0% found this document useful (0 votes)
8 views

Sub netting a Network

This paper gives insights on subnetting in networking

Uploaded by

wesleyelijah143
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Sub netting a Network

This paper gives insights on subnetting in networking

Uploaded by

wesleyelijah143
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Sub netting a Network

 Sub netting: Sub netting is the process of dividing a single network into multiple smaller,
logically-defined networks (subnets). This improves network performance and security by
reducing broadcast domains and optimizing IP address usage

 Subnet Mask: A subnet mask is a 32-bit number that divides an IP address into the network and
host portions. It is typically expressed in decimal format (e.g., 255.255.255.0) or CIDR notation
(e.g., /24). The bits set to '1' in the subnet mask represent the network part, while the bits set to '0'
represent the host part.


Sub netting is the process of dividing a larger network into smaller, more manageable sub-
networks (subnets). Here are the steps involved:

1. Determine the Network Requirements:


 Assess the number of subnets needed and the number of hosts required in each subnet.

2. Choose an Appropriate IP Addressing Scheme:


 Decide whether to use IPv4 or IPv6. Most sub netting discussions focus on IPv4.

3. Identify the Class of the IP Address:


 Determine if the IP address is Class A, B, or C, as this affects the default subnet mask.

4. Calculate the Subnet Mask:


 The subnet mask defines which portion of the IP address identifies the network and which part
identifies the host. Modify the default subnet mask based on the number of required subnets and
hosts.

5. Determine the Number of Bits to Borrow:


 Calculate how many bits from the host portion of the address need to be borrowed to create the
required number of subnets. Use the
formula 2n≥number of subnets needed2n≥number of subnets needed, where nn is the number of
bits borrowed.

6. Create the Subnet Mask:


 Update the subnet mask by adding the borrowed bits. For example, if you start with a Class C
default mask of 255.255.255.0 and borrow 2 bits, your new subnet mask becomes
255.255.255.192.

7. Calculate the Subnet Addresses:


 Determine the subnet addresses by incrementing the subnet mask. For example, using the
previous example, the subnets would be 192.168.1.0, 192.168.1.64, 192.168.1.128, and
192.168.1.192.
8. Assign IP Addresses to Hosts:
 Allocate IP addresses within each subnet, ensuring that the network address and broadcast
address are not assigned to hosts.

9. Document the Sub netting Scheme:


 Keep a record of the subnets, their ranges, and any assigned IP addresses for future reference.

Network Troubleshooting
Network troubleshooting is the systematic process of diagnosing and resolving issues within a
network. It involves identifying problems, determining their causes, and implementing solutions
to restore normal network functionality.

Steps Involved in Network Troubleshooting

1. Identify the Problem:


 Gather information about the symptoms of the issue. Ask users about their experiences and any
error messages they may have encountered.

2. Define the Scope:


 Determine if the problem is isolated to one device, a specific user, or if it affects the entire
network. This helps narrow down potential causes.

3. Check Physical Connections:


 Inspect cables, switches, routers, and other hardware for physical damage or disconnections.
Ensure that devices are powered on and functioning properly.

4. Verify Configuration:
 Check the configuration settings of affected devices, including IP addresses, subnet masks,
gateways, and any relevant network policies.

5. Use Diagnostic Tools:


 Employ tools such as ping, traceroute, and network analyzers to test connectivity and identify
where the failure occurs in the network path.

6. Review Logs:
 Examine system and network logs for any error messages or warnings that could provide insight
into the issue.

7. Isolate the Problem:


 If possible, isolate the problematic device or segment of the network to prevent further impact
while troubleshooting.

8. Test Solutions:
 Implement potential solutions based on the findings. This could involve reconfiguring settings,
replacing hardware, or adjusting network policies.

9. Monitor the Network:


 After applying a solution, monitor the network to ensure that the issue is resolved and that no
new problems arise.

10. Document the Process:


 Keep a record of the problem, steps taken, and the final resolution. This documentation can be
helpful for future troubleshooting efforts and for training purposes.
By following these steps, network administrators can effectively address and resolve network
issues, ensuring reliable and efficient network performance

INTERNET FUNDAMENTALS

 Internet: The Internet is a global network of interconnected computers that communicate using
standardized protocols (like TCP/IP). It allows users to access and share information, resources,
and services across the world. The Internet supports various services such as the World Wide
Web, email, file sharing, and online gaming.

 Extranet: An extranet is a controlled private network that allows external users (such as
business partners, vendors, or customers) to access certain parts of an organization's internal
network. It extends the organization’s intranet by providing a gateway for authorized users
outside the organization to access specific information and applications.

Differences between Internet and Extranet

Feature Internet Extranet


Publicly accessible to anyone Restricted access; only authorized
Accessibility
with an internet connection. external users can connect.
General communication, Facilitates collaboration and
Purpose information sharing, and services information sharing between
for the public. organizations and their partners.
More secure; uses firewalls and
Generally less secure; relies on
Security VPNs to protect sensitive
public protocols and standards.
information.
Anyone can access; includes Limited to specific users, such as
User Base
individuals and businesses. partners, clients, and suppliers.
Data Open data sharing across the Controlled data sharing based on
Sharing globe. permissions and agreements.
END. THANK YOU

DIFFERENCE BETWEEN A SWITCH AND A ROUTER

1. Functionality:
 Switch: Operates at the data link layer (Layer 2) and is primarily used to connect devices within
the same network, allowing them to communicate.
 Router: Operates at the network layer (Layer 3) and connects different networks, directing data
packets between them.

2. Traffic Management:
 Switch: Uses MAC addresses to forward data to the correct device within a local network.
 Router: Uses IP addresses to determine the best path for forwarding data between different
networks.

3. Network Type:
 Switch: Typically used in local area networks (LANs) to connect multiple devices like
computers and printers.
 Router: Used to connect different networks, such as a home network to the internet.

4. Data Handling:
 Switch: Operates by creating a MAC address table to efficiently send data to specific devices,
reducing unnecessary traffic.
 Router: Maintains a routing table to determine the best route for data packets, facilitating
communication across different networks.

5. Broadcasting:
 Switch: Can create broadcast domains, meaning it can send data to all devices within the same
network segment.
 Router: Creates separate broadcast domains, preventing broadcast traffic from one network
segment from affecting another.

6. Performance and Speed:


 Switch: Generally offers higher performance and lower latency for local traffic since it operates
within a single network.
 Router: May introduce additional latency due to processing and routing decisions when
managing traffic between different networks
WHY A SWITCH

1. Higher Speed and Performance:


 Switches operate at Layer 2 and can forward data frames quickly within a local network,
resulting in lower latency and higher throughput compared to routers.

2. Cost-Effectiveness:
 Switches are generally less expensive than routers, making them a more budget-friendly option
for connecting multiple devices within a local area network (LAN).

3. Simplicity in Local Networks:


 In a simple LAN setup, switches provide all the necessary connectivity without the complexity
of routing protocols, making them easier to manage and configure.

4. Reduced Network Congestion:


 Switches intelligently forward data only to the intended recipient based on MAC addresses,
reducing unnecessary traffic and minimizing network congestion.

5. Scalability:
 Switches can easily be added to expand a network by connecting more devices without requiring
significant changes to the existing infrastructure, making them ideal for growing networks.

You might also like