0% found this document useful (0 votes)
30 views58 pages

Chapter 2

The document discusses subnetting, including the binary number system, dotted decimal notation, and the advantages and disadvantages of subnetting. It explains the concept of IP addresses, classful addressing, and subnet masks, along with examples of converting between binary and decimal notations. Additionally, it highlights the benefits of subnetting, such as reduced network traffic and optimized performance, while also noting the increased complexity and potential wastage of IP addresses.

Uploaded by

Dawit Sebhat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views58 pages

Chapter 2

The document discusses subnetting, including the binary number system, dotted decimal notation, and the advantages and disadvantages of subnetting. It explains the concept of IP addresses, classful addressing, and subnet masks, along with examples of converting between binary and decimal notations. Additionally, it highlights the benefits of subnetting, such as reduced network traffic and optimized performance, while also noting the increased complexity and potential wastage of IP addresses.

Uploaded by

Dawit Sebhat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

Chapter :2

Subnetting
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Outline
❑The Binary Number System
❑Dotted Decimal Notation
❑Subnetting ▪

▪ Advantages of Subnetting
▪ Default Subnet mask ▪

▪ Custom subnet mask ▪ Disadvantages of Subnetting


▪ Range of subnet
❑Virtual LAN (VLAN)
▪ bit borrowing
▪ No of subnet
▪ No host
▪ No of valid host

2
4.1 INTRODUCTION
▪ The identifier used in the IP layer of the TCP/IP protocol
suite to identify each device connected to the Internet is
called the Internet address or IP address.
▪ An IP address is a 32-bit address that uniquely and
universally defines the connection of a host or a router to
the Internet.
▪ IP addresses are unique. They are unique in the sense that
each address defines one, and only one, connection to the
Internet.
▪ Two devices on the Internet can never have the same
address.

3
TCP/IP Protocol Suite 4
TCP/IP Protocol Suite 5
Note 1:

An IP address is a 32-bit address.

9
Note 2:

The IP addresses are unique.

10
Note 3:

The address space of IPv4 is


232 = 4,294,967,296 Addresses.

11
Figure 4.1 Dotted-decimal notation

12
Note:

The binary, decimal, and hexadecimal


number systems are reviewed in

13
Example 1

Change the following IP addresses from binary notation to


dotted-decimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 11100111 11011011 10001011 01101111
d. 11111001 10011011 11111011 00001111
Solution
We replace each group of 8 bits with its equivalent decimal
number and add dots for separation:

a. 129.11.11.239 b. 193.131.27.255
c. 231.219.139.111 d. 249.155.251.15

14
Example 2

Change the following IP addresses from dotted-decimal


notation to binary notation.
a. 111.56.45.78 b. 221.34.7.82
c. 241.8.56.12 d. 75.45.34.78

Solution
We replace each decimal number with its binary equivalent:
a. 01101111 00111000 00101101 01001110
b. 11011101 00100010 00000111 01010010
c. 11110001 00001000 00111000 00001100
d. 01001011 00101101 00100010 01001110
15
Example 3

Find the error, if any, in the following IP addresses:


a. 111.56.045.78 b. 221.34.7.8.20
c. 75.45.301.14 d. 11100010.23.14.67

Solution
a. There are no leading zeroes in dotted-decimal notation (045).
b. We may not have more than four numbers in an IP address.
c. In dotted-decimal notation, each number is less than or equal
to 255; 301 is outside this range.
d. A mixture of binary notation and dotted-decimal notation is not
allowed.
16
Example 4

Change the following IP addresses from binary notation to


hexadecimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
Solution
We replace each group of 4 bits with its hexadecimal equivalent
(see Appendix B). Note that hexadecimal notation normally has
no added spaces or dots; however, 0X (or 0x) is added at the
beginning or the subscript 16 at the end to show that the
number is in hexadecimal.
a. 0X810B0BEF or 810B0BEF16
b. 0XC1831BFF or C1831BFF16
17
4.2 CLASSFUL ADDRESSING

• IP addresses, when started a few decades ago, used the concept of classes.

• This architecture is called classful addressing.

• In the mid-1990s, a new architecture, called classless addressing, was

introduced and will eventually supersede the original architecture.

• However, part of the Internet is still using classful addressing, but the

migration is very fast.

18
Figure 4.2 Occupation of the address space

19
Table 4.1 Addresses per class

20
Figure 4.3 Finding the class in binary notation

21
Example 5

How can we prove that we have 2,147,483,648 addresses in


class A?

Solution

In class A, only 1 bit defines the class. The remaining 31 bits


are available for the address. With 31 bits, we can have 231
or 2,147,483,648 addresses.

TCP/IP Protocol Suite 22


Example 6

Find the class of each address:


a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 10100111 11011011 10001011 01101111
d. 11110011 10011011 11111011 00001111

Solution

See the procedure in Figure 4.3.


a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C address.
c. The first bit is 0; the second bit is 1. This is a class B address.
d. The first 4 bits are 1s. This is a class E address..
TCP/IP Protocol Suite 23
Figure 4.4 Finding the class in decimal notation

TCP/IP Protocol Suite 24


Example 7

Find the class of each address:


a. 227.12.14.87 b.193.14.56.22 c.14.23.120.8
d. 252.5.15.111 e.134.11.78.56

Solution
a. The first byte is 227 (between 224 and 239); the class is D.
b. The first byte is 193 (between 192 and 223); the class is C.
c. The first byte is 14 (between 0 and 127); the class is A.
d. The first byte is 252 (between 240 and 255); the class is E.
e. The first byte is 134 (between 128 and 191); the class is B.

TCP/IP Protocol Suite 25


Example 8
▪ In Example 5 we showed that class A has 231 (2,147,483,648)
addresses. How can we prove this same fact using dotted-
decimal notation?
Solution
1. The addresses in class A range from 0.0.0.0 to 127.255.255.255.
2. We need to show that the difference between these two numbers is
2,147,483,648.
3. This is a good exercise because it shows us how to define the range of
addresses between two addresses.
4. We notice that we are dealing with base 256 numbers here.
5. Each byte in the notation has a weight.
6. The weights are as follows (see Appendix B):

TCP/IP Protocol Suite


See Next Slide26
No NetID= 23 = 8
No usable Host= 25 = 32-2 = 30
1 for broadcast ID
No HostID= 25 = 32
1 for network ID
TCP/IP Protocol Suite 27
204.17.5.224

.225

TCP/IP Protocol Suite 28


Note:

In classful addressing, the network


address (the first address in the block)
is the one that is assigned to the
organization. The range of addresses
can automatically be inferred from the
network address.

TCP/IP Protocol Suite 29


Example 9

Given the network address 17.0.0.0, find the class?, the block?,
and the range of the addresses?

Solution

1. The class is A because the first byte is between 0 and 127.


2. The block has a netid of 17.
3. The addresses range from 17.0.0.0 to 17.255.255.255.
00010001.00000000.00000000.00000000 ---00010001.11111111.11111111.11111111

TCP/IP Protocol Suite 30


Example 10

Given the network address 132.21.0.0, find the class, the block,
and the range of the addresses.

Solution
1. The class is B because the first byte is between 128 and 191.
2. The block has a netid of 132.21.
3. The addresses range from 132.21.0.0 to 132.21.255.255.

TCP/IP Protocol Suite 31


Example 11

Given the network address 220.34.76.0, find the class, the


block, and the range of the addresses.

Solution

1. The class is C because the first byte is between 192 and 223.
2. The block has a netid of 220.34.76.
3. The addresses range from 220.34.76.0 to 220.34.76.255.

TCP/IP Protocol Suite 32


Figure 4.10 Masking concept

What is the concept of subnetting and subnet mask?


• A subnet mask is a number that distinguishes the network address and the host
address within an IP address.
• A subnet is a smaller network within a network that requires a subnet mask.
• Subnetting is the process of dividing a network into two or more subnets.
• To get the network Address we apply AND operation.

TCP/IP Protocol Suite 33


Figure 4.11 AND operation

TCP/IP Protocol Suite 34


Table 4.2 Default masks

TCP/IP Protocol Suite 35


Note:

1. The network address is the beginning


address of each block.
2. It can be found by applying the default
mask to any of the addresses in the block
(including itself).
3. It retains the netid of the block and sets
the hostid to zero.

TCP/IP Protocol Suite 36


Example 12

Given the address 23.56.7.91, find the beginning address


(network address).

Solution
1. The default mask is 255.0.0.0, which means that only the first byte is preserved and the
other 3 bytes are set to 0s.
2. The network address is 23.0.0.0.

TCP/IP Protocol Suite 37


Example 13

Given the address 132.6.17.85, find the beginning address


(network address).

Solution
The default mask is 255.255.0.0, which means that the first 2
bytes are preserved and the other 2 bytes are set to 0s.
The network address is 132.6.0.0.

TCP/IP Protocol Suite 38


Example 14

Given the address 201.180.56.5, find the beginning address


(network address).

Solution
The default mask is 255.255.255.0, which means that the first 3
bytes are preserved and the last byte is set to 0. The network
address is 201.180.56.0.

TCP/IP Protocol Suite 39


Note:
Note that we must not apply the default
mask of one class to an address
belonging to another class.

TCP/IP Protocol Suite 40


Loopback address
◼ The IP address with the first byte equal to 127 is used for the loopback
address which is an address used to test the software on a machine.
◼ For example, an application such as (ping ) can send a packet with a
loopback address as the destination address to see it IP software is capable
of receiving and processing a packet.

TCP/IP Protocol Suite 41


Subnet mask
The default mask is used when network is not subnetted.
The defualt mask is used to find the first address in the block or
network address
When network subnetted , the situation is different
We have a subnet mask .
The default mask creates the network address ; the subnet mask
creates the subnetwork address

TCP/IP Protocol Suite 42


Figure 4.24 Default mask and subnet mask

128 64 32 16 8 4 2 1 256

1 1 0 0 0 0 0 0 192
AND
Operation
0 1 0 0 1 0 0 0 72

0 1 0 0 0 0 0 0 64

TCP/IP Protocol Suite 43


Figure 4.24 Default mask and subnet mask

128 64 32 16 8 4 2 1 256

1 1 0 0 0 0 1 0 192
AND
Operation
0 1 0 0 0 1 1 0 70

0 1 0 0 0 0 1 0 66

130.15.66.0

130.15.70.1 130.15.0.0

255.255.194.0

130.15.66.0
130.15..70.1

TCP/IP Protocol Suite 44


Example 15

What is the subnetwork address if the destination address is


200.45.34.56 and the subnet mask is 255.255.240.0?

Solution
We apply the AND operation on the address and the subnet
mask.
Address ➡ 11001000 00101101 00100010 00111000
Subnet Mask ➡ 11111111 11111111 11110000 00000000
Subnetwork Address ➡ 11001000 00101101 00100000 00000000.

TCP/IP Protocol Suite 45


Figure 4.25 Comparison of a default mask and a subnet mask

• The number of 1s in default mask is predetermined


(8,16 or 24) .
• In subnet mask the number of 1s is more than the
number of 1s in the corresponding default mask.

TCP/IP Protocol Suite 46


Benefits of Subnetting
1)Reduced network traffic
2)Optimized network performance
3)Simplified management
4)Facilitated spanning of large
geographical distances

47
Disadvantages of Subnetting
▪ Subnetting increases the network's complexity.
▪ More subnets mean more IP addresses are wasted because each
subnet has its own network address and broadcast address.
▪ We have to face a loss of IP Addresses.
I. This is because two IP Addresses are wasted for each subnet.
II. One IP address is wasted for its network address.
III. Other IP Address is wasted for its direct broadcasting address

48
Implementing VLAN

➢ What is LAN?
➢ What is VLAN?
➢ Why do we need VLAN?
➢ How to configure VLAN?

0
◼ A LAN includes all devices in the same broadcast

domain.

◼ A broadcast domain includes the set of all LAN-

connected devices that when any of the devices sends

a broadcast frame, all the other devices get a copy of

the frame.

◼ Without VLANs, a switch considers all its interfaces

to be in the same broadcast domain; in others words,

all connected devices are in the same LAN.


Hub

Switch

VLAN Basics
◼ With VLANs, a switch can put some interfaces into
one broadcast domain and some into another,
creating multiple broadcast domains

◼ These individual broadcast domains created by the


switch are called virtual LANs.

◼ The more hosts in a single VLAN, the larger the


number of broadcasts, and the greater the processing
time required by each host in the VLAN.
VLAN Definitions
◼ VLAN (virtual LAN) is a logical partition of a layer 2 network
◼ Multiple partition can be created, allowing for multiple VLANs to
co-exist
◼ Each VLAN is a broadcast domain, usually with its own IP
network
◼ VLANS are mutually isolated and packets can only pass between
them through a router
◼ The partitioning of the layer 2 network takes inside a layer 2
device, usually a switch.
◼ The hosts grouped within a VLAN are unaware of the VLAN’s
existence
VLAN Definitions

VLAN Basics by TD
Benefits of VLANs: These are just a few reasons
for separating hosts into different VLANs.
1. To create more flexible designs that group users by

department, or by groups that work together instead of

by physical location.

2. To segment devices into smaller LANs (to shrink

broadcast domains) to reduce overhead caused to each

host in the VLAN


Controlling Broadcast Domains with VLANs
◼ VLANs can be used to limit the reach of broadcast frames

◼ A VLAN is a broadcast domain of its own

◼ Therefore, a broadcast frame sent by a device in a specific


VLAN is forwarded within that VLAN only.

◼ This help controlling the reach of broadcast frames and their


impact in the network

◼ Unicast and multicast frames are forwarded within the


originating VLAN as well

56
▪ To separate traffic sent by an IP phone from traffic
sent by PCs connected to the phones(Better
performance)

▪ Cost reduction

▪ Improved IT staff efficiency

▪ To enforce better security by keeping hosts that work


with sensitive data on a separate VLAN

TCP/IP Protocol Suite 57

You might also like