SlideShare a Scribd company logo
Why Subnet?
• To break the network down into pieces, each of
which can be addressed separately.
• Controls network traffic
• Reduces broadcasts
• Can provide low level security with access lists on the
router
• Organization of IP address space
Subnetting a Default Class C
Network Address: 200.129.41.0
• Default Class C address is divided into network and
host portions as follows:
N . N . N . H
• To subnet we “borrow” bits from the host portion
of the address (8 bits for Class C)
N . N . N . x x x x x x x x
• Borrowing n bits yields 2n
– 2 subnets.
• Leaving n bits yields 2n
– 2 hosts.
• For a class C, we can borrow from 2 to 6 bits.
• Why not 1 bit? (How many usable subnets?)
• Why not 7 bits? (How many usable hosts?)
Subnetting a Default Class C
Network Address: 200.129.41.0
• Suppose we need 14 usable subnets, how many
bits do we borrow?
• Remember, borrowing n bits give us:
• 2n
– 2 subnets
• Try borrowing 3 bits (n = 3):
• 23
– 2 = 8 – 2
= 6 usable subnets (not enough)
• Try borrowing 4 bits
• 24
– 2 = 16 – 2
= 14 usable subnets (enough)
Subnetting a Default Class C
Network Address: 200.129.41.0
• Write it with the network octet in binary:
200.129.41.0000 0000
breakhere
• Borrowing 4 bits yields 14 usable subnets
• How many usable hosts per subnet?
• Same formula as subnets (2n
– 2)
• 4 host bits (n = 4)
• 24
– 2 = 16 – 2
= 14 usable hosts per subnet
subnet bits host bits
Subnetting a Default Class C
Network Address: 200.129.41.0
• Examples:
• First usable 200.129.41.0001 ^ 0000
subnet address: 200.129.41.16
• First usable host 200.129.41.0001 ^ 0001
on the first subnet: 200.129.41.17
• Second usable host 200.129.41.0001 ^ 0010
on the first subnet: 200.129.41.18
.
.
.
• Last usable host 200.129.41.0001 ^ 1110
on the first subnet: 200.129.41.30
• Broadcast address 200.129.41.0001 ^ 1111
for the first subnet: 200.129.41.31
Subnetting a Default Class C
Network Address: 200.129.41.0
• Examples:
• Second usable 200.129.41.0010 ^ 0000
subnet address: 200.129.41.32
• Third usable 200.129.41.0011 ^ 0000
subnet address: 200.129.41.48
• Fourth usable 200.129.41.0100 ^ 0000
subnet address: 200.129.41.64
.
.
.
• Last usable 200.129.41.1110 ^ 0000
subnet address: 200.129.41.224
The Subnet Mask: How the
Router Determines the Subnet
• The subnet mask (in binary) has:
• all ones in the network and subnet portion of the
address
• all zeros in the host potion of the address
• The subnet mask for the previous example is:
255.255.255. 240
255.255.255. 1111^ 0000 (128 + 64 + 32 + 16 =240)
• ANDing this mask with any valid host address on the
network will always yield the subnet address for that
host, where if both bits are 1 you get a 1 otherwise its a 0.
The Subnet Mask: How the
Router Determines the Subnet
• Example (our subnet mask is 255.255.255.240)
IP host address: 200.129. 41.23
Last octet to binary: 200.129. 41.0001 0111
AND subnet mask: 255.255.255.1111 0000
200.129. 41.0001 0000
Subnet Address: 200.129. 41.16
So the host address 200.129. 41.23 is on the
200.129.41.16 subnet.
Subnetting a Default Class B
Network Address: 132.178.0.0
• Default Class B address is divided into network and
host portions as follows:
N . N . H . H
• To subnet we “borrow” bits from the host portion
of the address (16 bits for Class B)
N . N . x x x x x x x x . x x x x x x x x
• For a class B, we can borrow from 2 to 14 bits.
Subnetting a Default Class B
Network Address: 132.178.0.0
• Suppose we need 80 usable subnets, how many
bits do we borrow?
• Remember, borrowing n bits give us:
• 2n
– 2 subnets
• Try borrowing 6 bits (n = 6):
• 26
– 2 = 64 – 2
= 62 usable subnets (not enough)
• Try borrowing 7 bits
• 27
– 2 = 128 – 2
= 126 usable subnets (enough)
Subnetting a Default Class B
Network Address: 132.178.0.0
• Write it with the network octets in binary:
132.178.0000000 0.00000000
breakhere
• Borrowing 7 bits yields 126 usable subnets
• How many usable hosts per subnet?
• Same formula as subnets (2n
– 2)
• 9 host bits (n = 9)
• 29
– 2 = 512 – 2
= 510 usable hosts per subnet
subnet bits host bits
Subnetting a Default Class B
Network Address: 132.178.0.0
• Examples:
• First usable 132.178.0000001 ^ 0.00000000
subnet address: 132.178.2.0
• First usable host 132.178.0000001 ^ 0.00000001
on the first subnet: 132.178.2.1
• Second usable host 132.178.0000001 ^ 0.00000010
on the first subnet: 132.178.2.2
.
.
.
• Last usable host 132.178.0000001 ^ 1.11111110
on the first subnet: 132.178.3.254
• Broadcast address 132.178.0000001 ^1.11111111
for the first subnet: 132.178.3.255
Subnetting a Default Class B
Network Address: 132.178.0.0
• Examples:
• Second usable 132.178.0000010 ^ 0.00000000
subnet address: 132.178.4.0
• Third usable 132.178.0000011 ^ 0.00000000
subnet address: 132.178.6.0
.
.
.
• Ninety-first usable 132.178.1011011 ^ 0.00000000
subnet address: 132.178.182.0
.
.
.
• Last usable 132.178.1111110 ^ 0.00000000
subnet address: 132.178.252.0
Subnetting a Default Class B
Network Address: 132.178.0.0
• The subnet mask for this example is:
255.255.254.0
255.255.1111111 ^ 0.00000000
• ANDing this mask with any valid host address on
this network will always yield the subnet address.
• Where if both bits are 1 you get a 1 otherwise its a
0.
Subnetting a Default Class B
Network Address: 132.178.0.0
• Example:
IP host address: 132.178.119.112
Last octets to binary: 132.178.0111011 ^ 1.01110000
AND subnet mask: 255.255.1111111 ^ 0.00000000
132.178.0111011 ^ 0.00000000
Subnet Address: 132.178.118.0
Subnetting

More Related Content

What's hot

Subnetting
SubnettingSubnetting
Subnetting
Kishore Kumar
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
Monsur Ahmed Shafiq
 
I Have the Power(View)
I Have the Power(View)I Have the Power(View)
I Have the Power(View)
Will Schroeder
 
Beyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL ServerBeyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL Server
Scott Sutherland
 
Client side attacks using PowerShell
Client side attacks using PowerShellClient side attacks using PowerShell
Client side attacks using PowerShell
Nikhil Mittal
 
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
David Brossard
 
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active DirectoryThe Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
Will Schroeder
 
Vyos clustering ipsec
Vyos clustering ipsecVyos clustering ipsec
Vyos clustering ipsec
Gireesh Hariharasubramony
 
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
CODE BLUE
 
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
DirkjanMollema
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
singhsukdeep
 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Nikhil Mittal
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
Shahzad Rashid
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
Eslam Abdou
 
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...
Salem Trabelsi
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
Will Schroeder
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
 
aclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHoundaclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHound
DirkjanMollema
 

What's hot (20)

lab1
lab1lab1
lab1
 
Subnetting
SubnettingSubnetting
Subnetting
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
I Have the Power(View)
I Have the Power(View)I Have the Power(View)
I Have the Power(View)
 
Beyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL ServerBeyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL Server
 
Client side attacks using PowerShell
Client side attacks using PowerShellClient side attacks using PowerShell
Client side attacks using PowerShell
 
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
 
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active DirectoryThe Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
 
Vyos clustering ipsec
Vyos clustering ipsecVyos clustering ipsec
Vyos clustering ipsec
 
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...[cb22]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
[cb22] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Da...
 
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
aclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHoundaclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHound
 

Viewers also liked

A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
Sripati Mahapatra
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
INTEGRATED CIRCUIT
INTEGRATED CIRCUITINTEGRATED CIRCUIT
INTEGRATED CIRCUIT
Sripati Mahapatra
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
Sripati Mahapatra
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
Sripati Mahapatra
 
Subnitting
SubnittingSubnitting
Subnitting
Ramasubbu .P
 
configure IP address in command mode
configure IP address in command modeconfigure IP address in command mode
configure IP address in command mode
Sripati Mahapatra
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
Sripati Mahapatra
 
Processor
ProcessorProcessor
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
Sripati Mahapatra
 
01.number systems
01.number systems01.number systems
01.number systems
Sripati Mahapatra
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav
 
Raid Levels
Raid LevelsRaid Levels
Raid Levels
Sripati Mahapatra
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
mikem801
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 

Viewers also liked (20)

A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
INTEGRATED CIRCUIT
INTEGRATED CIRCUITINTEGRATED CIRCUIT
INTEGRATED CIRCUIT
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Subnitting
SubnittingSubnitting
Subnitting
 
configure IP address in command mode
configure IP address in command modeconfigure IP address in command mode
configure IP address in command mode
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
Storage device
Storage deviceStorage device
Storage device
 
Processor
ProcessorProcessor
Processor
 
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
 
01.number systems
01.number systems01.number systems
01.number systems
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Raid Levels
Raid LevelsRaid Levels
Raid Levels
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Similar to Subnetting

A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjay
sanjay kushwaha
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
aakritii765
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Subnetting
SubnettingSubnetting
Subnetting
Fatima Qayyum
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
Kishore Kumar
 
Subnetting
SubnettingSubnetting
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
AnusuaBasu
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
ZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
ZahouAmel1
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
Mahmmoud Mahdi
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
Fixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptxFixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptx
Shaqib3
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
Vivek chan
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
JAIGANESH SEKAR
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
monujangir2
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
Krishna Mohan
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 

Similar to Subnetting (20)

A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjay
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
Fixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptxFixed Length Subnetting about ip address.pptx
Fixed Length Subnetting about ip address.pptx
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Subnetting

  • 1.
  • 2. Why Subnet? • To break the network down into pieces, each of which can be addressed separately. • Controls network traffic • Reduces broadcasts • Can provide low level security with access lists on the router • Organization of IP address space
  • 3. Subnetting a Default Class C Network Address: 200.129.41.0 • Default Class C address is divided into network and host portions as follows: N . N . N . H • To subnet we “borrow” bits from the host portion of the address (8 bits for Class C) N . N . N . x x x x x x x x • Borrowing n bits yields 2n – 2 subnets. • Leaving n bits yields 2n – 2 hosts. • For a class C, we can borrow from 2 to 6 bits. • Why not 1 bit? (How many usable subnets?) • Why not 7 bits? (How many usable hosts?)
  • 4. Subnetting a Default Class C Network Address: 200.129.41.0 • Suppose we need 14 usable subnets, how many bits do we borrow? • Remember, borrowing n bits give us: • 2n – 2 subnets • Try borrowing 3 bits (n = 3): • 23 – 2 = 8 – 2 = 6 usable subnets (not enough) • Try borrowing 4 bits • 24 – 2 = 16 – 2 = 14 usable subnets (enough)
  • 5. Subnetting a Default Class C Network Address: 200.129.41.0 • Write it with the network octet in binary: 200.129.41.0000 0000 breakhere • Borrowing 4 bits yields 14 usable subnets • How many usable hosts per subnet? • Same formula as subnets (2n – 2) • 4 host bits (n = 4) • 24 – 2 = 16 – 2 = 14 usable hosts per subnet subnet bits host bits
  • 6. Subnetting a Default Class C Network Address: 200.129.41.0 • Examples: • First usable 200.129.41.0001 ^ 0000 subnet address: 200.129.41.16 • First usable host 200.129.41.0001 ^ 0001 on the first subnet: 200.129.41.17 • Second usable host 200.129.41.0001 ^ 0010 on the first subnet: 200.129.41.18 . . . • Last usable host 200.129.41.0001 ^ 1110 on the first subnet: 200.129.41.30 • Broadcast address 200.129.41.0001 ^ 1111 for the first subnet: 200.129.41.31
  • 7. Subnetting a Default Class C Network Address: 200.129.41.0 • Examples: • Second usable 200.129.41.0010 ^ 0000 subnet address: 200.129.41.32 • Third usable 200.129.41.0011 ^ 0000 subnet address: 200.129.41.48 • Fourth usable 200.129.41.0100 ^ 0000 subnet address: 200.129.41.64 . . . • Last usable 200.129.41.1110 ^ 0000 subnet address: 200.129.41.224
  • 8. The Subnet Mask: How the Router Determines the Subnet • The subnet mask (in binary) has: • all ones in the network and subnet portion of the address • all zeros in the host potion of the address • The subnet mask for the previous example is: 255.255.255. 240 255.255.255. 1111^ 0000 (128 + 64 + 32 + 16 =240) • ANDing this mask with any valid host address on the network will always yield the subnet address for that host, where if both bits are 1 you get a 1 otherwise its a 0.
  • 9. The Subnet Mask: How the Router Determines the Subnet • Example (our subnet mask is 255.255.255.240) IP host address: 200.129. 41.23 Last octet to binary: 200.129. 41.0001 0111 AND subnet mask: 255.255.255.1111 0000 200.129. 41.0001 0000 Subnet Address: 200.129. 41.16 So the host address 200.129. 41.23 is on the 200.129.41.16 subnet.
  • 10. Subnetting a Default Class B Network Address: 132.178.0.0 • Default Class B address is divided into network and host portions as follows: N . N . H . H • To subnet we “borrow” bits from the host portion of the address (16 bits for Class B) N . N . x x x x x x x x . x x x x x x x x • For a class B, we can borrow from 2 to 14 bits.
  • 11. Subnetting a Default Class B Network Address: 132.178.0.0 • Suppose we need 80 usable subnets, how many bits do we borrow? • Remember, borrowing n bits give us: • 2n – 2 subnets • Try borrowing 6 bits (n = 6): • 26 – 2 = 64 – 2 = 62 usable subnets (not enough) • Try borrowing 7 bits • 27 – 2 = 128 – 2 = 126 usable subnets (enough)
  • 12. Subnetting a Default Class B Network Address: 132.178.0.0 • Write it with the network octets in binary: 132.178.0000000 0.00000000 breakhere • Borrowing 7 bits yields 126 usable subnets • How many usable hosts per subnet? • Same formula as subnets (2n – 2) • 9 host bits (n = 9) • 29 – 2 = 512 – 2 = 510 usable hosts per subnet subnet bits host bits
  • 13. Subnetting a Default Class B Network Address: 132.178.0.0 • Examples: • First usable 132.178.0000001 ^ 0.00000000 subnet address: 132.178.2.0 • First usable host 132.178.0000001 ^ 0.00000001 on the first subnet: 132.178.2.1 • Second usable host 132.178.0000001 ^ 0.00000010 on the first subnet: 132.178.2.2 . . . • Last usable host 132.178.0000001 ^ 1.11111110 on the first subnet: 132.178.3.254 • Broadcast address 132.178.0000001 ^1.11111111 for the first subnet: 132.178.3.255
  • 14. Subnetting a Default Class B Network Address: 132.178.0.0 • Examples: • Second usable 132.178.0000010 ^ 0.00000000 subnet address: 132.178.4.0 • Third usable 132.178.0000011 ^ 0.00000000 subnet address: 132.178.6.0 . . . • Ninety-first usable 132.178.1011011 ^ 0.00000000 subnet address: 132.178.182.0 . . . • Last usable 132.178.1111110 ^ 0.00000000 subnet address: 132.178.252.0
  • 15. Subnetting a Default Class B Network Address: 132.178.0.0 • The subnet mask for this example is: 255.255.254.0 255.255.1111111 ^ 0.00000000 • ANDing this mask with any valid host address on this network will always yield the subnet address. • Where if both bits are 1 you get a 1 otherwise its a 0.
  • 16. Subnetting a Default Class B Network Address: 132.178.0.0 • Example: IP host address: 132.178.119.112 Last octets to binary: 132.178.0111011 ^ 1.01110000 AND subnet mask: 255.255.1111111 ^ 0.00000000 132.178.0111011 ^ 0.00000000 Subnet Address: 132.178.118.0

Editor's Notes

  1. See page 10 in the workbook and show students what happens with 255 octets in the mask when converted to binary for ANDing.