SlideShare une entreprise Scribd logo
1  sur  12
Chapter 6 Addressing the Network - IPV4 Part III
Addressing the Network: IPv4 Subnetting: Dividing Networks Into the Right Sizes
Dividing Networks Into the Right Size Network: 192.168.80.0  Subnet Mask:  255.255.255.224 192.168.80.255 192.168.80.225 – 192.168.80.254 192.168.80.224 7 192.168.80.223 192.168.80.193 – 192.168.80.222 192.168.80.192 6 192.168.80.191 192.168.80.161 – 192.168.80.190 192.168.80.160 5 192.168.80.159 192.168.80.129 – 192.168.80.158 192.168.80.128 4 192.168.80.127 192.168.80.97 – 192.168.80.126 192.168.80.96 3 192.168.80.95 192.168.80.65 – 192.168.80.94 192.168.80.64 2 192.168.80.63 192.168.80.33 – 192.168.80.62 192.168.80.32 1 192.168.80.31 192.168.80.1 – 192.168.80.30 192.168.80.0 0 Broadcast Address Subnet Address Range Network Address ID
Dividing Networks Into the Right Size 192.168.80.0/27 192.168.80.32/27 192.168.80.64/27 192.168.80.96/27 192.168.80.128/27 192.168.80.160/27 192.168.80.192/27
Dividing Networks Into the Right Size 192.168.80.0/27 Available:  30 Required:  5 Wasted:  25 192.168.80.96/27 Available:  30 Required:  4 Wasted:  26 192.168.80.128/27 Available:  30 Required:  2 Wasted:  28 Assigned  Required Wasted Network 1 30 5 25 Network 2 30 5 25 Network 3 30 4 26 Network 4 30 5 25 Network 5 30 2 28 Network 6 30 2 28 Network 7 30 5 25 Total 210 28 182
Variable Length Subnet Masking (VLSM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Variable Length Subnet Masking (VLSM) 10.2.0.0/24 10.2.0.1 10.2.0.254 10.2.0.255 Sub-subnet 10.2.1.0/24 10.2.1.1 10.2.1.254 10.2.1.255 Using /24 10.2.2.0/24 10.2.2.1 10.2.2.254 10.2.2.255 Etc. 10.2.255.0/24 10.2.255.1 10.2.255.254 10.2.255.255 10.0.0.0/8 Subnet using  /16 Subnet 1 st  Host Last Host Broadcast 10.0.0.0/16 10.0.0.1 10.0.255.254 10.0.255.255 10.1.0.0/16 10.1.0.1 10.1.255.254 10.1.255.255 10.2.0.0/16 10.2.0.1 10.2.255.254 10.2.255.255 10.3.0.0/16 10.3.0.1 10.3.255.254 10.3.255.255 Etc. 10.255.0.0/16 10.255.0.1 10.255.255.254 10.255.255.255 Subnet 1 st  Host Last Host Broadcast
Variable Length Subnet Masking (VLSM) 7 Networks with 30 usable addresses for each network Wasted 28 addresses on  each  WAN link  192.168.20.0/27 192.168.20.32/27 192.168.20.96/27 192.168.20.64/27 192.168.20.64/27 192.168.20.128/27 192.168.20.128/27
Variable Length Subnet Masking (VLSM) 192.168.20.0/27 192.168.20.32/27 192.168.20.64/27 192.168.20.96/27
Variable Length Subnet Masking (VLSM) 1 1 0 0 0 0  0 0 192.168.20.192 1 1 0 0 0 1  0 0 192.168.20.196 1 1 0 0 1 0  0 0 192.168.20.200 1 1 0 0 1 1  0 0 192.168.20.204 1 1 0 1 0 0  0 0 192.168.20.208 1 1 0 1 0 1  0 0 192.168.20.212 1 1 0 1 1 0  0 0 192.168.20.216 1 1 0 1 1 1  0 0 192.168.20.220 255.255.255.252 Sub-Subnet Mask Magic Number =  ? 1 1 1 1 1 1  0 0 Original Subnet Mask Magic Number =  32 255.255.255.224 1 1 1 0 0 0 0 0 192.168.20.0 0 0 0 0 0 0 0 0 192.168.20.32 0 0 1 0 0 0 0 0 192.168.20.64 0 1 0 0 0 0 0 0 192.168.20.96 0 1 1 0 0 0 0 0 192.168.20.128 1 0 0 0 0 0 0 0 192.168.20.160 1 0 1 0 0 0 0 0 192.168.20.192 1 1 0 0 0 0 0 0 192.168.20.224 1 1 1 0 0 0 0 0
Variable Length Subnet Masking (VLSM) ,[object Object],[object Object],[object Object]
Variable Length Subnet Masking (VLSM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances (20)

Subnetting
SubnettingSubnetting
Subnetting
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Subnetting class C
Subnetting class CSubnetting class C
Subnetting class C
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Subneting
SubnetingSubneting
Subneting
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
 
Vlsm
VlsmVlsm
Vlsm
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ramakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressingRamakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressing
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
Vlsm
VlsmVlsm
Vlsm
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 

En vedette

How to IP Subnetting IPV4
How to IP Subnetting IPV4How to IP Subnetting IPV4
How to IP Subnetting IPV4Ariful Islam
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answerNarayana Samy
 
Vlsm exercises solutions
Vlsm exercises solutionsVlsm exercises solutions
Vlsm exercises solutionsGerry Ismanto
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiNetwax Lab
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiNetwax Lab
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersS Khawaja
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesKrishna Mohan
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer) Arz Sy
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

En vedette (15)

How to IP Subnetting IPV4
How to IP Subnetting IPV4How to IP Subnetting IPV4
How to IP Subnetting IPV4
 
Vlsm subnetting chart
Vlsm subnetting chartVlsm subnetting chart
Vlsm subnetting chart
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
Vlsm exercises solutions
Vlsm exercises solutionsVlsm exercises solutions
Vlsm exercises solutions
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List ii
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 
Ip address
Ip addressIp address
Ip address
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similaire à Expl net fund_chapter_06_i_pv4_part_3

Subnetting class
Subnetting classSubnetting class
Subnetting classFTC
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptxaida alsamawi
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and SubnettingAtakan ATAK
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Dân Chơi
 
lecture8.ppt
lecture8.pptlecture8.ppt
lecture8.pptImXaib
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
ICND2_Chapter 5 for Networking beginners
ICND2_Chapter 5 for Networking beginnersICND2_Chapter 5 for Networking beginners
ICND2_Chapter 5 for Networking beginnersCSC
 
Ip addressing subnetting workbook
Ip addressing subnetting workbookIp addressing subnetting workbook
Ip addressing subnetting workbookVijay Shukla
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 

Similaire à Expl net fund_chapter_06_i_pv4_part_3 (20)

Subnetting class
Subnetting classSubnetting class
Subnetting class
 
CCNP Routing
CCNP Routing CCNP Routing
CCNP Routing
 
CCNP Routing Workbook
CCNP Routing WorkbookCCNP Routing Workbook
CCNP Routing Workbook
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptx
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Day03
Day03 Day03
Day03
 
lecture8.ppt
lecture8.pptlecture8.ppt
lecture8.ppt
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
ICND2_Chapter 5 for Networking beginners
ICND2_Chapter 5 for Networking beginnersICND2_Chapter 5 for Networking beginners
ICND2_Chapter 5 for Networking beginners
 
Ip addressing subnetting workbook
Ip addressing subnetting workbookIp addressing subnetting workbook
Ip addressing subnetting workbook
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Ipv4 address
Ipv4 addressIpv4 address
Ipv4 address
 

Dernier

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Dernier (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Expl net fund_chapter_06_i_pv4_part_3

  • 1. Chapter 6 Addressing the Network - IPV4 Part III
  • 2. Addressing the Network: IPv4 Subnetting: Dividing Networks Into the Right Sizes
  • 3. Dividing Networks Into the Right Size Network: 192.168.80.0 Subnet Mask: 255.255.255.224 192.168.80.255 192.168.80.225 – 192.168.80.254 192.168.80.224 7 192.168.80.223 192.168.80.193 – 192.168.80.222 192.168.80.192 6 192.168.80.191 192.168.80.161 – 192.168.80.190 192.168.80.160 5 192.168.80.159 192.168.80.129 – 192.168.80.158 192.168.80.128 4 192.168.80.127 192.168.80.97 – 192.168.80.126 192.168.80.96 3 192.168.80.95 192.168.80.65 – 192.168.80.94 192.168.80.64 2 192.168.80.63 192.168.80.33 – 192.168.80.62 192.168.80.32 1 192.168.80.31 192.168.80.1 – 192.168.80.30 192.168.80.0 0 Broadcast Address Subnet Address Range Network Address ID
  • 4. Dividing Networks Into the Right Size 192.168.80.0/27 192.168.80.32/27 192.168.80.64/27 192.168.80.96/27 192.168.80.128/27 192.168.80.160/27 192.168.80.192/27
  • 5. Dividing Networks Into the Right Size 192.168.80.0/27 Available: 30 Required: 5 Wasted: 25 192.168.80.96/27 Available: 30 Required: 4 Wasted: 26 192.168.80.128/27 Available: 30 Required: 2 Wasted: 28 Assigned Required Wasted Network 1 30 5 25 Network 2 30 5 25 Network 3 30 4 26 Network 4 30 5 25 Network 5 30 2 28 Network 6 30 2 28 Network 7 30 5 25 Total 210 28 182
  • 6.
  • 7. Variable Length Subnet Masking (VLSM) 10.2.0.0/24 10.2.0.1 10.2.0.254 10.2.0.255 Sub-subnet 10.2.1.0/24 10.2.1.1 10.2.1.254 10.2.1.255 Using /24 10.2.2.0/24 10.2.2.1 10.2.2.254 10.2.2.255 Etc. 10.2.255.0/24 10.2.255.1 10.2.255.254 10.2.255.255 10.0.0.0/8 Subnet using /16 Subnet 1 st Host Last Host Broadcast 10.0.0.0/16 10.0.0.1 10.0.255.254 10.0.255.255 10.1.0.0/16 10.1.0.1 10.1.255.254 10.1.255.255 10.2.0.0/16 10.2.0.1 10.2.255.254 10.2.255.255 10.3.0.0/16 10.3.0.1 10.3.255.254 10.3.255.255 Etc. 10.255.0.0/16 10.255.0.1 10.255.255.254 10.255.255.255 Subnet 1 st Host Last Host Broadcast
  • 8. Variable Length Subnet Masking (VLSM) 7 Networks with 30 usable addresses for each network Wasted 28 addresses on each WAN link 192.168.20.0/27 192.168.20.32/27 192.168.20.96/27 192.168.20.64/27 192.168.20.64/27 192.168.20.128/27 192.168.20.128/27
  • 9. Variable Length Subnet Masking (VLSM) 192.168.20.0/27 192.168.20.32/27 192.168.20.64/27 192.168.20.96/27
  • 10. Variable Length Subnet Masking (VLSM) 1 1 0 0 0 0 0 0 192.168.20.192 1 1 0 0 0 1 0 0 192.168.20.196 1 1 0 0 1 0 0 0 192.168.20.200 1 1 0 0 1 1 0 0 192.168.20.204 1 1 0 1 0 0 0 0 192.168.20.208 1 1 0 1 0 1 0 0 192.168.20.212 1 1 0 1 1 0 0 0 192.168.20.216 1 1 0 1 1 1 0 0 192.168.20.220 255.255.255.252 Sub-Subnet Mask Magic Number = ? 1 1 1 1 1 1 0 0 Original Subnet Mask Magic Number = 32 255.255.255.224 1 1 1 0 0 0 0 0 192.168.20.0 0 0 0 0 0 0 0 0 192.168.20.32 0 0 1 0 0 0 0 0 192.168.20.64 0 1 0 0 0 0 0 0 192.168.20.96 0 1 1 0 0 0 0 0 192.168.20.128 1 0 0 0 0 0 0 0 192.168.20.160 1 0 1 0 0 0 0 0 192.168.20.192 1 1 0 0 0 0 0 0 192.168.20.224 1 1 1 0 0 0 0 0
  • 11.
  • 12.