# Subnetting Study Guide

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Subnetting Study Guide by Boson Software, LLC An octet is a binary number of 8 bits, with the lowest possible number being and the highest possible number being , or 28. The binary number , or 28, converts to 255 in decimal format. Table 1 Address Class Summary Class Number of Number of Hosts Per Subnet Range of Network IDs (First Octet) Class A ,777, Class B 16,384 65, Class C 2,097, The First-Octed Rule: High-Order Bits Determine the Address Class The decimal number in the first octet, or the high-order bits, represents the network ID for the address, and that network ID remains the same for all hosts on that network segment. High-order bits, which are also called the most significant bits, are those in the left-most portion of the binary address. The remaining octets act as host IDs. Address classes are categorized based on the decimal number in the first octet, as seen in Table 1, the Address Class Summary table. Table 2 Class Binary Start Binary End First Octet Most Significant Bits Special Note Class A * 0 Assignable Class B Assignable Class C Assignable Class D Multicast Class E InterNIC *Addresses beginning with 127 are used for loopback testing Table 3 Class Total Number of Per Class Equation Class A = 126 Net.H.H.H Class B = 16,384 Net.Net.H.H Class C = 2,097,152 Net.Net.Net.H Table 4 Class Total Number of Hosts Per Subnet Equation Hosts Class A = 16,777,214 x Class B = 65,534 x.y Class C = 254 x.y.z.255

2 Table 5 Reserved Address Space *RFC 1166 and 1918 = Private Address Space (Internal Use Only) Netblock Special Use Reference 10.x.x.x Private RFC x.x.x Loopback Diagnostics 172.(16 31).x.x Private RFC x Reserved JBP x Backbone Test C RH x Internet Test C JBP (3 255).x Unassigned NIC (0 1).x Backbone Local Nets SGC x Backbone Apollo Nets SGC x.x Private RFC Create a chart with eight columns. Converting Decimal into Binary 2. In the first row, enter 1 in the far right column. Moving to the left, double the preceding value to enter 2 in the next column, 4 in the next column, 8 in the next column, etc. 3. Continue in that manner until all columns in the first row contain a value. The column on the far left should contain the value 128. These values are called weighted values. 4. Beginning with the left-most weighted value, subtract each weighted value from the decimal being converted to binary until you reach the largest weighted value that can be subtracted without yielding a negative result. Enter a 1 as the binary value for that weighted value, and enter a 0 as the binary values for the weighted values that yielded negative results. 5. After reaching the largest weighted value that can be subtracted from the decimal without yielding a negative result, subtract the next weighted value from the remainder of the previous weighted value, not from the decimal. If a subsequent weighted value yields a negative result, enter a 0 as the binary value and subtract the next weighted value from the remainder yielded by the last successful subtraction (Note: See Weighted Values 2 and 1 in Table 6 below for an example). 6. Table 6 below illustrates the conversion of the decimal 29 into binary: Table 6 Weighted Values Subtraction from Decimal Most Significant Bit Least Significant Bit = = = = = = = 1 Binary = 0 7. The decimal 29 converts into binary as

4 Table 8 Binary Mask Decimal Mask Binary Hosts Bits Used Number of Valid Host Imcrements Net ID Not a subnet * * * * * * * Seven subnets are valid for Class A or B in the first octet. Class C has five valid subnets; the last two subnets are each a binary of 1. Logical Addressing All subnets can be categorized into seven ranges with three classes each (Class A, Class B, and Class C). Table 9 Maximum Number of Calculation for Host ID Maximum Number of Hosts Per Subnet Class A Subnet Mask Subnet Bits Required Host Bits Available Range ,777, Begin Class A Invalid 128 = Subnet Not Recommended ,194, Range 1/ ,097, Range 2/ ,048, Range 3/ , Range 4/ , Range 5/ , Range 6/7 4

5 Table 10 Maximum Number of Calculation for Host ID Maximum Number of Hosts Per Subnet Class B Subnet Mask Subnet Bits Required Host Bits Available Range , Class A Range 7/7 & Begin Class B Invalid 128 = Subnet Not Recommended , Range 1/ , Range 2/ , Range 3/ , Range 4/ , Range 5/ Range 6/7 Table 11 Maximum Number of Calculation for Host ID Maximum Number of Hosts Per Subnet Class C Subnet Mask Subnet Bits Required Host Bits Available Range Class B Range 7/7 & Begin Class C Invalid 128 = Subnet Not Recommended Range 1/ Range 2/ Range 3/ Range 4/ Range 5/5 Things to Remember The octets that contain only 1s or only 0s do not need additional calculation. If there are only 1s, the decimal value is 255; if there are only 0s, the decimal value is 0. Calculation is only required for the octet that has been broken at the bit boundary. 5

6 Table 12 Class C Example Breakdown Subnet Octet Range Incremental Description Value Network (Subnet 0 00/ net ID (goes in routing table) Do not use) 00/ first host ID in Subnet 0 00/ last host ID in Subnet 0 00/ broadcast for only Subnet 0 Subnet 1 of 4 01/ net ID (goes in routing table) 01/ first host ID for Subnet 1 01/ last host ID for Subnet 1 01/ broadcast for only Subnet 1 Subnet 2 of 4 10/ net ID (goes in routing table) 10/ first host ID for Subnet 2 Broadcast Subnet (Do not use) Network (Subnet 0 Do not use) 10/ last host ID for Subnet 2 10/ broadcast for only Subnet 2 11/ net ID (goes in routing table) 11/ first host ID in All 1s subnet 11/ last host ID in All 1s subnet 11/ local wire (all subnets) broadcast 000/ net ID (goes in routing table) 000/ first host ID in Subnet 0 000/ last host ID in Subnet 0 000/ broadcast for only Subnet 0 Subnet 1 of 8 001/ net ID (goes in routing table) 001/ first host ID for Subnet 1 001/ last host ID for Subnet 1 001/ broadcast for only Subnet 1 Subnet 2 of 8 010/ net ID (goes in routing table) 010/ first host ID for Subnet 2 010/ last host ID for Subnet 2 010/ broadcast for only Subnet 2 Subnet 3 of 8 011/ net ID (goes in routing table) 011/ first host ID for Subnet 3 011/ last host ID for Subnet 3 011/ broadcast for only Subnet 3 6

7 Subnet Octet Range Incremental Value Description Subnet 4 of 8 100/ net ID (goes in routing table) 100/ first host ID for Subnet 4 100/ last host ID for Subnet 4 100/ broadcast for only Subnet 4 Subnet 5 of 8 101/ net ID (goes in routing table) 101/ first host ID for Subnet 5 101/ last host ID for Subnet 5 101/ broadcast for only Subnet 5 Subnet 6 of 8 110/ net ID (goes in routing table) 110/ first host ID for Subnet 6 110/ last host ID for Subnet 6 110/ broadcast for only Subnet 6 Broadcast Subnet (Do not use) 111/ net ID (goes in routing table) 111/ first host ID in All 1s subnet 111/ last host ID in All 1s subnet 111/ local wire (all subnets) broadcast Power of 2 Shortcuts for Calculating Networks Gained from Using Host Bits Where n is equal to the number of host bits used for subnets, 2 n 2 = the total number of networks gained. Hosts Available after Subnetting Where h is equal to the number of host bits remaining after subnetting, 2 h 2 = the total number of hosts available. Example You need to subnet the Class C network address to obtain 5 additional networks, and you need to find out how many hosts will be available after subnetting. There are 8 host bits for a Class C address. Beginning with 1 host bit, calculate the number of networks that would be gained until you find a number of host bits that yields at least five networks. 1 host bit: = 1 network 2 host bits: = 2 networks 3 host bits: = 6 networks 7

8 From the calculations, you can see that 2 host bits will only yield 2 networks; you would not obtain the 5 networks that you need. However, 3 host bits will yield 6 networks, which will provide the 5 networks that you need. Of the 8 host bits for a Class C address, you have allocated 3 of those for subnetting, thus leaving 5 host bits available for their original purpose. As a result, 2 5 2, or 30, hosts can be supported on each subnet. Table 13 Bits Required (n) (2 n 2) Class A (24 bits available for subnetting) Hosts Per Subnet (2 h 2) Slash Notation Mask Subnet Slice = = 8,388,606 / Subnet = = 4,194,302 / Subnet 1/ = = 2,097,150 / Subnet 2/ = = 1,048,574 / Subnet 3/ = = 524,286 / Subnet 4/ = = 262,142 / Subnet 5/7 7* = = 131,070 / Subnet 6/7 8* 28 2 = = 65,534 / Subnet 7/7 * 7 subnets valid for Class A Table 14 Bits Required (n) (2 n 2) Class B (16 bits available for subnetting) Hosts Per Subnet (2 h 2) Slash Notation Mask Subnet Slice = = 32,766 / Subnet = = 16,382 / Subnet 1/ = = 8,190 / Subnet 2/ = = 4,094 / Subnet 3/ = = 2,046 / Subnet 4/ = = 1,022 / Subnet 5/7 7* = = 510 / Subnet 6/7 8* = = 254 / Subnet 7/7 * 7 subnets valid for Class B 8

9 Table 15 Bits Required (n) (2 n 2) Class C (8 bits available for subnetting) Hosts Per Subnet (2 h 2) Slash Notation Mask Subnet Slice = = 126 / Subnet = = 62 / Subnet 1/ = = 30 / Subnet 2/ = = 14 / Subnet 3/5 5* = = 6 / Subnet 4/5 6* = = 2 / Subnet 5/5 * 5 valid subnets for Class C; last 2 are binary all 1 Practice You have the address You need 5 subnets of equal size with 1,500 hosts each. Find the following information in the given order: 1. The number of host bits to obtain for the required number of subnets 2. The numbers of hosts available per subnet after subnetting 3. The decimal value of the new subnet mask 4. The incremental value of the subnets 5. The first host, broadcast, and last host of each subnet 1. Using powers of 2, determine the number of host bits to obtain for 5 subnets. The first octet is 132, which is within the Class B range ( ). Recall that each octet has 8 bits. The first two octets in a Class B address may not be used for subnetting, so there are two octets, or 16 bits, available. Beginning at the left side of the available bits and moving toward the right, remove one bit at a time from the host portion of the binary and calculate the number of networks gained with each bit = 0 (You will never use just 1 bit.) = 2 (Not enough networks; keep trying.) = 6 (3 bits will provide the 5 subnets and leave 1 available for future expansion.) Enter those 3 bits into a weighted values chart, as shown in Table 16 below. Table 16 Most Significant Bit Least Significant Bit Hosts Weighted Values Binary

11 Table 17 Range Subnet Incremental Value (subnet ID used by routing table) First Host IP Broadcast Last Host IP Invalid Broadcast Reserved Notes You cannot use either All 0s or All 1s subnets, which reduces the available subnets by 2 (2 n 2 = available subnets). The All 0s address is the network ID for that subnet and will be used by a router in its routing table. The All 1s address is the network broadcast for all subnets on that wire. 11

### TCP/IP Cheat Sheet. A Free Study Guide by Boson Software, LLC

boson_logo_tcpip.pdf 9/23/2010 11:28:19 AM TCP/IP Cheat Sheet A Free Study Guide by Boson Software, LLC Table 1 Address Class Summary Class s Hosts per Range of Network IDs (First Octet) Class A 126 16,777,214

### APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

### TCP/IP Drill Pack. By Donna Warren. Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19

TCP/IP Drill Pack By Donna Warren Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19 Drill 1: OSI vs DOD and the TCP/IP Protocol Suite Complete the following chart. On the next page give a brief

### Lab 10.3.5a Basic Subnetting

Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet

### Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

### Question 3.1.1. Question 3.2.1. Question 3.3.1. EdTech 552: Lab 3 Answer Sheet

Question 3.1.1 Question Answers a. 123 01111011 b. 202 11001010 c. 67 01000011 d. 7 00000111 e. 252 11111100 f. 91 01011011 g. 116.127.71.3 01110100.01111111.01010001.00000011 h. 255.255.255.0 11111111.11111111.11111111.00000000

### Source net: 200.1.1.0 Destination net: 200.1.2.0 Subnet mask: 255.255.255.0 Subnet mask: 255.255.255.0. Router Hub

then to a router. Remember that with a Class C network address, the first 3 octets, or 24 bits, are assigned as the network address. So, these are two different Class C networks. This leaves one octet,

### CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

CCNA R&S: Introduction to Networks Chapter 9: Subnetting IP Networks Frank Schneemann Chapter 9: Subnetting IP Networks Subnetting IP Networks In this chapter, you will be learning how devices can be grouped

### Subnetting Examples. There are three types of subnetting examples I will show in this document:

Subnetting Examples There are three types of subnetting examples I will show in this document: 1) Subnetting when given a required number of networks 2) Subnetting when given a required number of clients

### Classful Subnetting Explained

Classful ting Explained When given an IP Address and a Mask, how can you determine other information such as: The subnet address of this subnet The broadcast address of this subnet The range of Host Addresses

### Seven Steps to Subnetting

Seven Steps to Subnetting Excerpt from MCSE Guide to Microsoft Windows 2000 Networking Certification Edition, written by Kelly Caudle, Walter J. Glenn, and James Michael Stewart; published by Course Technology

### Lab#2: IP Addressing and Subnetting

IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by

### 3201 Computer Networks 2014/2015 Handout: Subnetting Question

Subnetting Questions with Answers Question1: Given the following: Network address: 192.168.10.0 Subnet mask: 255.255.255.224 1. How many subnets? Ans: 6 2. How many hosts? Ans: 30 3. What are the valid

Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address. Every computer on network has an IP address that represent its location on network. Two version

### One of the most important topics in any discussion of TCP/IP is IP. IP Addressing

IP Addressing 125 machine, called a RARP server, responds with the answer, and the identity crisis is over. RARP uses the information it does know about the machine s MAC address to learn its IP address

### Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

### Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

Expert Reference Series of White Papers Binary and IP Address Basics of Subnetting 1-800-COURSES www.globalknowledge.com Binary and IP Address Basics of Subnetting Alan Thomas, CCNA, CCSI, Global Knowledge

### CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

3 Concepts in IP Addressing Terms You ll Need to Understand: Binary Hexadecimal Decimal Octet IP address Subnet Mask Subnet Host Increment Techniques You ll Need to Master: Identifying Address Class and

### IP Subnetting: Practical Subnet Design and Address Determination Example

IP Subnetting: Practical Subnet Design and Address Determination Example When educators ask students what they consider to be the most confusing aspect in learning about networking, many say that it is

### Number of bits needed to address hosts 8

Advanced Subnetting Example 1: Your ISP has assigned you a Class C network address of 198.47.212.0. You have 3 networks in your company with the largest containing 134 hosts. You need to figure out if

### Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d

Module 10 Subnetting Class A, B and C addresses Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d 10.3.5a Basic Subnetting Use the following information and answer the following subnet

### Module 4, Assignment 3-2

Module 4, Assignment 3-2 Lab 3.4 Basic Subnetting Question 3.4.1: A company has applied for and received a Class C network address of 197.15.22.0. The physical network is to be divided into 4 subnets,

### IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification Wayne M. Pecena, CPBE, CBNE Texas A&M Information Technology Educational Broadcast Services IP Networking,

### 2.3 IPv4 Address Subnetting Part 2

.3 IPv4 Address Subnetting Part Objective Upon completion of this activity, you will be able to determine subnet information for a given IP address and subnetwork mask. When given an IP address, network

### Activity 6.7.4: IPv4 Address Subnetting Part 2

Activity 6.7.4: IPv4 Address Subnetting Part 2 Learning Objectives Upon completion of this activity, you will be able to determine subnet information for a given IP address and subnetwork mask. Background

### Sybex CCENT 100-101 Chapter 4: Easy Subnetting. Instructor & Todd Lammle

Sybex CCENT 100-101 Chapter 4: Easy Subnetting Instructor & Todd Lammle Chapter 4 Objectives The CCENT Topics Covered in this chapter include: IP addressing (IPv4 / IPv6) Describe the operation and necessity

### Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

### Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Subnetting Basics You learned previously how to define and find the valid host ranges used in a Class A, Class B, and Class C network address by turning the host bits all off and then all on. This is very

### You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

### Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

### The Subnet Training Guide

The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP

### IP Addressing A Simplified Tutorial

Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

### Expert Reference Series of White Papers. Simple Tricks To Ace the Subnetting Portion of Any Certification Exam 1-800-COURSES. www.globalknowledge.

Expert Reference Series of White Papers Simple Tricks To Ace the Subnetting Portion of Any Certification Exam 1-800-COURSES www.globalknowledge.com Simple Tricks To Ace the Subnetting Portion of Any Certification

### Expert Reference Series of White Papers. Solving the Mysteries of Subnetting

Expert Reference Series of White Papers Solving the Mysteries of Subnetting 1-800-COURSES www.globalknowledge.com Solving the Mysteries of Subnetting Raj Tolani, Global Knowledge Instructor Introduction

### How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

SUBNET MASK To define the network and host portions of an address, the devices use a separate 32-bit pattern called a subnet mask. We express the subnet mask in the same dotted decimal format as the IPv4

### IP Subnetting for the Masses Or How a 12 year old kid can subnet the most complex network.

IP Subnetting for the Masses Or How a 12 year old kid can subnet the most complex network. Joe Richker Page 1 8/8/2008 IP subnetting is the most feared part of working with TCP/IP for many people. The

### Pre-lab Preparation: 1. Read thoroughly and prepare the experiment sheet. 2. You must bring a printed copy of this experiment with you to the lab.

University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.5 Subnetting &Variable Length Subnet Mask (VLSM) Objectives 1. To become

### examines the ideas related to Class A, Class B, and Class C networks (in other words, classful IP networks).

This chapter covers the following subjects: Classful Network Concepts: This section examines the ideas related to Class A, Class B, and Class C networks (in other words, classful IP networks). Practice

### Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

### IT:101 Cisco Networking Academy I Subnetting

IT:101 Cisco Networking Academy I Subnetting The IPv4 address is 32 bits long and it is written in the form of dotted decimal notation. IP address in binary format: 11000000.00000001.00000001.00000020

### Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to

IP Addressing To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a 32-bit logical address known as an IP address. This topic introduces the components of an IP address.

### IP Addressing. and Subnetting. Workbook Version 1.5. Student Name:

IP Addressing and Subnetting Workbook Version.5 Student Name: IP Address Classes Class A 27 (Network 27 is reserved for loopback and internal testing) Leading bit pattern... Network. Host. Host. Host Class

Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment

### SUBNETTING SCENARIO S

SUBNETTING SCENARIO S This white paper provides several in-depth scenario s dealing with a very confusing topic, subnetting. Many networking engineers need extra practice to completely understand the intricacies

### CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing

CE363 Data Communications & Networking Chapter 6 Network Layer: Logical Addressing TCP/IP and OSI model APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT NETWORK Host-Network TRANSPORT NETWORK DATA

### Subnetting IPv4 and IPv6

Subnetting IPv4 and IPv6 Advanced Networking: Routing & Switching 1 Chapter 9 Copyleft 2013 Hacklab Cosenza (http://hlcs.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials

### - IPv4 Addressing and Subnetting -

1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

### IP Subnetting and Related Topics A Tutorial by Chris Uriarte <chrisjur@cju.com> Updated April 2001

IP Subnetting and Related Topics A Tutorial by Chris Uriarte Updated April 2001 IP Addresses and their Binary Equivalents First and foremost, it s important to understand that every

### WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3

### Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe

### Expert Reference Series of White Papers. Solving the Mysteries of Subnetting 1-800-COURSES. www.globalknowledge.com

Expert Reference Series of White Papers Solving the Mysteries of Subnetting 1-800-COURSES www.globalknowledge.com Solving the Mysteries of Subnetting Raj Tolani, Global Knowledge Instructor Introduction

### IP Subnetting Colin Weaver, ITdojo

IP Subnetting Colin Weaver, ITdojo Note: This document assumes that subnet zero is NOT used. For a description of subnet-zero, go here (http://www.cisco.com/warp/public/105/40.html). Subnetting IP networks

### Internet Addressing. Name: identifies what the object is Address: identifies where it is Route: identifies how to get there

A unified network requires a universal communication service. Host identifiers: Name: identifies what the object is Address: identifies where it is Route: identifies how to get there Copyright Jim Martin

### CONFIGURING TCP/IP ADDRESSING AND SECURITY

1 Chapter 11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 2 OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security

### PART IV. Network Layer

PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

### Packet Tracer - Subnetting Scenario 1 (Instructor Version)

(Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or to provide

### SYMETRIX SOLUTIONS: TECH TIP April 2014

Understanding Class C Masking In the day to day support operations a Symertix tech support agent will most often come across customers that have their PC and Symetrix DSP on a Class C Mask of 255.255.255.0.

### Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

### Topics. Subnetting. The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing Creating a Subnet Example of Subnetting 1/37

1/37 Subnetting Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Topics 2/37 The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing

### Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

### Chapter 3: IP Addressing and VLSM

Chapter 3: IP Addressing and VLSM QUESTION 54 What is the principle reason to use a private IP address on an internal network? A. Subnet strategy for private companies. B. Manage and scale the growth of

### IP Sub Networking Mini Howto

Table of Contents IP Sub Networking Mini Howto...1 Robert Hart, hartr@interweft.com.au...1 1. Copyright...1 2. Introduction...1 3. The Anatomy of IP numbers...1 4. What are subnets?...1 5. Why subnetwork?...1

### 2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

### Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 5 IPv4 Addresses TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Outline TCP/IP Protocol Suite 2 5-1 INTRODUCTION The

### IP Subnetting. Subnetting

IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network

Part2 Chapter 8 Advanced TCP/IP Network Design - CLASSLESS ADDRESSING AND VARIABLE- LENGTH SUBNET MASKS Variable-Length Subnet Masks Variable-length subnet masks specified how a single network ID could

### TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers

### 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

### TCP/IP Basis. OSI Model

TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

### IPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011

IPv4 Addressing Simplified by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011 The concept of IP Addressing is foundational to overall routing in general. Without

### The Basics. As we begin our discussion of TCP/IP networking with Windows 2000 we first look at the basics of TCP/IP. We look at all PART ONE

ch01.qxd 3/19/01 3:05 PM Page 1 PART ONE The Basics As we begin our discussion of TCP/IP networking with Windows 2000 we first look at the basics of TCP/IP. We look at all those funny numbers and talk

### Ch.9 Classless And Subnet Address Extensions (CIDR)

CSC521 Communication Protocols 網 路 通 訊 協 定 Ch.9 Classless And Subnet Address Extensions (CIDR) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Review Of Relevant Facts 3. Minimizing Network Numbers

Chapter 4 IP Addresses: Classful Addressing The McGraw-Hill Companies, Inc., 2000 1 CONTENTS INTRODUCTION CLASSFUL ADDRESSING OTHER ISSUES A SAMPLE INTERNET The McGraw-Hill Companies, Inc., 2000 2 4.1

### Part A:Background/Preparation

Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration

### We Are HERE! Subne\ng

TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design

### (Refer Slide Time: 02:17)

Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

### Desirable Properties Of An Internet Addressing Scheme

Desirable Properties Of An Internet Addressing Scheme Compact Universal Works with all network hardware Supports efficient decision making - Test whether a destination can be reached directly - Decide

### Fast and Easy Subnetting. Marc Khayat, Technical Advocacy Team makhayat@cisco.com May 2011

Fast and Easy Subnetting Marc Khayat, Technical Advocacy Team makhayat@cisco.com May 2011 Number of required subnets Number of required hosts per subnet 2011 Cisco and/or its affiliates. All rights reserved.

### Appendix B Network, Routing, Firewall, and Basics

Appendix B Network, Routing, Firewall, and Basics This chapter provides an overview of IP networks, routing, and networking. Related Publications As you read this document, you may be directed to various

### IP Addressing and Subnetting for New Users

IP Addressing and Subnetting for New Users Document ID: 13788 Contents Introduction Prerequisites Requirements Components Used Additional Information Conventions Understanding IP Addresses Network Masks

### cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

### Chapter 19 Network Layer: Logical Addressing 19.1

Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that

Motivation A virtual network operates like a physical network and needs an addressing scheme, a packet format, and delivery techniques. An addressing scheme is critical and must appear to be a single uniform

IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

NETWORK ADMINISTRATION INTRODUCTION The PressureMAP software provides users who have access to an Ethernet network supporting TCP/IP with the ability to remotely log into the MAP System via a network connection,

### VLSM CHAPTER 2. IP Subnet Zero

CHAPTER 2 VLSM Variable-length subnet masking (VLSM) is the me realistic way of subnetting a netwk to make f the most efficient use of all of the bits Remember that when you perfm classful ( what I sometimes

### CCNA : Cisco Certified Network Associate Study Guide, 5th Edition (640-801) Todd Lammle

SYBEX Sample Chapter CCNA : Cisco Certified Network Associate Study Guide, 5th Edition (640-801) Todd Lammle Chapter 3: IP Subnetting and Variable Length Subnet Masks (VLSMs) Copyright 2005 SYBEX Inc.,