0% found this document useful (0 votes)
26 views44 pages

IP Subnetting

Here are the subnet masks for the given scenarios: 1. 16 Networks: 255.255.255.240 (Each network has 16 hosts) 2. 20 Networks: 255.255.255.248 (Each network has 8 hosts) 3. 10 Networks: 255.255.255.224 (Each network has 32 hosts) 4. 32 Networks: 255.255.255.240 (Each network has 16 hosts) 5. 50 Networks: 255.255.255.248 (Each network has 8 hosts)

Uploaded by

joshua ortega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views44 pages

IP Subnetting

Here are the subnet masks for the given scenarios: 1. 16 Networks: 255.255.255.240 (Each network has 16 hosts) 2. 20 Networks: 255.255.255.248 (Each network has 8 hosts) 3. 10 Networks: 255.255.255.224 (Each network has 32 hosts) 4. 32 Networks: 255.255.255.240 (Each network has 16 hosts) 5. 50 Networks: 255.255.255.248 (Each network has 8 hosts)

Uploaded by

joshua ortega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

At the end of the topic, the students should be able to:

Define masked bits


Define unmasked bits
Identify the Subnet mask given the number of
networks
Solve for the number of host per subnet
Create and apply an addressing scheme to a network
Identify and correct IP addressing issues
 Network Address
 Broadcast Address
 Local Broadcast Address
 Loopback Address
 Private Address
 All host bits with a value of “0”
 Used in routing tables to refer to the whole
network
 All host bits with a value of “1”
 Or Announce Address
 Entire IP Address is a value of “1”
 Or Limited Broadcast Address
e.g.
255.255.255.255
 Main purpose is to test the TCP/IP protocol
implementation on a host
 Ranges from 127.0.0.0 to 127.255.255.255.
In IPv4 network the host can communicate in
three different ways:
 UNICAST
 MULTICAST
 BROADCAST
 Normal host to host communication
 One to one communication
 Client-server
 Peer to peer
 Sends a single packet to multiple recipients
 Video or audio broadcast
 Routing information exchange by routing
protocols (Autonomous Systems)
 News feeds
 Sends packets to all hosts
 Requesting an address
 Exchange of route information
 Smaller networks are easier to manage.
 Overall traffic is reduced.
 You can more easily apply network security
policies.
 Allows creating multiple logical network from
a single address
 More networks = less hosts
 More hosts = less networks
 Based on the number of networks
 Based on the number of hosts
 VLSM
 Reverse engineering
To create a subnet, follow these steps:
1. Determine the number of required network IDs:
 One for each subnet
 One for each wide area network connection
2. Determine the number of required host IDs per
subnet:
 One for each TCP/IP host
 One for each router interface
3.Based on the above requirements, create the following:
 One subnet mask for your entire network
 A unique subnet ID for each physical segment
 A range of host IDs for each subnet
a 32-bit value that allows the recipient of IP
packets to distinguish the network ID portion
of the IP address from the host ID portion of
the IP address
xxxx xxxx.xxxx xxxx.xxxx xxxx.xxxx xxxx
From the 32 Bits:
 Masked Bits
◦ Network bits
◦ Has a bit value of 1
 Unmasked Bits
◦ Host Bits
◦ Has a bit value of 0
 Answer this five simple questions:
◦ How many subnets does the chosen subnet mask
produce?
 Subnets = 2x, where x is the number of masked bits
◦ How many valid hosts per subnet are available?
 Host = 2y-2, where y is the number of unmasked bits
◦ What are the valid subnets?
 Block Size = 256 – subnet mask
◦ What’s the broadcast address of each subnet?
 broadcast address is always the number right before
the next subnet
◦ What are the valid hosts in each subnet?
 Valid hosts are the numbers between the subnets
 Objective
◦ Identify what is CIDR
◦ Compare CIDR with Subnet Mask
◦ Create an addressing scheme using CIDR notation
 Classless Inter-Domain Routing
 the method that ISPs (Internet service
providers) use to allocate an amount of
addresses to a company, a home—a
customer
 v.w.x.y/z notation
 Example
192.168.10.32/28
 Number of Subnet:
◦ Number of Subnets = 2x
◦ where x is the number of masked bits

 Maximum Number of Host per Subnet:


◦ Number of Host = 2y-2
◦ where y is the number of unmasked bits
 Identify the subnet mask for each given
number of network and the number of host
per network.
 Chat in private your answer for each number.
◦ Example: 1. 255.255.255.255 1000 host
 Identify the subnet mask for each given
number of network and the number of host
per network.
 Chat in private your answer for each number.
◦ Example: 1. 255.255.255.255 1000 host

1. 16 Networks
2. 20 Networks
3. 10 Networks
4. 32 Networks
5. 50 Networks

You might also like