SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Mohammad Touhidul Islam
131004622E
muhdtohidul@gmail.com
Prepared for : Marjana Tahmid
Subnetting
What is Subnetting?
 Allows Creating multiple network from a
single address block.
 Subnetting is a process of breaking large network
in small networks known as subnets.
Diagram
Why Subnetting?
 Maximise addressing efficiency.
 Extend the life of IPV4.
 Public IPV4 Addresses are scare.
 Easy to manage.
 Subnetting reduces network traffic by removing
collision and broadcast traffic, that overall
improve performance.
 Subnetting allows you to apply network security
polices at the interconnection between subnets
How?
CIDR [ Classless Inter Domain Routing]
 CIDR is a slash notation of subnet mask. CIDR
tells us number of on bits in a network address
CIDR Decimal Binary
/25 128 10000000
/26 192 11000000
/27 224 11100000
/28 240 11110000
/29 248 11111000
/30 252 11111100
Formulas & Variables
 h=number of host bits
 n=number of host bit use in network bits
 Number of new networks reulting from the
subnetting: =2^n
 Number of hosts per new network: =2^h-2
One is network another is broadcast
 Broadcast address is the last address of subnet.
 Block size or increment number is used to calculate the valid
subnets
Example:-1
 Subnet base address
 New CIDR length /25
255.255.255.128(Subnet Mask)
 n = 1 [Number of host bit used in network] n
 h = 7 [Remaining host bits]
192 168 1 0/24
11111111 11111111 11111111 00000000
N N N H
192 168 1 0/25
11111111 11111111 11111111 10000000
Example:-1
 Total subnets ( 2^n ) :- 2^1 = 2.
 Block size (256 - subnet mask) :- 256 - 128 = 128
 Valid subnets 0,128
 Valid host per subnets (2^h-2)=2^7-2=126
Subnets Subnet 1 Subnet 2
Network ID 192.168.1.0 192.168.1.128
First host 192.168.1.1 192.168.1.129
Last host 192.168.1.126 192.168.1.254
Broadcast ID 192.168.1.127 192.168.1.255
Example:-2
 New Perfix length /26
255.255.255.192(Subnet Mask)
 n = 2 [Number of host bit used in network] n
 n = 6 [Remaining host bits]
 Total subnets ( 2^n ) :- 22 = 4.
 Block size (256 - subnet mask) :- 256 - 192 = 64.
 Valid subnets ( Count blocks from 0) :-
0,64,128,192
192 168 1 0/26
11111111 11111111 11111111 11000000
Example:-2
 Total hosts (2h) :- 26 = 64
 Valid hosts per subnet ( 2^h- 2 ) :- 64 - 2 = 62
Subnets Subnet 1 Subnet 2 Subnet 3 Subnet 4
Network ID 0 64 128 192
First host 1 65 129 193
Last host 62 126 190 254
Broadcast ID 63 127 191 255
Subnet Mask
 Subnet mask is a 32 bits long address used to distinguish
between network address and host address in IP address.
Subnet mask is always used with IP address. Subnet mask has
only one purpose, to identify which part of an IP address is
network address and which part is host address.
IP 192 168 1 1
Subnet mask 255 255 255 128
Case Study
In Real Life Example
Diagram
In real life scenario
 some subnets may require large number of host
addresses while other may require only few
addresses.
 Assume that you are a network administrator &
EDU has three departments connected with wan
links.
 CSE department has 74 computers.
 EEE department has 52 computers.
 Administrative department has 28 computers.
 All departments are connected with each other via wan link.
 Each wan link requires two IP addresses.
Choose address
 First choice (purchase a class B IP address)
172.168.1.0/23
Subnetting of this address would give us 128
subnets and 510 hosts in each subnet. Our network
requires only 6 subnets and 160 addresses. We
would have to pay for 65356 addresses while you
need only 160 addresses. Every IP address adds
more dollars in company bill. Would you consider
this address space for company?
 Second choice (purchase at least two Class C IP
addresses)
192.168.1.0/25
192.168.1.0/26
 Subnetting of first address 192.168.1.0/25 would give
us 2 subnets and 126 hosts in each subnet.
 Subnetting of second address 192.168.1.0/26 would
give us 4 subnets and 62 hosts in each subnet.
 Collectively we are getting 6 subnets and 500 hosts
from these two address spaces. We are still wasting
more than 300 IP address, and we would have to
purchase two address spaces.
Step-1
 Oder all segments according the hosts
requirement (Largest to smallest).
Subnet Segment Host
1 CSE 74
2 EEE 52
3 Administration 28
4 Wan link 1 2
5 Wan link 2 2
6 Wan link 3 2
Step-2
 Do Subnetting for largest segment. Our largest
segment needs 74 host addresses. /25 provide
us two subnets with 126 hosts in each subnet.
192.168.1.0/25
Subnet Subnet 1 Subnet 2
Network ID 192.168.1.0 192.168.1.128
First host address 192.168.1.1 192.168.1.129
Last host address 192.168.1.126 192.168.1.254
Broadcast ID 192.168.1.127 192.168.1.255
Step-3
 Assign subnet mask to the largest segment. As
you can see in above table, subnet 1 fulfill our
largest segment requirement. Assign it to our
segment.
Segment CSE
Requirement 74
CIDR /25
Subnet mask 255.255.255.128
Network ID 192.168.1.0
First hosts 192.168.1.1
Last hosts 192.168.1.126
Broadcast ID 192.168.1.127
Step-4
 Do subnetting for second largest segment from next available
subnet. Next segment requires 52 host addresses. Subnetting of
/25 has given us two subnets with 128 hosts in each, from that
we have assigned first subnet to CSE segment. Second segment
is available, we would do subnetting of this.
 /26 provide us 4 subnets with 62 hosts in each subnet.
192.168.1.0/26
Subnet Subnet 1 Subnet 2 Subnet 3 Subnet 4
Network ID 0 64 128 192
First address 1 65 129 193
Last address 62 126 190 254
Broadcast ID 63 127 191 255
 We cannot use subnet 1 and subnet 2 ( address
from 0 to 127 ) as they are already assigned to
CSE department. We can assign subnet 3 to our
EEE department.
Segment EEE
Requirement 52
CIDR /26
Subnet mask 255.255.255.192
Network ID 192.168.1.128
First hosts 192.168.1.129
Last hosts 192.168.1.190
Broadcast ID 192.168.1.191
Step-5
 Our next segment requires 28 hosts. From above
subnetting we have subnet 3 and subnet 4
available. Do subnetting for the requirement of 28
hosts. 192.168.1.0/27
Subnet Sub
1
Sub 2 Sub 3 Sub 4 Sub 5 Sub 6 Sub 7 Sub 8
Net ID 0 32 64 96 128 160 192 224
First
Host
1 33 65 95 129 161 193 225
Last
Host
30 62 94 126 158 190 222 254
Broad-
cast ID
31 63 95 127 159 191 223 255
 Subnets 1 to 6 [address from 0 to 191] are
already occupied by previous segments. We can
assign subnet 7 to this segment.
Segment Administration
Requirement 28
CIDR /27
Subnet mask 255.255.255.224
Network ID 192.168.1.192
First hosts 192.168.1.193
Last hosts 192.168.1.222
Broadcast ID 192.168.1.223
Step-6
 Our last three segments require 2 hosts per
subnet. Do subnetting for these-192.168.1.0/30
 Valid subnets are:-
 0,4,8,12,16,20,24,28,32,36,40,44,48,52,56,60,64,68,72,76,80,84,88,92,96,100,1
04,108,112,116,120,124,128,132,136,140,144,148,152,156,160,164,168,172,176
,180,184,188,192,196,200,204,208,212,216,220,224,228,232,236,240,244,2
48,252,256
Subnet Subnet 57 Subnet 58 Subnet 59
Network ID 224 228 232
First host 225 229 233
Last host 226 230 234
Broadcast ID 227 231 235
WAN Link 1
Segments Wan Link 1
Requirement 2
CIDR /30
Subnet mask 255.255.255.252
Network ID 192.168.1.224
First hosts 192.168.1.225
Last hosts 192.168.1.226
Broadcast ID 192.168.1.227
WAN Link-2
Segments Wan Link 2
Requirement 2
CIDR /30
Subnet mask 255.255.255.252
Network ID 192.168.1.228
First hosts 192.168.1.229
Last hosts 192.168.1.230
Broadcast ID 192.168.1.231
WAN Link-3
Segments Wan Link 3
Requirement 2
CIDR /30
Subnet mask 255.255.255.252
Network ID 192.168.1.232
First hosts 192.168.1.233
Last hosts 192.168.1.234
Broadcast ID 192.168.1.235
Whole Network
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Ip address
Ip addressIp address
Ip address
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
IPv4
IPv4IPv4
IPv4
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Andere mochten auch

How to calculate a broadcast address ?
How to calculate a broadcast address ?How to calculate a broadcast address ?
How to calculate a broadcast address ?Miguel Delamontagne
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_addressrizwanaabassi
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easyheidionthego
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree ProtocolManoj Gharate
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Comment choisir mobile Développeurs Mobile App développement et
Comment choisir mobile Développeurs Mobile App développement etComment choisir mobile Développeurs Mobile App développement et
Comment choisir mobile Développeurs Mobile App développement etStabl Web
 
2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...
2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...
2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...The Business Council of Mongolia
 
23.04.2015, English language institute program update, Enkhtsetseg Ganbold
23.04.2015, English language institute program update, Enkhtsetseg Ganbold23.04.2015, English language institute program update, Enkhtsetseg Ganbold
23.04.2015, English language institute program update, Enkhtsetseg GanboldThe Business Council of Mongolia
 
Ricoh Higher Ed Services Overview Brochure-Kallai
Ricoh Higher Ed Services Overview Brochure-KallaiRicoh Higher Ed Services Overview Brochure-Kallai
Ricoh Higher Ed Services Overview Brochure-KallaiRay Kallai
 
28.04.2014, Socio-Political Situation in Spring 2014, L.Sumati
28.04.2014, Socio-Political Situation in Spring 2014, L.Sumati28.04.2014, Socio-Political Situation in Spring 2014, L.Sumati
28.04.2014, Socio-Political Situation in Spring 2014, L.SumatiThe Business Council of Mongolia
 
The Beginners Guide to Peach
The Beginners Guide to PeachThe Beginners Guide to Peach
The Beginners Guide to PeachSaba Sedighi
 
31.08.2012 Financing infrastructure in Mongolia, Development Bank of Mongolia
31.08.2012 Financing infrastructure in Mongolia, Development Bank of Mongolia31.08.2012 Financing infrastructure in Mongolia, Development Bank of Mongolia
31.08.2012 Financing infrastructure in Mongolia, Development Bank of MongoliaThe Business Council of Mongolia
 

Andere mochten auch (20)

Ramakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressingRamakant tyagi presentation on ip addressing
Ramakant tyagi presentation on ip addressing
 
How to calculate a broadcast address ?
How to calculate a broadcast address ?How to calculate a broadcast address ?
How to calculate a broadcast address ?
 
Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_address
 
Subneting
SubnetingSubneting
Subneting
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
S4 tarea4 sumaa
S4 tarea4 sumaaS4 tarea4 sumaa
S4 tarea4 sumaa
 
Comment choisir mobile Développeurs Mobile App développement et
Comment choisir mobile Développeurs Mobile App développement etComment choisir mobile Développeurs Mobile App développement et
Comment choisir mobile Développeurs Mobile App développement et
 
23.11.2010 Mongolia mining supply chain, Mr. Jim Dwyer
23.11.2010 Mongolia mining supply chain, Mr. Jim Dwyer23.11.2010 Mongolia mining supply chain, Mr. Jim Dwyer
23.11.2010 Mongolia mining supply chain, Mr. Jim Dwyer
 
25.03.2011, NEWSWIRE, Issue 160
25.03.2011, NEWSWIRE, Issue 16025.03.2011, NEWSWIRE, Issue 160
25.03.2011, NEWSWIRE, Issue 160
 
2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...
2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...
2012.02.09 Монгол улсын эдийн засгийн өнөөгийн байдал, дунд хугацааны хандлаг...
 
25.07.2014, NEWSWIRE, Issue 334-335
25.07.2014, NEWSWIRE, Issue 334-33525.07.2014, NEWSWIRE, Issue 334-335
25.07.2014, NEWSWIRE, Issue 334-335
 
23.04.2015, English language institute program update, Enkhtsetseg Ganbold
23.04.2015, English language institute program update, Enkhtsetseg Ganbold23.04.2015, English language institute program update, Enkhtsetseg Ganbold
23.04.2015, English language institute program update, Enkhtsetseg Ganbold
 
Ricoh Higher Ed Services Overview Brochure-Kallai
Ricoh Higher Ed Services Overview Brochure-KallaiRicoh Higher Ed Services Overview Brochure-Kallai
Ricoh Higher Ed Services Overview Brochure-Kallai
 
28.04.2014, Socio-Political Situation in Spring 2014, L.Sumati
28.04.2014, Socio-Political Situation in Spring 2014, L.Sumati28.04.2014, Socio-Political Situation in Spring 2014, L.Sumati
28.04.2014, Socio-Political Situation in Spring 2014, L.Sumati
 
CACUSS2011
CACUSS2011CACUSS2011
CACUSS2011
 
SUSANTA SAHA C.V
SUSANTA SAHA C.VSUSANTA SAHA C.V
SUSANTA SAHA C.V
 
The Beginners Guide to Peach
The Beginners Guide to PeachThe Beginners Guide to Peach
The Beginners Guide to Peach
 
31.08.2012 Financing infrastructure in Mongolia, Development Bank of Mongolia
31.08.2012 Financing infrastructure in Mongolia, Development Bank of Mongolia31.08.2012 Financing infrastructure in Mongolia, Development Bank of Mongolia
31.08.2012 Financing infrastructure in Mongolia, Development Bank of Mongolia
 

Ähnlich wie Subnetting Presentation

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)Nusrat Jahan Nisha
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Very Simple way of subnetting for Class C.
Very Simple way of  subnetting for Class C.Very Simple way of  subnetting for Class C.
Very Simple way of subnetting for Class C.Nabeel Ahmad
 

Ähnlich wie Subnetting Presentation (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Vlsm
VlsmVlsm
Vlsm
 
Subnetting
SubnettingSubnetting
Subnetting
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Network Layer V.ppt
Network Layer V.pptNetwork Layer V.ppt
Network Layer V.ppt
 
Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)Subnetting - Computer network (Daffodil International University)
Subnetting - Computer network (Daffodil International University)
 
Subneting.ppt
Subneting.pptSubneting.ppt
Subneting.ppt
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
Ccna ppt
Ccna pptCcna ppt
Ccna ppt
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Mod6
Mod6Mod6
Mod6
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Easy subnetting
Easy subnettingEasy subnetting
Easy subnetting
 
Very Simple way of subnetting for Class C.
Very Simple way of  subnetting for Class C.Very Simple way of  subnetting for Class C.
Very Simple way of subnetting for Class C.
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Subnetting Presentation

  • 2. What is Subnetting?  Allows Creating multiple network from a single address block.  Subnetting is a process of breaking large network in small networks known as subnets.
  • 4. Why Subnetting?  Maximise addressing efficiency.  Extend the life of IPV4.  Public IPV4 Addresses are scare.  Easy to manage.  Subnetting reduces network traffic by removing collision and broadcast traffic, that overall improve performance.  Subnetting allows you to apply network security polices at the interconnection between subnets
  • 5. How? CIDR [ Classless Inter Domain Routing]  CIDR is a slash notation of subnet mask. CIDR tells us number of on bits in a network address CIDR Decimal Binary /25 128 10000000 /26 192 11000000 /27 224 11100000 /28 240 11110000 /29 248 11111000 /30 252 11111100
  • 6. Formulas & Variables  h=number of host bits  n=number of host bit use in network bits  Number of new networks reulting from the subnetting: =2^n  Number of hosts per new network: =2^h-2 One is network another is broadcast  Broadcast address is the last address of subnet.  Block size or increment number is used to calculate the valid subnets
  • 7. Example:-1  Subnet base address  New CIDR length /25 255.255.255.128(Subnet Mask)  n = 1 [Number of host bit used in network] n  h = 7 [Remaining host bits] 192 168 1 0/24 11111111 11111111 11111111 00000000 N N N H 192 168 1 0/25 11111111 11111111 11111111 10000000
  • 8. Example:-1  Total subnets ( 2^n ) :- 2^1 = 2.  Block size (256 - subnet mask) :- 256 - 128 = 128  Valid subnets 0,128  Valid host per subnets (2^h-2)=2^7-2=126 Subnets Subnet 1 Subnet 2 Network ID 192.168.1.0 192.168.1.128 First host 192.168.1.1 192.168.1.129 Last host 192.168.1.126 192.168.1.254 Broadcast ID 192.168.1.127 192.168.1.255
  • 9. Example:-2  New Perfix length /26 255.255.255.192(Subnet Mask)  n = 2 [Number of host bit used in network] n  n = 6 [Remaining host bits]  Total subnets ( 2^n ) :- 22 = 4.  Block size (256 - subnet mask) :- 256 - 192 = 64.  Valid subnets ( Count blocks from 0) :- 0,64,128,192 192 168 1 0/26 11111111 11111111 11111111 11000000
  • 10. Example:-2  Total hosts (2h) :- 26 = 64  Valid hosts per subnet ( 2^h- 2 ) :- 64 - 2 = 62 Subnets Subnet 1 Subnet 2 Subnet 3 Subnet 4 Network ID 0 64 128 192 First host 1 65 129 193 Last host 62 126 190 254 Broadcast ID 63 127 191 255
  • 11. Subnet Mask  Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to identify which part of an IP address is network address and which part is host address. IP 192 168 1 1 Subnet mask 255 255 255 128
  • 12. Case Study In Real Life Example
  • 14. In real life scenario  some subnets may require large number of host addresses while other may require only few addresses.  Assume that you are a network administrator & EDU has three departments connected with wan links.  CSE department has 74 computers.  EEE department has 52 computers.  Administrative department has 28 computers.  All departments are connected with each other via wan link.  Each wan link requires two IP addresses.
  • 15. Choose address  First choice (purchase a class B IP address) 172.168.1.0/23 Subnetting of this address would give us 128 subnets and 510 hosts in each subnet. Our network requires only 6 subnets and 160 addresses. We would have to pay for 65356 addresses while you need only 160 addresses. Every IP address adds more dollars in company bill. Would you consider this address space for company?
  • 16.  Second choice (purchase at least two Class C IP addresses) 192.168.1.0/25 192.168.1.0/26  Subnetting of first address 192.168.1.0/25 would give us 2 subnets and 126 hosts in each subnet.  Subnetting of second address 192.168.1.0/26 would give us 4 subnets and 62 hosts in each subnet.  Collectively we are getting 6 subnets and 500 hosts from these two address spaces. We are still wasting more than 300 IP address, and we would have to purchase two address spaces.
  • 17. Step-1  Oder all segments according the hosts requirement (Largest to smallest). Subnet Segment Host 1 CSE 74 2 EEE 52 3 Administration 28 4 Wan link 1 2 5 Wan link 2 2 6 Wan link 3 2
  • 18. Step-2  Do Subnetting for largest segment. Our largest segment needs 74 host addresses. /25 provide us two subnets with 126 hosts in each subnet. 192.168.1.0/25 Subnet Subnet 1 Subnet 2 Network ID 192.168.1.0 192.168.1.128 First host address 192.168.1.1 192.168.1.129 Last host address 192.168.1.126 192.168.1.254 Broadcast ID 192.168.1.127 192.168.1.255
  • 19. Step-3  Assign subnet mask to the largest segment. As you can see in above table, subnet 1 fulfill our largest segment requirement. Assign it to our segment. Segment CSE Requirement 74 CIDR /25 Subnet mask 255.255.255.128 Network ID 192.168.1.0 First hosts 192.168.1.1 Last hosts 192.168.1.126 Broadcast ID 192.168.1.127
  • 20. Step-4  Do subnetting for second largest segment from next available subnet. Next segment requires 52 host addresses. Subnetting of /25 has given us two subnets with 128 hosts in each, from that we have assigned first subnet to CSE segment. Second segment is available, we would do subnetting of this.  /26 provide us 4 subnets with 62 hosts in each subnet. 192.168.1.0/26 Subnet Subnet 1 Subnet 2 Subnet 3 Subnet 4 Network ID 0 64 128 192 First address 1 65 129 193 Last address 62 126 190 254 Broadcast ID 63 127 191 255
  • 21.  We cannot use subnet 1 and subnet 2 ( address from 0 to 127 ) as they are already assigned to CSE department. We can assign subnet 3 to our EEE department. Segment EEE Requirement 52 CIDR /26 Subnet mask 255.255.255.192 Network ID 192.168.1.128 First hosts 192.168.1.129 Last hosts 192.168.1.190 Broadcast ID 192.168.1.191
  • 22. Step-5  Our next segment requires 28 hosts. From above subnetting we have subnet 3 and subnet 4 available. Do subnetting for the requirement of 28 hosts. 192.168.1.0/27 Subnet Sub 1 Sub 2 Sub 3 Sub 4 Sub 5 Sub 6 Sub 7 Sub 8 Net ID 0 32 64 96 128 160 192 224 First Host 1 33 65 95 129 161 193 225 Last Host 30 62 94 126 158 190 222 254 Broad- cast ID 31 63 95 127 159 191 223 255
  • 23.  Subnets 1 to 6 [address from 0 to 191] are already occupied by previous segments. We can assign subnet 7 to this segment. Segment Administration Requirement 28 CIDR /27 Subnet mask 255.255.255.224 Network ID 192.168.1.192 First hosts 192.168.1.193 Last hosts 192.168.1.222 Broadcast ID 192.168.1.223
  • 24. Step-6  Our last three segments require 2 hosts per subnet. Do subnetting for these-192.168.1.0/30  Valid subnets are:-  0,4,8,12,16,20,24,28,32,36,40,44,48,52,56,60,64,68,72,76,80,84,88,92,96,100,1 04,108,112,116,120,124,128,132,136,140,144,148,152,156,160,164,168,172,176 ,180,184,188,192,196,200,204,208,212,216,220,224,228,232,236,240,244,2 48,252,256 Subnet Subnet 57 Subnet 58 Subnet 59 Network ID 224 228 232 First host 225 229 233 Last host 226 230 234 Broadcast ID 227 231 235
  • 25. WAN Link 1 Segments Wan Link 1 Requirement 2 CIDR /30 Subnet mask 255.255.255.252 Network ID 192.168.1.224 First hosts 192.168.1.225 Last hosts 192.168.1.226 Broadcast ID 192.168.1.227
  • 26. WAN Link-2 Segments Wan Link 2 Requirement 2 CIDR /30 Subnet mask 255.255.255.252 Network ID 192.168.1.228 First hosts 192.168.1.229 Last hosts 192.168.1.230 Broadcast ID 192.168.1.231
  • 27. WAN Link-3 Segments Wan Link 3 Requirement 2 CIDR /30 Subnet mask 255.255.255.252 Network ID 192.168.1.232 First hosts 192.168.1.233 Last hosts 192.168.1.234 Broadcast ID 192.168.1.235