1 / 19

Subnetting

Subnetting. ITEC 370 George Vaughan Franklin University. Sources for Slides. Material in these slides comes primarily from course text, Guide to Networking Essentials,Tomsho, Tittel, Johnson (2007). Other sources are cited in line and listed in reference section. TCP/IP and OSI Models.

castrow
Download Presentation

Subnetting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Subnetting ITEC 370 George Vaughan Franklin University

  2. Sources for Slides • Material in these slides comes primarily from course text, Guide to Networking Essentials,Tomsho, Tittel, Johnson (2007). • Other sources are cited in line and listed in reference section.

  3. TCP/IP and OSI Models

  4. Some Simple Binary ArithmeticTomsho, Tittel, Johnson (2007) • Four kinds of binary calculations: • Converting between binary and decimal • Converting between decimal and binary • Understanding how setting high-order bits to the value of 1 in 8-bit binary numbers corresponds to specific decimal numbers • Recognizing the decimal values for numbers that correspond to low-order bits when set to 1

  5. Converting Decimal to BinaryTomsho, Tittel, Johnson (2007) • 125 is converted to binary as follows: • 125 divided by 2 equals 62, remainder 1 • 62 divided by 2 equals 31, remainder 0 • 31 divided by 2 equals 15, remainder 1 • 15 divided by 2 equals 7, remainder 1 • 7 divided by 2 equals 3, remainder 1 • 3 divided by 2 equals 1, remainder 1 • 1 divided by 2 equals 0, remainder 1

  6. Converting Binary to DecimalTomsho, Tittel, Johnson (2007) To convert 11010011 to decimal: • Count the total number of digits in the number (8) • Subtract one from the total (8 - 1 = 7) • That number (7) is the power of 2 to associate with the highest exponent for two in the number • Convert to exponential notation, using all the digits as multipliers • 11010011, therefore, converts to:

  7. High-Order Bit PatternsTomsho, Tittel, Johnson (2007)

  8. Low-Order Bit PatternsTomsho, Tittel, Johnson (2007)

  9. Types of IP Addressing • The demarcation point in the 32 bit address between network ID and host ID depends on addressing scheme: • Class Based Addressing generally uses a byte boundary as the dividing point • Classless Based Addressing uses a bit boundary.

  10. Class Based IP Addressing (Cisco – IP Addressing, n.d.). Used less frequently now, CIDR preferred

  11. Special IP Addresses • Information on this slide from http://www.iana.org/faqs/abuse-faq.htm • "Private Use" IP addresses: • 10.0.0.0 - 10.255.255.255 • 172.16.0.0 - 172.31.255.255 • 192.168.0.0 - 192.168.255.255 • "Autoconfiguration" IP Addresses: • 169.254.0.0 - 169.254.255.255 • used automatically by some PCs and Macs when • They are configured to use IP • Do not have a static IP Address assigned • And are unable to obtain an IP address using DHCP. • "Loopback" IP addresses: • 127.0.0.0 - 127.255.255.255 • Each computer on the Internet uses 127.0.0.0/8 to identify itself, to itself. • 127.0.0.0 to 127.255.255.255 is earmarked for what is called "loopback". • This construct allows a computer to establish/validate its IP stack. • Most software only uses 127.0.0.1 for loopback purposes

  12. Classless Interdomain Routing (CIDR) • Division between Network and Host ID is at bit level. • Example: 192.203.187.0/27 • IP address is: 192.203.187.0 • ‘/27’ indicates that: • First 27 bits define Network ID • Last 5 bits define Host ID (defines size of subnet) • Subnet Mask = • (binary) 11111111 11111111 11111111 11100000 • (decimal) 255.255.255.224 • Subnet Mask defines Host ID size • 1’s used to define which bits belong to Network ID • 0’s used to define which bits belong to Host ID • Subnet Mask is assigned to host at same time that IP address is assigned.

  13. CIDR (Cont.) • Mapping class based IP addressing to CIDR: • Class A submask = 255.0.0.0 • Class B submask = 255.255.0.0 • Class C submask = 255.255.255.0 • All hosts in same network must use same subnet mask.

  14. Subnetting with Classless IP Addressing: Example 1

  15. Subnetting with Classless IP Addressing: Example 1 (Continued)

  16. Subnet 0 194.10.3.0 - 194.10.3.31 Subnet 1 194.10.3.32 - 194.10.3.63 Subnet 2 194.10.3.64 - 194.10.3.95 Subnet 3 194.10.3.96 - 194.10.3.127 Subnet 4 194.10.3.128 - 194.10.3.159 Subnet 5 194.10.3.160 - 194.10.3.191 Subnet 6 194.10.3.192 - 194.10.3.223 Subnet 7 194.10.3.224 - 194.10.3.255 Network Diagram of Subnets

  17. Subnetting with Classless IP Addressing: Example 2

  18. Subnetting with Classless IP Addressing: Example 2 (Continued)

  19. References Tomsho, Tittel, Johnson (2007). Guide to Networking Essentials. Boston: Thompson Course Technology. Odom, Knott (2006). Networking Basics: CCNA 1 Companion Guide. Indianapolis: Cisco Press Wikipedia (n.d.). OSI Model. Retrieved 09/12/2006 from http://en.wikipedia.org/wiki/OSI_Model Cisco – IP Addressing (n.d.). IP Addressing. Retrieved 09/27/2006 from http://cco.cisco.com/warp/public/701/3.html#figone IANA (n.d.) Abuse Issues and IP Addresses . Retrieved 11/11/06 from http://www.iana.org/faqs/abuse-faq.htm

More Related