SlideShare a Scribd company logo
CLASS B
SUBNETTING
-Utsav Shrestha
IP address = 172.168.0.0 / 19
Subnet mask = 11111111.11111111.11100000.00000000
= 255.255.224.0
No. of Hosts per Network = 213 - 2 = 8192 – 2 = 8190
Block size = 256 – 224 = 32
No. of Networks = 23 = 8
1st Network:
1st Network ID = 172.168.0.0
1st Valid IP address = 172.168.0.1
Last Valid IP address = 172.168.31.254
Broadcast IP address = 172.168.31.255
2nd Network:
2nd Network ID = 172.168.32.0
1st Valid IP address = 172.168.32.1
Last Valid IP address = 172.168.63.254
Broadcast IP address = 172.168.63.255
3rd Network:
3rd Network ID = 172.168.64.0
1st Valid IP address = 172.168.64.1
Last Valid IP address = 172.168.95.254
Broadcast IP address = 172.168.95.255
4th Network:
4th Network ID = 172.168.96.0
1st Valid IP address = 172.168.96.1
Last Valid IP address = 172.168.127.254
Broadcast IP address = 172.168.127.255
5th Network:
5th Network ID = 172.168.128.0
1st Valid IP address = 172.168.128.1
Last Valid IP address = 172.168.159.254
Broadcast IP address = 172.168.159.255
6th Network:
6th Network ID = 172.168.160.0
1st Valid IP address = 172.168.160.1
Last Valid IP address = 172.168.191.254
Broadcast IP address = 172.168.191.255
7th Network:
7th Network ID = 172.168.192.0
1st Valid IP address = 172.168.192.1
Last Valid IP address = 172.168.223.254
Broadcast IP address = 172.168.223.255
8th Network:
8th Network ID = 172.168.224.0
1st Valid IP address = 172.168.224.1
Last Valid IP address = 172.168.255.254
Broadcast IP address = 172.168.255.255
THANKYOU!

More Related Content

What's hot

Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
Mohibullah Saail
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
Harish Sripathi
 
About IPv6
About IPv6About IPv6
About IPv6
Marco Antonio
 
Ethereum A to Z
Ethereum A to ZEthereum A to Z
Ethereum A to Z
Dongsam Byun
 
Radio Enlace Tesis Mkrotik.pdf
Radio Enlace Tesis Mkrotik.pdfRadio Enlace Tesis Mkrotik.pdf
Radio Enlace Tesis Mkrotik.pdf
PitMezaj
 
Steganography
Steganography Steganography
Steganography
Humajabeen31
 
Building Blocks of the Private Cloud - Compute
Building Blocks of the Private Cloud - ComputeBuilding Blocks of the Private Cloud - Compute
Building Blocks of the Private Cloud - Compute
Daniel Mar
 
Concepts of optical fiber communication
Concepts of optical fiber communicationConcepts of optical fiber communication
Concepts of optical fiber communication
Naveen Jakhar, I.T.S
 
SSl/TLS Analysis
SSl/TLS AnalysisSSl/TLS Analysis
SSl/TLS Analysis
Duduman Bogdan Vlad
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation
Jim Brysland
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
Ali Nezhad
 
Basic network training1
Basic network training1Basic network training1
Basic network training1
Arunchai Seangparch
 
Subnetting
SubnettingSubnetting
Subnetting
Kishore Kumar
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
Monsur Ahmed Shafiq
 
CyberOps Associate Modul 27 Working with Network Security Data
CyberOps Associate Modul 27 Working with Network Security DataCyberOps Associate Modul 27 Working with Network Security Data
CyberOps Associate Modul 27 Working with Network Security Data
Panji Ramadhan Hadjarati
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
Rishi Pathak
 
Pertemuan 12 subnetting cara cepat
Pertemuan 12   subnetting cara cepatPertemuan 12   subnetting cara cepat
Pertemuan 12 subnetting cara cepat
aingaingaing
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Mansour Naslcheraghi
 

What's hot (20)

Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
About IPv6
About IPv6About IPv6
About IPv6
 
Ethereum A to Z
Ethereum A to ZEthereum A to Z
Ethereum A to Z
 
Radio Enlace Tesis Mkrotik.pdf
Radio Enlace Tesis Mkrotik.pdfRadio Enlace Tesis Mkrotik.pdf
Radio Enlace Tesis Mkrotik.pdf
 
Steganography
Steganography Steganography
Steganography
 
Building Blocks of the Private Cloud - Compute
Building Blocks of the Private Cloud - ComputeBuilding Blocks of the Private Cloud - Compute
Building Blocks of the Private Cloud - Compute
 
Concepts of optical fiber communication
Concepts of optical fiber communicationConcepts of optical fiber communication
Concepts of optical fiber communication
 
SSl/TLS Analysis
SSl/TLS AnalysisSSl/TLS Analysis
SSl/TLS Analysis
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
Basic network training1
Basic network training1Basic network training1
Basic network training1
 
Subnetting
SubnettingSubnetting
Subnetting
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
CyberOps Associate Modul 27 Working with Network Security Data
CyberOps Associate Modul 27 Working with Network Security DataCyberOps Associate Modul 27 Working with Network Security Data
CyberOps Associate Modul 27 Working with Network Security Data
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
Pertemuan 12 subnetting cara cepat
Pertemuan 12   subnetting cara cepatPertemuan 12   subnetting cara cepat
Pertemuan 12 subnetting cara cepat
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Similar to Class B Subnetting

Tugas komjar 4
Tugas komjar 4Tugas komjar 4
Tugas komjar 4
ramasatriaf
 
1.IPv4.pptx
1.IPv4.pptx1.IPv4.pptx
1.IPv4.pptx
WahyuniAnti
 
Subneting.ppt
Subneting.pptSubneting.ppt
Subneting.ppt
zheerhimdad
 
Sub Netting
Sub NettingSub Netting
Sub Netting
Lilesh Pathe
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting
Nanda Afif
 
Subnetting
SubnettingSubnetting
Subnetting
Junayed Noor
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt
jaycallaga
 
Subnetting ked
Subnetting kedSubnetting ked
Subnetting ked
Naresh Gotad
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
Shreehari Dhat
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module III
Ajit Nayak
 
Subnetting
SubnettingSubnetting
Subnetting
Omar Salem
 
Subnetting
SubnettingSubnetting
Subnetting
Omar Salem
 
6 subnetting
6 subnetting6 subnetting
6 subnetting
Omar Salem
 
6 subnetting
6 subnetting6 subnetting
6 subnetting
Omar Salem
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTE
Sofian .
 
Ip addresses
Ip addressesIp addresses
Ip addresses
Asif
 
Easy subnetting
Easy subnettingEasy subnetting
Easy subnetting
Saravanan Kanagasabapathi
 
Subnetting
SubnettingSubnetting
Subnetting
Netwax Lab
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
JAIGANESH SEKAR
 

Similar to Class B Subnetting (20)

Tugas komjar 4
Tugas komjar 4Tugas komjar 4
Tugas komjar 4
 
1.IPv4.pptx
1.IPv4.pptx1.IPv4.pptx
1.IPv4.pptx
 
Subneting.ppt
Subneting.pptSubneting.ppt
Subneting.ppt
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt
 
Subnetting ked
Subnetting kedSubnetting ked
Subnetting ked
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module III
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
6 subnetting
6 subnetting6 subnetting
6 subnetting
 
6 subnetting
6 subnetting6 subnetting
6 subnetting
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTE
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
Easy subnetting
Easy subnettingEasy subnetting
Easy subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 

Recently uploaded

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 

Recently uploaded (12)

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 

Class B Subnetting

  • 2. IP address = 172.168.0.0 / 19 Subnet mask = 11111111.11111111.11100000.00000000 = 255.255.224.0 No. of Hosts per Network = 213 - 2 = 8192 – 2 = 8190 Block size = 256 – 224 = 32 No. of Networks = 23 = 8
  • 3. 1st Network: 1st Network ID = 172.168.0.0 1st Valid IP address = 172.168.0.1 Last Valid IP address = 172.168.31.254 Broadcast IP address = 172.168.31.255 2nd Network: 2nd Network ID = 172.168.32.0 1st Valid IP address = 172.168.32.1 Last Valid IP address = 172.168.63.254 Broadcast IP address = 172.168.63.255
  • 4. 3rd Network: 3rd Network ID = 172.168.64.0 1st Valid IP address = 172.168.64.1 Last Valid IP address = 172.168.95.254 Broadcast IP address = 172.168.95.255 4th Network: 4th Network ID = 172.168.96.0 1st Valid IP address = 172.168.96.1 Last Valid IP address = 172.168.127.254 Broadcast IP address = 172.168.127.255
  • 5. 5th Network: 5th Network ID = 172.168.128.0 1st Valid IP address = 172.168.128.1 Last Valid IP address = 172.168.159.254 Broadcast IP address = 172.168.159.255 6th Network: 6th Network ID = 172.168.160.0 1st Valid IP address = 172.168.160.1 Last Valid IP address = 172.168.191.254 Broadcast IP address = 172.168.191.255
  • 6. 7th Network: 7th Network ID = 172.168.192.0 1st Valid IP address = 172.168.192.1 Last Valid IP address = 172.168.223.254 Broadcast IP address = 172.168.223.255 8th Network: 8th Network ID = 172.168.224.0 1st Valid IP address = 172.168.224.1 Last Valid IP address = 172.168.255.254 Broadcast IP address = 172.168.255.255