SlideShare a Scribd company logo
1 of 30
Mahmmoud Mahdi
 Allows you to take one larger network and
  break it into a bunch of smaller networks.
 benefits:
  Reduced network traffic
  Optimized network performance
  Simplified management
  Facilitated spanning of large geographical
   distances
192.168.2.1   192.168.3.1




              192.168.3.2




192.168.2.2
              192.168.3.3
    A 32-bit value that allows the recipient of IP packets
    to distinguish between:
     The network ID portion of the IP address.
     The host ID portion of the IP address.
   The 1s in the subnet mask represent:
     the positions that refer to the network or subnet
      addresses.
   Not all networks need subnets:
     meaning they use the default subnet mask.
     These default masks cannot change.
      ▪ Class A network, you can’t change the first byte in a subnet mask;
        it must read 255.0.0.0 at a minimum.
      ▪ Class B: start with 255.255.0.0
      ▪ Class C: start with 255.255.255.0.
Class B address
                  Class B address

      Network address       Host address

               130.57.
                130.57.     1.56
                             1.56


1000 0010. 0011 1001.
 1000 0010. 0011 1001.       0000 0001. 0011 1000
                              0000 0001. 0011 1000


      Class B address with aasubnet address
       Class B address with subnet address

      Network address         Subnet   Host address


1000 0010. 0011 1001.
 1000 0010. 0011 1001.        0000 0001. 0011 1000
                               0000 0001. 0011 1000
 To create subnet:
  Take bits from the host portion of the IP address
   and reserve them to define the subnet address.
  This means fewer bits for hosts, so the more
   subnets, the fewer bits available for defining
   hosts.
192.168.2.1
                     255.255.255.0

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0

       192.168.2.1/24 (CIDR notation)


                 1 network                28-2=254
                                          addresses
192.168.2.32    192.168.2.128
                              192.168.2.1   192.168.2.64
                                            192.168.2.96
                                                            192.168.2.160
                                                            192.168.2.192
                                            192.168.2.128   192.168.2.234
                        255.255.255.224           23=8subnets



1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0

      192.168.2.1/27 (CIDR notation)

                                                       25-2=30
                       network                         addresses
 CIDR creates a hierarchical addressing
  structure by breaking the network address
  space into CIDR blocks
 CIDR notation:
  describes a network by specifying the base
   address and the number of bits used for the
   network portion
  i.e., 10.0.0.0/8
   ▪ a network using 24 bits for host numbering
   ▪ a maximum of 224 -2 possible host addresses.
 Method that ISPs use to allocate a number of
 addresses to a company, a home—a customer.
 192.168.10.32/28:
   Telling you what your subnet mask is.
   The slash notation (/)
    ▪ how many bits are turned on (1s).
 Keep in Mind:
   the largest subnet mask available (regardless of the
   class of address) can only be a /30.
    ▪ you’ve got to keep at least 2 bits for host bits.
 Example:
  A Class A default subnet mask:
   ▪ which is 255.0.0.0
     ▪ This means that the first byte of the subnet mask is all ones (1s), or
       11111111.
   ▪ A slash notation:
     ▪ you need to count all the 1s bits to figure out your mask.
   ▪ The 255.0.0.0 is considered a /8
  A Class B default mask:
   ▪ 255.255.0.0
     ▪ which is a /16 because 16 bits are ones (1s):
       11111111.11111111.00000000.00000000.
Network Class   Starting    Ending Address    CIDR    Bitmask
                Address                       Block
Class A         0.0.0.0     127.255.255.255   /8      255.0.0.0
Class B         128.0.0.0   191.255.255.255   /16     255.255.0.0
Class C         192.0.0.0   223.255.255.255   /24     255.255.255.0
Class D         224.0.0.0   239.255.255.251   /4
(multicast)
Class E         240.0.0.0   255.255.255.255   /4
(reserved)
Subnet Mask     CIDR Value   Subnet Mask       CIDR Value
255.0.0.0       /8           255.255.240.0     /20
255.128.0.0     /9           255.255.248.0     /21
255.192.0.0     /10          255.255.252.0     /22
255.224.0.0     /11          255.255.254.0     /23
255.240.0.0     /12          255.255.255.0     /24
255.248.0.0     /13          255.255.255.128   /25
255.252.0.0     /14          255.255.255.192   /26
255.254.0.0     /15          255.255.255.224   /27
255.255.0.0     /16          255.255.255.240   /28
255.255.128.0   /17          255.255.255.248   /29
255.255.192.0   /18          255.255.255.252   /30
255.255.224.0   /19
 The /8 through /15
   can only be used with Class A network addresses.
 The /16 through /23
   can be used by Class A and B network addresses.
 The /24 through /30
   can be used by Class A, B, and C network addresses.
 This is a big reason why most companies use
 Class A network addresses.
   Since they can use all subnet masks, they get the
   maximum flexibility in network design.
 Class C address, only 8 bits are available for defining
  the hosts.
 Class C subnet masks can be the following:
   Binary           Decimal          CIDR
   00000000         =0               /24
   10000000         = 128            /25
   11000000         = 192            /26
   11100000         = 224            /27
   11110000         = 240            /28
   11111000         = 248            /29
   11111100         = 252            /30
  ▪ We can’t use a /31 or /32 because we have to have at least 2
    host bits for assigning IP addresses to hosts.
 2x= number of subnets.
  ▪ x is the number of masked bits, or the 1s.
 For example:
  ▪ in 11000000, the number of 1s gives us 22 subnets.
  ▪ In this example, there are 4 subnets.
 2y – 2 = number of hosts per subnet.
  ▪ y is the number of unmasked bits, or the 0s.
 Example:
  ▪ in 11000000, the number of 0s gives us 26 – 2 hosts.
  ▪ In this example, there are 62 hosts per subnet.
  ▪ You need to subtract 2 for the subnet address and the
    broadcast address, which are not valid hosts.
 256 – subnet mask = block size, or increment
  number.
 Ex: 256 – 192 = 64:
  ▪ The block size of a 192 mask is always 64.
  ▪ Start counting at zero in blocks of 64 until you reach
    the subnet mask value.
    ▪ 0, 64, 128, 192.
 The broadcast address is always the number
  right before the next subnet.
 Example:
  ▪ The 0 subnet has a broadcast address of 63
    ▪ Because: the next subnet is 64.
  ▪ The 64 subnet has a broadcast address of 127
    ▪ because the next subnet is 128. And so on.
 Remember: the broadcast address of the last
 subnet is always 255.
 The numbers between the subnets, omitting the
  all 0s and all 1s.
  ▪ it’s always the numbers between the subnet address
    and the broadcast address.
 Example:
  ▪ if 64 is the subnet number and 127 is the broadcast
    address,
  ▪ then 65–126 is the valid host range.
 Subnet the Class C network address
 255.255.255.128 (/25)
  192.168.10.0 = Network address
  255.255.255.128 = Subnet mask
Subnet       192.168.10.0   192.168.10.128
First host   192.168.10.1   192.168.10.129
Last host    192.168.10.126 192.168.10.254
Broadcast    192.168.10.127 192.168.10.255
Contact Me: qursaan@yahoo.com

More Related Content

What's hot

Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_addressrizwanaabassi
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 

What's hot (20)

Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_address
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Subnetting
SubnettingSubnetting
Subnetting
 

Viewers also liked

Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan SupernettingZainuddin Kurnia
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1Anant Lodha
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementKanishka Gopal
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)crm2life
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing PrintersMahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing FilesMahmmoud Mahdi
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing AMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Windump
WindumpWindump
Windumpjk847
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureMahmmoud Mahdi
 
Crm siebel
Crm siebelCrm siebel
Crm siebelcrm2life
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise SystemsSaurabh Goel
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemTushar B Kute
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning pptShivani Garg
 

Viewers also liked (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Subnetting dan Supernetting
Subnetting dan SupernettingSubnetting dan Supernetting
Subnetting dan Supernetting
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1
 
Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Windump
WindumpWindump
Windump
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning ppt
 

Similar to Lesson 2: Subnetting basics

Subnetting class
Subnetting classSubnetting class
Subnetting classFTC
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingneclinux
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_AddressingAnusuaBasu
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 

Similar to Lesson 2: Subnetting basics (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting class
Subnetting classSubnetting class
Subnetting class
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Day03
Day03 Day03
Day03
 
1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing1703_anusua_basuclassful addressing_IP_Addressing
1703_anusua_basuclassful addressing_IP_Addressing
 
IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Assignment 1 iap
Assignment 1 iapAssignment 1 iap
Assignment 1 iap
 
Mod6
Mod6Mod6
Mod6
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 

More from Mahmmoud Mahdi

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptMahmmoud Mahdi
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge labMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol AMahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionMahmmoud Mahdi
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsMahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 

More from Mahmmoud Mahdi (7)

Deploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup scriptDeploy a compute instance with a remote startup script
Deploy a compute instance with a remote startup script
 
Google cloud essential skills challenge lab
Google cloud essential skills challenge labGoogle cloud essential skills challenge lab
Google cloud essential skills challenge lab
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Lesson 2: Subnetting basics

  • 2.  Allows you to take one larger network and break it into a bunch of smaller networks.  benefits:  Reduced network traffic  Optimized network performance  Simplified management  Facilitated spanning of large geographical distances
  • 3. 192.168.2.1 192.168.3.1 192.168.3.2 192.168.2.2 192.168.3.3
  • 4. A 32-bit value that allows the recipient of IP packets to distinguish between:  The network ID portion of the IP address.  The host ID portion of the IP address.  The 1s in the subnet mask represent:  the positions that refer to the network or subnet addresses.  Not all networks need subnets:  meaning they use the default subnet mask.  These default masks cannot change. ▪ Class A network, you can’t change the first byte in a subnet mask; it must read 255.0.0.0 at a minimum. ▪ Class B: start with 255.255.0.0 ▪ Class C: start with 255.255.255.0.
  • 5.
  • 6.
  • 7. Class B address Class B address Network address Host address 130.57. 130.57. 1.56 1.56 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000 Class B address with aasubnet address Class B address with subnet address Network address Subnet Host address 1000 0010. 0011 1001. 1000 0010. 0011 1001. 0000 0001. 0011 1000 0000 0001. 0011 1000
  • 8.  To create subnet:  Take bits from the host portion of the IP address and reserve them to define the subnet address.  This means fewer bits for hosts, so the more subnets, the fewer bits available for defining hosts.
  • 9.
  • 10.
  • 11. 192.168.2.1 255.255.255.0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 192.168.2.1/24 (CIDR notation) 1 network 28-2=254 addresses
  • 12. 192.168.2.32 192.168.2.128 192.168.2.1 192.168.2.64 192.168.2.96 192.168.2.160 192.168.2.192 192.168.2.128 192.168.2.234 255.255.255.224 23=8subnets 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 192.168.2.1/27 (CIDR notation) 25-2=30 network addresses
  • 13.  CIDR creates a hierarchical addressing structure by breaking the network address space into CIDR blocks  CIDR notation:  describes a network by specifying the base address and the number of bits used for the network portion  i.e., 10.0.0.0/8 ▪ a network using 24 bits for host numbering ▪ a maximum of 224 -2 possible host addresses.
  • 14.  Method that ISPs use to allocate a number of addresses to a company, a home—a customer.  192.168.10.32/28:  Telling you what your subnet mask is.  The slash notation (/) ▪ how many bits are turned on (1s).  Keep in Mind:  the largest subnet mask available (regardless of the class of address) can only be a /30. ▪ you’ve got to keep at least 2 bits for host bits.
  • 15.  Example:  A Class A default subnet mask: ▪ which is 255.0.0.0 ▪ This means that the first byte of the subnet mask is all ones (1s), or 11111111. ▪ A slash notation: ▪ you need to count all the 1s bits to figure out your mask. ▪ The 255.0.0.0 is considered a /8  A Class B default mask: ▪ 255.255.0.0 ▪ which is a /16 because 16 bits are ones (1s): 11111111.11111111.00000000.00000000.
  • 16. Network Class Starting Ending Address CIDR Bitmask Address Block Class A 0.0.0.0 127.255.255.255 /8 255.0.0.0 Class B 128.0.0.0 191.255.255.255 /16 255.255.0.0 Class C 192.0.0.0 223.255.255.255 /24 255.255.255.0 Class D 224.0.0.0 239.255.255.251 /4 (multicast) Class E 240.0.0.0 255.255.255.255 /4 (reserved)
  • 17. Subnet Mask CIDR Value Subnet Mask CIDR Value 255.0.0.0 /8 255.255.240.0 /20 255.128.0.0 /9 255.255.248.0 /21 255.192.0.0 /10 255.255.252.0 /22 255.224.0.0 /11 255.255.254.0 /23 255.240.0.0 /12 255.255.255.0 /24 255.248.0.0 /13 255.255.255.128 /25 255.252.0.0 /14 255.255.255.192 /26 255.254.0.0 /15 255.255.255.224 /27 255.255.0.0 /16 255.255.255.240 /28 255.255.128.0 /17 255.255.255.248 /29 255.255.192.0 /18 255.255.255.252 /30 255.255.224.0 /19
  • 18.  The /8 through /15  can only be used with Class A network addresses.  The /16 through /23  can be used by Class A and B network addresses.  The /24 through /30  can be used by Class A, B, and C network addresses.  This is a big reason why most companies use Class A network addresses.  Since they can use all subnet masks, they get the maximum flexibility in network design.
  • 19.  Class C address, only 8 bits are available for defining the hosts.  Class C subnet masks can be the following: Binary Decimal CIDR 00000000 =0 /24 10000000 = 128 /25 11000000 = 192 /26 11100000 = 224 /27 11110000 = 240 /28 11111000 = 248 /29 11111100 = 252 /30 ▪ We can’t use a /31 or /32 because we have to have at least 2 host bits for assigning IP addresses to hosts.
  • 20.
  • 21.
  • 22.  2x= number of subnets. ▪ x is the number of masked bits, or the 1s.  For example: ▪ in 11000000, the number of 1s gives us 22 subnets. ▪ In this example, there are 4 subnets.
  • 23.  2y – 2 = number of hosts per subnet. ▪ y is the number of unmasked bits, or the 0s.  Example: ▪ in 11000000, the number of 0s gives us 26 – 2 hosts. ▪ In this example, there are 62 hosts per subnet. ▪ You need to subtract 2 for the subnet address and the broadcast address, which are not valid hosts.
  • 24.  256 – subnet mask = block size, or increment number.  Ex: 256 – 192 = 64: ▪ The block size of a 192 mask is always 64. ▪ Start counting at zero in blocks of 64 until you reach the subnet mask value. ▪ 0, 64, 128, 192.
  • 25.  The broadcast address is always the number right before the next subnet.  Example: ▪ The 0 subnet has a broadcast address of 63 ▪ Because: the next subnet is 64. ▪ The 64 subnet has a broadcast address of 127 ▪ because the next subnet is 128. And so on.  Remember: the broadcast address of the last subnet is always 255.
  • 26.  The numbers between the subnets, omitting the all 0s and all 1s. ▪ it’s always the numbers between the subnet address and the broadcast address.  Example: ▪ if 64 is the subnet number and 127 is the broadcast address, ▪ then 65–126 is the valid host range.
  • 27.  Subnet the Class C network address 255.255.255.128 (/25)  192.168.10.0 = Network address  255.255.255.128 = Subnet mask
  • 28.
  • 29. Subnet 192.168.10.0 192.168.10.128 First host 192.168.10.1 192.168.10.129 Last host 192.168.10.126 192.168.10.254 Broadcast 192.168.10.127 192.168.10.255