0% found this document useful (0 votes)
22 views7 pages

12.ITN - instructorPPT - Chapter9 2

Uploaded by

guntaphon.s
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views7 pages

12.ITN - instructorPPT - Chapter9 2

Uploaded by

guntaphon.s
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Chapter 12

12.1 Subnetting an IPv4 Network


12.2 Addressing Schemes
Chapter 12: Subnetting
IP Networks 12.3 Design Considerations for IPv6
12.4 Summary

Introduction to Networking

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2

Network Segmentation
Chapter 12: Objectives Reasons for Subnetting
 Explain why routing is necessary for hosts on different Large networks need to be segmented into smaller sub-networks,
networks to communicate. creating smaller groups of devices and services in order to:
 Control traffic by containing broadcast traffic within subnetwork
 Describe IP as a communication protocol used to identify a
 Reduce overall network traffic and improve network performance
single device on a network.
Subnetting - process of segmenting a network into multiple smaller
 Given a network and a subnet mask, calculate the number of network spaces called subnetworks or Subnets.
host addresses available.
 Calculate the necessary subnet mask in order to Communication Between Subnets
accommodate the requirements of a network.  A router is necessary for devices on different networks and subnets
to communicate.
 Describe the benefits of variable length subnet masking  Each router interface must have an IPv4 host address that belongs to
(VLSM) the network or subnet that the router interface is connected to.
 Explain how IPv6 address assignments are implemented in a  Devices on a network and subnet use the router interface attached to
their LAN as their default gateway.
business network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Subnetting an IPv4 Network
Subnetting an IPv4 Network Basic Subnetting
IP Subnetting is FUNdamental  Borrowing Bits to Create Subnets
 Borrowing 1 bit 21 = 2 subnets

Borrowing 1 Bit from the host portion creates 2 subnets with the same subnet mask

Subnet 0 Subnet 1
Network 192.168.1.0-127/25 Network 192.168.1.128-255/25
Mask: 255.255.255.128 Mask: 255.255.255.128

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6

Subnetting an IPv4 Network Subnetting an IPv4 Network


Subnets in Use Subnetting Formulas
Calculate Number of Subnets

Subnet 0
Network 192.168.1.0-127/25

Calculate Number of Hosts

Subnet 1
Network 192.168.1.128-255/25

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Subnetting an IPv4 Network Subnetting an IPv4 Network
Creating 4 Subnets Creating 8 Subnets
Borrowing 2 bits to create 4 subnets. 22 = 4 subnets Borrowing 3 bits to Create 8 Subnets. 23 = 8 subnets

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10

Subnetting an IPv4 Network Determining the Subnet Mask


Creating 8 Subnets(continued) Subnetting Based on Host Requirements
There are two considerations when planning subnets:
 Number of Subnets required
 Number of Host addresses required
Formula to determine number of useable hosts
2^n-2
2^n (where n is the number the number of host bits remaining) is
used to calculate the number of hosts
-2 Subnetwork ID and broadcast address cannot be used on each
subnet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Determining the Subnet Mask Determining the Subnet Mask
Subnetting Network-Based Requirements Subnetting To Meet Network Requirements
Calculate number of subnets It is important to balance the number of subnets needed
and the number of hosts required for the largest subnet.
Formula 2^n (where n is the number of bits borrowed)
 Design the addressing scheme to accommodate the
Subnet needed for maximum number of hosts for each subnet.
each department in Allow for growth in
graphic
each subnet.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14

Determining the Subnet Mask Benefits of Variable Length Subnet Masking


Subnetting To Meet Network Requirements (cont) Traditional Subnetting Wastes Addresses
Traditional subnetting - same number of addresses is
allocated for each subnet.
Subnets that require fewer addresses have unused
(wasted) addresses. For example, WAN links only need 2
addresses.
Variable Length Subnet Mask (VLSM) or subnetting a
subnet provides more efficient use of addresses.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Benefits of Variable Length Subnet Masking Benefits of Variable Length Subnet Masking
Variable Length Subnet Masks (VLSM) Basic VLSM
VLSM allows a network space to be divided in unequal
parts.
Subnet mask will vary depending on how many bits have
been borrowed for a particular subnet.
Network is first subnetted, and then the subnets are
subnetted again.
Process repeated as necessary to create subnets of
various sizes.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18

Benefits of Variable Length Subnet Masking Benefits of Variable Length Subnet Masking
VLSM in Practice VLSM Chart
Using VLSM subnets, the LAN and WAN segments in
example below can be addressed with minimum waste.
 Each LANs will be assigned a subnet with /27 mask.
Each WAN link will be assigned a subnet with /30 mask.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Structured Design Subnetting an IPv6 Network
Planning to Address the Network Subnetting Using the Subnet ID
Allocation of network addresses should be planned and An IPv6 Network Space is subnetted to support
documented for the purposes of: hierarchical, logical design of the network
Preventing duplication of addresses
Providing and controlling access
Monitoring security and performance
Addresses for Clients - usually dynamically assigned using
Dynamic Host Configuration Protocol (DHCP)

Sample Network
Addressing Plan

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22

Subnetting an IPv6 Network Subnetting an IPv6 Network


IPV6 Subnet Allocation Subnetting into the Interface ID
IPv6 bits can be borrowed from the interface ID to create
additional IPv6 subnets

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Chapter 9: Summary
 Process of segmenting a network, by dividing it into to
multiple smaller network spaces, is called subnetting.
 Subnetting a subnet, or using Variable Length Subnet
Mask (VLSM) was designed to avoid wasting addresses.
 IPv6 address space is a huge address space so it is
subnetted to support the hierarchical, logical design of
the network not to conserve addresses.
 Size, location, use, and access requirements are all
considerations in the address planning process.
 IP networks need to be tested to verify connectivity and
operational performance.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26

You might also like