0% found this document useful (0 votes)
34 views49 pages

Chapter 8 Subnetting IP Networks - July 2023

Lecture Note for Introduction to Networking

Uploaded by

black hello
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views49 pages

Chapter 8 Subnetting IP Networks - July 2023

Lecture Note for Introduction to Networking

Uploaded by

black hello
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Chapter 8: Subnetting

IP Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
8.1 Subnetting an IPV4
Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Subnetting
From a large network, break into smaller subnetworks

Reason
❑ Smaller broadcast domain
❑ Easier management
❑ Admin may divide network into
▪ different departments
▪ Different devices
▪ Different services
▪ Different locations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Broadcast Domains
Each router interface connects a broadcast domain and
broadcasts are only propagated within its specific
broadcast domain.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Problems with Large Broadcast Domains
▪ Slow network operations due to the significant amount of
broadcast traffic.
▪ Slow device operations because a device must accept and
process each broadcast packet.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Problems with Large Broadcast Domains
(cont.)
▪ Solution -reduce the size of the network to create smaller
broadcast domains in a process called subnetting.
▪ These smaller network spaces are called subnets.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
How subnetting can be done :Location
Network administrators can group devices and services into
subnets that are determined by: Location

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
How subnetting can be done : Department
Network administrators can group devices and services into
subnets that are determined by: Organizational unit.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
How subnetting can be done : device type
Network administrators can group devices and services into
subnets that are determined by: Device type.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
2 constraints for subnetting

Choose one of these

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
1st constraint
▪ Number of subnet needed
▪ Steps
▪ 1. 2^n = number of subnets needed.
Find n (round it up)
n will be the bits that needs to add to the network portion

▪ 2. New mask (custom mask) = original mask + n


▪ 3. Manipulate the n bits (include all possible combination)
▪ 4. Find range for each subnet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Subnetting Example : classful address

1. Find the subnet range


2. How many usable hosts for each subnet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Classless Subnetting Example
Given 10.1.1.0/25, subnet this to 2 subnets

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
2nd constraint
▪ Number of usable hosts needed
▪ Steps
▪ 1. 2^h – 2 = number of usable hosts needed.
Find h (round it up)
h will be the number of host bits

▪ 2. New mask (custom mask) = 32 – h


▪ 3. n bits = custom mask – original mask
▪ Manipulate the n bits (include all possible combination)
▪ 4. Find range for each subnet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Example

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
answer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Example
You are given the network
address of 192.168.100.0/24 to
subnet and provide the IP
addressing for this network

• Based on the topology, how many subnets are needed?

• How many bits must be borrowed to support the number of subnets in the
topology table?
• How many subnets does this create?

• Calculate the binary value for the first five subnets

• Fill in the Subnet Table, listing the decimal value of all available subnets, the
first and last usable host address, and the broadcast address. Repeat until all
addresses are listed.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Subnetting based on network
requirement

1. Count total of hosts


a. Take into account network expansion

2. Choose the suitable network address and mask to start


a. Classful address
b. Classless address

3. Choose the type of constraints for subnetting


a. Number of subnets needed
b. Number of usable hosts needed

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Network Requirement Example

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
8.2-8.4 Variable
Length Subnet Mask
(VLSM calculation)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Traditional Subnetting Wastes Addresses

192.168.20.0/24
Constraint : number of subnets needed >> 7 subnets
▪ Number of subnet needed
▪ Steps
2^n = 7
▪ 1. 2^n = number of subnets needed.
Find n (round it up)
n will be the bits that needs to add to the network portion
n=3

▪ 2. New mask (custom mask) = original mask + n


▪ 3. Manipulate the n bits (include all possible combination)
▪ 4. Find range for each subnet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Traditional Subnetting Wastes Addresses

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Traditional Subnetting Wastes Addresses (Cont.)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Benefits of VLSM

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Basic VLSM Class C address

1. Arrange subnet from largest to smallest


2. Create table

Subnet # hosts Find h, find Subnet range


needed mask

100
120 hosts 20 hosts 50 hosts 10 hosts

Use address 192.168.2.0/24


Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Prepare a base 2 table

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Observe that

Each subnet has

➢ Own mask
➢ Own maximum number of hosts
➢ IP addresses not wasted

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Basic VLSM Class B address

1. Arrange subnet from largest to smallest


2. Create table

Subn # hosts Find h, # block Subnet Range


et needed find C
mask

500 000 hosts 135 000 hosts 90 000 hosts 90 000 hosts

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Prepare a table with # blocks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
VLSM Class A,B,C address

1. Arrange subnet from largest to smallest


2. Create table

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Subnet # hosts # block # 2^h h mask Subnet ranges
needed B Block
C

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
VLSM Class A,B,C address

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Network Address Planning

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Planning to Address the Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Assigning Addresses to Devices

• First address ?
• Last address ?
• A certain range of addresses ?

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49

You might also like