SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
How to determine the number of subnets and the
                number of hosts per subnet
Two formulas can provide this basic information:

       Number of subnets = 2 s           (Second subnet formula: Number of subnets = 2s - 2)

       Number of hosts per subnet = 2 h - 2

Both formulas calculate the number of hosts or subnets based on the number of binary bits
used. For example if you borrow three bits from the host portion of the address use the
number of subnets formula to determine the total number of subnets gained by borrowing the
three bits. This would be 23 or 2 x 2 x 2 = 8 subnets

To determine the number of hosts per subnet you would take the number of binary bits used in
the host portion and apply this to the number of hosts per subnet formula If five bits are in the
host portion of the address this would be 2 5 or 2 x 2 x 2 x 2 x 2 = 32 hosts.

When dealing with the number of hosts per subnet you have to subtract two addresses from
the range. The first address in every range is the subnet number. The last address in every
range is the broadcast address. These two addresses cannot be assigned to any device in
the network which is why you have to subtract two addresses to find the number of usable
addresses in each range.

For example if two bits are borrowed for the network portion of the address you can easily
determine the number of subnets and hosts per subnets using the two formulas.

    195. 223 . 50 . 0                    0   0     0    0    0     0     0

              The number of subnets                The number of hosts created by
              created by borrowing 2               leaving 6 bits is 26 - 2 or
              bits is 2 2 or 2 x 2 = 4             2 x 2 x 2 x 2 x 2 x 2 = 64 - 2 = 62
              subnets.                             usable hosts per subnet.


What about that second subnet formula:
                                 s
       Number of subnets = 2 - 2

In some instances the first and last subnet range of addresses are reserved. This is similar to
the first and last host addresses in each range of addreses.

The first range of addresses is the zero subnet. The subnet number for the zero subnet is
also the subnet number for the classful subnet address.

The last range of addresses is the broadcast subnet. The broadcast address for the last
subnet in the broadcast subnet is the same as the classful broadcast address.
10
Class C Address unsubnetted:

195. 223 . 50 . 0

195.223.50.0                to   195.223.50.255
                                                                    Notice that the subnet and
                                                                    broadcast addresses match.
Class C Address subnetted (2 bits borrowed):

 195. 223 . 50 . 0                 0    0    0     0       0   0     0

 (Invalid range) (0) 195.223.50.0                              to     195.223.50.63
                 (1) 195.223.50.64                             to     195.223.50.127
                 (2) 195.223.50.128                            to     195.223.50.191
 (Invalid range) (3) 195.223.50.192                            to     195.223.50.255


The primary reason the the zero and broadcast subnets were not used had to do pirmarily with
the broadcast addresses. If you send a broadcast to 195.223.255 are you sending it to all 255
addresses in the classful C address or just the 62 usable addresses in the broadcast range?

The CCNA and CCENT certification exams may have questions which will require you to
determine which formula to use, and whehter or not you can use the first and last subnets. Use
the chart below to help decide.


    When to use which formula to determine the number of subnets
           s                                               s
 Use the 2 - 2 formula and don’t use the        Use the 2 formula and use the zero and
 zero and broadcast ranges if...                broadcast ranges if...

 Classful routing is used                       Classless routing or VLSM is used

 RIP version 1 is used                          RIP version 2, EIGRP, or OSPF is used

 The no ip subnet zero command is               The ip subnet zero command is
 configured on your router                      configured on your router (default setting)

                                                No other clues are given


Bottom line for the CCNA exams; if a question does not give you any clues as to whether or not
to allow these two subnets, assume you can use them.
                                                       s
This workbook has you use the number of subnets = 2 formula.


                                                                                              11
ANDING With
                                    Custom subnet masks

When you take a single network such as 192.100.10.0 and divide it into five smaller networks
(192.100.10.16, 192.100.10.32, 192.100.10.48, 192.100.10.64, 192.100.10.80) the outside
world still sees the network as 192.100.10.0, but the internal computers and routers see five
smaller subnetworks. Each independent of the other. This can only be accomplished by using
a custom subnet mask. A custom subnet mask borrows bits from the host portion of the
address to create a subnetwork address between the network and host portions of an IP
address. In this example each range has 14 usable addresses in it. The computer must still
AND the IP address against the custom subnet mask to see what the network portion is and
which subnetwork it belongs to.

        IP Address:                     192 . 100 . 10 . 0
        Custom Subnet Mask:             255.255.255.240

        Address Ranges:         192.10.10.0 to 192.100.10.15
                                192.100.10.16 to 192.100.10.31
                                192.100.10.32 to 192.100.10.47 (Range in the sample below)
                                192.100.10.48 to 192.100.10.63
                                192.100.10.64 to 192.100.10.79
                                192.100.10.80 to 192.100.10.95
                                192.100.10.96 to 192.100.10.111
                                192.100.10.112 to 192.100.10.127
                                192.100.10.128 to 192.100.10.143
                                192.100.10.144 to 192.100.10.159
                                192.100.10.160 to 192.100.10.175
                                192.100.10.176 to 192.100.10.191
                                192.100.10.192 to 192.100.10.207
                                192.100.10.208 to 192.100.10.223
                                192.100.10.224 to 192.100.10.239
                                192.100.10.240 to 192.100.10.255

                                                                              Sub
                                             Network                        Network Host
       IP Address: 1 1 0 0 0 0 0 0 . 0 1 1 0 0 1 0 0 . 0 0 0 0 1 0 1 0 . 0 0 1 0 0 0 0 1 (192 . 100 . 10 . 33)
Custom Subnet Mask: 1 1 1 1 1 1 1 1 . 0 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 1 1 1 0 0 0 0 (255 . 255 . 255 . 240)
              AND: 1 1 0 0 0 0 0 0 . 0 1 1 0 0 1 0 0 . 0 0 0 0 1 0 1 0 . 0 0 1 0 0 0 0 0 (192 . 100 . 10 . 32)

                                     Four bits borrowed from the host
                                     portion of the address for the
                                     custom subnet mask.
                                                         The ANDING process of the four borrowed bits
                                                         shows which range of IP addresses this
                                                         particular address will fall into.


In the next set of problems you will determine the necessary information to determine the
correct subnet mask for a variety of IP addresses.
                                                                                                         9
Produced by: Robb Jones
jonesr@careertech.net
Frederick County Career & Technology Center
Cisco Networking Academy
Frederick County Public Schools
Frederick, Maryland, USA

Contenu connexe

Tendances

Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)
Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)
Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)Donato Aquino
 
02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?
02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?
02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?臺灣塔米歐
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAnhMai173354
 
Redes de alta velocidad
Redes de alta velocidadRedes de alta velocidad
Redes de alta velocidadARCHER2477
 
Lab 6.7.3
Lab 6.7.3Lab 6.7.3
Lab 6.7.3UNAD
 
Email server configuration on cisco packet tracer
Email server configuration on cisco packet tracerEmail server configuration on cisco packet tracer
Email server configuration on cisco packet tracerArjun Das
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesTechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesRobb Boyd
 
Internal & External of Routers
Internal & External of RoutersInternal & External of Routers
Internal & External of RoutersKishore Kumar
 
Sistema autonomo cisco packet tracer
Sistema autonomo cisco packet tracerSistema autonomo cisco packet tracer
Sistema autonomo cisco packet tracerVicTorx D. Rko
 
Taller de direccionamiento.desafio
Taller de direccionamiento.desafioTaller de direccionamiento.desafio
Taller de direccionamiento.desafioAngieZambrano
 
Configuring a cisco 2901 router
Configuring a cisco 2901 routerConfiguring a cisco 2901 router
Configuring a cisco 2901 routerIT Tech
 
Copy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopCopy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopIT Tech
 
Aurelio cadenas frigorista
Aurelio cadenas frigoristaAurelio cadenas frigorista
Aurelio cadenas frigoristaTyrolit
 
Apple Payの仕組み
Apple Payの仕組みApple Payの仕組み
Apple Payの仕組み維 呉
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Cisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationCisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationHamed Moghaddam
 

Tendances (20)

Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)
Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)
Comandosdeconfiguraciondedispositivoscisco 130821210028-phpapp01 (1)
 
02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?
02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?
02.為什麼在網址列輸入totolink路由器的ip位址10.1.1.1,卻無法顯示網頁?
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
 
Redes de alta velocidad
Redes de alta velocidadRedes de alta velocidad
Redes de alta velocidad
 
Lab 6.7.3
Lab 6.7.3Lab 6.7.3
Lab 6.7.3
 
Email server configuration on cisco packet tracer
Email server configuration on cisco packet tracerEmail server configuration on cisco packet tracer
Email server configuration on cisco packet tracer
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesTechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
 
Internal & External of Routers
Internal & External of RoutersInternal & External of Routers
Internal & External of Routers
 
Sistema autonomo cisco packet tracer
Sistema autonomo cisco packet tracerSistema autonomo cisco packet tracer
Sistema autonomo cisco packet tracer
 
6.3.3.7 colaborativo 3
6.3.3.7  colaborativo 36.3.3.7  colaborativo 3
6.3.3.7 colaborativo 3
 
Taller de direccionamiento.desafio
Taller de direccionamiento.desafioTaller de direccionamiento.desafio
Taller de direccionamiento.desafio
 
Configuring a cisco 2901 router
Configuring a cisco 2901 routerConfiguring a cisco 2901 router
Configuring a cisco 2901 router
 
Copy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopCopy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptop
 
eSocial - 2.2
eSocial - 2.2eSocial - 2.2
eSocial - 2.2
 
Aurelio cadenas frigorista
Aurelio cadenas frigoristaAurelio cadenas frigorista
Aurelio cadenas frigorista
 
Apple Payの仕組み
Apple Payの仕組みApple Payの仕組み
Apple Payの仕組み
 
Subnetting VLSM
Subnetting VLSMSubnetting VLSM
Subnetting VLSM
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Cisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationCisco CCNA- NAT Configuration
Cisco CCNA- NAT Configuration
 
Ejercicios de redes
Ejercicios de redesEjercicios de redes
Ejercicios de redes
 

En vedette

Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheetswascher
 
IP Addressing Principles
IP Addressing PrinciplesIP Addressing Principles
IP Addressing Principlesswascher
 
Ip addressing and subnetting workbook
Ip addressing and subnetting workbookIp addressing and subnetting workbook
Ip addressing and subnetting workbookLuiz Souza
 
Subnetting A Network
Subnetting A NetworkSubnetting A Network
Subnetting A Networkswascher
 
Ip addressing and subnetting instructors workbook
Ip addressing and subnetting   instructors workbookIp addressing and subnetting   instructors workbook
Ip addressing and subnetting instructors workbookSwapnil Kapate
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 

En vedette (7)

Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheet
 
IP Addressing Principles
IP Addressing PrinciplesIP Addressing Principles
IP Addressing Principles
 
Ip addressing and subnetting workbook
Ip addressing and subnetting workbookIp addressing and subnetting workbook
Ip addressing and subnetting workbook
 
IP Addressing Subnetting Workbook
IP Addressing Subnetting WorkbookIP Addressing Subnetting Workbook
IP Addressing Subnetting Workbook
 
Subnetting A Network
Subnetting A NetworkSubnetting A Network
Subnetting A Network
 
Ip addressing and subnetting instructors workbook
Ip addressing and subnetting   instructors workbookIp addressing and subnetting   instructors workbook
Ip addressing and subnetting instructors workbook
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 

Similaire à Subnetting Principles

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docxDIPESH30
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.pptssuserf7cd2b
 
Ip addressing subnetting workbook
Ip addressing subnetting workbookIp addressing subnetting workbook
Ip addressing subnetting workbookVijay Shukla
 
Ip addressing subnetting workbook
Ip addressing   subnetting workbookIp addressing   subnetting workbook
Ip addressing subnetting workbookRoberto Loera
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 

Similaire à Subnetting Principles (20)

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subnetting
SubnettingSubnetting
Subnetting
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Subnetting
SubnettingSubnetting
Subnetting
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.ppt
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Day03
Day03 Day03
Day03
 
CCNP Routing
CCNP Routing CCNP Routing
CCNP Routing
 
CCNP Routing Workbook
CCNP Routing WorkbookCCNP Routing Workbook
CCNP Routing Workbook
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Vlsm
VlsmVlsm
Vlsm
 
Ip addressing subnetting workbook
Ip addressing subnetting workbookIp addressing subnetting workbook
Ip addressing subnetting workbook
 
Ip addressing subnetting workbook
Ip addressing   subnetting workbookIp addressing   subnetting workbook
Ip addressing subnetting workbook
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 

Plus de swascher

Resume interview tips
Resume interview tipsResume interview tips
Resume interview tipsswascher
 
RVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant PresentationRVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant Presentationswascher
 
Elevator speeches
Elevator speechesElevator speeches
Elevator speechesswascher
 
Cis142fall2011
Cis142fall2011Cis142fall2011
Cis142fall2011swascher
 
Strategic plan 2.9.11
Strategic plan 2.9.11Strategic plan 2.9.11
Strategic plan 2.9.11swascher
 
Newspaper January 2010
Newspaper January 2010Newspaper January 2010
Newspaper January 2010swascher
 
Rti Booklet
Rti BookletRti Booklet
Rti Bookletswascher
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingswascher
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Binary Review
Binary ReviewBinary Review
Binary Reviewswascher
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introductionswascher
 
Ip Addressing Worksheets
Ip Addressing WorksheetsIp Addressing Worksheets
Ip Addressing Worksheetsswascher
 

Plus de swascher (13)

Resume interview tips
Resume interview tipsResume interview tips
Resume interview tips
 
RVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant PresentationRVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant Presentation
 
Elevator speeches
Elevator speechesElevator speeches
Elevator speeches
 
Feb23
Feb23Feb23
Feb23
 
Cis142fall2011
Cis142fall2011Cis142fall2011
Cis142fall2011
 
Strategic plan 2.9.11
Strategic plan 2.9.11Strategic plan 2.9.11
Strategic plan 2.9.11
 
Newspaper January 2010
Newspaper January 2010Newspaper January 2010
Newspaper January 2010
 
Rti Booklet
Rti BookletRti Booklet
Rti Booklet
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Binary Review
Binary ReviewBinary Review
Binary Review
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introduction
 
Ip Addressing Worksheets
Ip Addressing WorksheetsIp Addressing Worksheets
Ip Addressing Worksheets
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Subnetting Principles

  • 1. How to determine the number of subnets and the number of hosts per subnet Two formulas can provide this basic information: Number of subnets = 2 s (Second subnet formula: Number of subnets = 2s - 2) Number of hosts per subnet = 2 h - 2 Both formulas calculate the number of hosts or subnets based on the number of binary bits used. For example if you borrow three bits from the host portion of the address use the number of subnets formula to determine the total number of subnets gained by borrowing the three bits. This would be 23 or 2 x 2 x 2 = 8 subnets To determine the number of hosts per subnet you would take the number of binary bits used in the host portion and apply this to the number of hosts per subnet formula If five bits are in the host portion of the address this would be 2 5 or 2 x 2 x 2 x 2 x 2 = 32 hosts. When dealing with the number of hosts per subnet you have to subtract two addresses from the range. The first address in every range is the subnet number. The last address in every range is the broadcast address. These two addresses cannot be assigned to any device in the network which is why you have to subtract two addresses to find the number of usable addresses in each range. For example if two bits are borrowed for the network portion of the address you can easily determine the number of subnets and hosts per subnets using the two formulas. 195. 223 . 50 . 0 0 0 0 0 0 0 0 The number of subnets The number of hosts created by created by borrowing 2 leaving 6 bits is 26 - 2 or bits is 2 2 or 2 x 2 = 4 2 x 2 x 2 x 2 x 2 x 2 = 64 - 2 = 62 subnets. usable hosts per subnet. What about that second subnet formula: s Number of subnets = 2 - 2 In some instances the first and last subnet range of addresses are reserved. This is similar to the first and last host addresses in each range of addreses. The first range of addresses is the zero subnet. The subnet number for the zero subnet is also the subnet number for the classful subnet address. The last range of addresses is the broadcast subnet. The broadcast address for the last subnet in the broadcast subnet is the same as the classful broadcast address. 10
  • 2. Class C Address unsubnetted: 195. 223 . 50 . 0 195.223.50.0 to 195.223.50.255 Notice that the subnet and broadcast addresses match. Class C Address subnetted (2 bits borrowed): 195. 223 . 50 . 0 0 0 0 0 0 0 0 (Invalid range) (0) 195.223.50.0 to 195.223.50.63 (1) 195.223.50.64 to 195.223.50.127 (2) 195.223.50.128 to 195.223.50.191 (Invalid range) (3) 195.223.50.192 to 195.223.50.255 The primary reason the the zero and broadcast subnets were not used had to do pirmarily with the broadcast addresses. If you send a broadcast to 195.223.255 are you sending it to all 255 addresses in the classful C address or just the 62 usable addresses in the broadcast range? The CCNA and CCENT certification exams may have questions which will require you to determine which formula to use, and whehter or not you can use the first and last subnets. Use the chart below to help decide. When to use which formula to determine the number of subnets s s Use the 2 - 2 formula and don’t use the Use the 2 formula and use the zero and zero and broadcast ranges if... broadcast ranges if... Classful routing is used Classless routing or VLSM is used RIP version 1 is used RIP version 2, EIGRP, or OSPF is used The no ip subnet zero command is The ip subnet zero command is configured on your router configured on your router (default setting) No other clues are given Bottom line for the CCNA exams; if a question does not give you any clues as to whether or not to allow these two subnets, assume you can use them. s This workbook has you use the number of subnets = 2 formula. 11
  • 3. ANDING With Custom subnet masks When you take a single network such as 192.100.10.0 and divide it into five smaller networks (192.100.10.16, 192.100.10.32, 192.100.10.48, 192.100.10.64, 192.100.10.80) the outside world still sees the network as 192.100.10.0, but the internal computers and routers see five smaller subnetworks. Each independent of the other. This can only be accomplished by using a custom subnet mask. A custom subnet mask borrows bits from the host portion of the address to create a subnetwork address between the network and host portions of an IP address. In this example each range has 14 usable addresses in it. The computer must still AND the IP address against the custom subnet mask to see what the network portion is and which subnetwork it belongs to. IP Address: 192 . 100 . 10 . 0 Custom Subnet Mask: 255.255.255.240 Address Ranges: 192.10.10.0 to 192.100.10.15 192.100.10.16 to 192.100.10.31 192.100.10.32 to 192.100.10.47 (Range in the sample below) 192.100.10.48 to 192.100.10.63 192.100.10.64 to 192.100.10.79 192.100.10.80 to 192.100.10.95 192.100.10.96 to 192.100.10.111 192.100.10.112 to 192.100.10.127 192.100.10.128 to 192.100.10.143 192.100.10.144 to 192.100.10.159 192.100.10.160 to 192.100.10.175 192.100.10.176 to 192.100.10.191 192.100.10.192 to 192.100.10.207 192.100.10.208 to 192.100.10.223 192.100.10.224 to 192.100.10.239 192.100.10.240 to 192.100.10.255 Sub Network Network Host IP Address: 1 1 0 0 0 0 0 0 . 0 1 1 0 0 1 0 0 . 0 0 0 0 1 0 1 0 . 0 0 1 0 0 0 0 1 (192 . 100 . 10 . 33) Custom Subnet Mask: 1 1 1 1 1 1 1 1 . 0 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 1 1 1 0 0 0 0 (255 . 255 . 255 . 240) AND: 1 1 0 0 0 0 0 0 . 0 1 1 0 0 1 0 0 . 0 0 0 0 1 0 1 0 . 0 0 1 0 0 0 0 0 (192 . 100 . 10 . 32) Four bits borrowed from the host portion of the address for the custom subnet mask. The ANDING process of the four borrowed bits shows which range of IP addresses this particular address will fall into. In the next set of problems you will determine the necessary information to determine the correct subnet mask for a variety of IP addresses. 9
  • 4. Produced by: Robb Jones jonesr@careertech.net Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA