30/28 3 Binary 11000000.10101000.0110 0100. 00100000 11000000.10101000.01100 100. 00100001 11000000.10101000.0110 0100. 00101110 Decimal 192.168.100.32/28 192.168.100.33/28 192.168.100.46/28
  • 11. 11 4 Binary 11000000.10101000.0110 0100. 00110000 11000000.10101000.01100 100. 00110001 11000000.10101000.0110 0100. 00111110 Decimal 192.168.100.48/28 192.168.100.49/28 192.168.100.62/28 5 Binary 11000000.10101000.0110 0100. 01000000 11000000.10101000.01100 100. 01000001 11000000.10101000.0110 0100. 01001110 Decimal 192.168.100.64/28 192.168.100.65/28 192.168.100.78/28 6 Binary 11000000.10101000.0110 0100. 01010000 11000000.10101000.01100 100. 01010001 11000000.10101000.0110 0100. 01011110 Decimal 192.168.100.80/28 192.168.100.81/28 192.168.100.94/28 7 Binary 11000000.10101000.0110 0100. 01100000 11000000.10101000.01100 100. 01100001 11000000.10101000.0110 0100. 01101110 Decimal 192.168.100.96/28 192.168.100.97/28 192.168.100.110/28 8 Binary 11000000.10101000.0110 0100. 01110000 11000000.10101000.01100 100. 01110000 11000000.10101000.0110 0100. 01110000 Decimal 192.168.100.112/28 192.168.100.113/28 192.168.100.126/28 9 Binary 11000000.10101000.0110 0100. 10000000 11000000.10101000.01100 100. 10000001 11000000.10101000.0110 0100. 10001110 Decimal 192.168.100.128/28 192.168.100.129/28 192.168.100.142/28 10 Binary 11000000.10101000.0110 0100. 10010000 11000000.10101000.01100 100. 10010001 11000000.10101000.0110 0100. 10011110 Decimal 192.168.100.144/28 192.168.100.145/28 192.168.100.158/28
  • 12. 12 11 Binary 11000000.10101000.0110 0100. 10100000 11000000.10101000.01100 100. 10100001 11000000.10101000.0110 0100. 10101110 Decimal 192.168.100.160/28 192.168.100.161/28 192.168.100.174/28 12 Binary 11000000.10101000.0110 0100. 10110000 11000000.10101000.0110 0100. 10110000 11000000.10101000.0110 0100. 10110000 Decimal 192.168.100.176/28 192.168.100.177/28 192.168.100.190/28 13 Binary 11000000.10101000.0110 0100. 11000000 11000000.10101000.0110 0100. 11000000 11000000.10101000.0110 0100. 11000000 Decimal 192.168.100.192/28 192.168.100.193/28 192.168.100.206/28 14 Binary 11000000.10101000.0110 0100. 11010000 11000000.10101000.0110 0100. 11010000 11000000.10101000.0110 0100. 11010000 Decimal 192.168.100.208 /28 192.168.100.209/28 192.168.100.222/28 Table 1: List of IP Addresses
  • 13. 13 Project Description: ➢ IP address Distribution: The following network addresses are distributed among the 14 networks as given in the project scenario. 1. 192.168.100.0/28 2. 192.168.100.16/28 3. 192.168.100.32/28 4. 192.168.100.48/28 5. 192.168.100.64/28 6. 192.168.100.80/28 7. 192.168.100.16/28 8. 192.168.100.112/28 9. 192.168.100.128/28 10. 192.168.100.144/28 11. 192.168.100.160/28 12. 192.168.100.176/28 13. 192.168.100.192/28 14. 192.168.100.208/28 ➢ RIP Routing: For Routing, RIP routing has been used. Figure 2: RIP Routing
  • 14. 14 ➢ Web Server configuration: The web server configuration is done by creating a new html file and editing the index.html file of the HTTP portion in the services of the server. Then by using the IP address of the server if a search is made is the web browser all the files will appear. Figure 3: Web Server Configuration ➢ File Server Configuration: The FTP server is configured by creating a user name and password in the FTP portion of the services of the servers. Then the IP address is given as the command in the command prompt and thus by logging into the server by using the given username and password we can transfer files. File transfer includes uploading a file into the server from any device in any network. And also includes downloading the files from the server.
  • 15. 15 Figure 4: FTP server Configuration ➢ Email Server Configuration: Email server configuration is done by creating a domain name in the Email portion of the services of the server. We also created user names and passwords for different users. In the emails of any device by using the user’s name and password along with the IP address of the Email server the device is configured. After that it was possible to send and receive emails from one configured device to another configured device by using the user’s name along with the domain name. Figure 5: Email Server Configuration
  • 16. 16 ➢ Wireless Router Configuration: Figure 6: Wireless router Configuration For access wireless router we have to configure pc wireless network.
  • 17. 17 Chapter 3 Experiments and Results Results: ➢ Packet Sending: After the Subnetting was done and RIP routing is done packets of data was successfully sent from all possible sources to destinations. Figure 7: Successful Packet sending
  • 18. 18 ➢ Web server: After configuring web server by doing search in wed browser using the IP address of the web server, we can’t find the files configured in the HTTP server because server doesn’t connect with network tree. Figure 8: Successful HTTP server configuration
  • 19. 19 ➢ Email server: After configuring email server, it wasn’t possible to send and receive emails among the generated users by using the email ids along with the domain name. ➢ File server: After configuring file server, it was possible to upload but wasn’t possible download files from the server that is file transferring was possible.
  • 20. Chapter 3 Conclusion By using subletting the IP address is distributed among the given 14 networks of the given scenario. After configuring RIP routing packets, it was possible to send packets from all possible sources to destinations. The server was configured and the servers was not working because it was not connected with the network tree.