WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us

Subnetting the IP, basic discussion

You are most welcome to this post.
IP Subnetting basic
Really thanks to you for your interest in this topics. :)

To increment scalability, meshwork administrators oftentimes poorness to line networks (especially oversized networks) into subnetworks, or subnets. A subnet segments the hosts within the system. With prudish meshwork segmentation, regularise when attackers get in, their gain is constricted to exclusive a section of the system and not to the whole web. One real underlying extend that an shrink leave requisite to action is to ascertain which subnet that a donated IP destination belongs to. For representation, when investigating the 10.1.1.36/24 IP label, one should be competent to make that this IP code belongs in the 10.1.1.0/24 subnet. Thus, it is alpha. Without subnets, the meshing has a unerect topology. A plain anatomy has a infinitesimal routing plateau and relies on MAC addresses to pass packets. MAC addresses fuck no hierarchic artefact. As the web grows, the use of the fabric bandwidth becomes less effectual.
A society that occupies a three-story business might have a web that is episodic by floors, with each structure distributive into offices. Imagine of the structure as the meshwork, the floors as the tercet subnets, and the offices as the individualistic computer addresses.
There are another disadvantages to a savourless system. All devices share the corresponding broadcast region, and it is ambitious to apply safeguard policies because there are no boundaries between devices.
In multiple-network environments, apiece subnetwork may be adjunctive to the Internet by a undivided router. This image shows one router connecting triplex subnetworks to the Net. The info of the interior fabric surroundings and how the material is segmented into multiple subnetworks are unimportant to added IP networks.
The advantages of subnetting a web are as follows:
” Smaller networks are easier to deal and map to geographical or operable requirements.
” Contain the broadcast reciprocation to the human subnets to ameliorate performance.
” More easily administer cloth guarantee measures at the interconnections between subnets than within a larger lone system.
The IP addressing that is victimised in the scenery cloth must be varied to harmonise the required segmentation. A subnet mask identifies the network-significant serving of an IP instruction. The network-significant allotment of an IP address is only the relation that identifies the system that the throng pattern is on. This strain is called the cloth direct and defines every subnetwork. The use of segmentation is essential for the routing computing to be economic.
The IP addressing that is utilised in the mat meshing must be varied to admit the required segmentation. A subnet cover identifies the network-significant allocation of an IP tact. The network-significant assets of an IP label is only the component that identifies the network that the breadstuff figure is on. This try is called the textile accost and defines every subnetwork. The use of segmentation is distinguished for the routing performance to be streamlined.
A subnet mask:
” Defines the numerate of bits that say the network and subnet location of the speech
” Is used by end systems to key the goal IP speech as either anaesthetic or device
” Is victimized by Layer 3 devices to watch network itinerary
How do you cognize how numerous bits transpose the mesh assignation of the accost and how numerous bits personify the patron apportionment? When you verbalise an IPv4 system instruction, you add a prefix size to the meshing direction. The prefix size is the periodical of bits in the address that apply the system part. For information, in 172.16.55.87 /20, /20 is the prefix length. It tells you that the prime 20 bits are the scheme writing, leaving the remaining 12 bits as the boniface allotment. The entity that is old to expound the tact does, and uses 1s and 0s to indicate which bits of the come are meshing bits and which bits are computer bits. You mail the subnet cover in the like dotted decimal dissever as the IPv4 tactfulness. The subnet mask is created by placing a binary 1 in each bit view that represents the meshwork share and placing a star 0 in apiece bit billet that represents the breadstuff component. Both the web and boniface portion of the subnet cover moldiness be ceaseless. A /20 prefix is verbalized as a subnet cover of 255.255.240.0 (11111111.11111111.11110000.00000000). The remaining bits (low organization) of the subnet cover are zeroes, indicating the throng direct within the web.
The subnet mask is configured on a breadstuff with its IPv4 address to cater the breadstuff shape the scheme assets of that label. The patron makes this judgment by logically ANDing the star bits of its IPv4 speech with the star bits of the subnet mask.
Networks are not ever assigned the very prefix. Depending on the enumerate of hosts on the mesh, the prefix that is assigned may be divers. Having a distinct prefix identify changes the entertainer compass and show tactfulness for apiece meshwork.
For warning, face at the patron 10.1.20.70/26:
” Address:
1. 10.1.20.70
2. 00001010.00000001.00010100.01000110
” Subnet mask:
1. 255.255.255.192
2. 11111111.11111111.11111111.11000000
” Network tactfulness:
1. 10.1.20.64
2. 00001010.00000001.00010100.01000000

Variable-Length Subnet Masking

The figure below illustrates a network that uses fixed-length prefixes to address various segments. Address space is wasted because large subnets are used for addressing the WAN interfaces which are simply point-to-point segments. The three WAN segments only require the use of two host addresses, yet a subnet containing 254 hosts has been assigned to each WAN segment, wasting lots of usable IP addressing space.

IP subnetting

IP subnetting

VLSM affords the options of including more than one subnet mask within a network and of subnetting an already subnetted network address.

Network using VLSM:

  1. The subnet 172.16.14.0/24 is divided into smaller subnets.
  2. One subnet has a subnet mask /27.

Further subnetting of one of the unused /27 subnets into /30 subnets.

VLSM offers these benefits:

  • More efficient use of IP addresses: Without the use of VLSM, companies must implement a single subnet mask within an entire Class A, B, or C network number.
    1. For example, consider the 172.16.0.0/16 network address that is divided into subnetworks using /24 masking. One of the subnetworks in this range, 172.16.14.0/24, is further divided into smaller subnetworks using /27 masking. These smaller subnetworks range from 172.16.14.0/27, 172.16.14.32/27, 172.16.14.64/27, and so on to 172.16.14.224/27.
    2. In the figure, one of these smaller subnets, 172.16.14.128/27, is further divided using the /30 prefix, which creates subnets with only two hosts, to be used on the WAN links. The /30 subnets range from 172.16.14.128/30 to 172.16.14.156/30. The WAN links used the 172.16.14.132/30, 172.16.14.136/30, and 172.16.14.140/30 subnets out of the range.
  • Better-defined network hierarchical levels: VLSM allows more hierarchical levels within an addressing plan, which enables easier aggregation of network addresses. For example, in the figure, subnet 172.16.14.0/24 describes all the addresses that are further subnets of 172.16.14.0, including addresses from subnet 172.16.14.0/27 to subnet 172.16.14.128/30, and so on.
Apr 20, 2018Himadri
 

Share with friends :

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to print (Opens in new window)

Related

Understanding Dynamic Host Configuration Protocol (DHCP) working principleICMP Vulnerabilities - what you need to know

Leave a Reply Cancel reply

three + 6 =

Himadri

Hi, I'm Himadri. I love blogging with tech topics, specially computer networking. We'll have more fun in the upcoming day. Stay with me. :)

April 20, 2018 Cyber Security150
Feel Free to Share :)
0
GooglePlus
0
Facebook
0
Twitter
0
Digg
0
Delicious
0
Stumbleupon
0
Linkedin
0
Pinterest
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • Free download Principles of Electronics by VK Mehta
  • Know about Host-Based Intrusion Prevention System
  • Know the Diamond Model for Intrusion Analysis
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 19 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking
     

    Loading Comments...