9783286 Subnet Masking Made Simple

  • Upload
    schmerb

  • View
    226

  • Download
    0

Embed Size (px)

Citation preview

  • 8/2/2019 9783286 Subnet Masking Made Simple

    1/3

    Subnet Masking Made Simple

    This Work Product, excluding any embedded AccentureMaterial, is Confidential and Proprietary to Avaya

    Page 1 of 3

    Assumptions:

    It is assumed that the reader understands IP addressing and how to recognize Class A/B/C addresses.

    Additionally, it is assumed that the reader is familiar with converting to and from decimal to binary.

    Why subnet:

    Subnetting allows a network administer to segment their network into smaller networks. An example of

    this would be to have IP phones on a different network than the data traffic in order to help reduce theamount of broadcast messages to the phone.

    Lets do it:

    We will take a private Class B address and subnet it. Here is our address: 172.20.0.0 255.255.0.0

    An administrator can borrow the last 2 octets (host) to subnet. Lets say that it has been decided that the

    customer wants 8 networks. They have IP phones, printer, servers, and so on that the company wants ondifferent networks.

    1. Since the administrator wants 8 networks, we need to borrow enough bits to equal 8. Nowremember this is binary, so we need 3 bits (2 to the power of 3 equals 8. Additionally, you can

    count in binary (2, 4, 8= 3 bits).

    2. Plot those 3 bits from left to right as shown. Remember, we are borrowing our bits from the left.This is why we are plotting them from the most significant bit.

    128 64 32 16 8 4 2 1

    1 1 1

    3. Now add 128+64+32 to get our subnet mask. 255.255.224.04. Now that we have our subnet mask we need to plot out our addresses. Highlight the farthest bit

    on the right and that will be the value we use to add.

    128 64 32 16 8 4 2 11 1 1

  • 8/2/2019 9783286 Subnet Masking Made Simple

    2/3

    Subnet Masking Made Simple

    This Work Product, excluding any embedded AccentureMaterial, is Confidential and Proprietary to Avaya

    Page 2 of 3

    The value here is 32, so our addresses for172.20.0.0255.255.224.0 are as follows:

    Start ofNetwork

    Start ofAddresses

    End ofAddresses

    BroadcastAddress

    172.20.0.0 172.20.0.1 172.20.31.254 172.20.31.255

    172.20.32.0 172.20.32.1 172.20.63.254 172.20.63.255

    172.20.64.0 172.20.64.1 172.20.95.254 172.20.95.255

    172.20.96.0 172.20.96.1 172.20.127.254 172.20.127.255

    172.20.128.0 172.20.128.1 172.20.159.254 172.20.159.255

    172.20.160.0 172.20.160.1 172.20.191.254 172.20.191.255

    172.20.192.0 172.20.192.1 172.20.223.254 172.20.223.255

    172.20.224.0 172.20.224.1 172.20.255.254 172.20.255.255

    There we have our 8 networks. Keep in mind that we would have the same results if the network

    administrator would have wanted 7 networks. We would still have borrowed 3 bits since 2 bits would

    equal 4 networks.

    Lets do it again:

    Now lets take a Class C address. The method is the same, but the outcome looks a little different. Hereis our address: 192.168.1.0 255.255.255.0

    An administrator can borrow the last octet (host) to subnet. Lets say that it has been decided that the

    customer wants 11 networks. They have IP phones, printer, servers, and so on that the company wantson different networks.

    5. Since the administrator wants 11 networks, we need to borrow enough bits to equal 11 (or closeto it). Now remember this is binary, so we need 4 bits (2 to the power of 4 equals 16.

    Additionally, you can count in binary (2, 4, 8, 16= 4 bits). We cannot use 3 bits because we

    want 11 and 8 is not enough. Even though we only want 11 networks 4 bits will have to do andthe administrator will have additional networks for growth.

    6. Plot those 4 bits from left to right as shown. Remember, we are borrowing our bits from the left.This is why we are plotting them from the most significant bit.

    128 64 32 16 8 4 2 1

    1 1 1 1

    7. Now add 128+64+32+16 to get our subnet mask. 255.255.255.2408. Now that we have our subnet mask we need to plot out our addresses. Highlight the farthest bit

    on the right and that will be the value we use to add.

    128 64 32 16 8 4 2 1

    1 1 1 1

  • 8/2/2019 9783286 Subnet Masking Made Simple

    3/3

    Subnet Masking Made Simple

    This Work Product, excluding any embedded AccentureMaterial, is Confidential and Proprietary to Avaya

    Page 3 of 3

    The value here is 16, so our addresses for192.168.1.0255.255.255.240 are as follows:

    Start of

    Network

    Start of

    Addresses

    End of

    Addresses

    Broadcast

    Address192.168.1.0 192.168.1.1 192.168.1.14 192.168.1.15

    192.168.1.16 192.168.1.17 192.168.1.30 192.168.1.31

    192.168.1.32 192.168.1.33 192.168.1.46 192.168.1.47

    192.168.1.48 192.168.1.49 192.168.1.62 192.168.1.63

    192.168.1.64 192.168.1.65 192.168.1.78 192.168.1.79

    192.168.1.80 192.168.1.81 192.168.1.94 192.168.1.95

    192.168.1.96 192.168.1.97 192.168.1.110 192.168.1.111

    192.168.1.112 192.168.1.113 192.168.1.126 192.168.1.127

    192.168.1.128 192.168.1.129 192.168.1.142 192.168.1.143

    192.168.1.144 192.168.1.145 192.168.1.158 192.168.1.159

    192.168.1.160 192.168.1.161 192.168.1.174 192.168.1.175

    192.168.1.176 192.168.1.177 192.168.1.190 192.168.1.191

    192.168.1.192 192.168.1.193 192.168.1.206 192.168.1.207

    192.168.1.208 192.168.1.209 192.168.1.222 192.168.1.223

    192.168.1.224 192.168.1.225 192.168.1.238 192.168.1.239

    192.168.1.240 192.168.1.241 192.168.1.254 192.168.1.255

    There we have our 16 networks.

    Additional notes:

    The only subnet masks available are ending in: 128, 192, 224, 240, 248, 252, and 254. This can beconfirmed by adding up the binary values.

    128 64 32 16 8 4 2 1

    1 1 1 1 1 1 1

    128

    +64192

    +32224

    +16

    240+8

    248

    +4

    252+2

    254