SlideShare a Scribd company logo
1 of 20
SUBNET MASKS Developed by Peter Smith
Subnet Mask An IP address has 2 parts: The Network identification. The Host identification. Frequently, the Network & Host portions of the address need to be separately extracted. In most cases, if you know the address class, it’s easy to separate the 2 portions. Peter Smith 2
Subnet Mask (Cont.) With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Peter Smith 3
Subnet Mask (Cont.) The subnet masking process was developed to identify & extract the Network part of the address. A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. If it is not, the process of routing it to an outside network begins. Peter Smith 4
Subnet Mask (Cont.) The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. It is applied to a message’s destination address to extract the network address. If the extracted network address matches the local network ID, the destination is located on the local network. Peter Smith 5
Subnet Mask (Cont.) However, if they don’t match, the message must be routed outside the local network. The process used to apply the subnet mask involves Boolean Algebra to filter out non-matching bits to identify the network address. Peter Smith 6
Boolean Algebra Boolean Algebra is a process that applies binary logic to yield binary results. Working with subnet masks, you need only 4 basic principles of Boolean Algebra: 1 and 1 = 1 1 and 0 = 0 0 and 1 = 0 0 and 0 = 0 Peter Smith 7
Boolean Algebra (Cont.) In another words, the only way you can get a result of a 1 is to combine 1 & 1.  Everything else will end up as a 0. The process of combining binary values with Boolean Algebra is called Anding. Peter Smith 8
Default Subnet Masks There are default standard subnet masks for Class A, B and C addresses: Peter Smith 9
Subnet Masks Subnet masks apply only to Class A, B or C IP addresses. The subnet mask is like a filter that is applied to a message’s destination IP address. Its objective is to determine if the local network is the destination network. Peter Smith 10
Example The subnet mask goes like this: If a destination IP address is 206.175.162.21, we know that it is a Class C address & that its binary equivalent is: 11001110.10101111.10100010.00010101 Peter Smith 11
Example We also know that the default standard Class C subnet mask is: 255.255.255.0 and that its binary equivalent is: 11111111.11111111.11111111.00000000 Peter Smith 12
Example When these two binary numbers (the IP address & the subnet mask) are combined using Boolean Algebra, the Network ID of the destination network is the result: Peter Smith 13
Example The result is the IP address of the network which in this case is the same as the local network & means that the message is for a node on the local network. Peter Smith 14
Routing IP Addresses When you build a network, you need to figure out how many network Ids your network requires. To do so, you must account for every WAN connection & subnet on the Network. Every node & router interface requires a Host address, or ID. Peter Smith 15
Routing IP Addresses (Cont.) There’s no hard & fast rule on how you should dole out your allotted IP addresses. Commonly, though, the lowest numbers (1 through 10) are assigned to routers & servers but how you assign addresses is strictly up to you & your network policies & guidelines. Peter Smith 16
Peter Smith 17 Finding Subnetwork A 3-step example of how the default Class A subnet mask is applied to a Class A address:
Peter Smith 18 Finding Subnetwork In the previous slide, the default Class A subnet mask (255.0.0.0) is AND’d with the Class A address (123.123.123.001) using Boolean Algebra, which results in the Network ID (123.0.0.0) being revealed. The default Class B subnet mask (255.255.0.0) strips out the 16-bit network ID & the default Class C subnet mask (255.255.255.0) strips out the 24-bit network ID.
Peter Smith 19 Subnetting, Subnet & Subnet Mask Subnetting, a subnet & a subnet mask are all different. In fact, the 1st creates the 2nd & is identified by the 3rd. Subnetting is the process of dividing a network & its IP addresses into segments, each of which is called a subnetwork or subnet.
Peter Smith 20 Subnetting, Subnet & Subnet Mask The subnet mask is the 32-bit number that the router uses to cover up the network address to show which bits are being used to identify the subnet.

More Related Content

What's hot

IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar pptSmriti Rastogi
 
IP Address
IP AddressIP Address
IP AddressRahul P
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itAsya Karapetyan
 
Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 

What's hot (20)

IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
IP Address
IP AddressIP Address
IP Address
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Ip address
Ip addressIp address
Ip address
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About it
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Viewers also liked

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorialmikem801
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersS Khawaja
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesKrishna Mohan
 
CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)Anis Mizi
 
Vlsm exercises solutions
Vlsm exercises solutionsVlsm exercises solutions
Vlsm exercises solutionsGerry Ismanto
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
Ccna( Cisco Certified Network Associate)
Ccna( Cisco Certified Network  Associate)Ccna( Cisco Certified Network  Associate)
Ccna( Cisco Certified Network Associate)Sukant Gupta
 
Data bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwaData bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwaAbhishek Wadhwa
 
Economic environment - Sound pollution
Economic environment - Sound pollutionEconomic environment - Sound pollution
Economic environment - Sound pollutionVicky Fakhrurrazi
 
MIPI DevCon 2016: MIPI I3C High Data Rate Modes
MIPI DevCon 2016: MIPI I3C High Data Rate ModesMIPI DevCon 2016: MIPI I3C High Data Rate Modes
MIPI DevCon 2016: MIPI I3C High Data Rate ModesMIPI Alliance
 
RADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICES
RADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICESRADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICES
RADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICESDr. Ghanshyam Singh
 

Viewers also liked (20)

Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Easy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for StartersEasy IP Addressing and Subnetting Manual for Starters
Easy IP Addressing and Subnetting Manual for Starters
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
Ip subnet
Ip subnetIp subnet
Ip subnet
 
CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)CCNA IP Address,Subnet mask (part 2)
CCNA IP Address,Subnet mask (part 2)
 
Vlsm exercises solutions
Vlsm exercises solutionsVlsm exercises solutions
Vlsm exercises solutions
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Classless subnetting
Classless subnettingClassless subnetting
Classless subnetting
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
InfiniBand Management on localhost
InfiniBand Management on localhostInfiniBand Management on localhost
InfiniBand Management on localhost
 
Ccna( Cisco Certified Network Associate)
Ccna( Cisco Certified Network  Associate)Ccna( Cisco Certified Network  Associate)
Ccna( Cisco Certified Network Associate)
 
Data bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwaData bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwa
 
Digital Communication Principle
Digital Communication PrincipleDigital Communication Principle
Digital Communication Principle
 
Economic environment - Sound pollution
Economic environment - Sound pollutionEconomic environment - Sound pollution
Economic environment - Sound pollution
 
MIPI DevCon 2016: MIPI I3C High Data Rate Modes
MIPI DevCon 2016: MIPI I3C High Data Rate ModesMIPI DevCon 2016: MIPI I3C High Data Rate Modes
MIPI DevCon 2016: MIPI I3C High Data Rate Modes
 
RADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICES
RADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICESRADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICES
RADIO FREQUENCY COMMUNICATION SYSTEMS, ANTENNA THEORY AND MICROWAVE DEVICES
 

Similar to SUBNET MASKS EXPLAINED

Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyKashif Sohail
 
Pjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easyPjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easyNaresh Gotad
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingBisrat Girma
 
ip addressing_&_subnetting_made_easy
 ip addressing_&_subnetting_made_easy ip addressing_&_subnetting_made_easy
ip addressing_&_subnetting_made_easyManjit Singh
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting MechanicsImranulHasan6
 
Subnetting in network layer in computer networks
Subnetting in network layer in computer networksSubnetting in network layer in computer networks
Subnetting in network layer in computer networkskarthiktyagi2
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docxDIPESH30
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting Saad Tanvir
 
[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm1 2d
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnettingRavi namboori
 

Similar to SUBNET MASKS EXPLAINED (20)

Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
Pjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easyPjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easy
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
ip addressing_&_subnetting_made_easy
 ip addressing_&_subnetting_made_easy ip addressing_&_subnetting_made_easy
ip addressing_&_subnetting_made_easy
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting Mechanics
 
Ip basics
Ip basicsIp basics
Ip basics
 
Subnetting in network layer in computer networks
Subnetting in network layer in computer networksSubnetting in network layer in computer networks
Subnetting in network layer in computer networks
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
Ip subnetting
Ip subnettingIp subnetting
Ip subnetting
 
13788 3
13788 313788 3
13788 3
 
Basic network training1
Basic network training1Basic network training1
Basic network training1
 
[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm[Ccna] subnetting & vlsm
[Ccna] subnetting & vlsm
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnetting
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
ELEC - Lecture 2
ELEC - Lecture 2ELEC - Lecture 2
ELEC - Lecture 2
 
chapter 6.pptx
chapter 6.pptxchapter 6.pptx
chapter 6.pptx
 

More from swascher

Resume interview tips
Resume interview tipsResume interview tips
Resume interview tipsswascher
 
RVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant PresentationRVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant Presentationswascher
 
Elevator speeches
Elevator speechesElevator speeches
Elevator speechesswascher
 
Cis142fall2011
Cis142fall2011Cis142fall2011
Cis142fall2011swascher
 
Strategic plan 2.9.11
Strategic plan 2.9.11Strategic plan 2.9.11
Strategic plan 2.9.11swascher
 
Newspaper January 2010
Newspaper January 2010Newspaper January 2010
Newspaper January 2010swascher
 
Rti Booklet
Rti BookletRti Booklet
Rti Bookletswascher
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingswascher
 
Binary Review
Binary ReviewBinary Review
Binary Reviewswascher
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introductionswascher
 
Ip Addressing Worksheets
Ip Addressing WorksheetsIp Addressing Worksheets
Ip Addressing Worksheetsswascher
 
Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheetswascher
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Subnetting A Network
Subnetting A NetworkSubnetting A Network
Subnetting A Networkswascher
 
IP Addressing Principles
IP Addressing PrinciplesIP Addressing Principles
IP Addressing Principlesswascher
 

More from swascher (16)

Resume interview tips
Resume interview tipsResume interview tips
Resume interview tips
 
RVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant PresentationRVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant Presentation
 
Elevator speeches
Elevator speechesElevator speeches
Elevator speeches
 
Feb23
Feb23Feb23
Feb23
 
Cis142fall2011
Cis142fall2011Cis142fall2011
Cis142fall2011
 
Strategic plan 2.9.11
Strategic plan 2.9.11Strategic plan 2.9.11
Strategic plan 2.9.11
 
Newspaper January 2010
Newspaper January 2010Newspaper January 2010
Newspaper January 2010
 
Rti Booklet
Rti BookletRti Booklet
Rti Booklet
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Binary Review
Binary ReviewBinary Review
Binary Review
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introduction
 
Ip Addressing Worksheets
Ip Addressing WorksheetsIp Addressing Worksheets
Ip Addressing Worksheets
 
Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheet
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Subnetting A Network
Subnetting A NetworkSubnetting A Network
Subnetting A Network
 
IP Addressing Principles
IP Addressing PrinciplesIP Addressing Principles
IP Addressing Principles
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

SUBNET MASKS EXPLAINED

  • 1. SUBNET MASKS Developed by Peter Smith
  • 2. Subnet Mask An IP address has 2 parts: The Network identification. The Host identification. Frequently, the Network & Host portions of the address need to be separately extracted. In most cases, if you know the address class, it’s easy to separate the 2 portions. Peter Smith 2
  • 3. Subnet Mask (Cont.) With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Peter Smith 3
  • 4. Subnet Mask (Cont.) The subnet masking process was developed to identify & extract the Network part of the address. A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. If it is not, the process of routing it to an outside network begins. Peter Smith 4
  • 5. Subnet Mask (Cont.) The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. It is applied to a message’s destination address to extract the network address. If the extracted network address matches the local network ID, the destination is located on the local network. Peter Smith 5
  • 6. Subnet Mask (Cont.) However, if they don’t match, the message must be routed outside the local network. The process used to apply the subnet mask involves Boolean Algebra to filter out non-matching bits to identify the network address. Peter Smith 6
  • 7. Boolean Algebra Boolean Algebra is a process that applies binary logic to yield binary results. Working with subnet masks, you need only 4 basic principles of Boolean Algebra: 1 and 1 = 1 1 and 0 = 0 0 and 1 = 0 0 and 0 = 0 Peter Smith 7
  • 8. Boolean Algebra (Cont.) In another words, the only way you can get a result of a 1 is to combine 1 & 1. Everything else will end up as a 0. The process of combining binary values with Boolean Algebra is called Anding. Peter Smith 8
  • 9. Default Subnet Masks There are default standard subnet masks for Class A, B and C addresses: Peter Smith 9
  • 10. Subnet Masks Subnet masks apply only to Class A, B or C IP addresses. The subnet mask is like a filter that is applied to a message’s destination IP address. Its objective is to determine if the local network is the destination network. Peter Smith 10
  • 11. Example The subnet mask goes like this: If a destination IP address is 206.175.162.21, we know that it is a Class C address & that its binary equivalent is: 11001110.10101111.10100010.00010101 Peter Smith 11
  • 12. Example We also know that the default standard Class C subnet mask is: 255.255.255.0 and that its binary equivalent is: 11111111.11111111.11111111.00000000 Peter Smith 12
  • 13. Example When these two binary numbers (the IP address & the subnet mask) are combined using Boolean Algebra, the Network ID of the destination network is the result: Peter Smith 13
  • 14. Example The result is the IP address of the network which in this case is the same as the local network & means that the message is for a node on the local network. Peter Smith 14
  • 15. Routing IP Addresses When you build a network, you need to figure out how many network Ids your network requires. To do so, you must account for every WAN connection & subnet on the Network. Every node & router interface requires a Host address, or ID. Peter Smith 15
  • 16. Routing IP Addresses (Cont.) There’s no hard & fast rule on how you should dole out your allotted IP addresses. Commonly, though, the lowest numbers (1 through 10) are assigned to routers & servers but how you assign addresses is strictly up to you & your network policies & guidelines. Peter Smith 16
  • 17. Peter Smith 17 Finding Subnetwork A 3-step example of how the default Class A subnet mask is applied to a Class A address:
  • 18. Peter Smith 18 Finding Subnetwork In the previous slide, the default Class A subnet mask (255.0.0.0) is AND’d with the Class A address (123.123.123.001) using Boolean Algebra, which results in the Network ID (123.0.0.0) being revealed. The default Class B subnet mask (255.255.0.0) strips out the 16-bit network ID & the default Class C subnet mask (255.255.255.0) strips out the 24-bit network ID.
  • 19. Peter Smith 19 Subnetting, Subnet & Subnet Mask Subnetting, a subnet & a subnet mask are all different. In fact, the 1st creates the 2nd & is identified by the 3rd. Subnetting is the process of dividing a network & its IP addresses into segments, each of which is called a subnetwork or subnet.
  • 20. Peter Smith 20 Subnetting, Subnet & Subnet Mask The subnet mask is the 32-bit number that the router uses to cover up the network address to show which bits are being used to identify the subnet.