29
8/16/2019 Sub Netting Concepts http://slidepdf.com/reader/full/sub-netting-concepts 1/29 1. NETWORKING-BASICS Network  – Connection of Computers Ethernet Ethernet uses only one cable that is used to connect all over the world –  RJ45/CAT 5/CAT 6/10 baset . Earlier Token ring was used in Ethernet. Types 1. Broadcast Multi-Access: All systems are connected to the network and only the addressed system receives the packets. irst messages are  broadcasted! addresses are received and then the packets are unicasted. ". oi!t-to-"oi!t : #nly two computers are connected. Address is not mandatory $%ut is present&.'t is not broadcasted. Routers# (outer is an intelligent device that receives data $packet& and checks from where it comes and where it goes $in the best route&.  Router is a CISCO  product. ()*+ ()11 ()11 ()*+ (  ,erver  # #

Sub Netting Concepts

Embed Size (px)

Citation preview

Page 1: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 1/29

1. NETWORKING-BASICS

• Network  – Connection of Computers

Ethernet

• Ethernet uses only one cable that is used to connect all over the world – 

 RJ45/CAT 5/CAT 6/10 baset . Earlier Token ring was used in Ethernet.

• Types

1. Broadcast Multi-Access: All systems are connected to the network and

only the addressed system receives the packets. irst messages are

 broadcasted! addresses are received and then the packets are unicasted.

". oi!t-to-"oi!t: #nly two computers are connected. Address is not

mandatory $%ut is present&.'t is not broadcasted.

• Routers# (outer is an intelligent device that receives data $packet& and checks

from where it comes and where it goes $in the best route&. Router is a CISCO

 product.

()*+ ()11 ()11 ()*+( (   ,erver 

#

#

Page 2: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 2/29

(outer Telecom

  Ethernet $ibre #ptics&

• -ata in a network is packed such that it travels in a any media such as ()*+!fibre

optics etc.!

Note: CCA tells about /ow to connect computers0

/ow hosts systems talks to each other! when and why0

/ow it interacts with the router and how router talks to the outer world0

•  etworks are divided as the private $illegal! reserved! nonroutable& and public

$2egal& networks. The private networks are secured leased lines that are over a

 particular areaused internally only. The public networks are world wide.

(outer (outer  Ethernet

 

• Computers will have two addresses:

1. 2ogical Address – '3 Address". 3hysical Address – /ardware address

  4AC address

  Ethernet address  3ermanent address

• MAC Address – 4edia Access Control Address. o two network cards will have

the same 4AC addresses.

E.$.#  5515ab 1"6*cd  7endor Card o.  Code

• O"erati!$ S%ste&: #, interfaces between the hardware and the software. The

software program that binds itself to the machine components

• 8e need a protocol to transfer data between two systems else your system will be

a standalone system. 'n order for two systems to communicate #, $etwork 

#perating ,ystems& is needed.

( ( 

3rivate

securedleased line

3ublicnetwork 

,erver 

Page 3: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 3/29

• TC'I  is used to transfer data between systems. 't is not a single protocol

instead it is a stack of protocols.

 

TC3 – Transmission Control 3rotocol

9-3 – 9ser -atagram 3rotocol

'3 – 'nternet 3rotocol

A(3 – Address (esolution 3rotocol

(A(3 – (everse Address (esolution 3rotocol

'C43 – 'nternet Control 4essaging 3rotocol

'43 'nternet roup 4essaging 3rotocol

(. I A))RESS

• ;uality of '3 Address $%orrowed from the /uman < Telecom networks&

1. 'dentification and 2ocation

". ,ame length6. etwork is divided based on the si=e

• I Address * +( ,it address

)iided i!to soctets

5"++ 5"++ 5"++ 5"++

Each octet is of!

This ranges from 55555555 >>>. 11111111 i.e. from 5 to "++.

 

TC3 9-3

  '3 A(3 (A(3 'C43 '43

"? "@ "+  "*  "6  ""  "1  "5 

"""""""""""""""""""""

""1"  @* 6" 1@ * " 1

Page 4: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 4/29

• '3 Address has two parts.

1. 2ocation $'- – etwork '-&

". 'dentification $/'- /ost '-&

• Network Classi/icatio!s

Class A

 

 '- /'-

  $etwork '-& $/ost '-&

 '- – bits.

/'- – "* bits.

 Network ID

There bits and so " networks are possible B "+@ networks. These 5"++ values in

first octet are shared among other classes also. 8e have values ranging in 51"? for Class A.

 I octet 

4,% 2,%

1" @* 6" 1@ * " 1

4,% – 4ost ,ignificant %it

2,% – 2east ,ignificant %it

1"$4,%& is reserved for Class A as 5D always.

5.5.5.5 – (eserved for representing any network.

1"?.5.5.5 – 2oop %ack Address.

.

  Thus Class A can have 11"@ networks.

  E.$. 15.5.5.5 is a Class A etwork

5 5 5 5 5 5 5 5

1 1 1 1 1 1 1

Page 5: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 5/29

 Host ID

'f the hosts '-s are 5D then it represents the etwork and not the host. 'f the hosts'-s are 1D then it represents the %roadcast address for the particular network.

 

E.$. 10.0.0.0 ----------- Network AddressAll 2I) 3045

10.0.0.1 ----------- 6irst 2ost I AddressAll 2I)

304e7ce"t t8e least5

10.(99.(99.(9 ----------- :ast 2ost I AddressAll 2I)

314e7ce"t t8e least5

10.(99.(99.(99 ----------- Broadcast I AddressAll 2I) 3145

Class B

  '- /'-  $etwork '-& $/ost '-&

 '- – 1@ bits.

/'- – 1@ bits.

 Network ID:

 I octet 

  4,% 2,%

 

1" @* 6" 1@ * " 1

Two bits are reserved for Class %.

The other bits can be from 555555 to 111111.

 '- has " octets out of which two " bits are reserved.

  "1@ " B "1* B 1@6* networks for Class %.

 

E.$. 1?"[email protected] is a Class % network.

 Host ID

'f the hosts '-s are 5D then it represents the etwork and not the host. 'f the hosts

'-s are "++D then it represents the %roadcast address for the particular network.

1 5 5 5 5 5 5 5

1 1 1 1 1 1

Page 6: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 6/29

 

E.$.

1;0.(;.0.0 ----------- Network Address

1;0.(;.0.1 ----------- 6irst 2ost I Address

1;0.(;.(99.(9 ----------- :ast 2ost I Address 1;0.(;.(99.(99 ----------- Broadcast I Address

Class C

  '- /'-

  $etwork '-& $/ost '-&

 '- – "* bits./'- – bits.

 Network ID

 I octet 

  4,% 2,%

 

1" @* 6" 1@ * " 1

The last three bits are reserved for Class C.

The others can be from 55555 to 11111.

 '- has 6 octets out of which two 6 bits are reserved.  ""*  – 6 B ""1 B "5?1+" networks for Class C.

  E.$. "5".1*.5.5 is a Class C network.

 Host ID

'f the hosts '-s are 5D then it represents the etwork and not the host. 'f the hosts'-s are "++D then it represents the %roadcast address for the particular network.

  E.$.

1<.(1.1=.0 ----------- Network Address

1<.(1.1=.1 ----------- 6irst 2ost I Address

1<.(1.1=.(9 ----------- :ast 2ost I Address

1<.(1.1=.(99 ----------- Broadcast I Address

Class -: Class - can have ""* – "6 networks. They are used for 4ulticasting.

Class E: Class E can have "*5 – "++ networks. They are used for (esearch purposes.

1 1 5 5 5 5 5 5

1 1 1 1 1

Page 7: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 7/29

Note# 6ro& t8e a,oe $ie! addresses so&e addresses are resered /or t8e "riate

!etworks. T8e% are>

10.0.0.0 --------- A

1;(.1=.0.0 to 1;(.+1.0.0 --------- B1<(.1=?.0.0 to 1<(.1=?.(99.0 --------- C

Broadcasti!$#

%roadcast involves delivering a message from one sender to many recipients. This

 broadcast is FlimitedF in that it does not reach every node on the 'nternet! only nodes on

the 2A.%roadcast address is found by #(ing the '3 address and the bit complement of the

subnet mask.

E.g. : 2et 1<0.1=..< ,e t8e I addressClass B !etwork5.T8e su,!et &ask /or class B !etwork is (99.(99.0.0

  ---,it co&"le&e!t is 0.0.(99.(99

1<0.1=..< ---- 10111110000100000000010000001001

0.0.(99.(99 ---- 00000000000000001111111111111111

1<0.1=.(99.(99 ----  10111110000100001111111111111111

S@MMAR

Class N'w

Bits

2ost

,its

Ra!$e- I

octet

MSB

/i7ed

No o/  

!'ws

No o/ 

8osts

62I) :2I

)

BC

Addr

Su,!et

&ask 

A ? ( 1-1(= 0 1(= ((-( .0.0.1 .(99

.(99.(

9

.(99.(

99.(99

(99.0.0.0

B 1= 1= 1(?-1<1 10 (1=-((1 (1=-( ..0.1 ..(

99.(9

..(99

.(99

(99.

(99.0.0

C ( ? 1<(-((+ 110 ((-+((1 (?-( ..D.1 ..D.(9

..D.(99

(99. (99.(99.0

) ((-(+<

E (0-(99

All

2I)s 1

NI)-314

2I)-304

Page 8: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 8/29

. OSI RE6ERENCE MO)E:

#,' – #pen ,ystems 'nterconnection.This is designed by the ',#$'nternational ,tandard

#rganisations&.This model is developed from the TC3G'3 4odel given by the-o-!-epartment of -efence!9,.

#pen ,ystems: 'rrespective of the plaltform !open to any platform.

The #,' 4odel comprises of ? layers.

  OSI Model

  $'nternational ,tandard #rganisation&

  TC'I Model $-epartment of -efence!9,&

3/H,'CA2 2AHE( 

• 3hysical layer is about the physical connectionsGmedia between the networks.

• Connections may be bound or unbound.

%ound – 9T3! ,T3! CoaIial! ibre optics..9nbound – 'nfrared rays! %lue tooth! (adio waves! 4icro waves>

•9T3 – 9nsheilded Twisted 3air.

15 base T15 base 15

155 base 15

%andwidth ,ignal 2ength of the

  reJuency cable

Application 2ayer 

3resentation 2ayer 

,ession 2ayer 

Transport 2ayer 

 etwork 2ayer 

-ata 2ink 2ayer 

3hysical 2ayer 

*

6

"

1

Page 9: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 9/29

?.+ m $accurately&

155m cable

• Ethernet Cross over and ,traight Through Cables

There are pins in the cables and or of different colours to identfy.

IN N0 WIRE CO:OR CROSSE)-OER STRAIG2T-T2RO@G2

1 #rangeG8hite 6 1

" #range @ "

6 reenG8hite 1 6

* %lue * *

+ %lueG8hite + +

@ reen " @

? %rownG8hite ? ?

%rown

• 'f there are more then two systems!connecting them to each and every systems are

not possible.'n such cases we use /ub or ,witches to connect the systems.

/ub$Concentrator&:/ubs operate on the physical layer./ubs are nothing

 but a repeater! that sends copy to all the systems during communicaton.Ahub can contain multiple ports.

  /9%

  1 6 * +

A43

Page 10: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 10/29

  /9%

" * @

'n a hub with ports! each connected to a system.'f system1 has to send data to

system it sends data to system and also to all other systems that are connected to the

hub. 'f the data transfer rate is 15 mbps that is shared to send data to all the systems.

• ull -upleI

'f transmission takes place in one line and data is received in another line!it is said to be in ull -upleI.

/alf -upleI'f transmission and received in same line! it is said to be in /alf -upleI.

-ATA 2'K 2AHE( 

• All the systems in the network are identified and are ready to send the data.

• This layer concentrates on

/ow the data look like0 – ormat. To whom the data is being sent and from where it is coming0

't checks for any collision or error0 – Error -etection.Error -etection is

done by C,4AGC-$Carrier ,ense 4ultilpe AccessGCollision -etection&

that continuously senses the line to check if there is any error or collision.

•  etwork 'nterface Card$'C& contains the 4AC$4edia Access Control&

Address.

• ,ub 2ayers of -ata 2ink 2ayer:

Page 11: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 11/29

22C – 2ogical 2ink Control:'t is concerned with managing the

traffic over the network 8hile carrying the packet from the -ata link layer to the network 

layer it should also carry data saying that it is a '3 packet logical

link between -atalink layer and the etwork layer.

15.5.5.5

(outer 

4AC – 4edia Access Control: 't is concerned with sharing the

 physical connection to the network among several computers. Each

computer has its own 4AC address.

• rame in the -ata link layer consists the To and rom 4AC address.

• 4ost popular layer" component is the ,witch. ,witch: A network switch is a small hardware device that Loins multiple

computers together within one 2A Technically! network switches operateat layer " i.e -ata 2ink 2ayer.

A switch unlike hub sends data only to the specific system that

reJuested the data.

,witch maintains the 4AT $4AC Address Table& to look up the4AC address of the hosts to which it needs to send the data. irst time it

 broadcasts and there after it maintains the addresses.

3ort umber 4AC address

 ET8#(K 2AHE( 

• This layer concentrates on routing the packet to the destination in the best route.

 

• 3acktes in the network layer contains the To and rom '3 address.

• 'n the following figure there are * data links between the the two networks.

(outer 

'

3

A

T

'3

M

Page 12: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 12/29

Page 13: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 13/29

,E,,'# 2AHE( 

• The session layer allows users on different machines to establish sessions between

them. A session management takes place whenever a session opens and ends.

• 'f the port is inactive for a particular period of time the port is reset $the session is

closed&.

• ,ource ;uench: 't is a message from one host to another host saying that toreduce the speed of data transfer. 't is one way to control data flow over thenetwork.

3(E,ETAT'# 2AHE( 

• This layer is concerned with the presentation of data that is transferred between

two application processes.

• 't ensures that the date eIchanged between them has a common meaning – ,hared

semantics.$common presentation style&

• -ata are transferred in %inary or A,C'' format .

• 'f any compression or encryption are needed they are also agreed upon.

A332'CA'# 2AHE( 

• This layer ensures that it provides service for an application program to

communicate with other application program in the network.

• This layer concentrates on!

Communication partners

;uality of service

9ser authentication

Constraints on data.

NOTE#

1.E!ca"sulatio!-Gie t8e ri$8t i!/or&atio! to t8e ri$8t user.

32-2

 2

T2

,2

32

A

2

Page 14: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 14/29

(.)isdaa!ta$e o/ TC'I co&&u!icatio!F Ack!owled$e&e!t

+. W8ic8 takes "art i! all la%ers o/ OSI &odelF

a. Router

,. A&"li/ierc. Brid$e

d. Network Ma!a$e&e!t statio!

e. Network 8ost

/. We, Serer

  Ans : d!e and f takes part in all layer activities.They are all hosts.

9. RO@TING 6@N)AMENTA:S

• Concepts (outing Table

-efault ateway

• 8indows -#, Commands

'pconfig

'pconfig Gall

(oute 3rint

(oute Add

(oute -elete

3ing

arp –a tracert

• 3rotocols

'C43

A(3

(#9T' TA%2E

A routing table is a database in which a routing protocol stores information aboutthe network layer  topology of the intranet work $The '3 Addresses are looked up here

 before the packets are being routed&.

(outing table can be built in two ways:1. 4anual

Route add dest!H MASK dest! SMH Ne7t 2o"H

$orwarding (outer&

E.g. (oute add 65.5.5.5 4A,K "++.5.5.5 15.5.5.1

". -efault ateway

Page 15: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 15/29

3' command: ,ends a packet through the internet to grope the destination host. Echo

(eJuest and (eply are the two pairs in 'C43 message. The 'C43 checks whether there

is an error during communication.

  Echo (eJuest

 

Echo (eply

+5.5.5." ?5.5.5.1 5.5.5.1

  +5.5.5.5 ?5.5.5.5

65.5.5.5 (1 (" (6 5.5.5.5  65.5.5.1 +5.5.5.1 ?5.5.5."

• 8hile pinging a host from the source!'f the hostGnetwork is not configured with

the router and if it does not identify the destination system in the routing

table!then the following 'C43 message is generated!

)esti!atio! 2ost @!reac8a,le

• 8hile pinging a host from the source!'f the host is connected and configured to

the router! the host sends all its messages to the router and then forwarded to the

destination. ow if the router is enable to identify the destination '3 Address inthe routing table!then the following 'C43 message isgenerated!

Re"l% /ro& dest!H ,%tes+( ti&e10&s TT:1(?

• 8hile pinging a host from the source!'f the destination host is not connected to

the network or if the cable is loosely connected or if the destination host does not

respond to the source reJuest then the

following 'C43 error message isgenerated!

ReJuest ti&ed out

arp –a  This command is used to obtain the 4AC address of the destination host.

• C:NOarp a

'nterface: .1*.*+.15 5I"  'nternet Address 3hysical Address Type

Page 16: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 16/29

.1*.*+.1 55555c5?ac"d dynamic

  .1*.*+.1+ 555d@5cd6 dynamic

  .1*.*+.155 555d@5fbe*ed dynamic.1*.*+.1* 5511"+*1*"" dynamic

•C:NOarp –d 15.5.5.1

  -eletes the 4AC address of the particular host.

tracertThe tracert command is used to visually see a network packet being sent and

received and the amount of hops reJuired for that packet to get to its destination.

C#Htracert

9sage: tracert PdQ Ph maIimumRhopsQ PL hostlistQ Pw timeoutQ targetRname

#ptions:

  d -o not resolve addresses to hostnames.  h maIimumRhops 4aIimum number of hops to search for target.

  L hostlist 2oose source route along hostlist.

  w timeout 8ait timeout milliseconds for each reply.

C#Htracert <.1?.9.1?

Tracing route to .1*.*+.1* over a maIimum of 65 hops

  1 S 1 ms 1 ms .1*.*+.1*Trace complete.

ind the /'-! 2/'-! %roadcast and ,ubnet4ask 

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  

A 1.5.5.5 1.5.5.1 1."++."++."+* 1."++."++."++ "++.5.5.5

A 6.5.5.5 6.5.5.1 6."++."++."+* 6."++."++."++ "++.5.5.5

% 1*?.5.5.5 1*?.5.5.1 1*?.5."++."+* 1*?.5."++."++ "++."++.5.5

C "11.5.5.5 "11.5.5.1 "11.5.5."+* "11.5.5."++ "++."++."++.5

=. S@BNETTING

Page 17: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 17/29

,ubnetting is the process of subdividing your networks into subnets that are

meaningful! for the effective management of '3 Address.8ith the help of mathematical

functions we divide network itno subnets. -ue to this congestion is controlled.

a. 'f .5.5.+ sends a packet to .5.5.6 hub copies and sends the packet to all the other

hosts also$%roadcasts&.#nce it broadcasts it receives the 4AC address! it unicasts toevery hosts./ere packet is received by only the destination that matches the To

address$4AC address&.

.5.5." .5.5.6

.5.5.+ .5.5.*

  /9%

 b. 'n case if a hub is replaced by the switch! intially it broadcasts and receives the 4ACaddress.After that the switch sends the packet only to the particular destination host and

doesnot send copies to other systems.

c. 'n case if a router is replaced with the switchGhub! broadcasting and unicasting takes

 place.%ut it ensures that the 4AC address doesnot cross the particular networkG2A.

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ ( su,!ets

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  A 15.5.5.5 15.5.5.1 15."++."++."+* 15."++."++."++ "++.5.5.5

To get " subnets!

"1"B""B5 subnets

"""B*"B" subnets.

/ence to get two subnets! we need to borrow " bits from the host id.

  1" @*

 '- /'-

Therefore the subnets are!15.@*.5.5 and 15.1".5.5

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

A 15.@*.5.5 15.@*.5.1 15.1"?."++."+* 15.1"?."++."++ "++.1".5.5

A 15.1".5.5 15.1".5.1 15.11."++."+* 15.11."++."++ "++.1".5.5

  @*U$6"U1@UU*U"U1&B@*U@6B1"? 1"U@*B1"

"n"OBno of subnets

Page 18: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 18/29

  1"U@6B11

Total no of host id bitsB"* "$borrowed&B"".

,o! The no of hosts possible in each subnet B " """ B *1*65*" B *1*65" hosts

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ = su,!ets

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  

A 15.5.5.5 15.5.5.1 15."++."++."+* 15."++."++."++ "++.5.5.5

To get @ subnets!

"1"B""B5 subnets"""B*"B" subnets.

"6"B"B@ subnets

/ence to get @ subnets! we need to borrow 6 bits from the host id.

  1" @* 6"

 '- /'-

Therefore the subnets are! 15.6".5.515.@*.5.5

[email protected]".5.5

[email protected]

15.1".5.5

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

A 15.6".5.5 15.6".5.1 15.@6."++."+* 15.@6."++."++ "++.""*.5.5

A 15.@*.5.5 15.@*.5.1 15.+."++."+* 15.+."++."++ "++.""*.5.5

A [email protected] [email protected] 15.1"?."++."+* 15.1"?."++."++ "++.""*.5.5

A 15.1".5.5 15.1".5.1 15.1+."++."+* 15.1+."++."++ "++.""*.5.5A [email protected] [email protected] 15.11."++."+* 15.11."++."++ "++.""*.5.5

A 15.1".5.5 15.1".5.1 15.""6."++."+* 15.""6."++."++ "++.""*.5.5

  6"U$1@UU*U"U1&B6"U61B@6 1"U@*U6"B""*Total no of host id bitsB"* 6$borrowed&B"1.

,o! The no of hosts possible in each subnet B " "1" B "5?1+"" B "5?1+5 hosts.

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ 1 su,!ets

"n"OBno of subnets

Page 19: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 19/29

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  

A 15.5.5.5 15.5.5.1 15."++."++."+* 15."++."++."++ "++.5.5.5

To get 1* subnets!

"1"B""B5 subnets

"""B*"B" subnets."6"B"B@ subnets

"*"B1@"B1* subnets

/ence to get 1* subnets! we need to borrow * bits from the host id.

  1" @* 6" 1@

 '- /'-

Therefore the subnets are!

[email protected]

15.6".5.515.*.5.5

  V

15.""*.5.5

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

A [email protected] [email protected] 15.61."++."+* 15.61."++."++ "++."*5.5.5

A 15.6".5.5 15.6".5.1 15.*?."++."+* 15.*?."++."++ "++."*5.5.5

A 15.*.5.5 15.*.5.1 15.@6."++."+* 15.@6."++."++ "++."*5.5.5

>.. ................ >>> >>>>>>. >>>>>.. >>>>..

A 15."5.5.5 15."5.5.1 15.""6."++."+* 15.""6."++."++ "++."*5.5.5

A 15.""*.5.5 15.""*.5.1 15."6."++."+* 15."6."++."++ "++."*5.5.5

  1@U$U*U"U1&B1@U1+B61 1"U@*U6"U1@B"*5

Total no of host id bitsB"* *$borrowed&B"5.

,o! The no of hosts possible in each subnet B " "5" B 15*+?@" B 15*+?* hosts.

• 2ow &a!% ,its %ou !eed to ,orrow to $et (+ su,!ets.

To get "6 subnets!

"n"OBno of subnets

Page 20: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 20/29

 

"1"B""B5 subnets

"""B*"B" subnets.

"6

"B"B@ subnets"*"B1@"B1* subnets

"+"B6""B65 subnets

/ence to get "6 subnets! we need to borrow + bits from the host id.

  1" @* 6" 1@

 '- /'-

Therefore the subnets are!

[email protected]

15."*.5.5  V

15.1*.5.5

  V15."*5.5.5

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

A 15..5.5 15..5.1 15.1+."++."+* 15.1+."++."++ "++."*.5.5

A [email protected] [email protected] 15."6."++."+* 15."6."++."++ "++."*.5.5

A 15."*.5.5 15."*.5.1 15.61."++."+* 15.61."++."++ "++."*.5.5

>.. ................ >>> >>>>>>. >>>>>.. >>>>..

A 15.1*.5.5 15.1*.5.1 15.11."++."+* 15.11."++."++ "++."*.5.5

>> >>> >>>>. >>>>> >>>>> >>>>..

A 15."*5.5.5 15."*5.5.1 15."*?."++."+* 15."*?."++."++ "++."*.5.5

  U$*U"U1&BU?B1+ 1"U@*U6"U1@UB"*

Total no of host id bitsB"* +$borrowed&B1.

,o! The no of hosts possible in each subnet B " 1" B +"*"" B +"*"@ hosts.

• 2ow &a!% ,its %ou !eed to ,orrow to $et 9 su,!ets.

To get *+ subnets!

"n"OBno of subnets

"n"OBno of subnets

Page 21: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 21/29

"1"B""B5 subnets

"""B*"B" subnets."6"B"B@ subnets

"*"B1@"B1* subnets

"+

"B6""B65 subnets"@"B@*"B@" subnets

/ence to get *+ subnets! we need to borrow @ bits from the host id.

  1" @* 6" 1@ *

 '- /'-

Therefore the subnets are!15.*.5.5

15..5.515.1".5.5

  V15.15.5.5

  V

15."*.5.5

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

A 15.*.5.5 15.*.5.1 15.?."++."+* 15.?."++."++ "++."+".5.5

A 15..5.5 15..5.1 15.11."++."+* 15.11."++."++ "++."+".5.5

A 15.1".5.5 15.1".5.1 15.1+."++."+* 15.1+."++."++ "++."+".5.5

>.. ................ >>> >>>>>>. >>>>>.. >>>>..

A 15.15.5.5 15.15.5.1 15..16."+* 15.16."++."++ "++."+".5.5

>> >>> >>>>. >>>>> >>>>> >>>>..

A 15."*.5.5 15."*.5.1 15."+1."++."+* 15."+"."++."++ "++."+".5.5

  *U$"U1&B*U6B? 1"U@*U6"U1@UU*B"+"

Total no of host id bitsB"* @$borrowed&B1.

,o! The no of hosts possible in each subnet B " 1" B "@"1**" B "@"1*" hosts.

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ ;9 a!d 190 su,!ets

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  

A 15.5.5.5 15.5.5.1 15."++."++."+* 15."++."++."++ "++.5.5.5

To get " subnets!

"1"B""B5 subnets

"n"OBno of subnets

Page 22: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 22/29

"""B*"B" subnets.

"6"B"B@ subnets

"*"B1@"B1* subnets."+"B6""B65 subnets

"@"B@*"B@" subnets.

"?

"B1""B1"@ subnets""B"+@"B"+* subnets

/ence to get ?+ subnets! we need to borrow ? bits from the host id.

And to get 1+5 subnets! we need to borrow bits from the host id.

  1" @* 6" 1@ * "

 '- /'-

1" @* 6" 1@ * " 1

 '- /'-Therefore the subnets are!

?+ subnet 1+5 subnet

15.".5.5 15.1.5.5

15.*.5.5 15.".5.5

[email protected] 15.6.5.5

  V V

15.1+5.5.5 15.1+5.5.5

?+ subnets

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  A 15.".5.5 15.".5.1 15.6."++."+* 15.6."++."++ "++."+*.5.5

A 15.*.5.5 15.*.5.1 15.6."++."+* 15.6."++."++ "++."+*.5.5

A 15.1+5.5.5 15.1+5.5.1 15.1+1."++."+* 15.1+1."++."++ "++."+*.5.5

A 15."+*.5.5 15."+*.5.1 15."++."++."+* 15."++."++."++ "++."+*.5.5

  "U$1&B"U1 1"U@*U6"U1@UU*U"B"+*

 

Total no of host id bitsB"* ?$borrowed&B1?.

,o! The no of hosts possible in each subnet B " 1?" B 1615?"" B 1615?5 hosts

1+5 subnets

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

A 15.1.5.5 15.1.5.1 15.1."++."+* 15.1."++."++ "++."++.5.5

A 15.".5.5 15.".5.1 15."."++."+* 15."."++."++ "++."++.5.5

>>. >>>. >>>.. >>>>>.. >>>>>.. >>>>

A 15.1+5.5.5 15.1+5.5.1 15.1+5."++."+* 15.1+5."++."++ "++."++.5.5

  1U$5&B1 1"U@*U6"U1@UU*U"U1B"++

Page 23: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 23/29

Total no of host id bitsB"* $borrowed&B1@.

,o! The no of hosts possible in each subnet B " 1@" B @++6@" B @++6* hosts

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ < su,!ets

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  

% 1?5.5.5.5 1?5.5.5.1 1?5.5."++."+* 1?5.5."++."++ "++."++.5.5

To get subnets!

"1"B""B5 subnets

""

"B*"B" subnets."6"B"B@ subnets

"*"B1@"B1* subnets

/ence to get subnets! we need to borrow * bits from the host id.

  1" @* 6" 1@

 '- /'-

Therefore the subnets are! [email protected]?5.5.6".5

1?5.5.*.5

  V1?5.5.1".5

1?5.5.1**.5

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

% [email protected] [email protected] 1?5.5.61."+* 1?5.5.61."++ "++."++."*5.5

% 1?5.5.6".5 1?5.5.6".1 1?5.5.*?."+* 1?5.5.*?."++ "++."++."*5.5

% 1?5.5.*.5 1?5.5.*.1 1?5.5.?."+* 1?5.5.?."++ "++."++."*5.5

% >>>. >>>. >>>. >>>. >>>>..

% 1?5.5.1".5 1?5.5.1".1 1?5.5.1*6."+* 1?5.5.1*6."++ "++."++."*5.5

% 1?5.5.1**.5 1?5.5.1**.1 1?5.5.1?+."+* 1?5.5.1?+."++ "++."++."*5.5

  1@U$U*U"U1&B1@U1+B61 1"U@*U6"U1@B"*5

Total no of host id bitsB1@ *$borrowed&B1*

,o! The no of hosts possible in each subnet B " 1*" B 1@6*" B 1@6" hosts.

"n"OBno of subnets

Page 24: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 24/29

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ << su,!ets

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  

% 1?5.5.5.5 1?5.5.5.1 1?5.5."++."+* 1?5.5."++."++ "++."++.5.5

To get subnets!

"1"B""B5 subnets

"""B*"B" subnets."6"B"B@ subnets

"*"B1@"B1* subnets

"+"B6""B65 subnets

"@

"B@*"B@5 subnets"?"B1""B1"@ subnets

/ence to get subnets! we need to borrow ? bits from the host id.

  1" @* 6" 1@ * "

 '- /'-

Therefore the subnets are! 1?5.5.".5

1?5.5.*.5

[email protected]  V

1?5.5."+5.5

1?5.5."+".5

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

% 1?5.5.".5 1?5.5.".1 1?5.5.6."+* 1?5.5.6."++ "++."++."*5.5

% 1?5.5.*.5 1?5.5.*.1 1?5.5.+."+* 1?5.5.+."++ "++."++."*5.5

% [email protected] [email protected] 1?5.5.?."+* 1?5.5.?."++ "++."++."*5.5

% >>>. >>>. >>>. >>>. >>>>..% 1?5.5."+5.5 1?5.5."+5.1 1?5.5."+1."+* 1?5.5."+1."++ "++."++."*5.5

% 1?5.5."+".5 1?5.5."+".1 1?5.5."+6."+* 1?5.5."+6."++ "++."++."*5.5

  "U$1&B"U1B6 1"U@*U6"U1@UU*U"B"+*

Total no of host id bitsB1@ ?$borrowed&B,o! The no of hosts possible in each subnet B " " B+1"" B +15 hosts.

------------------------------------------------------------------------------------------------------------

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ ( su,!ets

"n"OBno of subnets

Page 25: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 25/29

C2A,, ET8#(K /'- 2/'- %roadCast ,ubnet4ask  

C "55.5.5.5 "55.5.5.1 "55.5.5."+* "55.5.5."++ "++."++."++.5

To get " subnets!

"1"B""B5 subnets"""B*"B" subnets.

/ence to get " subnets! we need to borrow " bits from the host id.

  1" @*

 '- /'-

Therefore the subnets are! "55.5.5.@*"55.5.5.1"

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

C "55.5.5.@* "55.5.5.@+ "55.5.5.1"@ "55.5.5.1"? "++."++."++.1"

C "55.5.5.1" "55.5.5.1" "55.5.5.15 "55.5.5.11 "++."++."++.1"

  @*U$6"U1@UU*U"U1&B@*U@6B1"? 1"U@*B1"

Note#1(; is t8e Broadcast id.

Total no of host id bitsB "$borrowed&B@,o! The no of hosts possible in each subnet B " @" B@*" B@" hosts.

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ (+ 8osts.

To get " subnets!

""B"+@"B"+* hosts

"?"B1""B1"@ hosts"@"B@*"B@" hosts

"+"B6""B65 hosts"6"B"B@ subnets

"*"B1@"B1* hosts

"n"OBno of subnets

"no of bits left"OBno of hosts

(No o/ ,its le/t -( H No o/ 8osts

(No o/ ,its ,orrowed * ( H No o/ su,!ets

Page 26: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 26/29

/ence to get "6 hosts! we need to borrow 6 bits from the host id so that + bits will be left.

  1" @* 6"

 '- /'-

Therefore the subnets are! 1"[email protected]"

1"[email protected].@*

1"[email protected].@V

1"[email protected]"$we borrow 6 bits and so 6"S@ B1"&

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

C 1"[email protected]" 1"[email protected] 1"[email protected].@" 1"[email protected].@6 "++."++."++.""*

C 1"[email protected].@* 1"[email protected].@+ 1"[email protected].* 1"[email protected].+ "++."++."++.""*

C 1"[email protected]" 1"[email protected] 1"[email protected].""" 1"[email protected].""6 "++."++."++.""*

  6"U$1@UU*U"U1&B6"U61B@6 1"U@*U6"B1"

Total no of host id bitsB 6$borrowed&B+,o! The no of hosts possible in each subnet B " +" B6"" B65 hosts in each subnet.

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ 11 8osts.

To get " subnets!

""B"+@"B"+* hosts

"?"B1""B1"@ hosts

"@"B@*"B@" hosts"+"B6""B65 hosts

"*"B1@"B1* hosts"*"B1@"B1*

"6"B"B@ hosts

/ence to get 11 hosts! we need to borrow * bits from the host id so that * bits will be left.

  1" @* 6" 1@

"no of bits left"OBno of hosts

Page 27: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 27/29

 '- /'-

Therefore the subnets are! 1"[email protected]@

1"[email protected]"1"[email protected].*

V

1".1@.""*.$we borrow 6 bits and so 1@S1*B""*&

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

C 1"[email protected]@ 1"[email protected]? 1"[email protected] 1"[email protected] "++."++."++."*5

C 1"[email protected]" 1"[email protected] 1"[email protected].*@ 1"[email protected].*? "++."++."++."*5

C >>>>>. >>>>>. >>>>>... >>>>>.. >>>>>>>.

C 1"[email protected].""* 1"[email protected].""+ 1"[email protected]."+* 1"[email protected]."++ "++."++."++."*5

  1@U$U*U"U1&B1@U1+B61 1"U@*U6"U1@B"*5

Total no of host id bitsB *$borrowed&B*

,o! The no of hosts possible in each subnet B " *" B1@" B1* hosts in each subnet.

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ 1; su,!ets.

To get " subnets!

"1"B""B5 subnets

""

"B*"B" subnets"6"B"B@ subnets"*"B1@"B1* subnets

"+"B6""B65 subnets

/ence to get 1? subnets! we need to borrow + bits from the host id.

  1" @* 6" 1@

 '- /'-

Therefore the subnets are! 1"[email protected].

1"[email protected]@

1"[email protected]."*V

1"[email protected]@$we borrow + bits and so S1?B16@&

V1"[email protected]."*5$we borrow + bits and so S65B"*5&

"no of bits borrowed"OBno of subnets

Page 28: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 28/29

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

C 1"[email protected]. 1"[email protected]. 1"[email protected]* 1"[email protected]+ "++."++."++."*

C 1"[email protected]@ 1"[email protected]? 1"[email protected]."" 1"[email protected]."6 "++."++."++."*

C >>>>>. >>>>>. >>>>>... >>>>>.. >>>>>>..

C 1"[email protected]."*5 1"[email protected]."*1 1"[email protected]."*@ 1"[email protected]."*? "++."++."++."*  U$*U"U1&BU?B1+ 1"U@*U6"U1@UB"*

Total no of host id bitsB +$borrowed&B6

,o! The no of hosts possible in each subnet B " 6" B" B@ hosts in each subnet.

• )iide t8e /ollowi!$ !etwork co!sisti!$ o/ 90 su,!ets.

To get " subnets!

"1"B""B5 subnets

"""B*"B" subnets

"6"B"B@ subnets"*"B1@"B1* subnets

"+"B6""B65 subnets

"@"B@*"B@" subnets

/ence to get +5 subnets! we need to borrow @ bits from the host id.

  1" @* 6" 1@ *

 '- /'-

Therefore the subnets are! 1"[email protected].*1"[email protected].

1"[email protected]"

V

1"[email protected]."55$we borrow + bits and so *S+5B"55&V

1"[email protected]."*$we borrow + bits and so *S@"B"*&

Class ,ubnet /'- 2/'- %roadCast ,ubnet4ask  

C 1"[email protected].* 1"[email protected].+ 1"[email protected].@ 1"[email protected].? "++."++."++."+"

C 1"[email protected]. 1"[email protected]. 1"[email protected] 1"[email protected] "++."++."++."+"

C >>>>>. >>>>>. >>>>>... >>>>>.. >>>>>>..

"no of bits borrowed"OBno of subnets

Page 29: Sub Netting Concepts

8/16/2019 Sub Netting Concepts

http://slidepdf.com/reader/full/sub-netting-concepts 29/29

C 1"[email protected]."* 1"[email protected]."* 1"[email protected]."+5 1"[email protected]."+1 "++."++."++."+"

  *U$"U1&B*U6B? 1"U@*U6"U1@UU*B"+"

Total no of host id bitsB @$borrowed&B",o! The no of hosts possible in each subnet B " "" B*" B" hosts in each subnet.

NOTE # Su,!etti!$ ri!ci"le

• )o!ot c8a!$e %our NI)

• Borrow 2I) ,its to Nid

• Octet structure a!d ,it alues will !ot c8a!$es

• Rules /or 62I)> :2I)> BC a!d SNM will !ot c8a!$e.