SlideShare a Scribd company logo
Subnets


Routing within an Organization
Subnet
   Subnets are a subset of the entire
    network
       Networks can be divided into subnets
       Subnets can be divided into subnets
   Each subnet is treated as a separate
    network
       A subnet can be a WAN or LAN
Subnets



    Subnet 1   Subnet 2




   Subnet 3    Subnet 4
Subnet Addresses
   Typical (classed) IP addresses (e.g.
    137.207.32.2) have two parts:
       A network ID (e.g. 137.207.0.0)
       A host ID (e.g. 0.0.32.2)
   A subnetted network will divide the IP
    address differently
       Part of the host ID will be used to specify the
        subnet number
       The network ID and subnet portion of the host
        ID can be considered the subnet ID
Subnet Addresses
   For example, if we want to divide a
    network into 4 subnets, we can use
    the following scheme:
       4 subnets can be represented with 2
        bits (22 = 4)
       For a class B address, which already
        uses 16 bits for the network portion,
        the address would use 18 bits for the
        subnet portion
External Routing with Subnets
   Subnetting is transparent outside an
    organization
       e.g. If subnetting is used in the
        University, routers outside the
        University will not consider subnetting
        at all
       Thus, subnetting is only relevant within
        an organization
Internal Routing with Subnets
   When a packet enters a network
    with subnetting, the routers will
    behave differently
       A route may use the subnet ID
        (network portion + subnet portion,
        followed by zeroes) to determine which
        route to take
Routing with Subnets
 17710 =         ER2
101100012                             Subnet 1
137.207.177.81
                            00
 (137.207.0.0)

                            01
  ER1                  IR             Subnet 2

                            10
                                      Subnet 3

                                 11
            ER3
                                      Subnet 4
Routing with Subnets
 17710 =     ER2
                       12810 =
101100012                                     Subnet 1
                      100000002
                                    00
                  137.207.177.81
                  (137.207.128.0)
                                    01
  ER1                   IR                    Subnet 2

                                    10
                                              Subnet 3

                                         11
            ER3
                                              Subnet 4
Routing with Subnets
       ER2
                                  Subnet 1
                    00


                   01
ER1          IR                   Subnet 2

                    10
                                  Subnet 3
                         137.207.177.81
                        (137.207.177.81)


                        11
      ER3
                                  Subnet 4
Multi-Level Subnets
   A subnet can be divided into
    subnets
       If the first layer of subnetting used 2
        bits for the subnet portion, a second
        layer can be used to subnet within each
        subnet
            Using more bits from the host portion of
             the address
Multi-Level Subnets
                Layer 1     Layer 2


               Subnet 1


                            Subnet 2a


Network 1      Subnet 2

                            Subnet 2b



               Subnet 3
Calculating Subnet IDs
   Calculating the subnet ID is very much
    the same process as calculating a network
    ID (net ID)
       The difference is that typically net IDs are
        calculated using one of the three standard
        subnet masks:
          255.0.0.0 (Class A)

          255.255.0.0 (Class B)

          255.255.255.0 (Class C)

       A subnet ID is calculated using a non-standard
        subnet mask
          e.g. 255.255.192.0 (192
                                    10 = 110000002)
Common Class B Subnet Masks
Subnet Mask            # of Subnets
255.255.192.0          4 (22)
(19210 = 110000002)
255.255.240.0          16 (24)
(24010 = 111100002)
255.255.252.0          64 (26)
(25210 = 111111002)

• Class A and C subnet masks would be similar
CIDR Notation
   A convenient way to specify this kind of
    subnet mask is CIDR addressing
       e.g. 137.207.32.2/255.255.0.0:
        137.207.32.2/16
       e.g. 24.1.2.3/255.0.0.0: 24.1.2.3/8
   The number after the ‘/’ is the number of
    bits that are 1s in the subnet mask
       137.207.177.81/255.255.240.0:
        137.207.177.81/20 (16 bits for network ID + 4
        bits for subnetting)

More Related Content

What's hot

Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
AYESHA JAVED
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
Adeel Rasheed
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
Ip addressing
Ip addressingIp addressing
Ip addressing
sid1322
 
Sub Netting
Sub NettingSub Netting
Sub Netting
Lilesh Pathe
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
IPv4
IPv4IPv4
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
Ritu Ranjan Shrivastwa
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
SangeethaSasi1
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
NetProtocol Xpert
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
Mahmmoud Mahdi
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About it
Asya Karapetyan
 

What's hot (20)

Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Ip address
Ip addressIp address
Ip address
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
IPv4
IPv4IPv4
IPv4
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About it
 
IP addressing
IP addressingIP addressing
IP addressing
 

Viewers also liked

Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnets
tmavroidis
 
Mantenimiento a una Red Alambrica e Inalámbrica, Generación de Reportes
Mantenimiento a una Red Alambrica e Inalámbrica, Generación de ReportesMantenimiento a una Red Alambrica e Inalámbrica, Generación de Reportes
Mantenimiento a una Red Alambrica e Inalámbrica, Generación de ReportesNeovictril
 
Wins, DNS, Dominio y DHCP
Wins, DNS, Dominio y DHCPWins, DNS, Dominio y DHCP
Wins, DNS, Dominio y DHCPNeovictril
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
Subnetting
SubnettingSubnetting
SubnettingLucho1
 
Subnetting
SubnettingSubnetting
Subnetting
javtic
 
Resumen subnetting
Resumen subnettingResumen subnetting
Resumen subnetting
ianchisqueiro
 

Viewers also liked (8)

Splitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 SubnetsSplitting A Class C Network Into 4 Subnets
Splitting A Class C Network Into 4 Subnets
 
Mantenimiento a una Red Alambrica e Inalámbrica, Generación de Reportes
Mantenimiento a una Red Alambrica e Inalámbrica, Generación de ReportesMantenimiento a una Red Alambrica e Inalámbrica, Generación de Reportes
Mantenimiento a una Red Alambrica e Inalámbrica, Generación de Reportes
 
Wins, DNS, Dominio y DHCP
Wins, DNS, Dominio y DHCPWins, DNS, Dominio y DHCP
Wins, DNS, Dominio y DHCP
 
Dirección ip (d)
Dirección  ip (d)Dirección  ip (d)
Dirección ip (d)
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Resumen subnetting
Resumen subnettingResumen subnetting
Resumen subnetting
 

Similar to Subnetting

7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
ZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
ZahouAmel1
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
Shahzad Rashid
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTESofian .
 
Subnetting class C
Subnetting class CSubnetting class C
Subnetting class C
Muhammad Hammad
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
sharifbdp
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Icnd210 s08l03
Icnd210 s08l03Icnd210 s08l03
Icnd210 s08l03
computerlenguyen
 
Network Layer
Network LayerNetwork Layer
Network Layer
Kamal Acharya
 
Ccna certification training
Ccna certification trainingCcna certification training
Ccna certification trainingccnaguide
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
Atakan ATAK
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
Shreehari Dhat
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
Nam Nguyen
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2Kris Mofu
 
Ip Subnet Design
Ip Subnet DesignIp Subnet Design
Ip Subnet Design
Heather Dionne
 
Lab 3.5.1 basic frame relay
Lab 3.5.1 basic frame relayLab 3.5.1 basic frame relay
Lab 3.5.1 basic frame relay
Manuel Garcia Meza
 
Subnetting
SubnettingSubnetting
Subnetting
Kishore Kumar
 

Similar to Subnetting (20)

7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTE
 
Subnetting class C
Subnetting class CSubnetting class C
Subnetting class C
 
Ccna1v3 mod10
Ccna1v3 mod10Ccna1v3 mod10
Ccna1v3 mod10
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Icnd210 s08l03
Icnd210 s08l03Icnd210 s08l03
Icnd210 s08l03
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Ccna certification training
Ccna certification trainingCcna certification training
Ccna certification training
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Subneting
SubnetingSubneting
Subneting
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2
 
Ip Subnet Design
Ip Subnet DesignIp Subnet Design
Ip Subnet Design
 
Lab 3.5.1 basic frame relay
Lab 3.5.1 basic frame relayLab 3.5.1 basic frame relay
Lab 3.5.1 basic frame relay
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 

More from Gichelle Amon

Kerberos
KerberosKerberos
Kerberos
Gichelle Amon
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Module 3 law of contracts
Module 3  law of contractsModule 3  law of contracts
Module 3 law of contractsGichelle Amon
 
Transport triggered architecture
Transport triggered architectureTransport triggered architecture
Transport triggered architectureGichelle Amon
 
Time triggered arch.
Time triggered arch.Time triggered arch.
Time triggered arch.Gichelle Amon
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2Gichelle Amon
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1Gichelle Amon
 

More from Gichelle Amon (20)

Kerberos
KerberosKerberos
Kerberos
 
Network security
Network securityNetwork security
Network security
 
Os module 2 d
Os module 2 dOs module 2 d
Os module 2 d
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Lec3 final
Lec3 finalLec3 final
Lec3 final
 
Lec 3
Lec 3Lec 3
Lec 3
 
Lec2 final
Lec2 finalLec2 final
Lec2 final
 
Lec 4
Lec 4Lec 4
Lec 4
 
Lec1 final
Lec1 finalLec1 final
Lec1 final
 
Module 3 law of contracts
Module 3  law of contractsModule 3  law of contracts
Module 3 law of contracts
 
Transport triggered architecture
Transport triggered architectureTransport triggered architecture
Transport triggered architecture
 
Time triggered arch.
Time triggered arch.Time triggered arch.
Time triggered arch.
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Os module 2 ba
Os module 2 baOs module 2 ba
Os module 2 ba
 
Lec5
Lec5Lec5
Lec5
 
Delivery
DeliveryDelivery
Delivery
 
Addressing
AddressingAddressing
Addressing
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Subnetting

  • 2. Subnet  Subnets are a subset of the entire network  Networks can be divided into subnets  Subnets can be divided into subnets  Each subnet is treated as a separate network  A subnet can be a WAN or LAN
  • 3. Subnets Subnet 1 Subnet 2 Subnet 3 Subnet 4
  • 4. Subnet Addresses  Typical (classed) IP addresses (e.g. 137.207.32.2) have two parts:  A network ID (e.g. 137.207.0.0)  A host ID (e.g. 0.0.32.2)  A subnetted network will divide the IP address differently  Part of the host ID will be used to specify the subnet number  The network ID and subnet portion of the host ID can be considered the subnet ID
  • 5. Subnet Addresses  For example, if we want to divide a network into 4 subnets, we can use the following scheme:  4 subnets can be represented with 2 bits (22 = 4)  For a class B address, which already uses 16 bits for the network portion, the address would use 18 bits for the subnet portion
  • 6. External Routing with Subnets  Subnetting is transparent outside an organization  e.g. If subnetting is used in the University, routers outside the University will not consider subnetting at all  Thus, subnetting is only relevant within an organization
  • 7. Internal Routing with Subnets  When a packet enters a network with subnetting, the routers will behave differently  A route may use the subnet ID (network portion + subnet portion, followed by zeroes) to determine which route to take
  • 8. Routing with Subnets 17710 = ER2 101100012 Subnet 1 137.207.177.81 00 (137.207.0.0) 01 ER1 IR Subnet 2 10 Subnet 3 11 ER3 Subnet 4
  • 9. Routing with Subnets 17710 = ER2 12810 = 101100012 Subnet 1 100000002 00 137.207.177.81 (137.207.128.0) 01 ER1 IR Subnet 2 10 Subnet 3 11 ER3 Subnet 4
  • 10. Routing with Subnets ER2 Subnet 1 00 01 ER1 IR Subnet 2 10 Subnet 3 137.207.177.81 (137.207.177.81) 11 ER3 Subnet 4
  • 11. Multi-Level Subnets  A subnet can be divided into subnets  If the first layer of subnetting used 2 bits for the subnet portion, a second layer can be used to subnet within each subnet  Using more bits from the host portion of the address
  • 12. Multi-Level Subnets Layer 1 Layer 2 Subnet 1 Subnet 2a Network 1 Subnet 2 Subnet 2b Subnet 3
  • 13. Calculating Subnet IDs  Calculating the subnet ID is very much the same process as calculating a network ID (net ID)  The difference is that typically net IDs are calculated using one of the three standard subnet masks:  255.0.0.0 (Class A)  255.255.0.0 (Class B)  255.255.255.0 (Class C)  A subnet ID is calculated using a non-standard subnet mask  e.g. 255.255.192.0 (192 10 = 110000002)
  • 14. Common Class B Subnet Masks Subnet Mask # of Subnets 255.255.192.0 4 (22) (19210 = 110000002) 255.255.240.0 16 (24) (24010 = 111100002) 255.255.252.0 64 (26) (25210 = 111111002) • Class A and C subnet masks would be similar
  • 15. CIDR Notation  A convenient way to specify this kind of subnet mask is CIDR addressing  e.g. 137.207.32.2/255.255.0.0: 137.207.32.2/16  e.g. 24.1.2.3/255.0.0.0: 24.1.2.3/8  The number after the ‘/’ is the number of bits that are 1s in the subnet mask  137.207.177.81/255.255.240.0: 137.207.177.81/20 (16 bits for network ID + 4 bits for subnetting)