SlideShare ist ein Scribd-Unternehmen logo
1 von 14
SMC Networks
Visual IP Subnetting
IP address and subnet mask

                       IP Address: 192.168.2.11
                       Subnet: 255.255.255.0
IP address and subnet mask

                Subnet: 255.255.255.0


              IP Address:   192.168.2. 11


Network IP Address:            Computer IP Address:
192.168.2.0                    192.168.2.11
IP address and subnet mask


Computer IP Address:     192.168.2.11
Subnet Mask:             255.255.255.0

Network Address:         192.168.2.0
Available IP Addresses
for hosts in the LAN:    192.168.2.1-254

IP Address BROADCAST     192.168.2.255
Subnet Mask Types

Class A        255.0.0.0
               11111111.00000000.00000000.00000000


Class B        255.255.0.0
               11111111.11111111.00000000.00000000


Class C        255.255.255.0
               11111111.11111111.11111111.00000000



User defined   255.255.240.0
Examples       11111111.11111111.11110000.00000000

               255.255.255.224
               11111111.11111111.11111111.11100000

               255.255.255.252
               11111111.11111111.11111111.11111100
IP Address Types

Class A      1 to 126.xxx.xxx.xxx

Class B      128 to 191.xxx.xxx.xxx

Class C      192 to 223.xxx.xxx.xxx

Class D      224 to 239.xxx.xxx.xxx for multicasting

Class E      240 to 254.xxx.xxx.xxx reserved future use

127.xxx.xxx.xxx are reserved for loopback and internal
testing
Subnet Masks and IP addresses
    sA                                    Mask short name   Max. Number of Hosts
Clas
    255.0.0.0                                    /8             16.777.214
    11111111.00000000.00000000.00000000
    sB
Clas
    255.255.0.0                                  /16            65534
    11111111.11111111.00000000.00000000
    sC
Clas
    255.255.255.0                                /24            254
    11111111.11111111.11111111.00000000



    255.255.240.0                                /20            4094
    11111111.11111111.11110000.00000000

    255.255.255.224                              /27            30
    11111111.11111111.11111111.11100000

    255.255.255.252                              /30            2
    11111111.11111111.11111111.11111100
Examples

                 IP Address: 10.3.71.170 /8


Computer IP Address:                    10.3.71.170
Subnet Mask:                            255.0.0.0
                                                                  h   osts
                                                        77   .214
Network Address:                        10.0.0.0   16.7


Available IP Addresses
for hosts in the LAN:                   10.xxx.xxx.xxx

IP Address BROADCAST                    10.255.255.255
Examples

                 IP Address: 130.11.92.7 /16


Computer IP Address:                    130.11.92.7
Subnet Mask:                            255.255.0.0
                                                             os   ts
                                                         34h
Network Address:                        130.11.0.0   655


Available IP Addresses
for hosts in the LAN:                    130.11.xxx.xxx

IP Address BROADCAST                    130.11.255.255
Examples

                 IP Address: 192.168.2.10 /24


Computer IP Address:                    192.168.2.10
Subnet Mask:                            255.255.255.0
                                                              ts
                                                          ho s
                                                      254
Network Address:                        192.168.2.0
Available IP Addresses
for hosts in the LAN:                   192.168.2.xxx

IP Address BROADCAST                    192.168.2.255
IP Address Types

In private networks you can create a class B network
inside a class A address/network.

    Network IP Address: 10.0.0.0 /24



  SubNetwork: 10.1.0.0 /16

         SubNetwork: 10.2.0.0 /16

                 SubNetwork: 10.3.0.0 /16     …
IP Address Types

And also create class C networks inside a class B
address/network.

     Network IP Address: 10.9.0.0 /16



  SubNetwork: 10.9.1.0 /24

          SubNetwork: 10.9.2.0 /24

                 SubNetwork: 10.9.3.0 /24      …
IP Address Types

  In private networks you can create any type of network
  that suits your needs in terms of IP address type and
  network mask/amount of host IP addresses. For instance:

                IP Address: 10.70.2.10 /24

Computer IP Address:                           10.70.2.10
Subnet Mask:                                   255.255.255.0
Network Address:                               10.70.2.0
Available IP Addresses for hosts in the LAN:   10.70.2.xxx
IP Address BROADCAST                           10.70.2.255
For more technical documents visit us
www.smc.com

Facebook: SMC Networks Europe & Africa
Twitter: SMC_EU

Disclaimer: All data has been carefully checked for correctness.
SMC Networks takes no responsibility for possible errors in this document.
All technical specifications are subject to change without prior notice.

(c) 2010, SMC Networks

Weitere ähnliche Inhalte

Was ist angesagt?

Kiến trúc máy tính và hợp ngữ bài 03
Kiến trúc máy tính và hợp ngữ bài 03Kiến trúc máy tính và hợp ngữ bài 03
Kiến trúc máy tính và hợp ngữ bài 03Nhóc Nhóc
 
Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2
Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2
Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2pisu412
 
Slide he dieu hanh
Slide he dieu hanhSlide he dieu hanh
Slide he dieu hanhPhan Duy
 
đinh tuyến tĩnh và định tuyến động
đinh tuyến tĩnh và định tuyến độngđinh tuyến tĩnh và định tuyến động
đinh tuyến tĩnh và định tuyến độngnguyenhoangbao
 
Tiểu+luận+antoan
Tiểu+luận+antoanTiểu+luận+antoan
Tiểu+luận+antoanBùi Quân
 
Kiến trúc máy tính và hợp ngữ bài 01
Kiến trúc máy tính và hợp ngữ bài 01Kiến trúc máy tính và hợp ngữ bài 01
Kiến trúc máy tính và hợp ngữ bài 01Nhóc Nhóc
 
Giao trinh ky thuat xung so
Giao trinh ky thuat xung soGiao trinh ky thuat xung so
Giao trinh ky thuat xung sokhoangtoicuocdoi
 
Tìm hiểu về mongodb
Tìm hiểu về mongodbTìm hiểu về mongodb
Tìm hiểu về mongodbvuphong93
 
HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)
HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)
HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)Tú Cao
 
Bài giảng xác suất thống kê
Bài giảng xác suất thống kêBài giảng xác suất thống kê
Bài giảng xác suất thống kêHọc Huỳnh Bá
 
Phuong phap chia subnet nhanh nhat
Phuong phap chia subnet nhanh nhatPhuong phap chia subnet nhanh nhat
Phuong phap chia subnet nhanh nhatnp_thanh
 
Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)
Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)
Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)jangvi
 
Tích phân-3-Phương pháp biến đổi số-pages-30-43
Tích phân-3-Phương pháp biến đổi số-pages-30-43Tích phân-3-Phương pháp biến đổi số-pages-30-43
Tích phân-3-Phương pháp biến đổi số-pages-30-43lovestem
 
Bai giang cau truc may tinh
Bai giang cau truc may tinhBai giang cau truc may tinh
Bai giang cau truc may tinhDong Van
 

Was ist angesagt? (20)

Kiến trúc máy tính và hợp ngữ bài 03
Kiến trúc máy tính và hợp ngữ bài 03Kiến trúc máy tính và hợp ngữ bài 03
Kiến trúc máy tính và hợp ngữ bài 03
 
Chia subnetmask
Chia subnetmaskChia subnetmask
Chia subnetmask
 
Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2
Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2
Slide Hệ Quản Trị Cơ sở dữ liệu - CHƯƠNG 2
 
Slide mang may tinh
Slide mang may tinhSlide mang may tinh
Slide mang may tinh
 
Slide he dieu hanh
Slide he dieu hanhSlide he dieu hanh
Slide he dieu hanh
 
đinh tuyến tĩnh và định tuyến động
đinh tuyến tĩnh và định tuyến độngđinh tuyến tĩnh và định tuyến động
đinh tuyến tĩnh và định tuyến động
 
Bai tap chia_dia_chi_ip
Bai tap chia_dia_chi_ipBai tap chia_dia_chi_ip
Bai tap chia_dia_chi_ip
 
Tiểu+luận+antoan
Tiểu+luận+antoanTiểu+luận+antoan
Tiểu+luận+antoan
 
Kiến trúc máy tính và hợp ngữ bài 01
Kiến trúc máy tính và hợp ngữ bài 01Kiến trúc máy tính và hợp ngữ bài 01
Kiến trúc máy tính và hợp ngữ bài 01
 
Ktmt chuong 5
Ktmt chuong 5Ktmt chuong 5
Ktmt chuong 5
 
Kỹ thuật số
Kỹ thuật sốKỹ thuật số
Kỹ thuật số
 
Ktmt chuong 2
Ktmt chuong 2Ktmt chuong 2
Ktmt chuong 2
 
Giao trinh ky thuat xung so
Giao trinh ky thuat xung soGiao trinh ky thuat xung so
Giao trinh ky thuat xung so
 
Tìm hiểu về mongodb
Tìm hiểu về mongodbTìm hiểu về mongodb
Tìm hiểu về mongodb
 
HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)
HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)
HTTP POST DOS (Denial Of Service) (Demo tấn công DOS, phòng chống)
 
Bài giảng xác suất thống kê
Bài giảng xác suất thống kêBài giảng xác suất thống kê
Bài giảng xác suất thống kê
 
Phuong phap chia subnet nhanh nhat
Phuong phap chia subnet nhanh nhatPhuong phap chia subnet nhanh nhat
Phuong phap chia subnet nhanh nhat
 
Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)
Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)
Duong loi khang chien chong thuc dan Phap xam luoc (1946 - 1954)
 
Tích phân-3-Phương pháp biến đổi số-pages-30-43
Tích phân-3-Phương pháp biến đổi số-pages-30-43Tích phân-3-Phương pháp biến đổi số-pages-30-43
Tích phân-3-Phương pháp biến đổi số-pages-30-43
 
Bai giang cau truc may tinh
Bai giang cau truc may tinhBai giang cau truc may tinh
Bai giang cau truc may tinh
 

Andere mochten auch

Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switchIT Tech
 
Port Security - Possible Technology Interventions and Solutioning
Port Security - Possible Technology Interventions and SolutioningPort Security - Possible Technology Interventions and Solutioning
Port Security - Possible Technology Interventions and SolutioningAmol Vidwans
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switchtcpipguru
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port SecurityHamed Moghaddam
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
Carta de MORENA al comisionado de la ONU para los Derechos Humanos
Carta de MORENA al comisionado de la ONU para los Derechos Humanos Carta de MORENA al comisionado de la ONU para los Derechos Humanos
Carta de MORENA al comisionado de la ONU para los Derechos Humanos AMLO-MORENA
 

Andere mochten auch (14)

TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switch
 
Port Security
Port SecurityPort Security
Port Security
 
Port Security - Possible Technology Interventions and Solutioning
Port Security - Possible Technology Interventions and SolutioningPort Security - Possible Technology Interventions and Solutioning
Port Security - Possible Technology Interventions and Solutioning
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Ip address
Ip addressIp address
Ip address
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Carta de MORENA al comisionado de la ONU para los Derechos Humanos
Carta de MORENA al comisionado de la ONU para los Derechos Humanos Carta de MORENA al comisionado de la ONU para los Derechos Humanos
Carta de MORENA al comisionado de la ONU para los Derechos Humanos
 

Ähnlich wie Visual ip subnetting

Ähnlich wie Visual ip subnetting (20)

IP classes and subnetting.
IP classes and subnetting.IP classes and subnetting.
IP classes and subnetting.
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Assignment 1 iap
Assignment 1 iapAssignment 1 iap
Assignment 1 iap
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
1.IPv4.pptx
1.IPv4.pptx1.IPv4.pptx
1.IPv4.pptx
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Microsoft windows server 2003
Microsoft windows server 2003Microsoft windows server 2003
Microsoft windows server 2003
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Subneting.ppt
Subneting.pptSubneting.ppt
Subneting.ppt
 
Soal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan KomputerSoal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan Komputer
 
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Ip address classes
Ip address classesIp address classes
Ip address classes
 
Mod6
Mod6Mod6
Mod6
 
Subnetting ked
Subnetting kedSubnetting ked
Subnetting ked
 
Subnetting class B
Subnetting class BSubnetting class B
Subnetting class B
 
CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014
 

Kürzlich hochgeladen

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Visual ip subnetting

  • 2. IP address and subnet mask IP Address: 192.168.2.11 Subnet: 255.255.255.0
  • 3. IP address and subnet mask Subnet: 255.255.255.0 IP Address: 192.168.2. 11 Network IP Address: Computer IP Address: 192.168.2.0 192.168.2.11
  • 4. IP address and subnet mask Computer IP Address: 192.168.2.11 Subnet Mask: 255.255.255.0 Network Address: 192.168.2.0 Available IP Addresses for hosts in the LAN: 192.168.2.1-254 IP Address BROADCAST 192.168.2.255
  • 5. Subnet Mask Types Class A 255.0.0.0 11111111.00000000.00000000.00000000 Class B 255.255.0.0 11111111.11111111.00000000.00000000 Class C 255.255.255.0 11111111.11111111.11111111.00000000 User defined 255.255.240.0 Examples 11111111.11111111.11110000.00000000 255.255.255.224 11111111.11111111.11111111.11100000 255.255.255.252 11111111.11111111.11111111.11111100
  • 6. IP Address Types Class A 1 to 126.xxx.xxx.xxx Class B 128 to 191.xxx.xxx.xxx Class C 192 to 223.xxx.xxx.xxx Class D 224 to 239.xxx.xxx.xxx for multicasting Class E 240 to 254.xxx.xxx.xxx reserved future use 127.xxx.xxx.xxx are reserved for loopback and internal testing
  • 7. Subnet Masks and IP addresses sA Mask short name Max. Number of Hosts Clas 255.0.0.0 /8 16.777.214 11111111.00000000.00000000.00000000 sB Clas 255.255.0.0 /16 65534 11111111.11111111.00000000.00000000 sC Clas 255.255.255.0 /24 254 11111111.11111111.11111111.00000000 255.255.240.0 /20 4094 11111111.11111111.11110000.00000000 255.255.255.224 /27 30 11111111.11111111.11111111.11100000 255.255.255.252 /30 2 11111111.11111111.11111111.11111100
  • 8. Examples IP Address: 10.3.71.170 /8 Computer IP Address: 10.3.71.170 Subnet Mask: 255.0.0.0 h osts 77 .214 Network Address: 10.0.0.0 16.7 Available IP Addresses for hosts in the LAN: 10.xxx.xxx.xxx IP Address BROADCAST 10.255.255.255
  • 9. Examples IP Address: 130.11.92.7 /16 Computer IP Address: 130.11.92.7 Subnet Mask: 255.255.0.0 os ts 34h Network Address: 130.11.0.0 655 Available IP Addresses for hosts in the LAN: 130.11.xxx.xxx IP Address BROADCAST 130.11.255.255
  • 10. Examples IP Address: 192.168.2.10 /24 Computer IP Address: 192.168.2.10 Subnet Mask: 255.255.255.0 ts ho s 254 Network Address: 192.168.2.0 Available IP Addresses for hosts in the LAN: 192.168.2.xxx IP Address BROADCAST 192.168.2.255
  • 11. IP Address Types In private networks you can create a class B network inside a class A address/network. Network IP Address: 10.0.0.0 /24 SubNetwork: 10.1.0.0 /16 SubNetwork: 10.2.0.0 /16 SubNetwork: 10.3.0.0 /16 …
  • 12. IP Address Types And also create class C networks inside a class B address/network. Network IP Address: 10.9.0.0 /16 SubNetwork: 10.9.1.0 /24 SubNetwork: 10.9.2.0 /24 SubNetwork: 10.9.3.0 /24 …
  • 13. IP Address Types In private networks you can create any type of network that suits your needs in terms of IP address type and network mask/amount of host IP addresses. For instance: IP Address: 10.70.2.10 /24 Computer IP Address: 10.70.2.10 Subnet Mask: 255.255.255.0 Network Address: 10.70.2.0 Available IP Addresses for hosts in the LAN: 10.70.2.xxx IP Address BROADCAST 10.70.2.255
  • 14. For more technical documents visit us www.smc.com Facebook: SMC Networks Europe & Africa Twitter: SMC_EU Disclaimer: All data has been carefully checked for correctness. SMC Networks takes no responsibility for possible errors in this document. All technical specifications are subject to change without prior notice. (c) 2010, SMC Networks