SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Ch. 7 Subnetting and Other
    Masking Acrobatics
         Bruce Hartpence
 The Packet Guide to Core Network
             Protocols
Introduction
• Let’s start with the idea of a network
  – The 10,000 foot view is that it is a bunch of
    computers connected together
  – But the technical view is a little more precise
• Computers on the same network
  – Share the same IP address range
  – Have the same default gateway (router)
  – Have the same broadcast address
What is a Mask?
• 192.168.100.0 255.255.255.0
• Used to determine the network for a host
• Also used by routers to determine forwarding
  information
• The normal or natural network mask
  (netmask) is defined by address class type
• Not much flexibility
How do we use the mask?



•Classes vary in size and the number of hosts.
    •Each class has it’s own address range and mask.
•Early networks could be given an entire class.
    •For example, RIT has a Class B network address.
•But, this is inefficient and with more and more folks desiring
connectivity, was not sustainable.
Logical AND

 AND gate
Example: Class C network host
           200.150.100.95
• Steps 1 & 2: Convert the address and mask to
  binary
  11001000.10010110.01100100.01011111
  11111111.11111111.11111111.00000000
• Perform the ANDing operation from RT to LT
  11001000.10010110.01100100.00000000
• Convert back to base 10 numbers
  200.150.100.0
• Easy right?
IP packets
• Network Masks
  are not included
  in the IP packet
• All of the
  processing is
  done on devices
• But, you never
  know the mask
  for the other
  end
Revisiting the mask structure
• From the class structure
  – for a class A address: 255.0.0.0
  – for a class B address: 255.255.0.0
  – for a class C address: 255.255.255.0
• When we convert to binary
  – There 1’s indicate the network portion
  – The 0’s indicate the host portion
From an earlier chapter




• So for our example, the network address is 200.150.100.0 (all
  0’s) and the broadcast address is 200.150.100.255 (all 1’s)
• This also means that after ANDing, the host addresses from
  200.150.100.1 to 200.150.100.254 are on the same network.
What is a subnet?
• “Logically visible sub-      • Created by
  sections” RFC 917              manipulating the
• Work exactly like the          network mask
  classful network and         • This splits the network
  they still have:               into smaller networks
   – Network (subnetwork)      • Bits are “stolen” from
     address                     the host portion of the
   – Broadcast address           network
   – All hosts on the subnet
     typically use the same
                               • A third portion is added
     gateway                     to the IP address
OK, we can subnet but why?
• As a network grows in terms of the number of
  hosts, the traffic grows as well
  – Broadcast (ARP, Windows, DHCP, etc.)
• Users or departments may have varying
  security concerns
• The desire to provide different quality of
  service options
• Other overhead: SNMP, routing
• Rule of thumb: 100/30
Subnet behavior
• Local traffic is limited to the subnet
  – ARP traffic (and everything else) is now limited
  – Limited broadcast address 255.255.255.255
  – Broadcast frame address ff-ff-ff-ff-ff-ff
• MAC addresses belong to the subnet, not the
  classful network
• A router (or routing function) is required to
  get traffic between subnets
So how do you decide?
• First, how many subnets do you need?
  –   Organization of the groups
  –   Addresses required
  –   Growth
  –   Current equipment
• Once this has been determined, “steal the bits”
  – Number of bits stolen is determined by the number of
    required subnets
  – In the host portion, work to the right, converting 0s to
    1’s as you go
Common subnet patterns
• As bits are stolen, the number of subnets
  increases and the number of hosts/subnet
  decreases
Simple example
• A company desires 4 internal subnets within their
  200.150.100.0 network
• This requires 2 bits to be stolen because there are
  four possibilities in 2 bits
   – 00, 01, 10, 11
   – These are seen in the subnet field
   – Stolen bits are revealed in the mask
• New mask
   – Instead of 255.255.255.0 we have 255.255.255.192
Wait, how did this work?
• The classful network characteristics
  – Network 200.150.100.0 mask 255.255.255.0
  – Low useable address 200.150.100.1
  – High useable address 200.150.100.254
     • Often for the router
  – Broadcast address 200.150.100.255
• ANDing puts everyone on the same network
• Mask binary
  11111111.11111111.11111111.00000000
       Network portion       Host portion
Con’t
• Stealing 2 bits changes the mask
  – 255.255.255.192
  – 11111111.11111111.11111111.11000000
• The red bits represent the subnet field
• But what about the binary patterns?
  – The classful network address
  – 200.150.100.0
  – 11001000.10010110.01100100.00000000
  – The red bits are affected by the change to the
    mask
New subnet values
• Mask for all: 255.255.255.192
• Network ranges
  – Subnet ID           Subnet broadcast
  – 200.150.100.0 –     200.150.100.63
  – 200.150.100.64 –    200.150.100.127
  – 200.150.100.128 –   200.150.100.191
  – 200.150.100.192 –   200.150.100.255
Let’s look at an example address
• Node IP address: 200.150.100.137
  • Binary: 11001000.10010110.01100100.10001011
• Subnet mask: 255.255.255.192
  • Binary: 11111111.11111111.11111111.11000000
• AND
  • 11001000.10010110.01100100.10001011
  • 11111111.11111111.11111111.11000000
  • 11001000.10010110.01100100.10000000
• Base 10: 200.150.100.128
   • This is the new subnet for this node
Binary value details
• Node 200.150.100.137
   • 11001000.10010110.01100100.10001011
• Subnet mask: 255.255.255.192
  • 11111111.11111111.11111111.11000000
• Put all 0’s in for the host portion, you get the subnet
  ID
  • 11001000.10010110.01100100.10000000
• Put all 1’s in the host portion, you get the broadcast
  address
  • 11001000.10010110.01100100.10111111
Another look at the binary patterns
• Subnet address and binary
•   200.150.100.0:     11001000.10010110.01100100.00000000
•   200.150.100.64:    11001000.10010110.01100100.01000000
•   200.150.100.128:   11001000.10010110.01100100.10000000
•   200.150.100.192:   11001000.10010110.01100100.11000000
• So, where are the routers?
    –   200.150.100.62
    –   200.150.100.126
    –   200.150.100.190
    –   200.150.100.254
Another problem: 2 techniques
• Problem: Class B network 172.30.0.0, 8 subnets
  desired
  – Another way to ask this is “How many hosts do you
    need in each subnet?”
• Method 1 – Algebra
  –   How many hosts total? 65536
  –   How many subnets? 8
  –   Hosts/subnet? 65536/8 = 8192
  –   Bits for subnets? 3
  –   Mask? 255.255.224.0
  –   Always start at the classful network address.
Subnets
• The only tough question: What does 8191 look like in
  dotted quad notation?
• 172.30.0.0 - 172.30.31.255
• What is the next possible value?
    – 172.30.32.0 – this is the next subnet? Follow the pattern.
•   172.30.32.0 – 172.30.63.255
•   172.30.64.0 – 172.30.95.255
•   172.30.96.0 – 172.30.127.255
•   172.30.128.0 – 172.30.159.255
•   172.30.160.0 – 172.30.191.255
•   172.30.192.0 – 172.30.223.255
•   172.30.224.0 – 172.30.225.255
Method 2 – to the binary!
• Having selected the mask, start at the classful address
  and work through the binary patterns (172.30.0.0)
   –   172.30.00000000.00000000
   –   172.30.00100000.00000000
   –   172.30.01000000.00000000
   –   172.30.01100000.00000000
   –   172.30.10000000.00000000
   –   172.30.10100000.00000000
   –   172.30.11000000.00000000
   –   172.30.11100000.00000000
• Remember that these are the subnet addresses
Upper end of the range
• Broadcast addresses insert 1’s in the host portion
  –   172.30.00011111.11111111 (172.30.31.255)
  –   172.30.00111111.11111111
  –   172.30.01011111.11111111
  –   172.30.01111111.11111111
  –   172.30.10011111.11111111
  –   172.30.10111111.11111111
  –   172.30.11011111.11111111
  –   172.30.11111111.11111111
• Routers would typically be high/low in the range
Review and other ideas
• You should be able to go back to the simpler
  example and work both techniques
• Related ideas
  – Supernetting (combining networks)
  – Classless inter-domain routing (CIDR)
  – Variable length subnet masks (VLSM)
  – Aggregation
• All of these represent different ways to
  manipulate address space via the subnet mask
Thanks!
• Questions?
• Bruce.hartpence@rit.edu
• Keep an eye out for podcasts on itunes
Visit http://oreilly.com
                                       to purchase your copy
                                       of Core Network
                                       Protocols and enter
                                       code 4CAST to save
                                       40% off print book &
                                       50% off ebook with
                                       special code 4CAST



Visit http://oreilly.com webcasts to view upcoming webcasts and online events.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnets
SubnetsSubnets
Subnets
 
Subneting
SubnetingSubneting
Subneting
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
Vlsm
VlsmVlsm
Vlsm
 
Subnetting
SubnettingSubnetting
Subnetting
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)
 
Subnetting
SubnettingSubnetting
Subnetting
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
CCNA part 2 ip addressing
CCNA part 2 ip addressingCCNA part 2 ip addressing
CCNA part 2 ip addressing
 

Andere mochten auch

Search Different Understanding Apple's New Search Engine State of Search 2016
Search Different   Understanding Apple's New Search Engine State of Search 2016Search Different   Understanding Apple's New Search Engine State of Search 2016
Search Different Understanding Apple's New Search Engine State of Search 2016Andrew Shotland
 
WattzOn Personal Energy Audit
WattzOn Personal Energy AuditWattzOn Personal Energy Audit
WattzOn Personal Energy AuditWeb 2.0 Expo
 
A Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime WebA Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime WebHilary Mason
 
Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1O'Reilly Media
 
But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?gagravarr
 
Voice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, GermanyVoice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, GermanyMarc RenĂŠ Gardeya
 
Nov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars georgeNov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars georgeO'Reilly Media
 
Apple earnings q4-2010
Apple earnings q4-2010Apple earnings q4-2010
Apple earnings q4-2010O'Reilly Media
 
InsideRIA Outlook for 2009
InsideRIA Outlook for 2009InsideRIA Outlook for 2009
InsideRIA Outlook for 2009AndreCharland
 
Visual Experience 360 Flex
Visual Experience 360 FlexVisual Experience 360 Flex
Visual Experience 360 FlexJuan Sanchez
 
U.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - PresentU.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - PresentO'Reilly Media
 
Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2O'Reilly Media
 
Souders WPO Web 2.0 Expo
Souders WPO Web 2.0 ExpoSouders WPO Web 2.0 Expo
Souders WPO Web 2.0 ExpoSteve Souders
 
12 13 what is desktop virtualization
12 13 what is desktop virtualization12 13 what is desktop virtualization
12 13 what is desktop virtualizationO'Reilly Media
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven DevelopmentJohn Blanco
 
Allister Frost Speaker Biography
Allister Frost Speaker BiographyAllister Frost Speaker Biography
Allister Frost Speaker BiographyWild Orange Media Ltd
 
Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012Ronald Lenz
 

Andere mochten auch (20)

Search Different Understanding Apple's New Search Engine State of Search 2016
Search Different   Understanding Apple's New Search Engine State of Search 2016Search Different   Understanding Apple's New Search Engine State of Search 2016
Search Different Understanding Apple's New Search Engine State of Search 2016
 
WattzOn Personal Energy Audit
WattzOn Personal Energy AuditWattzOn Personal Energy Audit
WattzOn Personal Energy Audit
 
A Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime WebA Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime Web
 
Hoppala at XMediaLab
Hoppala at XMediaLabHoppala at XMediaLab
Hoppala at XMediaLab
 
Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1
 
But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?
 
Voice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, GermanyVoice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, Germany
 
Nov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars georgeNov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars george
 
Apple earnings q4-2010
Apple earnings q4-2010Apple earnings q4-2010
Apple earnings q4-2010
 
InsideRIA Outlook for 2009
InsideRIA Outlook for 2009InsideRIA Outlook for 2009
InsideRIA Outlook for 2009
 
Visual Experience 360 Flex
Visual Experience 360 FlexVisual Experience 360 Flex
Visual Experience 360 Flex
 
U.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - PresentU.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - Present
 
Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2
 
Souders WPO Web 2.0 Expo
Souders WPO Web 2.0 ExpoSouders WPO Web 2.0 Expo
Souders WPO Web 2.0 Expo
 
12 13 what is desktop virtualization
12 13 what is desktop virtualization12 13 what is desktop virtualization
12 13 what is desktop virtualization
 
Mate
MateMate
Mate
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
 
Allister Frost Speaker Biography
Allister Frost Speaker BiographyAllister Frost Speaker Biography
Allister Frost Speaker Biography
 
Hoppala at ARE2011
Hoppala at ARE2011Hoppala at ARE2011
Hoppala at ARE2011
 
Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012
 

Ähnlich wie Oct. 14, 2011 webcast ch7 subnets bruce hartpence

08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.pptssuserf7cd2b
 
Chapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingChapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingVishnu Vardhan
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptxaida alsamawi
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptFaysalAhamed32
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7mlrbrown
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).pptjaycallaga
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnettingIGZ Software house
 
Subnetting
SubnettingSubnetting
SubnettingNetwax Lab
 
CCNP Routing Workbook
CCNP Routing WorkbookCCNP Routing Workbook
CCNP Routing WorkbookNetworkershome
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and SubnettingAtakan ATAK
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 

Ähnlich wie Oct. 14, 2011 webcast ch7 subnets bruce hartpence (20)

08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.ppt
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
Chapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingChapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routing
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptx
 
Mod10
Mod10Mod10
Mod10
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.ppt
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
CCNP Routing
CCNP Routing CCNP Routing
CCNP Routing
 
CCNP Routing Workbook
CCNP Routing WorkbookCCNP Routing Workbook
CCNP Routing Workbook
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Mod6
Mod6Mod6
Mod6
 

Mehr von O'Reilly Media

2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloudO'Reilly Media
 
2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankings2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankingsO'Reilly Media
 
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+O'Reilly Media
 
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...O'Reilly Media
 
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...O'Reilly Media
 
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standardsOct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standardsO'Reilly Media
 
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast   desiging mobile interfaces by steven hooberNov. 8, 2011 webcast   desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast desiging mobile interfaces by steven hooberO'Reilly Media
 
Oct. 25. 2011 webcast conduct aninterview
Oct. 25. 2011 webcast   conduct aninterviewOct. 25. 2011 webcast   conduct aninterview
Oct. 25. 2011 webcast conduct aninterviewO'Reilly Media
 
Nov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projectsNov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projectsO'Reilly Media
 
What's New & Cool in Drupal 7
What's New & Cool in Drupal 7What's New & Cool in Drupal 7
What's New & Cool in Drupal 7O'Reilly Media
 
Dealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter ScottDealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter ScottO'Reilly Media
 
The Science of Social Media
The Science of Social MediaThe Science of Social Media
The Science of Social MediaO'Reilly Media
 
Web 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalWeb 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalO'Reilly Media
 
2009 Research Where
2009 Research Where2009 Research Where
2009 Research WhereO'Reilly Media
 
O'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The CloudO'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The CloudO'Reilly Media
 
Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009O'Reilly Media
 
Facebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief UpdateFacebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief UpdateO'Reilly Media
 
U.S. iTunes App Store: Sellers
U.S. iTunes App Store: SellersU.S. iTunes App Store: Sellers
U.S. iTunes App Store: SellersO'Reilly Media
 
The What Why And Who Of Xbrl
The What Why And Who Of XbrlThe What Why And Who Of Xbrl
The What Why And Who Of XbrlO'Reilly Media
 

Mehr von O'Reilly Media (20)

2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud
 
2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankings2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankings
 
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
 
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
 
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
 
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standardsOct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
 
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast   desiging mobile interfaces by steven hooberNov. 8, 2011 webcast   desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
 
Oct. 25. 2011 webcast conduct aninterview
Oct. 25. 2011 webcast   conduct aninterviewOct. 25. 2011 webcast   conduct aninterview
Oct. 25. 2011 webcast conduct aninterview
 
Nov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projectsNov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projects
 
What's New & Cool in Drupal 7
What's New & Cool in Drupal 7What's New & Cool in Drupal 7
What's New & Cool in Drupal 7
 
Dealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter ScottDealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter Scott
 
The Science of Social Media
The Science of Social MediaThe Science of Social Media
The Science of Social Media
 
Web 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalWeb 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning Proposal
 
2009 Research Where
2009 Research Where2009 Research Where
2009 Research Where
 
O'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The CloudO'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The Cloud
 
Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009
 
Web Squared
Web SquaredWeb Squared
Web Squared
 
Facebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief UpdateFacebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief Update
 
U.S. iTunes App Store: Sellers
U.S. iTunes App Store: SellersU.S. iTunes App Store: Sellers
U.S. iTunes App Store: Sellers
 
The What Why And Who Of Xbrl
The What Why And Who Of XbrlThe What Why And Who Of Xbrl
The What Why And Who Of Xbrl
 

KĂźrzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

KĂźrzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Oct. 14, 2011 webcast ch7 subnets bruce hartpence

  • 1. Ch. 7 Subnetting and Other Masking Acrobatics Bruce Hartpence The Packet Guide to Core Network Protocols
  • 2. Introduction • Let’s start with the idea of a network – The 10,000 foot view is that it is a bunch of computers connected together – But the technical view is a little more precise • Computers on the same network – Share the same IP address range – Have the same default gateway (router) – Have the same broadcast address
  • 3. What is a Mask? • 192.168.100.0 255.255.255.0 • Used to determine the network for a host • Also used by routers to determine forwarding information • The normal or natural network mask (netmask) is defined by address class type • Not much flexibility
  • 4. How do we use the mask? •Classes vary in size and the number of hosts. •Each class has it’s own address range and mask. •Early networks could be given an entire class. •For example, RIT has a Class B network address. •But, this is inefficient and with more and more folks desiring connectivity, was not sustainable.
  • 6. Example: Class C network host 200.150.100.95 • Steps 1 & 2: Convert the address and mask to binary 11001000.10010110.01100100.01011111 11111111.11111111.11111111.00000000 • Perform the ANDing operation from RT to LT 11001000.10010110.01100100.00000000 • Convert back to base 10 numbers 200.150.100.0 • Easy right?
  • 7. IP packets • Network Masks are not included in the IP packet • All of the processing is done on devices • But, you never know the mask for the other end
  • 8. Revisiting the mask structure • From the class structure – for a class A address: 255.0.0.0 – for a class B address: 255.255.0.0 – for a class C address: 255.255.255.0 • When we convert to binary – There 1’s indicate the network portion – The 0’s indicate the host portion
  • 9. From an earlier chapter • So for our example, the network address is 200.150.100.0 (all 0’s) and the broadcast address is 200.150.100.255 (all 1’s) • This also means that after ANDing, the host addresses from 200.150.100.1 to 200.150.100.254 are on the same network.
  • 10. What is a subnet? • “Logically visible sub- • Created by sections” RFC 917 manipulating the • Work exactly like the network mask classful network and • This splits the network they still have: into smaller networks – Network (subnetwork) • Bits are “stolen” from address the host portion of the – Broadcast address network – All hosts on the subnet typically use the same • A third portion is added gateway to the IP address
  • 11. OK, we can subnet but why? • As a network grows in terms of the number of hosts, the traffic grows as well – Broadcast (ARP, Windows, DHCP, etc.) • Users or departments may have varying security concerns • The desire to provide different quality of service options • Other overhead: SNMP, routing • Rule of thumb: 100/30
  • 12. Subnet behavior • Local traffic is limited to the subnet – ARP traffic (and everything else) is now limited – Limited broadcast address 255.255.255.255 – Broadcast frame address ff-ff-ff-ff-ff-ff • MAC addresses belong to the subnet, not the classful network • A router (or routing function) is required to get traffic between subnets
  • 13. So how do you decide? • First, how many subnets do you need? – Organization of the groups – Addresses required – Growth – Current equipment • Once this has been determined, “steal the bits” – Number of bits stolen is determined by the number of required subnets – In the host portion, work to the right, converting 0s to 1’s as you go
  • 14. Common subnet patterns • As bits are stolen, the number of subnets increases and the number of hosts/subnet decreases
  • 15. Simple example • A company desires 4 internal subnets within their 200.150.100.0 network • This requires 2 bits to be stolen because there are four possibilities in 2 bits – 00, 01, 10, 11 – These are seen in the subnet field – Stolen bits are revealed in the mask • New mask – Instead of 255.255.255.0 we have 255.255.255.192
  • 16. Wait, how did this work? • The classful network characteristics – Network 200.150.100.0 mask 255.255.255.0 – Low useable address 200.150.100.1 – High useable address 200.150.100.254 • Often for the router – Broadcast address 200.150.100.255 • ANDing puts everyone on the same network • Mask binary 11111111.11111111.11111111.00000000 Network portion Host portion
  • 17. Con’t • Stealing 2 bits changes the mask – 255.255.255.192 – 11111111.11111111.11111111.11000000 • The red bits represent the subnet field • But what about the binary patterns? – The classful network address – 200.150.100.0 – 11001000.10010110.01100100.00000000 – The red bits are affected by the change to the mask
  • 18. New subnet values • Mask for all: 255.255.255.192 • Network ranges – Subnet ID Subnet broadcast – 200.150.100.0 – 200.150.100.63 – 200.150.100.64 – 200.150.100.127 – 200.150.100.128 – 200.150.100.191 – 200.150.100.192 – 200.150.100.255
  • 19. Let’s look at an example address • Node IP address: 200.150.100.137 • Binary: 11001000.10010110.01100100.10001011 • Subnet mask: 255.255.255.192 • Binary: 11111111.11111111.11111111.11000000 • AND • 11001000.10010110.01100100.10001011 • 11111111.11111111.11111111.11000000 • 11001000.10010110.01100100.10000000 • Base 10: 200.150.100.128 • This is the new subnet for this node
  • 20. Binary value details • Node 200.150.100.137 • 11001000.10010110.01100100.10001011 • Subnet mask: 255.255.255.192 • 11111111.11111111.11111111.11000000 • Put all 0’s in for the host portion, you get the subnet ID • 11001000.10010110.01100100.10000000 • Put all 1’s in the host portion, you get the broadcast address • 11001000.10010110.01100100.10111111
  • 21. Another look at the binary patterns • Subnet address and binary • 200.150.100.0: 11001000.10010110.01100100.00000000 • 200.150.100.64: 11001000.10010110.01100100.01000000 • 200.150.100.128: 11001000.10010110.01100100.10000000 • 200.150.100.192: 11001000.10010110.01100100.11000000 • So, where are the routers? – 200.150.100.62 – 200.150.100.126 – 200.150.100.190 – 200.150.100.254
  • 22. Another problem: 2 techniques • Problem: Class B network 172.30.0.0, 8 subnets desired – Another way to ask this is “How many hosts do you need in each subnet?” • Method 1 – Algebra – How many hosts total? 65536 – How many subnets? 8 – Hosts/subnet? 65536/8 = 8192 – Bits for subnets? 3 – Mask? 255.255.224.0 – Always start at the classful network address.
  • 23. Subnets • The only tough question: What does 8191 look like in dotted quad notation? • 172.30.0.0 - 172.30.31.255 • What is the next possible value? – 172.30.32.0 – this is the next subnet? Follow the pattern. • 172.30.32.0 – 172.30.63.255 • 172.30.64.0 – 172.30.95.255 • 172.30.96.0 – 172.30.127.255 • 172.30.128.0 – 172.30.159.255 • 172.30.160.0 – 172.30.191.255 • 172.30.192.0 – 172.30.223.255 • 172.30.224.0 – 172.30.225.255
  • 24. Method 2 – to the binary! • Having selected the mask, start at the classful address and work through the binary patterns (172.30.0.0) – 172.30.00000000.00000000 – 172.30.00100000.00000000 – 172.30.01000000.00000000 – 172.30.01100000.00000000 – 172.30.10000000.00000000 – 172.30.10100000.00000000 – 172.30.11000000.00000000 – 172.30.11100000.00000000 • Remember that these are the subnet addresses
  • 25. Upper end of the range • Broadcast addresses insert 1’s in the host portion – 172.30.00011111.11111111 (172.30.31.255) – 172.30.00111111.11111111 – 172.30.01011111.11111111 – 172.30.01111111.11111111 – 172.30.10011111.11111111 – 172.30.10111111.11111111 – 172.30.11011111.11111111 – 172.30.11111111.11111111 • Routers would typically be high/low in the range
  • 26. Review and other ideas • You should be able to go back to the simpler example and work both techniques • Related ideas – Supernetting (combining networks) – Classless inter-domain routing (CIDR) – Variable length subnet masks (VLSM) – Aggregation • All of these represent different ways to manipulate address space via the subnet mask
  • 27. Thanks! • Questions? • Bruce.hartpence@rit.edu • Keep an eye out for podcasts on itunes
  • 28. Visit http://oreilly.com to purchase your copy of Core Network Protocols and enter code 4CAST to save 40% off print book & 50% off ebook with special code 4CAST Visit http://oreilly.com webcasts to view upcoming webcasts and online events.