SlideShare a Scribd company logo
1 of 30
Mahmmoud Mahdi
 Allows you to take one larger network and
  break it into a bunch of smaller networks.
 benefits:
  Reduced network traffic
  Optimized network performance
  Simplified management
  Facilitated spanning of large geographical
   distances
192.168.2.1   192.168.3.1




              192.168.3.2




192.168.2.2
              192.168.3.3
    A 32-bit value that allows the recipient of IP packets
    to distinguish between:
     The network ID portion of the IP address.
     The host ID portion of the IP address.
   The 1s in the subnet mask represent:
     the positions that refer to the network or subnet
      addresses.
   Not all networks need subnets:
     meaning they use the default subnet mask.
     These default masks cannot change.
      ▪ Class A network, you can’t change the first byte in a subnet mask;
        it must read 255.0.0.0 at a minimum.
      ▪ Class B: start with 255.255.0.0
      ▪ Class C: start with 255.255.255.0.
Class B address
                  Class B address

      Network address       Host address

               130.57.
                130.57.     1.56
                             1.56


1000 0010. 0011 1001.
 1000 0010. 0011 1001.       0000 0001. 0011 1000
                              0000 0001. 0011 1000


      Class B address with aasubnet address
       Class B address with subnet address

      Network address         Subnet   Host address


1000 0010. 0011 1001.
 1000 0010. 0011 1001.        0000 0001. 0011 1000
                               0000 0001. 0011 1000
 To create subnet:
  Take bits from the host portion of the IP address
   and reserve them to define the subnet address.
  This means fewer bits for hosts, so the more
   subnets, the fewer bits available for defining
   hosts.
192.168.2.1
                     255.255.255.0

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0

       192.168.2.1/24 (CIDR notation)


                 1 network                28-2=254
                                          addresses
192.168.2.32    192.168.2.128
                              192.168.2.1   192.168.2.64
                                            192.168.2.96
                                                            192.168.2.160
                                                            192.168.2.192
                                            192.168.2.128   192.168.2.234
                        255.255.255.224           23=8subnets



1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0

      192.168.2.1/27 (CIDR notation)

                                                       25-2=30
                       network                         addresses
 CIDR creates a hierarchical addressing
  structure by breaking the network address
  space into CIDR blocks
 CIDR notation:
  describes a network by specifying the base
   address and the number of bits used for the
   network portion
  i.e., 10.0.0.0/8
   ▪ a network using 24 bits for host numbering
   ▪ a maximum of 224 -2 possible host addresses.
 Method that ISPs use to allocate a number of
 addresses to a company, a home—a customer.
 192.168.10.32/28:
   Telling you what your subnet mask is.
   The slash notation (/)
    ▪ how many bits are turned on (1s).
 Keep in Mind:
   the largest subnet mask available (regardless of the
   class of address) can only be a /30.
    ▪ you’ve got to keep at least 2 bits for host bits.
 Example:
  A Class A default subnet mask:
   ▪ which is 255.0.0.0
     ▪ This means that the first byte of the subnet mask is all ones (1s), or
       11111111.
   ▪ A slash notation:
     ▪ you need to count all the 1s bits to figure out your mask.
   ▪ The 255.0.0.0 is considered a /8
  A Class B default mask:
   ▪ 255.255.0.0
     ▪ which is a /16 because 16 bits are ones (1s):
       11111111.11111111.00000000.00000000.
Network Class   Starting    Ending Address    CIDR    Bitmask
                Address                       Block
Class A         0.0.0.0     127.255.255.255   /8      255.0.0.0
Class B         128.0.0.0   191.255.255.255   /16     255.255.0.0
Class C         192.0.0.0   223.255.255.255   /24     255.255.255.0
Class D         224.0.0.0   239.255.255.251   /4
(multicast)
Class E         240.0.0.0   255.255.255.255   /4
(reserved)
Subnet Mask     CIDR Value   Subnet Mask       CIDR Value
255.0.0.0       /8           255.255.240.0     /20
255.128.0.0     /9           255.255.248.0     /21
255.192.0.0     /10          255.255.252.0     /22
255.224.0.0     /11          255.255.254.0     /23
255.240.0.0     /12          255.255.255.0     /24
255.248.0.0     /13          255.255.255.128   /25
255.252.0.0     /14          255.255.255.192   /26
255.254.0.0     /15          255.255.255.224   /27
255.255.0.0     /16          255.255.255.240   /28
255.255.128.0   /17          255.255.255.248   /29
255.255.192.0   /18          255.255.255.252   /30
255.255.224.0   /19
 The /8 through /15
   can only be used with Class A network addresses.
 The /16 through /23
   can be used by Class A and B network addresses.
 The /24 through /30
   can be used by Class A, B, and C network addresses.
 This is a big reason why most companies use
 Class A network addresses.
   Since they can use all subnet masks, they get the
   maximum flexibility in network design.
 Class C address, only 8 bits are available for defining
  the hosts.
 Class C subnet masks can be the following:
   Binary           Decimal          CIDR
   00000000         =0               /24
   10000000         = 128            /25
   11000000         = 192            /26
   11100000         = 224            /27
   11110000         = 240            /28
   11111000         = 248            /29
   11111100         = 252            /30
  ▪ We can’t use a /31 or /32 because we have to have at least 2
    host bits for assigning IP addresses to hosts.
 2x= number of subnets.
  ▪ x is the number of masked bits, or the 1s.
 For example:
  ▪ in 11000000, the number of 1s gives us 22 subnets.
  ▪ In this example, there are 4 subnets.
 2y – 2 = number of hosts per subnet.
  ▪ y is the number of unmasked bits, or the 0s.
 Example:
  ▪ in 11000000, the number of 0s gives us 26 – 2 hosts.
  ▪ In this example, there are 62 hosts per subnet.
  ▪ You need to subtract 2 for the subnet address and the
    broadcast address, which are not valid hosts.
 256 – subnet mask = block size, or increment
  number.
 Ex: 256 – 192 = 64:
  ▪ The block size of a 192 mask is always 64.
  ▪ Start counting at zero in blocks of 64 until you reach
    the subnet mask value.
    ▪ 0, 64, 128, 192.
 The broadcast address is always the number
  right before the next subnet.
 Example:
  ▪ The 0 subnet has a broadcast address of 63
    ▪ Because: the next subnet is 64.
  ▪ The 64 subnet has a broadcast address of 127
    ▪ because the next subnet is 128. And so on.
 Remember: the broadcast address of the last
 subnet is always 255.
 The numbers between the subnets, omitting the
  all 0s and all 1s.
  ▪ it’s always the numbers between the subnet address
    and the broadcast address.
 Example:
  ▪ if 64 is the subnet number and 127 is the broadcast
    address,
  ▪ then 65–126 is the valid host range.
 Subnet the Class C network address
 255.255.255.128 (/25)
  192.168.10.0 = Network address
  255.255.255.128 = Subnet mask
Subnet       192.168.10.0   192.168.10.128
First host   192.168.10.1   192.168.10.129
Last host    192.168.10.126 192.168.10.254
Broadcast    192.168.10.127 192.168.10.255
Contact Me: qursaan@yahoo.com

More Related Content

What's hot

Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_addressrizwanaabassi
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationZakaria Hossain
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
IP Address
IP AddressIP Address
IP AddressRahul P
 

What's hot (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_address
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
Ip address
Ip address Ip address
Ip address
 
Subnetting
SubnettingSubnetting
Subnetting
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip address
Ip addressIp address
Ip address
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
IP Address
IP AddressIP Address
IP Address
 

Viewers also liked

Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan SupernettingZainuddin Kurnia
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1Anant Lodha
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementKanishka Gopal
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)crm2life
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing PrintersMahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing FilesMahmmoud Mahdi
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing AMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Windump
WindumpWindump
Windumpjk847
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise SystemsSaurabh Goel
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemTushar B Kute
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning pptShivani Garg
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol AMahmmoud Mahdi
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planningAmit Singh
 

Viewers also liked (20)

Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan Supernetting
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Windump
WindumpWindump
Windump
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning ppt
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
 

Similar to Lesson 2: Subnetting basics

Subnetting class
Subnetting classSubnetting class
Subnetting classFTC
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingneclinux
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 

Similar to Lesson 2: Subnetting basics (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Day03
Day03 Day03
Day03
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Assignment 1 iap
Assignment 1 iapAssignment 1 iap
Assignment 1 iap
 
Mod6
Mod6Mod6
Mod6
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 

More from Mahmmoud Mahdi

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptMahmmoud Mahdi
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge labMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionMahmmoud Mahdi
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsMahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 

More from Mahmmoud Mahdi (6)

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup script
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge lab
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Lesson 2: Subnetting basics

  • 2.  Allows you to take one larger network and break it into a bunch of smaller networks.  benefits:  Reduced network traffic  Optimized network performance  Simplified management  Facilitated spanning of large geographical distances
  • 3. 192.168.2.1 192.168.3.1 192.168.3.2 192.168.2.2 192.168.3.3
  • 4. A 32-bit value that allows the recipient of IP packets to distinguish between:  The network ID portion of the IP address.  The host ID portion of the IP address.  The 1s in the subnet mask represent:  the positions that refer to the network or subnet addresses.  Not all networks need subnets:  meaning they use the default subnet mask.  These default masks cannot change. ▪ Class A network, you can’t change the first byte in a subnet mask; it must read 255.0.0.0 at a minimum. ▪ Class B: start with 255.255.0.0 ▪ Class C: start with 255.255.255.0.
  • 5.
  • 6.
  • 7. Class B address Class B address Network address Host address 130.57. 130.57. 1.56 1.56 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000 Class B address with aasubnet address Class B address with subnet address Network address Subnet Host address 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000
  • 8.  To create subnet:  Take bits from the host portion of the IP address and reserve them to define the subnet address.  This means fewer bits for hosts, so the more subnets, the fewer bits available for defining hosts.
  • 9.
  • 10.
  • 11. 192.168.2.1 255.255.255.0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 192.168.2.1/24 (CIDR notation) 1 network 28-2=254 addresses
  • 12. 192.168.2.32 192.168.2.128 192.168.2.1 192.168.2.64 192.168.2.96 192.168.2.160 192.168.2.192 192.168.2.128 192.168.2.234 255.255.255.224 23=8subnets 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 192.168.2.1/27 (CIDR notation) 25-2=30 network addresses
  • 13.  CIDR creates a hierarchical addressing structure by breaking the network address space into CIDR blocks  CIDR notation:  describes a network by specifying the base address and the number of bits used for the network portion  i.e., 10.0.0.0/8 ▪ a network using 24 bits for host numbering ▪ a maximum of 224 -2 possible host addresses.
  • 14.  Method that ISPs use to allocate a number of addresses to a company, a home—a customer.  192.168.10.32/28:  Telling you what your subnet mask is.  The slash notation (/) ▪ how many bits are turned on (1s).  Keep in Mind:  the largest subnet mask available (regardless of the class of address) can only be a /30. ▪ you’ve got to keep at least 2 bits for host bits.
  • 15.  Example:  A Class A default subnet mask: ▪ which is 255.0.0.0 ▪ This means that the first byte of the subnet mask is all ones (1s), or 11111111. ▪ A slash notation: ▪ you need to count all the 1s bits to figure out your mask. ▪ The 255.0.0.0 is considered a /8  A Class B default mask: ▪ 255.255.0.0 ▪ which is a /16 because 16 bits are ones (1s): 11111111.11111111.00000000.00000000.
  • 16. Network Class Starting Ending Address CIDR Bitmask Address Block Class A 0.0.0.0 127.255.255.255 /8 255.0.0.0 Class B 128.0.0.0 191.255.255.255 /16 255.255.0.0 Class C 192.0.0.0 223.255.255.255 /24 255.255.255.0 Class D 224.0.0.0 239.255.255.251 /4 (multicast) Class E 240.0.0.0 255.255.255.255 /4 (reserved)
  • 17. Subnet Mask CIDR Value Subnet Mask CIDR Value 255.0.0.0 /8 255.255.240.0 /20 255.128.0.0 /9 255.255.248.0 /21 255.192.0.0 /10 255.255.252.0 /22 255.224.0.0 /11 255.255.254.0 /23 255.240.0.0 /12 255.255.255.0 /24 255.248.0.0 /13 255.255.255.128 /25 255.252.0.0 /14 255.255.255.192 /26 255.254.0.0 /15 255.255.255.224 /27 255.255.0.0 /16 255.255.255.240 /28 255.255.128.0 /17 255.255.255.248 /29 255.255.192.0 /18 255.255.255.252 /30 255.255.224.0 /19
  • 18.  The /8 through /15  can only be used with Class A network addresses.  The /16 through /23  can be used by Class A and B network addresses.  The /24 through /30  can be used by Class A, B, and C network addresses.  This is a big reason why most companies use Class A network addresses.  Since they can use all subnet masks, they get the maximum flexibility in network design.
  • 19.  Class C address, only 8 bits are available for defining the hosts.  Class C subnet masks can be the following: Binary Decimal CIDR 00000000 =0 /24 10000000 = 128 /25 11000000 = 192 /26 11100000 = 224 /27 11110000 = 240 /28 11111000 = 248 /29 11111100 = 252 /30 ▪ We can’t use a /31 or /32 because we have to have at least 2 host bits for assigning IP addresses to hosts.
  • 20.
  • 21.
  • 22.  2x= number of subnets. ▪ x is the number of masked bits, or the 1s.  For example: ▪ in 11000000, the number of 1s gives us 22 subnets. ▪ In this example, there are 4 subnets.
  • 23.  2y – 2 = number of hosts per subnet. ▪ y is the number of unmasked bits, or the 0s.  Example: ▪ in 11000000, the number of 0s gives us 26 – 2 hosts. ▪ In this example, there are 62 hosts per subnet. ▪ You need to subtract 2 for the subnet address and the broadcast address, which are not valid hosts.
  • 24.  256 – subnet mask = block size, or increment number.  Ex: 256 – 192 = 64: ▪ The block size of a 192 mask is always 64. ▪ Start counting at zero in blocks of 64 until you reach the subnet mask value. ▪ 0, 64, 128, 192.
  • 25.  The broadcast address is always the number right before the next subnet.  Example: ▪ The 0 subnet has a broadcast address of 63 ▪ Because: the next subnet is 64. ▪ The 64 subnet has a broadcast address of 127 ▪ because the next subnet is 128. And so on.  Remember: the broadcast address of the last subnet is always 255.
  • 26.  The numbers between the subnets, omitting the all 0s and all 1s. ▪ it’s always the numbers between the subnet address and the broadcast address.  Example: ▪ if 64 is the subnet number and 127 is the broadcast address, ▪ then 65–126 is the valid host range.
  • 27.  Subnet the Class C network address 255.255.255.128 (/25)  192.168.10.0 = Network address  255.255.255.128 = Subnet mask
  • 28.
  • 29. Subnet 192.168.10.0 192.168.10.128 First host 192.168.10.1 192.168.10.129 Last host 192.168.10.126 192.168.10.254 Broadcast 192.168.10.127 192.168.10.255