SlideShare a Scribd company logo
1 of 14
IPAddressing and
Subnetting
Ali Nezhad
2
Outline
• Introduction
• IP Address Format
• Routing
– Classful
– Classless
• IP Subnetting
• VLSM
• Summary
3
Introduction
Node 4
Node 2
Node 3Node 1
Router 3
Router 2
Router 1
Router 4
Every communication device needs an address.
4
IP Address Format
01111111.00001010.00010100.10000010
127 . 10 . 20 . 130
00000000binary= 0decimal
11111111binary= 255decimal
5
Packet Routing
212.10.12.14
121.30.112.24
212.10.12.14 DATA
SA
121.30.112.24
DA
6
Classful Addressing
121. 30.112.24
011101001. 00011110.01110000.00011000
Network ID Host ID
Class Pattern 1st
Octet #addresses/net
A x.x.x.x 1 – 127 2563
B x.X.x.x 128- 191 2562
C x.X.X.x 192 - 223 256
7
Classless Addressing
• Allows for breaking up of a classful address range.
• Helps conserve IP addresses.
• Important for network segmentation
8
Subnetting
xxxxxxxx. xxxx xxxx.xxxxxxxx.xxxxxxxx
Network ID Host ID
xxxxxxxx. xxxx.xxxxxxxx.xxxxxxxxxxxx
• 4 bits are borrowed.
• 24
= 16 subnets are available
• #addresses per subnet = 220
9
1111
xxxx xxxx.xxxxxxxx.xxxxxxxx
Subnet Mask
AND
xxxxxxxx.IP Address
1111 1111. 0000.00000000.00000000Subnet Mask
xxxxxxxx. xxxx 0000.00000000.00000000Subnet ID
• CIDR Notation (Classless Inter-Domain Routing)
- Specifies the length of the network portion with a number after a slash (/).
•Example Address: 192.168.129.10/18
The subnet mask equivalent to this CIDR notation is 255.255.192.0
The subnet ID is calculated as:
192.168.129.10 AND 255.255.192.0 = 192.168.128.0
10
VLSM (Variable Length Subnet Masks)
• Custom subnet masks generate subnets that are all of the
same size.
– Note: Subnet masks associated with the A, B and C classes are
called default subnet masks.
• This limitation still results in the wastage of addresses.
• Example: A class C network can be divided into 4
subnets each accommodating 62 hosts. On a subnet that
requires only 2 hosts, 60 addresses will be wasted.
• VLSM prevents this by allowing recursive subnetting.
11
VLSM
Example: Given the IP address of 196.220.10.0/24, propose an addressing
scheme to accommodate three subnets with 2, 30 and 100 hosts.
Solution: The host portion is initially 8 bits long which supports 254 hosts.
Order the subnets in a decreasing number of hosts: Net1: 100, Net2: 30, Net3:
2
Net1: 100 hosts  Requires 128 = 27
addresses borrow 1 bit  2 subnets
are available, new CIDR prefix = /25 , BS= 128
196.220.10. x | 000 0000
Subnet ID#1: x=0  196.220.10.0/25 (196.220.10.1 to 196.220.10.127)
Assign this subnet to Net1.
Subnet ID#2: x=1  196.220.10.128/25 (196.220.10.127 to 196.220.10.255)
Break this down further for other subnets.
12
VLSM (IP address assignments)
Majer Network Original subnets VLSM (L1) VLSM (L2) Assignment
196.220.10.0/24 196.220.10.0//25 Net1
196.220.10.128/25 196.220.10.128/2
7
Net2
196.220.10.160/2
7
Reserved
196.220.10.192/2
7
Reserved
196.220.10.224/2
7
196.220.10.224/3
0
Net3
196.220.10.228/3
0
Reserved
196.220.10.232/3
0
Reserved
196.220.10.236/3
0
Reserved
196.220.10.240/3
0
Reserved
196.220.10.244/3 Reserved
13
Summary
• IP addressing techniques are used to
segment a given address range.
• Segmentation results in IP address
conservation, security and better
performance.
14
Questions

More Related Content

What's hot

Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Irsandi Hasan
 
Subnetting
SubnettingSubnetting
Subnetting
swascher
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
swascher
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
Ahmed Sultan
 

What's hot (20)

IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptx
 
DIRECCIONAMIENTO IP: IPv4 y IPv6
DIRECCIONAMIENTO  IP: IPv4 y IPv6DIRECCIONAMIENTO  IP: IPv4 y IPv6
DIRECCIONAMIENTO IP: IPv4 y IPv6
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Subnetting
SubnettingSubnetting
Subnetting
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basic
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Ip address
Ip addressIp address
Ip address
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
Chapter 20 : access control lists
Chapter 20 : access control listsChapter 20 : access control lists
Chapter 20 : access control lists
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
 

Viewers also liked

Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routing
Anand Dhouni
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
Hattori Sidek
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
welcometofacebook
 

Viewers also liked (20)

Classful ip address (ip address picture book 4 from visual land animations)
Classful ip address (ip address picture book 4 from visual land animations)Classful ip address (ip address picture book 4 from visual land animations)
Classful ip address (ip address picture book 4 from visual land animations)
 
Dynamic Vs Static
Dynamic Vs StaticDynamic Vs Static
Dynamic Vs Static
 
Dynamic vs static
Dynamic vs staticDynamic vs static
Dynamic vs static
 
Dynamic vs static stretching
Dynamic vs static stretchingDynamic vs static stretching
Dynamic vs static stretching
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
 
CCNA part 2 ip addressing
CCNA part 2 ip addressingCCNA part 2 ip addressing
CCNA part 2 ip addressing
 
C++ Language
C++ LanguageC++ Language
C++ Language
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routing
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
Discrete Mathematics Presentation
Discrete Mathematics PresentationDiscrete Mathematics Presentation
Discrete Mathematics Presentation
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Chapter 19: Logical Addressing
Chapter 19: Logical AddressingChapter 19: Logical Addressing
Chapter 19: Logical Addressing
 
IP addressing
IP addressingIP addressing
IP addressing
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 

Similar to IP Addressing and subnetting

Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
robertoxe
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
FTC
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
askme
 

Similar to IP Addressing and subnetting (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
1.IPv4.pptx
1.IPv4.pptx1.IPv4.pptx
1.IPv4.pptx
 
Oct. 14, 2011 webcast ch7 subnets bruce hartpence
Oct. 14, 2011 webcast ch7 subnets bruce hartpenceOct. 14, 2011 webcast ch7 subnets bruce hartpence
Oct. 14, 2011 webcast ch7 subnets bruce hartpence
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Ccna ppt
Ccna pptCcna ppt
Ccna ppt
 
VLSM.pptx
VLSM.pptxVLSM.pptx
VLSM.pptx
 
Day 5.5 subnetting
Day 5.5 subnettingDay 5.5 subnetting
Day 5.5 subnetting
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Data Communications and Network -Subnetting
Data Communications and Network -SubnettingData Communications and Network -Subnetting
Data Communications and Network -Subnetting
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
IP Addressing.ppt
IP Addressing.pptIP Addressing.ppt
IP Addressing.ppt
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.ppt
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 

More from Ali Nezhad (6)

Network programming using python
Network programming using pythonNetwork programming using python
Network programming using python
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
converged Networks
converged Networksconverged Networks
converged Networks
 
cnet311 q-bank
cnet311 q-bankcnet311 q-bank
cnet311 q-bank
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 
adhoc network workshop
adhoc network workshopadhoc network workshop
adhoc network workshop
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 

IP Addressing and subnetting

  • 2. 2 Outline • Introduction • IP Address Format • Routing – Classful – Classless • IP Subnetting • VLSM • Summary
  • 3. 3 Introduction Node 4 Node 2 Node 3Node 1 Router 3 Router 2 Router 1 Router 4 Every communication device needs an address.
  • 4. 4 IP Address Format 01111111.00001010.00010100.10000010 127 . 10 . 20 . 130 00000000binary= 0decimal 11111111binary= 255decimal
  • 6. 6 Classful Addressing 121. 30.112.24 011101001. 00011110.01110000.00011000 Network ID Host ID Class Pattern 1st Octet #addresses/net A x.x.x.x 1 – 127 2563 B x.X.x.x 128- 191 2562 C x.X.X.x 192 - 223 256
  • 7. 7 Classless Addressing • Allows for breaking up of a classful address range. • Helps conserve IP addresses. • Important for network segmentation
  • 8. 8 Subnetting xxxxxxxx. xxxx xxxx.xxxxxxxx.xxxxxxxx Network ID Host ID xxxxxxxx. xxxx.xxxxxxxx.xxxxxxxxxxxx • 4 bits are borrowed. • 24 = 16 subnets are available • #addresses per subnet = 220
  • 9. 9 1111 xxxx xxxx.xxxxxxxx.xxxxxxxx Subnet Mask AND xxxxxxxx.IP Address 1111 1111. 0000.00000000.00000000Subnet Mask xxxxxxxx. xxxx 0000.00000000.00000000Subnet ID • CIDR Notation (Classless Inter-Domain Routing) - Specifies the length of the network portion with a number after a slash (/). •Example Address: 192.168.129.10/18 The subnet mask equivalent to this CIDR notation is 255.255.192.0 The subnet ID is calculated as: 192.168.129.10 AND 255.255.192.0 = 192.168.128.0
  • 10. 10 VLSM (Variable Length Subnet Masks) • Custom subnet masks generate subnets that are all of the same size. – Note: Subnet masks associated with the A, B and C classes are called default subnet masks. • This limitation still results in the wastage of addresses. • Example: A class C network can be divided into 4 subnets each accommodating 62 hosts. On a subnet that requires only 2 hosts, 60 addresses will be wasted. • VLSM prevents this by allowing recursive subnetting.
  • 11. 11 VLSM Example: Given the IP address of 196.220.10.0/24, propose an addressing scheme to accommodate three subnets with 2, 30 and 100 hosts. Solution: The host portion is initially 8 bits long which supports 254 hosts. Order the subnets in a decreasing number of hosts: Net1: 100, Net2: 30, Net3: 2 Net1: 100 hosts  Requires 128 = 27 addresses borrow 1 bit  2 subnets are available, new CIDR prefix = /25 , BS= 128 196.220.10. x | 000 0000 Subnet ID#1: x=0  196.220.10.0/25 (196.220.10.1 to 196.220.10.127) Assign this subnet to Net1. Subnet ID#2: x=1  196.220.10.128/25 (196.220.10.127 to 196.220.10.255) Break this down further for other subnets.
  • 12. 12 VLSM (IP address assignments) Majer Network Original subnets VLSM (L1) VLSM (L2) Assignment 196.220.10.0/24 196.220.10.0//25 Net1 196.220.10.128/25 196.220.10.128/2 7 Net2 196.220.10.160/2 7 Reserved 196.220.10.192/2 7 Reserved 196.220.10.224/2 7 196.220.10.224/3 0 Net3 196.220.10.228/3 0 Reserved 196.220.10.232/3 0 Reserved 196.220.10.236/3 0 Reserved 196.220.10.240/3 0 Reserved 196.220.10.244/3 Reserved
  • 13. 13 Summary • IP addressing techniques are used to segment a given address range. • Segmentation results in IP address conservation, security and better performance.