Networking Basic Refresh
Networking Basic Refresh
• Computer networks and the sharing of electronic data encourage the use of
standard policies and procedures.
• Computer networks provide backup and recovery support for our data, i.e.,
redundancy.
• Examples:
o Smart Phone to Laptop
o Smart Watch to Smart Phone
o Smart Phone Hands-Free Car Calling
o Heart Rate Monitor to Smart Phone
Local Area Network (LAN)
• A computer network within a small geographical
area, such as a single room, building or group of
buildings.
• Considered to be self-contained:
o All devices are directly connected via cables and/or
short-range wireless technology.
o Doesn’t require a leased telecommunications line
from an Internet Service Provider (ISP).
• Examples:
o Home Network
o Small Business or Office Network
Wireless Local Area Network (WLAN)
• A LAN that’s dependent on wireless connectivity
or one that extends a traditional wired LAN to a
wireless LAN.
• Most home networks are WLANs.
Campus Area Network (CAN)
• A computer network of multiple
interconnected LANs in a limited geographical
area, such as a corporate business park,
government agency, or university campus.
• Typically owned or used by a single entity.
Metropolitan Area Network (MAN)
• A computer network that interconnects
users with computer resources in a city.
• Larger than a campus area network, but
smaller than a wide area network.
Wide Area Network (WAN)
• A computer network that extends over a
large geographical distance, typically
multiple cities and countries.
• WANs connect geographically distant LANs.
• Typically use leased telecommunications
lines from ISPs.
• Examples:
o The Internet
o Corporate Offices in Different States
Some Basic Networking Rules
• The computers in a network must use the same procedures for sending and
receiving data. We call these communication protocols.
It’s Purpose
• Gives us a guide to understanding how networks operate.
00:21:70:6f:06:f2 00-21-70-6F-06-F2
• Physical
o Cabling, Connectors, Equipment, etc.
• Logical
o Network Access Method, i.e., Carrier Sense Multiple Access (CSMA)
Physical vs. Logical Topologies
Physical topologies describe the placement of network devices and
how they are physically connected.
Circuit-Level Firewalls
• 2nd Generation
• Monitors Valid/Invalid TCP Sessions
DB-25
• 25-pin connection previously commonly
used for serial printer connections.
TIA/EIA 568A & 568B Wiring Standards
• Industry-standard that specifies the pin
arrangement for RJ-45 connectors.
• Two Standards:
• 568A & 568B
• 568B is newer and the recommended standard.
• Either can be used.
• Why are standards important?
o Lower Costs
o Increase Interoperability
o Easier Maintenance
Straight-Through & Crossover Cables
Straight-Through Cable Crossover Cable
• Connecting “Unlike” Devices • Connecting “Like” Devices
o Computer to Switch o Router to Router
o Switch to Router o Computer to Computer
Which Twisted Pairs Are Used?
Ethernet & Fast Ethernet Gigabit & 10 Gigabit Ethernet
Cat 3 and Cat 5 Cat 5e & Faster
Only Green and Orange Pairs Used: All Four Pairs Used:
• Pins 1, 2, 3, and 6 • Supports bi-directional data transmission on
o One Pair to Transmit Data (TX) each pair of wires.
o One Pair to Receive Data (RX)
The Plenum
• The plenum is the open space above the ceiling or below a raised floor.
• A “plenum space” is the part of a building that enables air circulation by
providing pathways for heated/air-conditioned and return airflows at a higher
pressure than normal.
• All network cabling placed in the plenum should be “plenum-rated.”
Non-Plenum-Rated & Fire Hazard
• Non-plenum cable or polyvinyl chloride (PVC)
cable is often much less expensive than
plenum-rated cable.
• When PVC burns or smolders, it releases
toxic fumes into the air (Hydrochloric Acid
and Dioxin).
• The plenum air return would unknowingly
circulate toxic air throughout an office.
• Sprinkler systems typically can’t access the
plenum area.
• Building codes often require Plenum Rated
cable installed through any plenum space.
Plenum-Rated Cables
• Plenum-rated cables have a special insulation that has low smoke,
low flame and non-toxic characteristics.
• Coated with nonflammable materials that minimize toxic fumes:
o Teflon
o Fluorinated ethylene polymer (FEP)
o Low-Smoke PVC
Fiber Optic Cabling
• Glass or plastic fiber that carries light (photons)
o High Bandwidth: Photons travel faster than electrons.
o Long Distances: Less attenuation.
o Immune to Electromagnetic Interference (EMI)
o Doesn’t Emanate Signals
• Two Types
o Multi-mode Fiber (MMF)
• Shorter Distances (LAN / Building-to-Building)
• Up to 2 Kilometers
o Single-mode Fiber (SMF)
• More expensive than multi-mode
• Longer Distances (WAN / Across Town)
• Up to 200 Kilometers
Informational Note: 9-micron Single-Mode Fiber can travel 75 miles at 400 Gbps
MMF versus SMF
Multi-Mode Fiber (MMF) Single-Mode Fiber (SMF)
• Many photons of light travel • A single direct photon of light
through the cable at once, and travels through the cable, which
bounce off the walls, which allows greater distances and
reduces the distance and speed. speed.
• Larger Core: 50 to 62.5 microns • Smaller Core: 8 to 10 microns
Fiber Optic Cable Connectors
Lucent Connector (LC) Subscriber Connector (SC)
• Small form-factor design that has a flange on • Square connector that uses a push-pull
the top, similar to an RJ-45 connector. connector similar to A/V equipment.
• Commonly used in MMF & SMF gigabit and • Commonly used in MMF & SMF gigabit
10-gigabit Ethernet networks. Ethernet networks.
Distance Requirements
• Electrical signals degrade relatively quickly (100 meters)
• Fiber can transmit over long distances
If a computer knows a device’s IP address but not its MAC address, it’ll send a broadcast
message to all devices on the LAN asking which device is assigned that MAC address.
The Internet Protocol (IP)
• An OSI Layer 3 protocol that defines routing and logical addressing of packets
that allow data to traverse WANs and the Internet.
• It specifies the formatting of packets and the logical addressing schema
o IP addresses: IPv4 and IPv6
• Its job is to connect different OSI Layer 2 (switched) networks together.
• Provides end-to-end connectivity from one Layer 2 network to another via
routers.
The Internet Protocol (IP)
• It’s connectionless and, therefore, unreliable (similar to UDP).
o No continued connection.
• Each packet sent is independent of each other packet.
o TCP and other protocols provide a means to reassemble them properly.
o Packets don’t always follow the same path to their destination.
o They’re sent via the most efficient route.
• Doesn’t provide any error recovery or sequencing functionality.
o That’s the job of other protocols.
Internet Control Message Protocol (ICMP)
• OSI Layer 3 Internet Protocol (IP) companion “error reporting” protocol within
the TCP/IP suite of protocols.
• Just like IP, it’s connectionless.
• Used to generate error messages to the source IP address when network
issues prevent the delivery of a packet.
• Typically used by routers to report packet delivery issues, and, most
importantly, it can report errors but not correct them.
• Commonly used by IT administrators to troubleshoot network connections
with command-line utilities, including ping, pathping, and traceroute.
• For IPv6, it is also used for:
o Neighbor Solicitation and Advertisement Messages (Similar to ARP)
o Router Solicitation and Advertisement Messages
(Some) ICMP Message Types
• Echo Request, Echo Reply: Tests destination accessibility and status. A host sends an Echo
Request and listens for a corresponding Echo Reply. Commonly done using the ping
command.
• Destination Unreachable: Sent by a router when it can’t deliver an IP packet.
• Source Quench: Sent by a host or router if it’s receiving too much data than it can handle.
The message requests that the source reduces its rate of data transmission.
• Redirect Message: Sent by a router if it receives a packet that should have been sent to a
different router. The message includes the IP address to which future packets should be
sent and is used to optimize the routing.
• Time Exceeded: Sent by a router if a packet has reached the maximum limit of routers
through which it can travel.
• Router Advertisement, Router Solicitation (IPv6): Allow hosts to discover the existence of
routers. Routers periodically multicast their IP addresses via Router Advertisement
messages. Hosts may also request a router IP address by broadcasting a Router Solicitation
message, then wait for a router to reply with a Router Advertisement.
Understanding Protocols, Ports, and Sockets
Protocols
• Computers communicate with each other with network protocols.
• Protocols are rules governing how machines exchange data and
enable effective communication.
• In an operating system (OS), a protocol runs as a process or service.
Ports
• Ports are logical constructs that bind a unique port number to a
protocol process or service.
Sockets
• Sockets are a combination of an IP address and a port number, for
example, 192.168.1.1:80.
Why We Need Ports and Sockets
• Computers require ports because of network
application multitasking.
• Because a computer may have only one IP address,
it needs ports to differentiate network protocols
and services running on it.
• TCP/IP has 65,536 ports available
Dynamic Ports 49,152 – 65,535 Not registered and used for any purpose.
Protocols & Port Numbers
Service, Protocol, or Application Port Number(s) TCP or UDP
FTP (File Transfer Protocol) 20, 21 TCP
Telnet 23 TCP
• Note: TCP header is 20 bytes in size, whereas the UDP header is only
8 bytes.
TCP Three-Way Handshake
• A connection must be established before data is transmitted, called
the three-way handshake.
o SYN → SYN / ACK → ACK
• Creates a Virtual Connection Between 2 Devices
“Best Effort” UDP
• A scaled-down, economic version of TCP
o Connectionless & Unreliable
o No Data Retransmissions
o “Best Effort”
• Faster than TCP
o Smaller Header & Connectionless
• Primarily used for protocols that favor:
• Low-Latency, i.e., Faster Speeds
• Can Tolerate Data Loss
“Best Effort” UDP
• Example UDP Use-Cases
o VoIP Phone Calls
o Live Video Streams
o Live Audio Streams
o Online Gaming
o Certain Network Management Protocols
o DNS
o DHCP
o NTP
Application Layer Management Protocols
• Domain Name System (DNS)
• Dynamic Host Configuration Protocol (DHCP)
• Network Time Protocol (NTP)
• Simple Network Management Protocol (SNMP)
• Lightweight Directory Access Protocol (LDAP)
• LDAP Secure (LDAPS)
• Server Message Block (SMB)
Domain Name System (DNS)
Port: 53 Transport Layer Protocol: UDP
• Protocol that automatically synchronizes a system’s time with a network time server.
o Important for time-dependent network applications and protocols.
o If a system is configured with the incorrect time, it may not be able to access network services.
o Authentication will often fail if time isn’t properly synchronized between devices.
• Uses TCP port 123 by default.
Simple Network Management Protocol (SNMP)
Port: 161 Transport Layer Protocol: TCP
• Protocol that provides a means to access and query directory service systems:
o Usernames, Passwords, Computer Accounts, etc.
• Typically Unix/Linux-based or Microsoft Active Directory-based
• Uses TCP 389 by default
LDAP Secure (LDAPS)
Port: 636 Transport Layer Protocol: TCP
• A Microsoft protocol that allows users to remotely connect to, view, and control a
remote computer from a Windows desktop.
• Built into the Microsoft operating system.
• Uses TCP port 3389 by default
Application Layer File Transfer Protocols
• File Transfer Protocol (FTP)
• Secure File Transfer Protocol (SFTP)
• Trivial File Transfer Protocol (TFTP)
File Transfer Protocol (FTP)
Ports: 20, 21 Transport Layer Protocol: TCP
• A secure cryptographic version of FTP that uses SSH to provide encryption services.
o Provides file transfer over SSH
• Uses TCP port 22 by default (same port as SSH)
Trivial File Transfer Protocol (TFTP)
Port: 69 Transport Layer Protocol: UDP
• Email protocol that is used to deliver emails from an email client (Outlook) to a
destination email server
• Can be configured to use encryption (recommended) or plain text
• Uses TCP Port 25 by default
Post Office Protocol Version 3 (POP3)
Port: 110 Transport Layer Protocol: TCP
• Protocol that provides browsing services for the World Wide Web (WWW)
o Retrieves the content of a web page from a web server
o Requests are made in hypertext markup language (HTML) and returned to your browser
in that format
• Data is sent in plain text
• Uses TCP Port 80 by default
HTTP Secure (HTTPS)
Port: 443 Transport Layer Protocol: TCP
• HTTP over Secure Socket Layer (SSL) or Transport Layer Security (TLS)
• A secure version of HTTP that utilizes SSL/TLS to encrypts HTTP content
• Utilizes Public Key Infrastructure (PKI)
• Uses TCP Port 443 by default
Understanding IPv4 Addresses
• An IP Address is a logical address used in order to uniquely identify a device
on an IP network.
• It’s a Network Layer Address
• There are Two Versions:
o IP version 4 (IPv4)
o IP version 6 (IPv6)
• This lesson focuses on IPv4, and we’ll discuss IPv6 later in the course.
IPv4 Address Anatomy
• Made up of 32 binary bits, which can be divided into a network portion and a
host portion with the help of a subnet mask.
o The 32 binary bits are broken into four octets (1 octet = 8 bits).
o Each octet is converted to decimal and separated by a period (dot).
o For this reason, an IP address is said to be expressed in dotted decimal format.
IPv4 Address Anatomy
Remember This
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255
What is the binary 11111111 in decimal?
128 64 32 16 8 4 2 1
Binary 1 1 1 1 1 1 1 1
Decimal 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255 Decimal
128 64 32 16 8 4 2 1
Binary 1 0 1 0 1 0 1 0
Decimal 128 + 0 + 32 + 0 + 8 + 0 + 2 + 0 = 170 Decimal
128 64 32 16 8 4 2 1
Binary 1 0 0 0 0 0 1 1
Decimal 128 + 0 + 0 + 0 + 0 + 0 + 2 + 1 = 131 Decimal
128 64 32 16 8 4 2 1
Binary 1 1 0 0 0 0 0 0 = 11000000
Decimal 128 + 64 + 0 + 0 + 0 + 0 + 0 + 0 = 192 Decimal
Start adding the numbers from left to right until you achieve the decimal amount
you are looking for!
What’s 202 in binary?
128 64 32 16 8 4 2 1
Binary 1 1 0 0 1 0 1 0 = 11001010
Decimal 128 + 64 + 0 + 0 + 8 + 0 + 2 + 0 = 202 Decimal
Start adding the numbers from left to right until you achieve the decimal amount
you are looking for!
What’s 54 in binary?
128 64 32 16 8 4 2 1
Binary 0 0 1 1 0 1 1 0 = 00110110
Decimal 0 + 0 + 32 + 16 + 0 + 4 + 2 + 0 = 54 Decimal
Start adding the numbers from left to right until you achieve the decimal amount
you are looking for!
IP Address Conversion Process
CONVERSION CHART
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1
128 64 32 16 8 4 2 1
Binary 1 1 1 1 0 0 0 0 =
Decimal 128 + 64 + 32 + 16 + 0 + 0 + 0 + 0 = 240 Decimal
128 64 32 16 8 4 2 1
Binary 1 0 0 1 1 0 0 1 =
Decimal 128 + 0 + 0 + 16 + 8 + 0 + 0 + 1 = 153 Decimal
128 64 32 16 8 4 2 1
Binary 0 1 1 0 1 0 1 1 =
Decimal 0 + 64 + 32 + 0 + 8 + 0 + 2 + 1 = 107 Decimal
128 64 32 16 8 4 2 1
Binary 1 0 1 1 0 0 1 1 =
Decimal 128 + 0 + 32 + 16 + 0 + 0 + 2 + 1 = 179 Decimal
128 64 32 16 8 4 2 1
Binary 1 1 1 1 0 0 0 0 = 11110000 Binary
Decimal 128 + 64 + 32 + 16 + 0 + 0 + 0 + 0 =
Binary Math Worksheet ANSWER KEY
128 64 32 16 8 4 2 1
Binary 1 0 1 0 0 0 1 1 = 10100011 Binary
Decimal 128 + 0 + 32 + 0 + 0 + 0 + 2 + 1 =
7. CONVERT 94 TO BINARY
128 64 32 16 8 4 2 1
Binary 0 1 0 1 1 1 1 0 = 01011110 Binary
Decimal 0 + 64 + 0 + 16 + 8 + 4 + 2 + 0 =
128 64 32 16 8 4 2 1
Binary 1 1 1 0 0 0 0 1 = 11100001 Binary
Decimal 128 + 64 + 32 + 0 + 0 + 0 + 0 + 1 =
192.168.98.18
• 192 = 11000000
• 168 = 10101000
• 98 = 01100010
• 18 = 00010010
01000010.11010010.11000110.11000101
• 01000010 = 66
• 11010010 = 210
• 11000110 = 198
• 11000101 = 197
CONVERSION CHART
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
Binary Math Worksheet
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
7. CONVERT 94 TO BINARY
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
192.168.98.18
01000010.11010010.11000110.11000101
IPv4 Address Classes (Simplified)
A 8 24 1.0.0.0 – 126.255.255.255
B 16 16 128.0.0.0 – 191.255.255.255
C 24 8 192.0.0.0 – 223.255.255.255
Network and Host Bits
IPv4 Address Classes (Detailed)
• IP Address: 9.10.40.15
• Subnet Mask: 255.0.0.0
• IP Address: 135.240.110.100
• Subnet Mask: 255.255.0.0
• IP Address: 196.200.10.5
• Subnet Mask: 255.255.255.0
CIDR Notation
• CIDR: Classless Inter-Domain Routing
o A methodology for subnetting
o “Slash” Notation tells you how many bits are associated with the Subnet Mask
21 = 2 22 = 4 23 = 8 24 = 16
25 = 32 26 = 64 27 = 128 28 = 256
Host Bits Left 2y Addresses per Subnet (2y) Hosts per Subnet (2y – 2)
1 21 2 0
2 22 4 2
3 23 8 6
4 24 16 14
5 25 32 30
6 26 64 62
7 27 128 126
8 28 256 254
9 29 512 510
10 210 1,024 1,022
11 211 2,048 2,046
12 212 4,096 4,094
Subnetting Reference Material
21 = 2 29 = 512
22 = 4 210 = 1,024
23 = 8 211 = 2,048
24 = 16 212 = 4,096
25 = 32 213 = 8,192
26 = 64 214 = 16,384
27 = 128 215 = 32,768
28 = 256 216 = 65,536
128 64 32 16 8 4 2 1
1 1 1 1 1 1 1 1
Subnetting Reference Material
Binary Decimal
00000000 0
10000000 128
11000000 192
11100000 224
11110000 240
11111000 248
11111100 252
Host Bits Left 2y Hosts per Subnet (2y – 2) Addresses per Subnet (2y)
1 21 0 2
2 22 2 4
3 23 6 8
4 24 14 16
5 25 30 32
6 26 62 64
7 27 126 128
8 28 254 256
9 29 510 512
10 210 1,022 1,024
11 211 2,046 2,048
12 212 4,094 4,096
Subnetting Reference Material
Binary (N.N.N.H) Decimal CIDR # Subnets (2x) Block Size (2y) # Hosts (2y - 2)
N.N.N.00000000 255.255.255.0 /24 20 = 1 28 = 256 28 – 2 = 254
N.N.N.10000000 255.255.255.128 /25 21 = 2 27 = 128 27 – 2 = 126
N.N.N.11000000 255.255.255.192 /26 22 = 4 26 = 64 26 – 2 = 62
N.N.N.11100000 255.255.255.224 /27 23 = 8 25 = 32 25 – 2 = 30
N.N.N.11110000 255.255.255.240 /28 24 = 16 24 = 16 24 – 2 = 14
N.N.N.11111000 255.255.255.248 /29 25 = 32 23 = 8 23 – 2 = 6
N.N.N.11111100 255.255.255.252 /30 26 = 64 22 = 4 22 – 2 = 2
Binary (N.N.H.H) Decimal CIDR # Subnets (2x) Block Size (2y) # Hosts (2y - 2)
N.N.00000000.00000000 255.255.0.0 /16 20 = 1 216 = 65,536 216 – 2 = 65,534
N.N.10000000.00000000 255.255.128.0 /17 21 = 2 215 = 32,768 215 – 2 = 32,766
N.N.11000000.00000000 255.255.192.0 /18 22 = 4 214 = 16,384 214 – 2 = 16,382
N.N.11100000.00000000 255.255.224.0 /19 23 = 8 213 = 8,192 213 – 2 = 8,190
N.N.11110000.00000000 255.255.240.0 /20 24 = 16 212 = 4,096 212 – 2 = 4,094
N.N.11111000.00000000 255.255.248.0 /21 25 = 32 211 = 2,048 211 – 2 = 2,046
N.N.11111100.00000000 255.255.252.0 /22 26 = 64 210 = 1,024 210 – 2 = 1,022
N.N.11111110.00000000 255.255.254.0 /23 27 = 128 29 = 512 29 – 2 = 510
N.N.11111111.00000000 255.255.255.0 /24 28 = 256 28 = 256 28 – 2 = 254
N.N.11111111.10000000 255.255.255.128 /25 29 = 512 27 = 128 27 – 2 = 126
N.N.11111111.11000000 255.255.255.192 /26 210 = 1,024 26 = 64 26 – 2 = 62
N.N.11111111.11100000 255.255.255.224 /27 211 = 2,048 25 = 32 25 – 2 = 30
N.N.11111111.11110000 255.255.255.240 /28 212 = 4,096 24 = 16 24 – 2 = 14
N.N.11111111.11111000 255.255.255.248 /29 213 = 8,192 23 = 8 23 – 2 = 6
N.N.11111111.11111100 255.255.255.252 /30 214 = 16,384 22 = 4 22 – 2 = 2
Subnetting Reference Material
Binary (N.H.H.H) Decimal CIDR # Subnets (2x) Block Size (2y) # Hosts (2y - 2)
N.00000000.00000000.00000000 255.0.0.0 /8 20 = 1 222 = 16,777,216 222 – 2 = 16,777,214
N.10000000.00000000.00000000 255.128.0.0 /9 21 = 2 223 = 8,388,608 223 – 2 = 8,388,606
N.11000000.00000000.00000000 255.192.0.0 /10 22 = 4 222 = 4,194,304 222 – 2 = 4,194,302
N.11100000.00000000.00000000 255.224.0.0 /11 23 = 8 221 = 2,097,152 221 – 2 = 2,097,150
N.11110000.00000000.00000000 255.240.0.0 /12 24 = 16 220 = 1,048,576 220 – 2 = 1,048,574
N.11111000.00000000.00000000 255.248.0.0 /13 25 = 32 219 = 524,288 219 – 2 = 524,286
N.11111100.00000000.00000000 255.252.0.0 /14 26 = 64 218 = 262,144 218 – 2 = 262,142
N.11111110.00000000.00000000 255.254.0.0 /15 27 = 128 217 = 131,072 217 – 2 = 131,070
N.11111111.00000000.00000000 255.255.0.0 /16 28 = 256 216 = 65,536 216 – 2 = 65,534
N.11111111.10000000.00000000 255.255.128.0 /17 29 = 512 215 = 32,768 215 – 2 = 32,766
N.11111111.11000000.00000000 255.255.192.0 /18 210 = 1,024 214 = 16,384 214 – 2 = 16,382
N.11111111.11100000.00000000 255.255.224.0 /19 211 = 2,048 213 = 8,192 213 – 2 = 8,190
N.11111111.11110000.00000000 255.255.240.0 /20 212 = 4,096 212 = 4,096 212 – 2 = 4,094
N.11111111.11111000.00000000 255.255.248.0 /21 213 = 8,192 211 = 2,048 211 – 2 = 2,046
N.11111111.11111100.00000000 255.255.252.0 /22 214 = 16,384 210 = 1,024 210 – 2 = 1,022
N.11111111.11111110.00000000 255.255.254.0 /23 215 = 32,768 29 = 512 29 – 2 = 510
N.11111111.11111111.00000000 255.255.255.0 /24 216 = 65,536 28 = 256 28 – 2 = 254
N.11111111.11111111.10000000 255.255.255.128 /25 217 = 131,072 27 = 128 27 – 2 = 126
N.11111111.11111111.11000000 255.255.255.192 /26 218 = 262,144 26 = 64 26 – 2 = 62
N.11111111.11111111.11100000 255.255.255.224 /27 219 = 524,288 25 = 32 25 – 2 = 30
N.11111111.11111111.11110000 255.255.255.240 /28 220 = 1,048,576 24 = 16 24 – 2 = 14
N.11111111.11111111.11111000 255.255.255.248 /29 221 = 2,097,152 23 = 8 23 – 2 = 6
N.11111111.11111111.11111100 255.255.255.252 /30 222 = 4,194,304 22 = 4 22 – 2 = 2
Subnetting a Class C Network #1
Details & Requirements
You’ve been assigned a 192.168.1.0/24 Class C network, and
you need to create two subnets from it. Subnet #1 #2
How many host bit do we need to borrow? Network Address 192.168.1.0 192.168.1.128
1 host bit, 21 = 2 Subnets
First Host IP 192.168.1.1 192.168.1.129
How many host addresses per subnet?
7 host bits left, 27 = 128 Addresses / Subnet Last Host IP 192.168.1.126 192.168.1.254
27 - 2= 126 Addresses / Subnet
Broadcast Address 192.168.1.127 192.168.1.255
What are the valid subnets?
192.168.1.0 and 192.168.1.128
Binary (N.N.N.H) Decimal CIDR # Subnets (2x) Block Size (2y) # Hosts (2y - 2)
N.N.N.00000000 255.255.255.0 /24 20 = 1 28 = 256 28 – 2 = 254
New Subnet Mask? N.N.N.10000000 255.255.255.128 /25 21 = 2 27 = 128 27 – 2 = 126
11111111.11111111.11111111.10000000 N.N.N.11000000 255.255.255.192 /26 22 = 4 26 = 64 26 – 2 = 62
255.255.255.128 or /25 N.N.N.11100000 255.255.255.224 /27 23 = 8 25 = 32 25 – 2 = 30
N.N.N.11110000 255.255.255.240 /28 24 = 16 24 = 16 24 – 2 = 14
N.N.N.11111000 255.255.255.248 /29 25 = 32 23 = 8 23 – 2 = 6
N.N.N.11111100 255.255.255.252 /30 26 = 64 22 = 4 22 – 2 = 2
Visualizing Subnetting a Class C Network #1