SlideShare a Scribd company logo
IP Addressing 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 2
IP Addressing 
• Basic Addressing 
• Working with Addresses 
• Summarization & Subnets 
• VLSM 
• Working with VLSM Networks 
• Classful Addressing 
• Working with Classful Addressing 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 3
Basic Addressing 
Dots separate the sections 
10.1.1.1 
• IP addresses are 
written in dotted 
decimal format. 
• Four sections are 
separated by dots. 
• Each section contains 
a number between 0 
and 255. 
Each section 
contains a number 
between 0 and 255 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 4
Basic Addressing 
Dots separate the sections 
10.1.1.1 
• Why is each section a 
number between 0 and 255? 
• Computers operate in 
binary, humans operate in 
decimal. 
• Computers treat IP 
addresses as a single 
large 32 digit binary 
number, but this is hard 
for people to do. 
• So, we split them up into 
four smaller sections so 
we can remember and 
work with them better! 
Each section 
contains a number 
between 0 and 255 
Why???? 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 5
Basic Addressing 
10.1.1.1 
• 32/4 == 8. 
• 28 = 256. 
• But, computers 
number starting at 0, 
so to make a space of 
256 numbers, we 
number from 0 to 255. 
00001010 00000001 00000001 00000001 
8 8 8 8 
32 
Each 8 digit group 
represents a number 
between 0 and 255 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 6
Basic Addressing 
10.1.1.1 
• Each device on a network 
is assigned an IP 
address. 
• Each IP address has two 
fundamental parts: 
• The network portion, 
which describes the 
physical wire the device 
is attached to. 
• The host portion, which 
identifies the host on 
that wire. 
• How can we tell the 
difference between the 
two sections? 
00001010 00000001 00000001 00000001 
Network 
Host 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 7
Basic Addressing 
10.1.1.1 
• The network mask shows 
us where to split the 
network and host 
sections. 
• Each place there is a 1 in 
the network mask, that 
binary digit belongs to the 
network portion of the 
address. 
• Each place there is a 0 in 
the network mask, that 
binary digit belongs to the 
host portion of the 
address. 
00001010 00000001 00000001 00000001 
Network 
Host 
11111111 11111111 11111111 00000000 
255.255.255.0 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 8
Basic Addressing 
• An alternative set of 10.1.1.1 
terminology is: 
• The network portion of 
the address is called the 
prefix. 
• The host portion of the 
address is called the host. 
• The network mask is 
expressed as a prefix 
length, which is a count 
of the number of 1’s in the 
subnet mask. 
00001010 00000001 00000001 00000001 
Prefix 
Host 
11111111 11111111 11111111 00000000 
8 + 8 + 8 = 24 
10.1.1.1/24 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 9
Basic Addressing 
• The network address is 
the IP address with all 
0’s in the host bits. 
• The broadcast address 
is the IP address with 
all 1’s in the host bits. 
• Packets sent to either 
address will be 
delivered to all the 
hosts connected to the 
wire. 
10 1 1 0/24 
00001010 000000011 00000001 00000000 
prefix host 
these bits are 0, so this is the network address 
10 1 1 255/24 
00001010 000000011 00000001 11111111 
prefix host 
these bits are 1, so this is the broadcast address 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 10
Working with Addresses 
• Two of the most 
common questions 
you are going to face 
when dealing with IP 
addresses are: 
• What’s the network? 
• What’s the host? 
• How dow we figure 
this out? 
192.168.100.80/26 
???? 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 11
Working with Addresses (The Hard Way) 
• First, convert the IP 
address into binary. This 
is easier than it looks. 
• Work with one octet at a 
time. 
• Divide by two, farm out the 
remainder on the side. 
• The bottom is the binary 
MSD, the top the binary 
LSD. 
192 
divide by 2 
remainder 
96 0 
divide by 2 
remainder 
48 0 
divide by 2 
remainder 
24 0 
divide by 2 
remainder 
12 0 
divide by 2 
remainder 
6 0 
divide by 2 
remainder 
3 0 
divide by 2 
remainder 
1 1 
divide by 2 
remainder 
0 1 
Left Right 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 12
Working with Addresses (The Hard Way) 
Write down the IP 
address. 
11000000 10101000 01100100 01010000 
192 168 100 80 
If you have a prefix 
length, just wrote 
down the number of 
1’s. If you have a 
network mask, 
computer the binary 
as with the IP 
address. 
11111111 11111111 11111111 11000000 
8 +8 +8 +2 == 26 
AND these two. 11000000 10101000 01100100 01000000 
Convert back to 
192 168 100 64 
dotted decimal. This 
is the network 
address. 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 13
Working with Addresses (The Hard Way) 
Write down the IP 
address. 
11000000 10101000 01100100 01010000 
192 168 100 80 
If you have a prefix 
length, just wrote 
down the number of 
1’s. If you have a 
network mask, 
computer the binary 
as with the IP 
address. 
11111111 11111111 11111111 11000000 
8 +8 +8 +2 == 26 
NOR these two. 00000000 00000000 00000000 00010000 
Convert back to 
0 0 0 16 
dotted decimal. This 
is the host address. 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 14
Working with Addresses (The Hard Way) 
• To convert from 
binary to decimal, use 
a simple chart. 
• Add the number 
indicated for each 1 
set in the binary 
number. 
128 1 128 
64 0 0 
32 1 32 
16 0 0 
8 1 8 
4 0 0 
2 0 0 
1 0 0 
168 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 15
Working with Addresses (The Easy Way) 
• First, if you are using a 
network mask, convert it 
to a prefix length. 
• For each octet in the 
network mask that is 255, 
add 8 to the prefix length. 
• For the one octet that isn’t 
255, convert to binary and 
add the right number of 
bits--or use a chart! 
192 == 11000000 
255.255.255.192 
8 +8 +8 +2 == 26 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 16
Working with Addresses (The Easy Way) 
• Take the prefix length and 
divide by 8. 
• Take the resulting number, 
and ignore those octets 
out of the IP address-- 
these are all part of the 
network address! 
• We’re going to use the 
remainder to find the 
fourth octet of the network 
address. 
192.168.100.80/26 
These three 
octets are 
part of the 
network 
26/8 == 3 (remainder 2) 
The remainder tells us 
what the network address 
in the fourth octet is 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 17
Working with Addresses (The Easy Way) 
• Take the remainder, and 
find the corresponding 
“multiple” on the chart; in 
this case, 64. 
• The largest multiple of 64 
that will fit into 80 is 64, so 
the network is 64. 
• Add the three octets we 
“set aside” earlier, and the 
network (prefix!) is 
192.168.100.64/26. 
• 80 - 64 == 16, so the host 
address is 16. 
Remainder == 2 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
64 x 1 == 64 
64 x 2 == 128 
Network is 64! 
192.168.100.64/26 
80 - 64 == 16 
16 Hosts! 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 18
Working with Addresses (The Easy Way) 
• How many hosts are in this 
network? The remainder tells 
us there are 64 addresses, 
minus the network and 
broadcast addresses, so 62 
hosts. 
• To find the broadcast 
address, subtract 1 from the 
number of hosts, and add 
that number to the network 
address. 
• The key is to work in octets, 
rather than trying to work 
with the entire IP address at 
once! 
Remainder == 2 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
64 addresses 
64 - 2 == 62 hosts 
64 + (64 - 1) == 127 
192.168.100.127 is the 
broadcast address 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 19
Working with Addresses (The Easy Way) 
• What if the prefix length is 
less than 24? 
• Take the prefix length and 
divide by 8. 
• Take the resulting number, 
and ignore those octets 
out of the IP address-- 
these are all part of the 
network address! 
• We’re going to use the 
remainder to find the third 
octet of the network 
address. 
192.168.100.80/22 
These three 
octets are 
part of the 
network 
22/8 == 2 (remainder 6) 
The remainder tells us 
what the network address 
in the third octet is 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 20
Working with Addresses (The Easy Way) 
• Take the remainder, and 
find the corresponding 
Remainder == 6 
“multiple” on the chart; in 
this case, 4. 
8 7 6 5 4 3 2 1 
• The largest multiple of 64 
1 2 4 8 16 32 64 128 
that will fit into 80 is 64, so 
the network is 64. 
4 x 25 == 100 
• Add the two octets we “set 
4 x 26 == 104 
aside” earlier, and make 
any octets after the 
Third octet is 100! 
network 0’s (the fourth 
Set the fourth octet to 0. 
octet). 
192.168.100.0/22 
• The network (prefix!) is 
192.168.100.0/22. 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 21
Working with Addresses (The Easy Way) 
• To find the number of 
hosts, take the number of 
octets set to 0, which is 1 
in this case (the fourth 
octet), and multiply by 256. 
• Next, take the number 
relating to the remainder 
from the chart, and 
multiple this by the 
number we just found 
above. 
• Subtract two. 
“0” octets == 1 
1 x 256 == 256 
Remainder == 6 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
4 x 256 == 1024 
1024 – 2 == 1022 hosts 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 22
Working with Addresses (The Easy Way) 
• The key is to work in octets, rather than 
trying to work with the entire IP address at 
once! 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 23
Summarization & Subnets 
• A single network address 
(prefix!) represents a set 
of hosts attached to a 
wire. 
• We can abstract this, and 
simply say that a prefix 
represents a set of 
reachable addresses. 
• We can say that we’ve 
“summarized” information 
about the hosts attached 
to the physical wire by 
referring to the entire 
group as a single network. 
10.1.1.2 
10.1.1.4 
10.1.1.7 
10.1.1.8 
10.1.1.0/26 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 24
Summarization & Subnets 
• In effect, we’ve shortened the 
network part of the address 
(prefix!), and lengthened the 
host portion of the address, 
in effect describing more 
hosts (destinations) in a 
single address. 
• If we can shorten the prefix 
length to describe multiple 
hosts with a single network 
address, why can’t we 
shorten the prefix length so a 
single network address 
describes two networks? 
• We can! It’s called address 
summarization, or just 
summarization. 
10.1.1.2/32 
10.1.1.4/32 
10.1.1.7/32 
10.1.1.8/32 
10.1.1.0/26 
10.1.1.64/26 
These host 
addresses 
are 
described 
by this 
network 
10.1.1.0/25 
These 
networks 
are 
described 
by this 
network 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 25
Summarization & Subnets 
10.1.1.0 through 
10.1.1.31. 
00001010 00000001 00000001 00000000 
10 1 1 0 
11111111 11111111 11111111 11000000 
10.1.1.32 through 
10.1.1.63. 
00001010 00000001 00000001 01000000 
10 1 1 64 
11111111 11111111 11111111 11000000 
10.1.1.0 through 
10.1.1.63, so it’s the 
same space! 
00001010 00000001 00000001 00000000 
10 1 1 0 
11111111 11111111 11111111 10000000 
Changing the mask bit from 1 to 0, which shortens the 
prefix length, means the bit in the two networks that 
distinguish them from one another are now considered 
host bits! 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 26
Summarization & Subnets 
• A network which is a part 
of another network is 
called a subnet. 
• There is another term, the 
supernet, but it’s 
definition depends on 
whether you are using 
VLSM subnetting, or 
calssful subnetting, so it 
will be defined in the next 
two sections. 
10.1.1.2/32 
10.1.1.4/32 
10.1.1.7/32 
10.1.1.8/32 
10.1.1.0/26 
10.1.1.64/26 
These host 
addresses 
are 
subnets of 
this 
network 
10.1.1.0/25 
These 
networks 
are 
subnets of 
this 
network 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 27
VLSM 
• VLSM: Variable Length 
Subnet Masking 
• It simply means that the 
entire IP address space is 
treated as one flat address 
space. 
• Any prefix length is 
allowed in the network at 
any point. 
10.1.1.0/24 
10.1.2.0/25 
10.1.2.128/26 
10.1.2.192/27 
All of these are valid in 
the same network! 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 28
VLSM 
• At this point, you pretty much already know 
VLSM! You already know how to find the network 
address, broadcast address, and number of 
hosts in a network. 
• Two other common problems in working with 
VLSM networks remain: 
• Building summary addresses from groups of 
networks. We won’t cover this here (maybe later in 
routing). 
• Building network addressing schemes from a given 
number of hosts and networks. 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 29
Working with VLSM Networks 
• You have 5 subnets with the following numbers of hosts 
on them: 58, 14, 29, 49, 3 
• You are given the address space 10.1.1.0/24. 
• Determine what subnets you could use to fit these hosts 
into it. 
• How to solve this: 
• Start with the chart! 
• Order the networks from the largest to the smallest. 
• Find the smallest number in the chart that will fit the number 
of the largest number of hosts + 2. 
• Continue through each space needed until you either run 
out of space, or you finish. 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 30
Working with VLSM Networks 
• 58, 14, 29, 49, 3: reorder to 
58, 49, 29, 14, 3. Start with 58. 
• Smallest number larger than 
(58 + 2) is 64. 64 is 2 bits. 
• 24 bits of prefix length in the 
address space given, add 2 
for 26. 
• First network is 10.1.1.0/26. 
• The next network is 10.1.1.0 
+ 64, so we start the next 
“round” at 10.1.1.64. 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
32 < (58 + 2) < 64 
24 + 2 == 26 
10.1.1.0/26 takes 
care of the first 58 
hosts 
Start the next block 
at 10.1.1.64 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 31
Working with VLSM Networks 
• Next block is 49 hosts. 
• Smallest number larger than 
(49 + 2) is 64. 64 is 2 bits. 
• 24 bits of prefix length in the 
address space given, add 2 
for 26. 
• We start this block at 
10.1.1.64, so network is 
10.1.1.64/26. 
• The next network is 10.1.1.64 
+ 64, so we start the next 
“round” at 10.1.1.128. 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
32 < (49 + 2) < 64 
24 + 2 == 26 
10.1.1.64/26 takes 
care of the next 49 
hosts 
Start the next block 
at 10.1.1.128 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 32
Working with VLSM Networks 
• Next block is 29 hosts. 
• Smallest number larger than 
(29 + 2) is 32. 32 is 3 bits. 
• 24 bits of prefix length in the 
address space given, add 3 
for 27. 
• We start this block at 
10.1.1.128, so network is 
10.1.1.128/27. 
• The next network is 
10.1.1.128 + 32, so we start 
the next “round” at 
10.1.1.160. 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
16 < (29 + 2) < 32 
24 + 3 == 27 
10.1.1.128/27 
takes care of the 
next 29 hosts 
Start the next block 
at 10.1.1.160 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 33
Working with VLSM Networks 
• Next block is 14 hosts. 
• Smallest number larger than 
(14 + 2) is 16. 16 is 4 bits 
(actually equal, but it still 
works!). 
• 24 bits of prefix length in the 
address space given, add 4 
for 28. 
• We start this block at 
10.1.1.160, so network is 
10.1.1.160/27. 
• The next network is 
10.1.1.160 + 16, so we start 
the next “round” at 
10.1.1.176. 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
(14 + 2) == 16 
24 + 4 == 28 
10.1.1.160/28 
takes care of the 
next 14 hosts 
Start the next block 
at 10.1.1.176 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 34
Working with VLSM Networks 
• Last block is 3 hosts. 
• Smallest number larger than 
(3 + 2) is 8. 8 is 5 bits. 
• 24 bits of prefix length in the 
address space given, add 5 
for 29. 
• We start this block at 
10.1.1.176, so network is 
10.1.1.176/29. 
• This is the last block of 
hosts, so we’re done! 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
4 < (5 + 2) < 8 
24 + 5 == 29 
10.1.1.176/29 
takes care of the 
next 14 hosts 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 35
Working with VLSM Networks 
• A subnet is any network 
which is “part of” a larger 
network space. 
• A supernet is any network 
which covers a larger 
space than a given 
network, including the 
space covered by the 
network. 
10.1.0.0/23 
10.1.1.0/24 
10.1.2.0/24 
10.1.2.0/25 
10.1.2.128/25 
10.1.2.128/26 
subnets 
subnet subnets 
supernet supernet supernet 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 36
Classful Addressing 
• Classful subnetting is similar to VLSM, 
with two more rules: 
• The IP address space is divided into 
“classes,” with each class having a specific 
“natural” prefix length. Each block of 
address space is called a “major net.” 
• You cannot have more than one prefix length 
within a major net. 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 37
Classful Addressing 
Network Class Beginning 
Digits in 
Binary 
Natural 
Prefix 
Length 
Range of 
Addresses 
Example Major 
Networks 
Class A 10XX 8 1.0.0.0/8 
through 
126.0.0.0/8 
11.0.0.0/8 
100.0.0.0/8 
120.0.0.0/8 
Class B 110X 16 128.0.0.0/16 
through 
191.0.0.0/16 
130.1.0.0/16 
148.45.0.0/16 
190.100.0.0/16 
Class C 1110 24 192.0.0.0/24 
through 
223.0.0.0/24 
193.1.3.0/24 
193.1.4.0/24 
192.2.5.0/24 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 38
Classful Addressing 
• It’s illegal to have multiple 
network masks within a 
single major network. 
• There cannot be a mix of / 
24’s and /25’s in the 
10.0.0.0/8 major network. 
• There cannot be a mix of / 
25’s and /26’s in the 
11.0.0.0/8 network. 
10.1.1.0/24 
10.1.2.0/24 
10.1.3.0/25 
10.1.3.128/25 
11.1.1.0/25 
11.1.1.128/26 
two different 
prefix lengths 
in the same 
major network 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 39
Working with Classful Addressing 
• You can find the network address, 
broadcast address, and number of hosts 
as we described earlier. 
• You can find the number of networks by 
subtracting the network mask from the 
natural mask, and then using the chart. 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 40
Working with Classful Addressing 
• 10.1.1.0/25 is in the 
10.0.0.0 class A major 
network. 
• The natural prefix length 
for a class A network is /8. 
• Subtract the natural prefix 
length from the actual 
prefix length. 
• Divide by 8, holding the 
remainder on the side. 
10.1.1.0/25 
10.0.0.0/8 is class A 
25 – 8 == 17 
17/8 == 2, 1 remaining 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 41
Working with Classful Addressing 
• Find the remainder in 
the power of two’s 
chart. 
• Multiply the result, 
256, and the number 
from the power of 
two’s chart. 
• Subtract 2. 
10.1.1.0/25 
10.0.0.0/8 is class A 
25 – 8 == 17 
17/8 == 2, 1 remaining 
(256 x 2) x 128 == 65536 
8 7 6 5 4 3 2 1 
1 2 4 8 16 32 64 128 
65536 – 2 == 65534 networks 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 42
Working with Classful Addressing 
• Subnet 0 
• The network with 
all the between the 
host and the 
natural major net 
set to 0. 
• This only exists in 
classful 
addressing 
schemes. 
10 0 0 0/24 
00001010 00000000 00000000 00000000 
natural 
natural 
network 
host 
configured 
network these bits are 0, so this is subnet 0 
10.0.0.0/16 
10.0.1.0/16 
172.31.0.0/24 
172.31.1.0/24 
192.168.100.0/25 
Yes 
No 
Yes 
No 
Yes 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 43
Working with Classful Addressing 
• Broadcast Subnet 
• The network with 
all the bits 
between the host 
and the natural 
major network set 
to 1. 
• This only exists in 
calssful address 
schemes. 
10 255 255 0/24 
00001010 11111111 11111111 00000000 
natural 
natural 
network 
host 
configured 
network these bits are 1, so this is 
the broadcast network 
10.255.0.0/16 
10.255.0.0/24 
172.31.255.0/24 
172.31.255.0/25 
192.168.100.128/25 
Yes 
No 
Yes 
No 
Yes 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 44
Working with Classful Addressing 
• You have 5 subnets with the following numbers of hosts 
on them: 58, 14, 29, 49, 3 
• You are given the address space 10.1.0.0/22. 
• Determine what subnets you could use to fit these hosts 
into it. 
• How to solve this: 
• Start with the chart! 
• Find the largest set of hosts. 
• Find the smallest number in the chart that will fit the number 
of the largest number of hosts + 2. 
• Use that prefix length for all the subnets (remember you 
cannot have different subnet masks within the same major 
network). 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 45
Working with Classful Addressing 
• A subnet is any prefix with 
a prefix length longer than 
the natural prefix length of 
the major network. 
• A supernet is any prefix 
with a prefix length 
shorter than the natural 
prefix length of the major 
network. 
172.18.1.0/24 Subnet 
10.2.0.0/9 Subnet 
172.34.0.0/15 Supernet 
192.168.44.64/25 Subnet 
192.168.44.0/23 Supernet 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 46
Private & Special Address Space 
Address Space Range of Addresses 
10.0.0.0/8 10.0.0.0 through 10.255.255.255 
172.16.0.0/19 172.16.0.0 through 172.31.0.0 
192.168.0.0/16 192.168.0.0 through 192.168.255.255 
Network Class Beginning Digits in Binary Range of Addresses 
Class D 
11110x 224.0.0.0 through 
(Multicast) 
239.255.255.255 
Class E 
(Experimental) 
11111x 240.0.0.0 through .... 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 47
Cisco IOS Show IP Route 
2651A#sho ip route 
.... 
Gateway of last resort is not set 
two different prefix 
lengths under the 
same major 
network 
C 208.0.12.0/24 is directly connected, Serial0/2 
.... 
S 208.1.10.0/24 [1/0] via 208.0.12.11 
.... 
144.2.0.0/16 is variably subnetted, 2 subnets, 2 masks 
S 144.2.2.0/24 [1/0] via 208.0.12.11 
S 144.2.3.0/29 [1/0] via 208.0.12.11 
C 208.0.7.0/24 is directly connected, Serial0/0 
C 208.0.6.0/24 is directly connected, FastEthernet0/0 
C 208.0.0.0/24 is directly connected, FastEthernet0/1 
S 208.1.0.0/16 [1/0] via 208.0.12.11 
a supernet and natural 
mask in the same 
network address space 
RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 48

More Related Content

What's hot

Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
NetProtocol Xpert
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
Subnetting
SubnettingSubnetting
Subnetting
selvakumar_b1985
 
Subnetting
SubnettingSubnetting
Subnetting
Fredrick Hall
 
Vlsm
VlsmVlsm
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
Ali Nezhad
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easyheidionthego
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
Wamuyu Murakaru
 
Subnetting
SubnettingSubnetting
Subnetting
Kishore Kumar
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
Shahzad Rashid
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
S Khawaja
 
Subnetting
SubnettingSubnetting
Subnetting
Netwax Lab
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
Vishal Pawar
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
Mahmmoud Mahdi
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
AYESHA JAVED
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Tafadzwa Gonera
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
AnhMai173354
 
Subnetting
SubnettingSubnetting
Subnetting
Sripati Mahapatra
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)welcometofacebook
 

What's hot (20)

Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Vlsm
VlsmVlsm
Vlsm
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)
 

Viewers also liked

computer memory and memory module
computer memory and memory modulecomputer memory and memory module
computer memory and memory module
thensi
 
Memory and memory modules by zuko khephu
Memory and memory modules by zuko khephuMemory and memory modules by zuko khephu
Memory and memory modules by zuko khephuzuks56
 
Memory modules
Memory modulesMemory modules
Memory modulesSana Sini
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
Md. Rafid Abrar Miah
 
Chapter 5
Chapter 5Chapter 5
Chapter 5askme
 
Memory module
Memory moduleMemory module
Memory modulelemar12
 
Random access memory
Random access memoryRandom access memory
Random access memory
BESOR ACADEMY
 
Random access memory
Random access memoryRandom access memory
Random access memory
Ruchi Maurya
 
Ram presentation
Ram presentationRam presentation
Ram presentation
Kadai McFadden
 
Ram presentation
Ram presentationRam presentation
Ram presentation
Kadai McFadden
 

Viewers also liked (10)

computer memory and memory module
computer memory and memory modulecomputer memory and memory module
computer memory and memory module
 
Memory and memory modules by zuko khephu
Memory and memory modules by zuko khephuMemory and memory modules by zuko khephu
Memory and memory modules by zuko khephu
 
Memory modules
Memory modulesMemory modules
Memory modules
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Memory module
Memory moduleMemory module
Memory module
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
Ram presentation
Ram presentationRam presentation
Ram presentation
 
Ram presentation
Ram presentationRam presentation
Ram presentation
 

Similar to Cisco ip-addressing

Cisco-IP-Addressing.ppt
Cisco-IP-Addressing.pptCisco-IP-Addressing.ppt
Cisco-IP-Addressing.ppt
MuhamadAriefY
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Tapan Khilar
 
Ex 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chenEx 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chenĐô GiẢn
 
IP_Addressing_and Subnetting.pdf
IP_Addressing_and Subnetting.pdfIP_Addressing_and Subnetting.pdf
IP_Addressing_and Subnetting.pdf
SayusAli
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
Er Bhagat Sharma
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingneclinux
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
Kashif Sohail
 
Student IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.pptStudent IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.ppt
johnBronson6
 
Ip addressing
Ip addressingIp addressing
Ip addressing
sid1322
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
Zakaria Hossain
 
Chapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingChapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routing
Vishnu Vardhan
 
2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx
DintlePhofu
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptx
KISHOYIANKISH
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
Sachii Dosti
 
ip addressing_&_subnetting_made_easy
 ip addressing_&_subnetting_made_easy ip addressing_&_subnetting_made_easy
ip addressing_&_subnetting_made_easy
Manjit Singh
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
Ronoh Kennedy
 

Similar to Cisco ip-addressing (20)

Cisco-IP-Addressing.ppt
Cisco-IP-Addressing.pptCisco-IP-Addressing.ppt
Cisco-IP-Addressing.ppt
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ex 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chenEx 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chen
 
IP_Addressing_and Subnetting.pdf
IP_Addressing_and Subnetting.pdfIP_Addressing_and Subnetting.pdf
IP_Addressing_and Subnetting.pdf
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
I Paddress
I PaddressI Paddress
I Paddress
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
Student IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.pptStudent IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.ppt
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
Chapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingChapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routing
 
IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptx
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
ip addressing_&_subnetting_made_easy
 ip addressing_&_subnetting_made_easy ip addressing_&_subnetting_made_easy
ip addressing_&_subnetting_made_easy
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 

More from askme

016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
askme
 
Human Generation
Human GenerationHuman Generation
Human Generationaskme
 
Do U Know Him
Do U Know HimDo U Know Him
Do U Know Himaskme
 
Investment Proposal
Investment ProposalInvestment Proposal
Investment Proposalaskme
 
Ramadan For Bodyand Soul
Ramadan For Bodyand SoulRamadan For Bodyand Soul
Ramadan For Bodyand Soulaskme
 
Shame On Us Or Us
Shame On Us Or UsShame On Us Or Us
Shame On Us Or Usaskme
 
Network Project
Network ProjectNetwork Project
Network Projectaskme
 
Zend Framework In Action
Zend Framework In ActionZend Framework In Action
Zend Framework In Actionaskme
 
Linux Vs Windows Tco Comparison
Linux Vs Windows Tco ComparisonLinux Vs Windows Tco Comparison
Linux Vs Windows Tco Comparisonaskme
 
B B Q Party
B B Q  PartyB B Q  Party
B B Q Partyaskme
 
Dit211 Chapter 7 (Lab 4)
Dit211   Chapter 7 (Lab 4)Dit211   Chapter 7 (Lab 4)
Dit211 Chapter 7 (Lab 4)askme
 
Dit211 Chapter 2 (Lab 1)
Dit211   Chapter 2 (Lab 1)Dit211   Chapter 2 (Lab 1)
Dit211 Chapter 2 (Lab 1)askme
 
D I T211 Chapter 5 ( Lab 3)
D I T211    Chapter 5 ( Lab 3)D I T211    Chapter 5 ( Lab 3)
D I T211 Chapter 5 ( Lab 3)askme
 
D I T211 Chapter 2 ( Lab 1)
D I T211    Chapter 2 ( Lab 1)D I T211    Chapter 2 ( Lab 1)
D I T211 Chapter 2 ( Lab 1)askme
 
D I T211 Chapter 7 ( Lab 4)
D I T211    Chapter 7 ( Lab 4)D I T211    Chapter 7 ( Lab 4)
D I T211 Chapter 7 ( Lab 4)askme
 
D I T211 Chapter 6
D I T211    Chapter 6D I T211    Chapter 6
D I T211 Chapter 6askme
 
D I T211 Chapter 4 ( Lab 2)
D I T211    Chapter 4 ( Lab 2)D I T211    Chapter 4 ( Lab 2)
D I T211 Chapter 4 ( Lab 2)askme
 
D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1askme
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1askme
 
D I T211 Chapter 3
D I T211    Chapter 3D I T211    Chapter 3
D I T211 Chapter 3askme
 

More from askme (20)

016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
016E_Surah_An-Nahl_Arabic_Recitation_with_English_Translation_Slides.pptx
 
Human Generation
Human GenerationHuman Generation
Human Generation
 
Do U Know Him
Do U Know HimDo U Know Him
Do U Know Him
 
Investment Proposal
Investment ProposalInvestment Proposal
Investment Proposal
 
Ramadan For Bodyand Soul
Ramadan For Bodyand SoulRamadan For Bodyand Soul
Ramadan For Bodyand Soul
 
Shame On Us Or Us
Shame On Us Or UsShame On Us Or Us
Shame On Us Or Us
 
Network Project
Network ProjectNetwork Project
Network Project
 
Zend Framework In Action
Zend Framework In ActionZend Framework In Action
Zend Framework In Action
 
Linux Vs Windows Tco Comparison
Linux Vs Windows Tco ComparisonLinux Vs Windows Tco Comparison
Linux Vs Windows Tco Comparison
 
B B Q Party
B B Q  PartyB B Q  Party
B B Q Party
 
Dit211 Chapter 7 (Lab 4)
Dit211   Chapter 7 (Lab 4)Dit211   Chapter 7 (Lab 4)
Dit211 Chapter 7 (Lab 4)
 
Dit211 Chapter 2 (Lab 1)
Dit211   Chapter 2 (Lab 1)Dit211   Chapter 2 (Lab 1)
Dit211 Chapter 2 (Lab 1)
 
D I T211 Chapter 5 ( Lab 3)
D I T211    Chapter 5 ( Lab 3)D I T211    Chapter 5 ( Lab 3)
D I T211 Chapter 5 ( Lab 3)
 
D I T211 Chapter 2 ( Lab 1)
D I T211    Chapter 2 ( Lab 1)D I T211    Chapter 2 ( Lab 1)
D I T211 Chapter 2 ( Lab 1)
 
D I T211 Chapter 7 ( Lab 4)
D I T211    Chapter 7 ( Lab 4)D I T211    Chapter 7 ( Lab 4)
D I T211 Chapter 7 ( Lab 4)
 
D I T211 Chapter 6
D I T211    Chapter 6D I T211    Chapter 6
D I T211 Chapter 6
 
D I T211 Chapter 4 ( Lab 2)
D I T211    Chapter 4 ( Lab 2)D I T211    Chapter 4 ( Lab 2)
D I T211 Chapter 4 ( Lab 2)
 
D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1
 
D I T211 Chapter 3
D I T211    Chapter 3D I T211    Chapter 3
D I T211 Chapter 3
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Cisco ip-addressing

  • 1.
  • 2. IP Addressing RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 2
  • 3. IP Addressing • Basic Addressing • Working with Addresses • Summarization & Subnets • VLSM • Working with VLSM Networks • Classful Addressing • Working with Classful Addressing RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 3
  • 4. Basic Addressing Dots separate the sections 10.1.1.1 • IP addresses are written in dotted decimal format. • Four sections are separated by dots. • Each section contains a number between 0 and 255. Each section contains a number between 0 and 255 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 4
  • 5. Basic Addressing Dots separate the sections 10.1.1.1 • Why is each section a number between 0 and 255? • Computers operate in binary, humans operate in decimal. • Computers treat IP addresses as a single large 32 digit binary number, but this is hard for people to do. • So, we split them up into four smaller sections so we can remember and work with them better! Each section contains a number between 0 and 255 Why???? RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 5
  • 6. Basic Addressing 10.1.1.1 • 32/4 == 8. • 28 = 256. • But, computers number starting at 0, so to make a space of 256 numbers, we number from 0 to 255. 00001010 00000001 00000001 00000001 8 8 8 8 32 Each 8 digit group represents a number between 0 and 255 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 6
  • 7. Basic Addressing 10.1.1.1 • Each device on a network is assigned an IP address. • Each IP address has two fundamental parts: • The network portion, which describes the physical wire the device is attached to. • The host portion, which identifies the host on that wire. • How can we tell the difference between the two sections? 00001010 00000001 00000001 00000001 Network Host RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 7
  • 8. Basic Addressing 10.1.1.1 • The network mask shows us where to split the network and host sections. • Each place there is a 1 in the network mask, that binary digit belongs to the network portion of the address. • Each place there is a 0 in the network mask, that binary digit belongs to the host portion of the address. 00001010 00000001 00000001 00000001 Network Host 11111111 11111111 11111111 00000000 255.255.255.0 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 8
  • 9. Basic Addressing • An alternative set of 10.1.1.1 terminology is: • The network portion of the address is called the prefix. • The host portion of the address is called the host. • The network mask is expressed as a prefix length, which is a count of the number of 1’s in the subnet mask. 00001010 00000001 00000001 00000001 Prefix Host 11111111 11111111 11111111 00000000 8 + 8 + 8 = 24 10.1.1.1/24 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 9
  • 10. Basic Addressing • The network address is the IP address with all 0’s in the host bits. • The broadcast address is the IP address with all 1’s in the host bits. • Packets sent to either address will be delivered to all the hosts connected to the wire. 10 1 1 0/24 00001010 000000011 00000001 00000000 prefix host these bits are 0, so this is the network address 10 1 1 255/24 00001010 000000011 00000001 11111111 prefix host these bits are 1, so this is the broadcast address RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 10
  • 11. Working with Addresses • Two of the most common questions you are going to face when dealing with IP addresses are: • What’s the network? • What’s the host? • How dow we figure this out? 192.168.100.80/26 ???? RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 11
  • 12. Working with Addresses (The Hard Way) • First, convert the IP address into binary. This is easier than it looks. • Work with one octet at a time. • Divide by two, farm out the remainder on the side. • The bottom is the binary MSD, the top the binary LSD. 192 divide by 2 remainder 96 0 divide by 2 remainder 48 0 divide by 2 remainder 24 0 divide by 2 remainder 12 0 divide by 2 remainder 6 0 divide by 2 remainder 3 0 divide by 2 remainder 1 1 divide by 2 remainder 0 1 Left Right RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 12
  • 13. Working with Addresses (The Hard Way) Write down the IP address. 11000000 10101000 01100100 01010000 192 168 100 80 If you have a prefix length, just wrote down the number of 1’s. If you have a network mask, computer the binary as with the IP address. 11111111 11111111 11111111 11000000 8 +8 +8 +2 == 26 AND these two. 11000000 10101000 01100100 01000000 Convert back to 192 168 100 64 dotted decimal. This is the network address. RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 13
  • 14. Working with Addresses (The Hard Way) Write down the IP address. 11000000 10101000 01100100 01010000 192 168 100 80 If you have a prefix length, just wrote down the number of 1’s. If you have a network mask, computer the binary as with the IP address. 11111111 11111111 11111111 11000000 8 +8 +8 +2 == 26 NOR these two. 00000000 00000000 00000000 00010000 Convert back to 0 0 0 16 dotted decimal. This is the host address. RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 14
  • 15. Working with Addresses (The Hard Way) • To convert from binary to decimal, use a simple chart. • Add the number indicated for each 1 set in the binary number. 128 1 128 64 0 0 32 1 32 16 0 0 8 1 8 4 0 0 2 0 0 1 0 0 168 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 15
  • 16. Working with Addresses (The Easy Way) • First, if you are using a network mask, convert it to a prefix length. • For each octet in the network mask that is 255, add 8 to the prefix length. • For the one octet that isn’t 255, convert to binary and add the right number of bits--or use a chart! 192 == 11000000 255.255.255.192 8 +8 +8 +2 == 26 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 16
  • 17. Working with Addresses (The Easy Way) • Take the prefix length and divide by 8. • Take the resulting number, and ignore those octets out of the IP address-- these are all part of the network address! • We’re going to use the remainder to find the fourth octet of the network address. 192.168.100.80/26 These three octets are part of the network 26/8 == 3 (remainder 2) The remainder tells us what the network address in the fourth octet is RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 17
  • 18. Working with Addresses (The Easy Way) • Take the remainder, and find the corresponding “multiple” on the chart; in this case, 64. • The largest multiple of 64 that will fit into 80 is 64, so the network is 64. • Add the three octets we “set aside” earlier, and the network (prefix!) is 192.168.100.64/26. • 80 - 64 == 16, so the host address is 16. Remainder == 2 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 64 x 1 == 64 64 x 2 == 128 Network is 64! 192.168.100.64/26 80 - 64 == 16 16 Hosts! RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 18
  • 19. Working with Addresses (The Easy Way) • How many hosts are in this network? The remainder tells us there are 64 addresses, minus the network and broadcast addresses, so 62 hosts. • To find the broadcast address, subtract 1 from the number of hosts, and add that number to the network address. • The key is to work in octets, rather than trying to work with the entire IP address at once! Remainder == 2 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 64 addresses 64 - 2 == 62 hosts 64 + (64 - 1) == 127 192.168.100.127 is the broadcast address RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 19
  • 20. Working with Addresses (The Easy Way) • What if the prefix length is less than 24? • Take the prefix length and divide by 8. • Take the resulting number, and ignore those octets out of the IP address-- these are all part of the network address! • We’re going to use the remainder to find the third octet of the network address. 192.168.100.80/22 These three octets are part of the network 22/8 == 2 (remainder 6) The remainder tells us what the network address in the third octet is RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 20
  • 21. Working with Addresses (The Easy Way) • Take the remainder, and find the corresponding Remainder == 6 “multiple” on the chart; in this case, 4. 8 7 6 5 4 3 2 1 • The largest multiple of 64 1 2 4 8 16 32 64 128 that will fit into 80 is 64, so the network is 64. 4 x 25 == 100 • Add the two octets we “set 4 x 26 == 104 aside” earlier, and make any octets after the Third octet is 100! network 0’s (the fourth Set the fourth octet to 0. octet). 192.168.100.0/22 • The network (prefix!) is 192.168.100.0/22. RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 21
  • 22. Working with Addresses (The Easy Way) • To find the number of hosts, take the number of octets set to 0, which is 1 in this case (the fourth octet), and multiply by 256. • Next, take the number relating to the remainder from the chart, and multiple this by the number we just found above. • Subtract two. “0” octets == 1 1 x 256 == 256 Remainder == 6 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 4 x 256 == 1024 1024 – 2 == 1022 hosts RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 22
  • 23. Working with Addresses (The Easy Way) • The key is to work in octets, rather than trying to work with the entire IP address at once! RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 23
  • 24. Summarization & Subnets • A single network address (prefix!) represents a set of hosts attached to a wire. • We can abstract this, and simply say that a prefix represents a set of reachable addresses. • We can say that we’ve “summarized” information about the hosts attached to the physical wire by referring to the entire group as a single network. 10.1.1.2 10.1.1.4 10.1.1.7 10.1.1.8 10.1.1.0/26 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 24
  • 25. Summarization & Subnets • In effect, we’ve shortened the network part of the address (prefix!), and lengthened the host portion of the address, in effect describing more hosts (destinations) in a single address. • If we can shorten the prefix length to describe multiple hosts with a single network address, why can’t we shorten the prefix length so a single network address describes two networks? • We can! It’s called address summarization, or just summarization. 10.1.1.2/32 10.1.1.4/32 10.1.1.7/32 10.1.1.8/32 10.1.1.0/26 10.1.1.64/26 These host addresses are described by this network 10.1.1.0/25 These networks are described by this network RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 25
  • 26. Summarization & Subnets 10.1.1.0 through 10.1.1.31. 00001010 00000001 00000001 00000000 10 1 1 0 11111111 11111111 11111111 11000000 10.1.1.32 through 10.1.1.63. 00001010 00000001 00000001 01000000 10 1 1 64 11111111 11111111 11111111 11000000 10.1.1.0 through 10.1.1.63, so it’s the same space! 00001010 00000001 00000001 00000000 10 1 1 0 11111111 11111111 11111111 10000000 Changing the mask bit from 1 to 0, which shortens the prefix length, means the bit in the two networks that distinguish them from one another are now considered host bits! RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 26
  • 27. Summarization & Subnets • A network which is a part of another network is called a subnet. • There is another term, the supernet, but it’s definition depends on whether you are using VLSM subnetting, or calssful subnetting, so it will be defined in the next two sections. 10.1.1.2/32 10.1.1.4/32 10.1.1.7/32 10.1.1.8/32 10.1.1.0/26 10.1.1.64/26 These host addresses are subnets of this network 10.1.1.0/25 These networks are subnets of this network RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 27
  • 28. VLSM • VLSM: Variable Length Subnet Masking • It simply means that the entire IP address space is treated as one flat address space. • Any prefix length is allowed in the network at any point. 10.1.1.0/24 10.1.2.0/25 10.1.2.128/26 10.1.2.192/27 All of these are valid in the same network! RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 28
  • 29. VLSM • At this point, you pretty much already know VLSM! You already know how to find the network address, broadcast address, and number of hosts in a network. • Two other common problems in working with VLSM networks remain: • Building summary addresses from groups of networks. We won’t cover this here (maybe later in routing). • Building network addressing schemes from a given number of hosts and networks. RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 29
  • 30. Working with VLSM Networks • You have 5 subnets with the following numbers of hosts on them: 58, 14, 29, 49, 3 • You are given the address space 10.1.1.0/24. • Determine what subnets you could use to fit these hosts into it. • How to solve this: • Start with the chart! • Order the networks from the largest to the smallest. • Find the smallest number in the chart that will fit the number of the largest number of hosts + 2. • Continue through each space needed until you either run out of space, or you finish. RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 30
  • 31. Working with VLSM Networks • 58, 14, 29, 49, 3: reorder to 58, 49, 29, 14, 3. Start with 58. • Smallest number larger than (58 + 2) is 64. 64 is 2 bits. • 24 bits of prefix length in the address space given, add 2 for 26. • First network is 10.1.1.0/26. • The next network is 10.1.1.0 + 64, so we start the next “round” at 10.1.1.64. 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 32 < (58 + 2) < 64 24 + 2 == 26 10.1.1.0/26 takes care of the first 58 hosts Start the next block at 10.1.1.64 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 31
  • 32. Working with VLSM Networks • Next block is 49 hosts. • Smallest number larger than (49 + 2) is 64. 64 is 2 bits. • 24 bits of prefix length in the address space given, add 2 for 26. • We start this block at 10.1.1.64, so network is 10.1.1.64/26. • The next network is 10.1.1.64 + 64, so we start the next “round” at 10.1.1.128. 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 32 < (49 + 2) < 64 24 + 2 == 26 10.1.1.64/26 takes care of the next 49 hosts Start the next block at 10.1.1.128 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 32
  • 33. Working with VLSM Networks • Next block is 29 hosts. • Smallest number larger than (29 + 2) is 32. 32 is 3 bits. • 24 bits of prefix length in the address space given, add 3 for 27. • We start this block at 10.1.1.128, so network is 10.1.1.128/27. • The next network is 10.1.1.128 + 32, so we start the next “round” at 10.1.1.160. 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 16 < (29 + 2) < 32 24 + 3 == 27 10.1.1.128/27 takes care of the next 29 hosts Start the next block at 10.1.1.160 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 33
  • 34. Working with VLSM Networks • Next block is 14 hosts. • Smallest number larger than (14 + 2) is 16. 16 is 4 bits (actually equal, but it still works!). • 24 bits of prefix length in the address space given, add 4 for 28. • We start this block at 10.1.1.160, so network is 10.1.1.160/27. • The next network is 10.1.1.160 + 16, so we start the next “round” at 10.1.1.176. 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 (14 + 2) == 16 24 + 4 == 28 10.1.1.160/28 takes care of the next 14 hosts Start the next block at 10.1.1.176 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 34
  • 35. Working with VLSM Networks • Last block is 3 hosts. • Smallest number larger than (3 + 2) is 8. 8 is 5 bits. • 24 bits of prefix length in the address space given, add 5 for 29. • We start this block at 10.1.1.176, so network is 10.1.1.176/29. • This is the last block of hosts, so we’re done! 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 4 < (5 + 2) < 8 24 + 5 == 29 10.1.1.176/29 takes care of the next 14 hosts RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 35
  • 36. Working with VLSM Networks • A subnet is any network which is “part of” a larger network space. • A supernet is any network which covers a larger space than a given network, including the space covered by the network. 10.1.0.0/23 10.1.1.0/24 10.1.2.0/24 10.1.2.0/25 10.1.2.128/25 10.1.2.128/26 subnets subnet subnets supernet supernet supernet RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 36
  • 37. Classful Addressing • Classful subnetting is similar to VLSM, with two more rules: • The IP address space is divided into “classes,” with each class having a specific “natural” prefix length. Each block of address space is called a “major net.” • You cannot have more than one prefix length within a major net. RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 37
  • 38. Classful Addressing Network Class Beginning Digits in Binary Natural Prefix Length Range of Addresses Example Major Networks Class A 10XX 8 1.0.0.0/8 through 126.0.0.0/8 11.0.0.0/8 100.0.0.0/8 120.0.0.0/8 Class B 110X 16 128.0.0.0/16 through 191.0.0.0/16 130.1.0.0/16 148.45.0.0/16 190.100.0.0/16 Class C 1110 24 192.0.0.0/24 through 223.0.0.0/24 193.1.3.0/24 193.1.4.0/24 192.2.5.0/24 RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 38
  • 39. Classful Addressing • It’s illegal to have multiple network masks within a single major network. • There cannot be a mix of / 24’s and /25’s in the 10.0.0.0/8 major network. • There cannot be a mix of / 25’s and /26’s in the 11.0.0.0/8 network. 10.1.1.0/24 10.1.2.0/24 10.1.3.0/25 10.1.3.128/25 11.1.1.0/25 11.1.1.128/26 two different prefix lengths in the same major network RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 39
  • 40. Working with Classful Addressing • You can find the network address, broadcast address, and number of hosts as we described earlier. • You can find the number of networks by subtracting the network mask from the natural mask, and then using the chart. RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 40
  • 41. Working with Classful Addressing • 10.1.1.0/25 is in the 10.0.0.0 class A major network. • The natural prefix length for a class A network is /8. • Subtract the natural prefix length from the actual prefix length. • Divide by 8, holding the remainder on the side. 10.1.1.0/25 10.0.0.0/8 is class A 25 – 8 == 17 17/8 == 2, 1 remaining RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 41
  • 42. Working with Classful Addressing • Find the remainder in the power of two’s chart. • Multiply the result, 256, and the number from the power of two’s chart. • Subtract 2. 10.1.1.0/25 10.0.0.0/8 is class A 25 – 8 == 17 17/8 == 2, 1 remaining (256 x 2) x 128 == 65536 8 7 6 5 4 3 2 1 1 2 4 8 16 32 64 128 65536 – 2 == 65534 networks RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 42
  • 43. Working with Classful Addressing • Subnet 0 • The network with all the between the host and the natural major net set to 0. • This only exists in classful addressing schemes. 10 0 0 0/24 00001010 00000000 00000000 00000000 natural natural network host configured network these bits are 0, so this is subnet 0 10.0.0.0/16 10.0.1.0/16 172.31.0.0/24 172.31.1.0/24 192.168.100.0/25 Yes No Yes No Yes RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 43
  • 44. Working with Classful Addressing • Broadcast Subnet • The network with all the bits between the host and the natural major network set to 1. • This only exists in calssful address schemes. 10 255 255 0/24 00001010 11111111 11111111 00000000 natural natural network host configured network these bits are 1, so this is the broadcast network 10.255.0.0/16 10.255.0.0/24 172.31.255.0/24 172.31.255.0/25 192.168.100.128/25 Yes No Yes No Yes RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 44
  • 45. Working with Classful Addressing • You have 5 subnets with the following numbers of hosts on them: 58, 14, 29, 49, 3 • You are given the address space 10.1.0.0/22. • Determine what subnets you could use to fit these hosts into it. • How to solve this: • Start with the chart! • Find the largest set of hosts. • Find the smallest number in the chart that will fit the number of the largest number of hosts + 2. • Use that prefix length for all the subnets (remember you cannot have different subnet masks within the same major network). RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 45
  • 46. Working with Classful Addressing • A subnet is any prefix with a prefix length longer than the natural prefix length of the major network. • A supernet is any prefix with a prefix length shorter than the natural prefix length of the major network. 172.18.1.0/24 Subnet 10.2.0.0/9 Subnet 172.34.0.0/15 Supernet 192.168.44.64/25 Subnet 192.168.44.0/23 Supernet RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 46
  • 47. Private & Special Address Space Address Space Range of Addresses 10.0.0.0/8 10.0.0.0 through 10.255.255.255 172.16.0.0/19 172.16.0.0 through 172.31.0.0 192.168.0.0/16 192.168.0.0 through 192.168.255.255 Network Class Beginning Digits in Binary Range of Addresses Class D 11110x 224.0.0.0 through (Multicast) 239.255.255.255 Class E (Experimental) 11111x 240.0.0.0 through .... RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 47
  • 48. Cisco IOS Show IP Route 2651A#sho ip route .... Gateway of last resort is not set two different prefix lengths under the same major network C 208.0.12.0/24 is directly connected, Serial0/2 .... S 208.1.10.0/24 [1/0] via 208.0.12.11 .... 144.2.0.0/16 is variably subnetted, 2 subnets, 2 masks S 144.2.2.0/24 [1/0] via 208.0.12.11 S 144.2.3.0/29 [1/0] via 208.0.12.11 C 208.0.7.0/24 is directly connected, Serial0/0 C 208.0.6.0/24 is directly connected, FastEthernet0/0 C 208.0.0.0/24 is directly connected, FastEthernet0/1 S 208.1.0.0/16 [1/0] via 208.0.12.11 a supernet and natural mask in the same network address space RST-2002 © 2003, Cisco Systems, Inc. All rights reserved. 48