SlideShare ist ein Scribd-Unternehmen logo
1 von 55
IPAddressing &IPAddressing &
SubnettingSubnetting
Prepared By Adugna A.
Summary of classful addressingSummary of classful addressing
schemescheme
When Internet addresses were standardized (early
1980s), the Internet address space was divided up
into classes:
Prepared By Adugna A.
Special AddressesSpecial Addresses (Cont.)(Cont.)
Prepared By Adugna A.
Special AddressesSpecial Addresses (Cont.)(Cont.)
 Within each address class is a set of
addresses that are set aside for use in
local networks setting(private).
Prepared By Adugna A.
Private AddressesPrivate Addresses (Cont.)(Cont.)
 A range of addresses from each class:
Prepared By Adugna A.
ExampleExample
SolutionSolution
Find the class of the following IP addresses
00000001 00001011 00001011 11101111
11000001 00001011 00001011 11101111
•00000001 00001011 00001011 11101111
1st
is 0, hence it is Class A
•11000001 00001011 00001011 11101111
1st
and 2nd
bits are 1, and 3rd
bit is 0 hence, Class C
How to identify which class the IP address belongs to
Method #1
Prepared By Adugna A.
Method #1 simplified
Prepared By Adugna A.
Finding the class in decimal notation
Method #2
Prepared By Adugna A.
ExampleExample
SolutionSolution
Find the class of the following addresses
158.223.1.108
227.13.14.88
158.223.1.108
1st
byte = 158 (128<158<191) class B
227.13.14.88
1st
byte = 227 (224<227<239) class D
Prepared By Adugna A.
Method #3Method #3
 Class A default mask is 255.0.0.0
 Class B default mask is 255.255.0.0
 Class C Default mask 255.255.255.0
If default subnet mask is given
Prepared By Adugna A.
How do we know how long theHow do we know how long the
network prefix is?network prefix is?
 The network prefix used to be implicitly
defined (class-based addressing,
A,B,C,D…)
 The network prefix now is flexible and is
indicated by a prefix/netmask (classless).
Prepared By Adugna A.
Network AddressesNetwork Addresses
The network address is the first address.
The network address defines the network to the
rest of the Internet.
Given the network address, we can find the
class of the address, the block, and the range of
the addresses in the block
Prepared By Adugna A.
ExampleExample
SolutionSolution
Given the network address 132.21.0.0, find the
class, the block( netid), and the range of the
addresses
The 1st
byte is between 128 and 191.
Hence, Class B
The block has a netid of 132.21.
The addresses range from
132.21.0.0 to 132.21.255.255.
Prepared By Adugna A.
Subnet MaskSubnet Mask
 Frequently, the Network & Host portions of
the address need to be separately extracted.
 In most cases, if you know the address class,
it’s easy to separate the 2 portions.
Prepared By Adugna A.
Subnet MaskSubnet Mask (Cont.)(Cont.)
 Under the addressing scheme, called
Subnetting, separating the Network &
Host requires a special process called
Subnet Masking.
Prepared By Adugna A.
Function of Subnet MaskFunction of Subnet Mask
 To determine whether an IP address exists
on the local network or outside the local
network.
 It is applied to a message’s destination
address to extract the network address.
 If the extracted network address matches
the local network ID, the destination is
located on the local network. Otherwise
the message will be forwarded outside to
other network.
Prepared By Adugna A.
Subnet MaskSubnet Mask (Cont.)(Cont.)
 We can subnet masking process in two
ways: straight or short-cut
1. Straight
 we use binary notation for both the
address and the mask and then apply the
AND operation to get block address
(Network address)
• Mask AND IP address =Network Address
Prepared By Adugna A.
2. Short-Cut Method
i. If the byte in the mask is 255, copy the byte
in the destination address.
ii. If the byte in the mask is 0, replace the
byte in the address with 0.
iii. If the byte in the mask is neither 255 nor 0,
we write the mask and the address in binary
and apply the AND operation.
Prepared By Adugna A.
Simplified Short-Cut Method AND operation
If the mask is neither 255(1’s) nor 0(0’s), we
write the mask and the address in binary and
apply the AND operation.
Prepared By Adugna A.
Boolean Algebra(AND)Boolean Algebra(AND)
 Boolean Algebra is a process that applies
binary logic to yield binary results.
 1 and 1 = 1
 1 and 0 = 0
 0 and 1 = 0
 0 and 0 = 0
 The process of combining binary
values with Boolean Algebra is
called Anding.Prepared By Adugna A.
Limitations and objectivesLimitations and objectives
 Subnet masks apply only to Class A, B
or C IP addresses.
 The subnet mask is like a filter that is
applied to a message’s destination IP
address.
 Its objective is to determine if the local
network is the destination network.
Prepared By Adugna A.
Examples …Examples …
1. If a destination IP address is
206.175.162.21, we know that it is a
Class C address & that its binary
equivalent is:
11001110.10101111.10100010.00010101
Prepared By Adugna A.
Examples …Examples …(Cont’d…)(Cont’d…)
2. We also know that the default subnet
mask for Class C is: 255.255.255.0
and that its binary equivalent is:
11111111.11111111.11111111.00000000
Prepared By Adugna A.
Examples …Examples …(Cont’d…)(Cont’d…)
3. When these two binary numbers are
combined using AND, the Network ID of
the destination network is the result:
206.175.162.0 ->(NetID )Prepared By Adugna A.
Examples …Examples …(Cont’d…)(Cont’d…)
4. The result is the IP address of the
network which in this case is the same
as the local network & it means, the
message is for a node on the local
network.
Prepared By Adugna A.
CIDR cont’d…CIDR cont’d…
 Goals: Restructure IP address assignments
to increase efficiency
 Hierarchical routing aggregation to
minimize route table entries
Key Concept: The length of the network id (prefix) in IP
addresses is arbitrary/flexible and is defined by the network
hierarchy.
 Consequence:
 Routers use the IP address and the length of the prefix for
forwarding.
 All advertised IP addresses must include a prefix
Prepared By Adugna A.
CIDR ExampleCIDR Example
 CIDR notation of a network address:
192.0.2.0/18
 "18" says that the first 18 bits are the network part of
the address
 The network part is called the network prefix
 Example:
 Assume that a site requires an IP network domain that can support
1000 IP host addresses
 With CIDR, the network is assigned a continuous block of 1024 = 210
(>1000) addresses with a 32-10 = 22-bit long prefix
Prepared By Adugna A.
CIDR: Prefix Size vs. HostCIDR: Prefix Size vs. Host
SpaceSpace
CIDR Block Prefix # of Host Addresses
/27 32 hosts
/26 64 hosts
/25 128 hosts
/24 256 hosts
/23 512 hosts
/22 1,024 hosts
/21 2,048 hosts
/20 4,096 hosts
/19 8,192 hosts
/18 16,384 hosts
/17 32,768 hosts
/16 65,536 hosts
/15 131,072 hosts
/14 262,144 hosts
/13 524,288 hostsPrepared By Adugna A.
CIDR and AddressCIDR and Address
assignmentsassignments
 Backbone ISPs obtain large blocks of IP
address space and then reallocate portions of
their address blocks to their customers.
Example:
 Assume that an ISP owns the address block
206.0.64.0/18, which represents 16,384 (232-18
=214
) IP
host addresses
 No. Host 2N-n
where N(total bit) and n netid prifix
 Suppose a client requires 800 host addresses
 512=29
<800<1024=210
-> 32-10 = 22,
 Assigning a /22 block, i.e., 206.0.68.0/22 -> gives a block
of 1,024 (210
) IP addresses to client.Prepared By Adugna A.
Routing IP AddressesRouting IP Addresses
 When you build a network, you need to
figure out how many network Ids your
network requires.
 To do so, you must account for every
WAN connection & subnet on the
Network.
 Every node & router interface requires
a Host address, or ID.
Prepared By Adugna A.
Subnetting, Subnet & SubnetSubnetting, Subnet & Subnet
MaskMask
 Subnetting, a subnet & a subnet mask
are all different.
 In fact, the 1st
creates the 2nd
& is
identified by the 3rd
.
 Subnetting is the process of dividing a
network & its IP addresses into
segments, each of which is called a
subnetwork or subnet.
Prepared By Adugna A.
SubnettingSubnetting (Cont.)(Cont.)
 Through the use of subnetting, the
network from the previous slide can be
logically divided into subnets with fewer
hosts on each subnetwork.
 Subnetting
 i. Improve the available shared bandwidth
 ii. Minimize the amount of broadcast
traffic generated over the entire network.
Prepared By Adugna A.
SubnettingSubnetting (Cont.)(Cont.)
 Example of subnetting: when the
network administrator divides the
172.20.0.0 network into 5 smaller
networks – 172.20.1.0, 172.20.2.0,
172.20.3.0, 172.20.4.0 & 172.20.5.0 –
the outside world stills sees the network
as 172.20.0.0, but the internal routers
now break the network addressing into
the 5 smaller subnetworks.
Prepared By Adugna A.
SubnettingSubnetting (Cont.)(Cont.)
 In the example, only a single IP address
is used to reference the network &
instead of 5 network addresses, only
one network reference is included in the
routing tables of routers on other
networks.
Prepared By Adugna A.
Borrowing Bits for SubnetBorrowing Bits for Subnet
 The key concept in subnetting is borrowing
bits from the host portion of the network to
create a sub-network.
 The 2 rules required:
 -There must always be at least 2 bits available for
the Host ID.
 From each class, only a certain number of bits can be
borrowed from the host portion.
 -All of the subnet bits cannot be all 1s or 0s at the
same time.
 Remember that the addresses with all ones (broadcast
address) & all zeroes (local network) cannot be used as
they have special meanings.Prepared By Adugna A.
Borrowing Bits for SubnetBorrowing Bits for Subnet
(Cont.)(Cont.)
Bits Available for Creating Subnets
Address Class Host Bits Bits Available for
Subnet
A 24 22
B 16 14
C 8 6
Prepared By Adugna A.
Subnetting a Class ASubnetting a Class A
NetworkNetwork
 Example: To create subnets with more
than 4 millions hosts per subnet, you
must borrow 2 bits from the 2nd
octet &
use 10 masked bits for the subnet mask
(11111111.11000000) or 255.192 in
decimal.
Prepared By Adugna A.
Class A Subnet MasksClass A Subnet Masks (Cont.)(Cont.)
A sample of subnet mask options available for Class A addresses.
Prepared By Adugna A.
Class A Subnet MasksClass A Subnet Masks (Cont.)(Cont.)
 The subnet mask with the highest value
(255.255.255.252) has a binary
representation of:
11111111.11111111.11111111.11111100
 The 2 zeroes in this subnet mask
represent the 2 positions set aside for
the Host address portion of the address.
Prepared By Adugna A.
Subnetting Class B & Class CSubnetting Class B & Class C
 The same procedure will be applied for
Class B & Class C IP addresses & subnet
masks as depicted in table on slide 44
“Class A Subnet Masks”
 The only differences are that you have
fewer options (due to a fewer number of
bits available) & that you’re much more
likely to work with Class B & Class C
networks in real life.Prepared By Adugna A.
Subnetting Class B & Class CSubnetting Class B & Class C
(Cont.)(Cont.)
A sample of the subnet masks available for Class B networks.
Prepared By Adugna A.
Subnetting Class B & Class CSubnetting Class B & Class C
(Cont.)(Cont.)
A list of the subnet masks available for Class C networks.
Prepared By Adugna A.
Knowing How to CalculateKnowing How to Calculate
SubnetsSubnets
 To determine the number of subnets & hosts
per subnet for any of the available subnet
masks, 2 simple formulas to calculate these
numbers:
Prepared By Adugna A.
Method of subnettingMethod of subnetting
 In subnetting we find the answer of following
questions.
1. What is subnet mask for given address?
2. How many subnets does given subnet mask provide?
3. What is block size for given subnet mask?
4. What are the valid subnets?
5. What are the total hosts?
6. How many valid hosts per subnet?
7. What is network address of each subnet?
8. What is broadcast address of each subnet?
Prepared By Adugna A.
1. What is subnet mask1. What is subnet mask
for given address?for given address?
 Ex. find the subnet mask of address
188.25.45.48/20 ?
 This address belong to class B (255.255.0.0)
with /16 in CIDR . Let us borrowed 4 bits
from hosts portion. So this subnet mask in
binary would be
11111111.11111111.11110000.00000000.
 Our answer subnet mask would be
255.255.240.0
Prepared By Adugna A.
2. How many subnets does2. How many subnets does
given subnet mask provide?given subnet mask provide?
 Ex. in 192.168.1.0/27, N(borrowed bit)
is 3. By looking at address we can
determined that this address is belong
to class C and class C has default
subnet mask 255.255.255.0 [/24 in
CIDR]. In given address we borrowed
27 - 24 = 3 host bits to create subnets.
Now 23
= 8, so our answer is 8.
Prepared By Adugna A.
What is block size forWhat is block size for
given subnet mask?given subnet mask?
 It is used to calculate the valid subnets
 To figure out the block size, use this
formula 256 - Subnet mask = block
size.
 For example block size for subnet mask
255.255.255.240 is 256 - 240 = 16.
Prepared By Adugna A.
What are the valid subnets?What are the valid subnets?
 1st
calculate total subnet by using formula 2N
 2nd
find the block size and count from zero in
block until you reach the subnet mask value
incrementing with block size. Ex. the valid
subnets for 192.168.1.0/26.
 N=2 [26-24],Total subnets are 22
= 4.
 Subnet mask would be 255.255.255.192.
 Block size would be 256-192 = 64.
 Start counting from zero at blocks of 64, so our valid
subnets would be 0,64,128,192.
Prepared By Adugna A.
What are the total hosts?What are the total hosts?
 Total hosts per subnet =2H
= Total hosts.
H is the number of host bits. For
example in address 192.168.1.0/26 we
have 32 – 26 = 6. Total hosts per subnet
would be 26
= 64.
Prepared By Adugna A.
How many valid hosts areHow many valid hosts are
available per subnet?available per subnet?
 As we know, we need to reduce two
address per subnet, one for network ID
and another for broadcast ID.
 So our formula, to calculate valid hosts
would be Total hosts -2 = Valid hosts.
In above example we have 64 hosts per
subnet, so valid hosts in each subnet
would be 64 - 2 = 62.
Prepared By Adugna A.
What is broadcast address ofWhat is broadcast address of
each subnet?each subnet?
 Broadcast address is the last address of
subnet and cannot be assigned to any
host. In above example
 0 Subnet has broadcast address 63
 64 Subnet has broadcast address 127
 128 Subnet has broadcast address 191
 192 Subnet has broadcast address 255
Prepared By Adugna A.
What is the network addressWhat is the network address
of each subnet?of each subnet?
 Network address is the first address of
subnet. This address is used to locate
the network, and cannot be assigned to
any host. In above example address
0,64,128,192 are the network address
Prepared By Adugna A.
A Short BroadcastA Short Broadcast
 A broadcast is a message that every
node on a network or subnetwork
receives & examines.
 Cisco IOS supports 2 different types of
broadcast messages:
 Flooded
 Directed
Prepared By Adugna A.
A Short BroadcastA Short Broadcast (Cont.)(Cont.)
 Generally speaking, routers do not
propagate broadcasts, which is one of
the benefits of installing a router in the
first place.
Prepared By Adugna A.
A Short BroadcastA Short Broadcast (Cont.)(Cont.)
 Flooded broadcasts (those with the
nominal broadcast address of
255.255.255.255) are not forwarded by
the router & are considered local traffic
only.
 Directed broadcasts, which contain all
1’s in the Host portion of the IP
address, are addressed to a specific
subnetwork & are allowed to pass.Prepared By Adugna A.

Weitere ähnliche Inhalte

Was ist angesagt?

Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routingVikas Jagtap
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar pptSmriti Rastogi
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 

Was ist angesagt? (20)

Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
IPv4
IPv4IPv4
IPv4
 
Explaining ip address
Explaining ip addressExplaining ip address
Explaining ip address
 
Vlsm
VlsmVlsm
Vlsm
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
IP Security
IP SecurityIP Security
IP Security
 
Transport layer
Transport layer Transport layer
Transport layer
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 

Andere mochten auch

Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyKashif Sohail
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7mlrbrown
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introductionswascher
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingswascher
 
Ip Subredes
Ip SubredesIp Subredes
Ip SubredesEspol
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureMahmmoud Mahdi
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing FilesMahmmoud Mahdi
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsMahmmoud Mahdi
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionMahmmoud Mahdi
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing AMahmmoud Mahdi
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing PrintersMahmmoud Mahdi
 

Andere mochten auch (20)

Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introduction
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Telnet
TelnetTelnet
Telnet
 
Ip Subredes
Ip SubredesIp Subredes
Ip Subredes
 
Subnetting
SubnettingSubnetting
Subnetting
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Lesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking ConceptsLesson1: Introduction To Networking Concepts
Lesson1: Introduction To Networking Concepts
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 

Ähnlich wie Computer Networking: Subnetting and IP Addressing

IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm1 2d
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from JuniperNam Nguyen
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4praveenps17
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3VISHNU N
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basicstmavroidis
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing ArchitectureShreehari Dhat
 
183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)MdJiarulIslam
 

Ähnlich wie Computer Networking: Subnetting and IP Addressing (20)

Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Ip basics
Ip basicsIp basics
Ip basics
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Ip addressing upload
Ip addressing uploadIp addressing upload
Ip addressing upload
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4
 
Vlsm
VlsmVlsm
Vlsm
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
3 ip address
3 ip address3 ip address
3 ip address
 
CCNA Icnd110 s04l03
CCNA Icnd110 s04l03CCNA Icnd110 s04l03
CCNA Icnd110 s04l03
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)
 

Mehr von Bisrat Girma

Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesBisrat Girma
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6Bisrat Girma
 
Object oriented sad-5 part ii
Object oriented sad-5 part iiObject oriented sad-5 part ii
Object oriented sad-5 part iiBisrat Girma
 
Object oriented sad-5 part i
Object oriented sad-5 part iObject oriented sad-5 part i
Object oriented sad-5 part iBisrat Girma
 
Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085Bisrat Girma
 

Mehr von Bisrat Girma (6)

Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN Technologies
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6
 
Object oriented sad-5 part ii
Object oriented sad-5 part iiObject oriented sad-5 part ii
Object oriented sad-5 part ii
 
Object oriented sad-5 part i
Object oriented sad-5 part iObject oriented sad-5 part i
Object oriented sad-5 part i
 
Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085Chapter 4 - Interrupts of 8085
Chapter 4 - Interrupts of 8085
 
Chapter5
Chapter5Chapter5
Chapter5
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Computer Networking: Subnetting and IP Addressing

  • 2. Summary of classful addressingSummary of classful addressing schemescheme When Internet addresses were standardized (early 1980s), the Internet address space was divided up into classes: Prepared By Adugna A.
  • 3. Special AddressesSpecial Addresses (Cont.)(Cont.) Prepared By Adugna A.
  • 4. Special AddressesSpecial Addresses (Cont.)(Cont.)  Within each address class is a set of addresses that are set aside for use in local networks setting(private). Prepared By Adugna A.
  • 5. Private AddressesPrivate Addresses (Cont.)(Cont.)  A range of addresses from each class: Prepared By Adugna A.
  • 6. ExampleExample SolutionSolution Find the class of the following IP addresses 00000001 00001011 00001011 11101111 11000001 00001011 00001011 11101111 •00000001 00001011 00001011 11101111 1st is 0, hence it is Class A •11000001 00001011 00001011 11101111 1st and 2nd bits are 1, and 3rd bit is 0 hence, Class C How to identify which class the IP address belongs to Method #1 Prepared By Adugna A.
  • 8. Finding the class in decimal notation Method #2 Prepared By Adugna A.
  • 9. ExampleExample SolutionSolution Find the class of the following addresses 158.223.1.108 227.13.14.88 158.223.1.108 1st byte = 158 (128<158<191) class B 227.13.14.88 1st byte = 227 (224<227<239) class D Prepared By Adugna A.
  • 10. Method #3Method #3  Class A default mask is 255.0.0.0  Class B default mask is 255.255.0.0  Class C Default mask 255.255.255.0 If default subnet mask is given Prepared By Adugna A.
  • 11. How do we know how long theHow do we know how long the network prefix is?network prefix is?  The network prefix used to be implicitly defined (class-based addressing, A,B,C,D…)  The network prefix now is flexible and is indicated by a prefix/netmask (classless). Prepared By Adugna A.
  • 12. Network AddressesNetwork Addresses The network address is the first address. The network address defines the network to the rest of the Internet. Given the network address, we can find the class of the address, the block, and the range of the addresses in the block Prepared By Adugna A.
  • 13. ExampleExample SolutionSolution Given the network address 132.21.0.0, find the class, the block( netid), and the range of the addresses The 1st byte is between 128 and 191. Hence, Class B The block has a netid of 132.21. The addresses range from 132.21.0.0 to 132.21.255.255. Prepared By Adugna A.
  • 14. Subnet MaskSubnet Mask  Frequently, the Network & Host portions of the address need to be separately extracted.  In most cases, if you know the address class, it’s easy to separate the 2 portions. Prepared By Adugna A.
  • 15. Subnet MaskSubnet Mask (Cont.)(Cont.)  Under the addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Prepared By Adugna A.
  • 16. Function of Subnet MaskFunction of Subnet Mask  To determine whether an IP address exists on the local network or outside the local network.  It is applied to a message’s destination address to extract the network address.  If the extracted network address matches the local network ID, the destination is located on the local network. Otherwise the message will be forwarded outside to other network. Prepared By Adugna A.
  • 17. Subnet MaskSubnet Mask (Cont.)(Cont.)  We can subnet masking process in two ways: straight or short-cut 1. Straight  we use binary notation for both the address and the mask and then apply the AND operation to get block address (Network address) • Mask AND IP address =Network Address Prepared By Adugna A.
  • 18. 2. Short-Cut Method i. If the byte in the mask is 255, copy the byte in the destination address. ii. If the byte in the mask is 0, replace the byte in the address with 0. iii. If the byte in the mask is neither 255 nor 0, we write the mask and the address in binary and apply the AND operation. Prepared By Adugna A.
  • 19. Simplified Short-Cut Method AND operation If the mask is neither 255(1’s) nor 0(0’s), we write the mask and the address in binary and apply the AND operation. Prepared By Adugna A.
  • 20. Boolean Algebra(AND)Boolean Algebra(AND)  Boolean Algebra is a process that applies binary logic to yield binary results.  1 and 1 = 1  1 and 0 = 0  0 and 1 = 0  0 and 0 = 0  The process of combining binary values with Boolean Algebra is called Anding.Prepared By Adugna A.
  • 21. Limitations and objectivesLimitations and objectives  Subnet masks apply only to Class A, B or C IP addresses.  The subnet mask is like a filter that is applied to a message’s destination IP address.  Its objective is to determine if the local network is the destination network. Prepared By Adugna A.
  • 22. Examples …Examples … 1. If a destination IP address is 206.175.162.21, we know that it is a Class C address & that its binary equivalent is: 11001110.10101111.10100010.00010101 Prepared By Adugna A.
  • 23. Examples …Examples …(Cont’d…)(Cont’d…) 2. We also know that the default subnet mask for Class C is: 255.255.255.0 and that its binary equivalent is: 11111111.11111111.11111111.00000000 Prepared By Adugna A.
  • 24. Examples …Examples …(Cont’d…)(Cont’d…) 3. When these two binary numbers are combined using AND, the Network ID of the destination network is the result: 206.175.162.0 ->(NetID )Prepared By Adugna A.
  • 25. Examples …Examples …(Cont’d…)(Cont’d…) 4. The result is the IP address of the network which in this case is the same as the local network & it means, the message is for a node on the local network. Prepared By Adugna A.
  • 26. CIDR cont’d…CIDR cont’d…  Goals: Restructure IP address assignments to increase efficiency  Hierarchical routing aggregation to minimize route table entries Key Concept: The length of the network id (prefix) in IP addresses is arbitrary/flexible and is defined by the network hierarchy.  Consequence:  Routers use the IP address and the length of the prefix for forwarding.  All advertised IP addresses must include a prefix Prepared By Adugna A.
  • 27. CIDR ExampleCIDR Example  CIDR notation of a network address: 192.0.2.0/18  "18" says that the first 18 bits are the network part of the address  The network part is called the network prefix  Example:  Assume that a site requires an IP network domain that can support 1000 IP host addresses  With CIDR, the network is assigned a continuous block of 1024 = 210 (>1000) addresses with a 32-10 = 22-bit long prefix Prepared By Adugna A.
  • 28. CIDR: Prefix Size vs. HostCIDR: Prefix Size vs. Host SpaceSpace CIDR Block Prefix # of Host Addresses /27 32 hosts /26 64 hosts /25 128 hosts /24 256 hosts /23 512 hosts /22 1,024 hosts /21 2,048 hosts /20 4,096 hosts /19 8,192 hosts /18 16,384 hosts /17 32,768 hosts /16 65,536 hosts /15 131,072 hosts /14 262,144 hosts /13 524,288 hostsPrepared By Adugna A.
  • 29. CIDR and AddressCIDR and Address assignmentsassignments  Backbone ISPs obtain large blocks of IP address space and then reallocate portions of their address blocks to their customers. Example:  Assume that an ISP owns the address block 206.0.64.0/18, which represents 16,384 (232-18 =214 ) IP host addresses  No. Host 2N-n where N(total bit) and n netid prifix  Suppose a client requires 800 host addresses  512=29 <800<1024=210 -> 32-10 = 22,  Assigning a /22 block, i.e., 206.0.68.0/22 -> gives a block of 1,024 (210 ) IP addresses to client.Prepared By Adugna A.
  • 30. Routing IP AddressesRouting IP Addresses  When you build a network, you need to figure out how many network Ids your network requires.  To do so, you must account for every WAN connection & subnet on the Network.  Every node & router interface requires a Host address, or ID. Prepared By Adugna A.
  • 31. Subnetting, Subnet & SubnetSubnetting, Subnet & Subnet MaskMask  Subnetting, a subnet & a subnet mask are all different.  In fact, the 1st creates the 2nd & is identified by the 3rd .  Subnetting is the process of dividing a network & its IP addresses into segments, each of which is called a subnetwork or subnet. Prepared By Adugna A.
  • 32. SubnettingSubnetting (Cont.)(Cont.)  Through the use of subnetting, the network from the previous slide can be logically divided into subnets with fewer hosts on each subnetwork.  Subnetting  i. Improve the available shared bandwidth  ii. Minimize the amount of broadcast traffic generated over the entire network. Prepared By Adugna A.
  • 33. SubnettingSubnetting (Cont.)(Cont.)  Example of subnetting: when the network administrator divides the 172.20.0.0 network into 5 smaller networks – 172.20.1.0, 172.20.2.0, 172.20.3.0, 172.20.4.0 & 172.20.5.0 – the outside world stills sees the network as 172.20.0.0, but the internal routers now break the network addressing into the 5 smaller subnetworks. Prepared By Adugna A.
  • 34. SubnettingSubnetting (Cont.)(Cont.)  In the example, only a single IP address is used to reference the network & instead of 5 network addresses, only one network reference is included in the routing tables of routers on other networks. Prepared By Adugna A.
  • 35. Borrowing Bits for SubnetBorrowing Bits for Subnet  The key concept in subnetting is borrowing bits from the host portion of the network to create a sub-network.  The 2 rules required:  -There must always be at least 2 bits available for the Host ID.  From each class, only a certain number of bits can be borrowed from the host portion.  -All of the subnet bits cannot be all 1s or 0s at the same time.  Remember that the addresses with all ones (broadcast address) & all zeroes (local network) cannot be used as they have special meanings.Prepared By Adugna A.
  • 36. Borrowing Bits for SubnetBorrowing Bits for Subnet (Cont.)(Cont.) Bits Available for Creating Subnets Address Class Host Bits Bits Available for Subnet A 24 22 B 16 14 C 8 6 Prepared By Adugna A.
  • 37. Subnetting a Class ASubnetting a Class A NetworkNetwork  Example: To create subnets with more than 4 millions hosts per subnet, you must borrow 2 bits from the 2nd octet & use 10 masked bits for the subnet mask (11111111.11000000) or 255.192 in decimal. Prepared By Adugna A.
  • 38. Class A Subnet MasksClass A Subnet Masks (Cont.)(Cont.) A sample of subnet mask options available for Class A addresses. Prepared By Adugna A.
  • 39. Class A Subnet MasksClass A Subnet Masks (Cont.)(Cont.)  The subnet mask with the highest value (255.255.255.252) has a binary representation of: 11111111.11111111.11111111.11111100  The 2 zeroes in this subnet mask represent the 2 positions set aside for the Host address portion of the address. Prepared By Adugna A.
  • 40. Subnetting Class B & Class CSubnetting Class B & Class C  The same procedure will be applied for Class B & Class C IP addresses & subnet masks as depicted in table on slide 44 “Class A Subnet Masks”  The only differences are that you have fewer options (due to a fewer number of bits available) & that you’re much more likely to work with Class B & Class C networks in real life.Prepared By Adugna A.
  • 41. Subnetting Class B & Class CSubnetting Class B & Class C (Cont.)(Cont.) A sample of the subnet masks available for Class B networks. Prepared By Adugna A.
  • 42. Subnetting Class B & Class CSubnetting Class B & Class C (Cont.)(Cont.) A list of the subnet masks available for Class C networks. Prepared By Adugna A.
  • 43. Knowing How to CalculateKnowing How to Calculate SubnetsSubnets  To determine the number of subnets & hosts per subnet for any of the available subnet masks, 2 simple formulas to calculate these numbers: Prepared By Adugna A.
  • 44. Method of subnettingMethod of subnetting  In subnetting we find the answer of following questions. 1. What is subnet mask for given address? 2. How many subnets does given subnet mask provide? 3. What is block size for given subnet mask? 4. What are the valid subnets? 5. What are the total hosts? 6. How many valid hosts per subnet? 7. What is network address of each subnet? 8. What is broadcast address of each subnet? Prepared By Adugna A.
  • 45. 1. What is subnet mask1. What is subnet mask for given address?for given address?  Ex. find the subnet mask of address 188.25.45.48/20 ?  This address belong to class B (255.255.0.0) with /16 in CIDR . Let us borrowed 4 bits from hosts portion. So this subnet mask in binary would be 11111111.11111111.11110000.00000000.  Our answer subnet mask would be 255.255.240.0 Prepared By Adugna A.
  • 46. 2. How many subnets does2. How many subnets does given subnet mask provide?given subnet mask provide?  Ex. in 192.168.1.0/27, N(borrowed bit) is 3. By looking at address we can determined that this address is belong to class C and class C has default subnet mask 255.255.255.0 [/24 in CIDR]. In given address we borrowed 27 - 24 = 3 host bits to create subnets. Now 23 = 8, so our answer is 8. Prepared By Adugna A.
  • 47. What is block size forWhat is block size for given subnet mask?given subnet mask?  It is used to calculate the valid subnets  To figure out the block size, use this formula 256 - Subnet mask = block size.  For example block size for subnet mask 255.255.255.240 is 256 - 240 = 16. Prepared By Adugna A.
  • 48. What are the valid subnets?What are the valid subnets?  1st calculate total subnet by using formula 2N  2nd find the block size and count from zero in block until you reach the subnet mask value incrementing with block size. Ex. the valid subnets for 192.168.1.0/26.  N=2 [26-24],Total subnets are 22 = 4.  Subnet mask would be 255.255.255.192.  Block size would be 256-192 = 64.  Start counting from zero at blocks of 64, so our valid subnets would be 0,64,128,192. Prepared By Adugna A.
  • 49. What are the total hosts?What are the total hosts?  Total hosts per subnet =2H = Total hosts. H is the number of host bits. For example in address 192.168.1.0/26 we have 32 – 26 = 6. Total hosts per subnet would be 26 = 64. Prepared By Adugna A.
  • 50. How many valid hosts areHow many valid hosts are available per subnet?available per subnet?  As we know, we need to reduce two address per subnet, one for network ID and another for broadcast ID.  So our formula, to calculate valid hosts would be Total hosts -2 = Valid hosts. In above example we have 64 hosts per subnet, so valid hosts in each subnet would be 64 - 2 = 62. Prepared By Adugna A.
  • 51. What is broadcast address ofWhat is broadcast address of each subnet?each subnet?  Broadcast address is the last address of subnet and cannot be assigned to any host. In above example  0 Subnet has broadcast address 63  64 Subnet has broadcast address 127  128 Subnet has broadcast address 191  192 Subnet has broadcast address 255 Prepared By Adugna A.
  • 52. What is the network addressWhat is the network address of each subnet?of each subnet?  Network address is the first address of subnet. This address is used to locate the network, and cannot be assigned to any host. In above example address 0,64,128,192 are the network address Prepared By Adugna A.
  • 53. A Short BroadcastA Short Broadcast  A broadcast is a message that every node on a network or subnetwork receives & examines.  Cisco IOS supports 2 different types of broadcast messages:  Flooded  Directed Prepared By Adugna A.
  • 54. A Short BroadcastA Short Broadcast (Cont.)(Cont.)  Generally speaking, routers do not propagate broadcasts, which is one of the benefits of installing a router in the first place. Prepared By Adugna A.
  • 55. A Short BroadcastA Short Broadcast (Cont.)(Cont.)  Flooded broadcasts (those with the nominal broadcast address of 255.255.255.255) are not forwarded by the router & are considered local traffic only.  Directed broadcasts, which contain all 1’s in the Host portion of the IP address, are addressed to a specific subnetwork & are allowed to pass.Prepared By Adugna A.