Premium Essay

Ip Subnetting

In:

Submitted By maninder
Words 586
Pages 3
n IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation.
Example: 140.179.220.200

It is sometimes useful to view the values in their binary form.

140 .179 .220 .200
10001100.10110011.11011100.11001000
Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address.

Address Classes

There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address.
Class A addresses begin with 0xxx, or 1 to 126 decimal.
Class B addresses begin with 10xx, or 128 to 191 decimal.
Class C addresses begin with 110x, or 192 to 223 decimal.
Class D addresses begin with 1110, or 224 to 239 decimal.
Class E addresses begin with 1111, or 240 to 254 decimal.
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine; [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting; Class E addresses are reserved for future use. They should not be used for host addresses.

Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N, in blue) and which part belongs to the node (n, in red).

Class A -- NNNNNNNN.nnnnnnnn.nnnnnnnn.nnnnnnnn
Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn
Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn
In the example, 140.179.220.200 is a Class B

Similar Documents

Premium Essay

Ip Subnetting

...IP networking 12/17/2013 IP Addresses Classes and specific-Use IP Address Space An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2] The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address, was developed in 1995.[3] IPv6 was standardized as RFC 2460 in 1998,[4] and its deployment has been ongoing since the mid-2000s. IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6). The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities. In IPv4 an address consists of...

Words: 841 - Pages: 4

Premium Essay

Ip Addressing Subnetting

...010101001011000 110101100011010 11010100001011 001010100110 1001010010 11010011 10011000 IP Addressing and Subnetting Workbook Version 2.0 Instructor’s Edition 11111110 10010101 00011011 10000110 IP Address Classes Class A Class B Class C Class D Class E 1 – 127 128 – 191 192 – 223 224 – 239 240 – 255 (Network 127 is reserved for loopback and internal testing) 00000000.00000000.00000000.00000000 Leading bit pattern 0 Network . Host . Host . Host Leading bit pattern Leading bit pattern 10 110 10000000.00000000.00000000.00000000 Network . Network . Host . Host 11000000.00000000.00000000.00000000 Network . Network . Network . Host (Reserved for multicast) (Reserved for experimental, used for research) Private Address Space Class A Class B Class C 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 Default Subnet Masks Class A Class B Class C 255.0.0.0 255.255.0.0 255.255.255.0 Produced by: Robb Jones jonesr@careertech.net and/or Robert.Jones@fcps.org Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors, and to everyone who has sent in suggestions to improve the series. Workbooks included in the series: IP Addressing and Subnetting Workbooks ACLs - Access Lists Workbooks VLSM Variable-Length Subnet Mask Workbooks Instructors (and...

Words: 18750 - Pages: 75

Premium Essay

Ip Subnetting Project

...This is newest updated file from today. See below. IP Subnetting Project XUMUC is has the WAN links in place to the new locations in the Houston Region. XUMUC currently has 2 other Regions San Francisco and Denver. Originally, XUMUC was only in one region (San Francisco). The previous consultant did a poor job with the integration resulting in a poor IP address scheme as a result routing tables at the summarization points and at the San Francisco Campus are very large. In addition, no VLAN structure was developed to isolate broadcast traffic. There are 4 main departments in XUMC: sales, finance, human resources, and research and development. Also, there has been some concern that the WAN transport was not able to accommodate the network traffic. The XUMC sales team has added a call center with hours of operation from 9AM-9PM EST. Access to the call center network should be restricted after hours. The research and development department has (3) unique special projects which will require over 1000 devices to be enabled to use IPV6. A new network should be created for this area. Finally, all addresses in the network are statically assigned resulting in high administration overhead when changes are needed XUMC would like this changed to lower administrative overhead. The Board of Director meet and decided to add a Security Analyst role to the team. The new Security Analyst has request the access restrictions be documented. The Finance Department should have restrictions...

Words: 526 - Pages: 3

Premium Essay

Unknown

...____________________________ Build the OSI Model by providing the following information: Layer # | Layer Name | Function | | | | | | | | | | | | | | | | | | | | | | Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses contained in the packet. IP defines packet structures that encapsulate the data to be delivered and defines the addressing used to identify the source and destination information. IP is a service in the connection-oriented Transmission Control Protocol (TCP) – thus it is often referred to as the TCP/IP Suite. Two versions of IP: IP Version | Number Format | # of Bits | Example | | | | | | | | | Subnets/Subnetting Subnetting is the practice of dividing a large network into two or more smaller networks (subnets) – this is typically done to improve manageability and performance. Subnet Methods | | | | | Classful: Classful subnetting is a method for allocating IP addresses using five classes of...

Words: 1730 - Pages: 7

Premium Essay

Subnetting Made Simple

...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...

Words: 7956 - Pages: 32

Premium Essay

Nt2640

... | |1 and 192.168.16.01/24 | | | | | Step 5. |Show IP route connected command/ see no connection routes | | | | | | | Step 6: |172.30.10.2 / has no IP address admin down | | | | | | ...

Words: 1716 - Pages: 7

Premium Essay

Narnia

...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...

Words: 7956 - Pages: 32

Premium Essay

Fruit

...Subnetting Examples There are three types of subnetting examples I will show in this document: 1) Subnetting when given a required number of networks 2) Subnetting when given a required number of clients 3) Given an IP address & Subnet Mask, finding original network range (reverse engineering a subnet problem) Subnetting Examples document created by Jeremy D. Cioara. Please do not change this document without first contacting me! Thank you! If you have any questions, please email me at Jeremy@CBTNuggets.com Subnetting, Style 1 - Subnetting when given a required number of networks Example 1: A service provider has given you the Class C network range 209.50.1.0. Your company must break the network into 20 separate subnets. Step 1) Determine the number of subnets and convert to binary - In this example, the binary representation of 20 = 00010100. Step 2) Reserve required bits in subnet mask and find incremental value - The binary value of 20 subnets tells us that we need at least 5 network bits to satisfy this requirement (since you cannot get the number 20 with any less than 5 bits – 10100) Our original subnet mask is 255.255.255.0 (Class C subnet) The full binary representation of the subnet mask is as follows: 255.255.255.0 = 11111111.11111111.11111111.00000000 - We must “convert” 5 of the client bits (0) to network bits (1) in order to satisfy the requirements: New Mask = 11111111.11111111.11111111.11111000 - If we convert the mask back to decimal, we now have the subnet...

Words: 2200 - Pages: 9

Premium Essay

D1 Iw

...is called subnetting it so for example A company wants to subnet an IP address of 170.1.0.0/27 as it is resulting in too much traffic that is delaying the performance of it here is how you would do it To calculate an IP subnet mask you will need to have a network class, IP address, subnet mask, mask bits, the maximum required IP subnets and the maximum required hosts per subnet, by calculating the subnet it will provide you with a hexadecimal IP address, wildcard mask to use the ACL (Access control lists), the subnet ID, broadcast address, the subnet address range. The method to calculate an IP subnet mask for CIDR is first of all you need the IP address which is 170.1.0.0/27 you will need to convert this bit-length prefix into a quad dotted decimal representation to do this you look at the number after the slash / which is 27 because, it says quad we have to find 4 numbers that sum up to 27 which is 27= 8+8+8+3 Then you would look at the conversion of how to convert quad- dotted into bit length using the conversion tables If we let the IP address equal 170.1.0.0/26 using the tables you can say 26= 8+8+8+2 26=255.255.255.192 So the IP address is 170.1.0.0 and the subnet mask in quad dotted format is 255.255.255.192 Then you will need to calculate the number of bits used for subnetting to their corresponding subnet mask The ranges of the subnet mask is 0,128,192,224,240,248,252,254,255 You can convert the subnet mask into the number bits used for subnetting from the...

Words: 522 - Pages: 3

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

It Substituting

... | | Q#1: What is IP address and also define classes of IP address? Ans: IP ADDRESS: "IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that governs online communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible. An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to send and retrieve data over our Internet connections, ensuring that our messages, as well as our requests for data and the data we've requested, will reach their correct Internet destinations. Without this numeric protocol, sending and receiving data over the World Wide Web would be impossible. IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and provide a simple and...

Words: 2246 - Pages: 9

Premium Essay

Checkpoint Tcp/Ip

...Checkpoint: TCP/IP LAN Plan 1. An IPv6 address is made up of how many bits? a. 32 b. 48 c. 64 d. 128 e. 256 The answer to this question is d. Ipv6 address has 128 bits which is better than Ipv4 which has only 32 bit addresses. If I understand it with Ipv4 the amount of addresses will soon run out. With Ipv6 as stated in the book unless every star in the universe were assigned an address it is unlikely to run out of addresses. With Ipv4 it was stated that there are only 4 billion possible addresses. With Ipv6 there are 3.4x10^38 or 34 followed by 37 zeroes. Ipv6 resolves some problems found in Ipv4 such as limited addresses, security, sometimes complicated setup and quality of service (QoS). QoS describes the ability of a network to prioritize data packets based on the type of information. Ipv6 makes the handling of special packets easier to implement, such as applications that use video or audio. Whereas Ipv4 uses a dotted decimal in 8 bit sections, Ipv6 uses a hexadecimal format in 16 bit sections. At first I was a bit confused over what this meant and looking at the address example further confused me. Then after further reading I discovered that each 16 bit section was ended with a colon. It was explained that there are three sections to the address they are public topology, a site topology, and an interface identifier. If I am right then the address giving in the book would break down like this: 2001:DB8:0:0:0:2ed3:340:ab The first 3 16 bit sections 2001:DB8:0: represent...

Words: 1749 - Pages: 7

Premium Essay

It 240 Week4

...Chapter 5 Questions (Subnetting) Brian M. Robinson IT/240 February 1, 2013 Derrick Sorrells Chapter 5 Questions (Subnetting) 1. An IPv6 address is made up of how many bits? An Ipv6 address is made up of 128 bits. Because IPv6 has 128 bits, instead of the 32 bits that IPv4 has, the need for private addressing is eliminated. This is because IPv6 has 3.4 x 10^38 addresses, compared to the 4 billion addresses that IPv4 has. This is more than enough IP addresses to handle the needs of networking for the foreseeable future and beyond. 2. The subnet mask of an IP address does which of the following? The subnet mask defines network and host portions of an IP address. The most important task performed by subnetting is that it helps determine whether the host is communicating with computer that is on the same network, or subnet, or a different network or subnet. The distinction matters because if the host is talking to a computer on the same subnet, then no router is needed. If the two are on separate subnets, then the router must then be involved to facilitate communications. 4. Which of the following is a private IP address and can’t be routed across the Internet? a. 192.156.90.100 b. 172.19.243.254 c. 11.200.99.180 d. 221.24.250.207 e. 12.12.12.12 The IP address 172.19.243.254 is a private address and cannot be routed across the internet. For Class A, addresses beginning with 10; for Class B, addresses starting with 172.16 and running through 172.31; and for Class...

Words: 824 - Pages: 4

Premium Essay

Subnetting 1 2 3

...Subnetting 1 2 3 By Adam Chee W.S Ever get stressed out because you know that there would be subnetting question(s) in the next exam you are taking and that these questions easily take up 10 to 20 minutes of your precious exam time? What if there is more than one question? The process of converting the subnet to binary and decimal can drive the unfamiliar insane, not to mention the waste of precious time and brain power which can be utilized for other areas of exam preparation. Let's take a look at a shortcut method that will cut down the time needed to answer these questions without the need for a calculator. Subnet Basics: This article assumes that you know how to perform subnetting in the traditional method but it is important to stress that there are only 3 classes of usable IP addresses which are Class Range Subnet mask Host bit Subnet Class A (127 is reserved for loopback) 255.0.0.0 24 8 Class B 128 - 191 255.255.0.0 16 16 Class C 192 - 223 255.255.255.0 8 24 1 - 126 You must understand and remember this table well in order to master the shortcut. Note: You must borrow at least 2 bits and must leave at least 2 bits The 'Subnet Table' 1 2 3 4 5 6 7 8 Bit Value 128 64 32 16 8 4 2 1 Subnet Mask 128 192 224 240 248 252 254 255 0 2 6 14 30 62 126 254 Bits Borrowed (N) Number of Subnets ((2^N)-2) ...

Words: 1155 - Pages: 5

Premium Essay

Network and Communication

...COMMUNICATION Presentation Topic: Subnet Masking MBA IN E-GOVERNANCE - Programme III Prepared and Narrated by : KDU/MEG/03/11 – Theshantha Mukirigala Submission Date : 26 November 2015 Subnet Mask • An IP address has 2 parts: – The Network identification. – The Host identification. • Frequently, the Network & Host portions of the address need to be separately extracted. • In most cases, if you know the address class, it’s easy to separate the 2 portions. Subnet Mask (Cont.) • With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. • Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Subnet Mask (Cont.) • The subnet masking process was developed to identify & extract the Network part of the address. • A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. • If it is not, the process of routing it to an outside network begins. Subnet Mask (Cont.) • The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. • It is applied to a message’s destination address to extract the network address. • If the extracted network address...

Words: 770 - Pages: 4