...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...
Words: 7956 - Pages: 32
...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True...
Words: 1872 - Pages: 8
...The Netmask When setting up each node with its IP address, the Netmask ask must also be specified. This mask is used to specify which part of the address is the network number part, and which is the host part. This is accomplished by a logical bitwise-AND between the Netmask ask and the IP address. The result specifies the network number. For Class C, the Netmask ask will always be 255.255.255.0; for Class B, the Netmask ask will always be 255.255.0.0; and so on. When A sent a packet to E in the last example, A knew that E wasn’t on its network segment by comparing A’s network number 200.1.2 to the value resulting from the bitwise-AND between the Netmask ask 255.255.255.0 and the IP address of E, 200.1.3.2, which is 200.1.3. The Netmask ask becomes very important, and more complicated, when “classless” addressing is used. Hierarchical Sub-Allocation of Class C Addresses To make more efficient use of Class C addresses in the Internet community, these addresses are subnetted hierarchically from the service provider to the organization. They are allocated bi™ ask-oriented subsets of the provider’s address space [4, 5]. These are classless addresses. Consider the following example of a small organization consisting of two Ethernet segments connecting to an Internet service provider using a WAN router that emulates an additional network segment, such as WANPIPE®;. The service provider has been allocated several different Class C addresses to be used for its clients. This particular...
Words: 4350 - Pages: 18
...Understanding IP Addressing: Everything You Ever Wanted To Know Introduction In the mid-1990's, the Internet is a dramatically different network than when it was first established in the early 1980's. Today, the Internet has entered the public consciousness as the world's largest public data network, doubling in size every nine months. This is reflected in the tremendous popularity of the World Wide Web (WWW), the opportunities that businesses see in reaching customers from virtual storefronts, and the emergence of new types and methods of doing business. It is clear that expanding business and social awareness will continue to increase public demand for access to resources on the Internet. There is a direct relationship between the value of the Internet and the number of sites connected to the Internet. As the Internet grows, the value of each site's connection to the Internet increases because it provides the organization with access to an ever expanding user/customer population. Internet Scaling Problems Over the past few years, the Internet has experienced two major scaling issues as it has struggled to provide continuous and uninterrupted growth: - The eventual exhaustion of the IPv4 address space - The ability to route traffic between the ever increasing number of networks that comprise the Internet The first problem is concerned with the...
Words: 7368 - Pages: 30
...Prepared for: University of Maryland University College Prepared by: Student Name I. Physical Network Design Network Topology Business Needs UOE is an institution that it is growing globally and diversifies its spears of academic excellence and markets itself. For the institution to achieve its goals and mission, use of computer systems and internet facilities installation should be prioritized. Today the world has become a global village and thus the need to put the infrastructure in place is essential. The institution looked at the need and considered it to be the priority. The organizations’ network has different users each with different privileges. The users are the administration, the staff and the students. My aim is to come up with an efficient, modular, resilient, structured and manageable network upon implementation with good structural and engineering principles. To meet the requirements of the organization, I propose a hierarchical network design needs to be implemented. This is because this design allows the use of the other topologies at different levels, growth and robustness. Hierarchical network design A hierarchical network is also called network backbone. The hierarchical system is divided into three tiers, namely core, distribution and access level, with the privileges reducing downwards. This design is most appropriate for the organization since it allows for network administrators to optimize and specify the correct hardware and software for the entire...
Words: 2532 - Pages: 11
...raft Manuscript Draft Ma VLSM and CIDR cript Draft Manuscript Dra Manuscript Draft Manuscri raft Manuscript Draft Ma uscript Draft Manuscript raft Manuscript Draft Ma script Draft Manuscript D ft Manuscript Draft Manu ript Draft Manuscript Dra Manuscript Draft Manuscri t Draft Manuscript Draft M nuscript Draft Manuscript CHAPTER 6 Objectives ■ Upon completion of this chapter, you should be able to answer the following questions: What are the differences between classful and classless IP addressing? What is VLSM, and what are the benefits of classless IP addressing? ■ ■ What is the role of the classless interdomain routing (CIDR) standard in making efficient use of scarce IPv4 addresses? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary at the end of the book. classful IP addressing page 280 prefix aggregation page 285 network prefix page 286 contiguous page 294 discontiguous address assignment page 280 supernet page 280 private addressing page 281 high-order bits page 282 supernetting page 294 This is a prepublication draft of the manuscript. The final book will publish in December and will be available for purchase at http://www.ciscopress.com/title/9781587132063. raft Manuscript Draft Ma cript Draft Manuscript Dra Manuscript Draft Manuscri raft Manuscript Draft Ma uscript Draft Manuscript raft Manuscript Draft Ma script Draft Manuscript D ft Manuscript Draft Manu ript Draft Manuscript Dra Manuscript...
Words: 10468 - Pages: 42
...| Contents OSPF 4 BASIC COMMANDS 4 Backup link Configuration 4 QOS 8 Testing 10 Trouble Shooting 11 Implications/How it works 11 SNMP & NetFlow 12 In Global Configuration Mode on each Cisco Router: 12 In Interface Configuration Mode on each Cisco Router: 12 Install Cacti on the HQ Server 12 Installing NfSen on the HQ Server: 13 Troubleshooting: 14 Verification/Testing: 14 Explanation: 15 What was not accomplished: 15 Formatting Cisco IOS on 2600 series routers 15 Testing 16 Trouble Shooting 16 General IPv6 commands: 17 Rip6 commands: 17 Implications/How it works 18 Testing 19 Troubleshooting 20 IP 21 Delegation: 21 VLAN information: 22 VLAN IP Addresses: 23 HQ Subnetting: 23 Store Subnetting: 24 Procedures: 25 Troubleshooting: 27 Traffic generation/Services 29 Installing Ubuntu 10.04.2 LTS 29 Installing and Configuring NTP on Ubuntu 31 Installing BackTrack 4 R2 32 Installing and Configuring Nping 35 Verification and Troubleshooting for Nping 35 Reflection 36 Troubleshooting 36 Adtran 37 Commands for set-up 37 How does Adtran differ from Cisco? 38 How do you verify/what were the results 38 Bibliography 39 Appendix A 40 OSPF BASIC COMMANDS The following commands are entered into global configuration mode. router ospf 10 network <the ip network of the network you wish to add> <the inverse mask of the area> area <region number> Some routers required entering...
Words: 7461 - Pages: 30
...Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning to get it right. Retail product and service businesses operate in a crowded market. There is intense competition for customers. Today's businesses have found that the pursuit and retention of customers is the primary goal and Johnson is concerned that their methods are too antiquated to keep them competitive. Currently, Johnson used analog phone lines and takes all customer orders by...
Words: 3601 - Pages: 15
...Static secure MAC addresses-These are manually configured by using the switchport port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration. Dynamic secure MAC addresses-These are dynamically configured, stored only in the address table, and removed when the switch restarts. Sticky secure MAC addresses-These are dynamically configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, when the switch restarts, the interface does not need to dynamically reconfigure them. You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter the switchport port-security mac-address sticky interface configuration command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. The interface adds all the sticky secure MAC addresses to the running configuration. The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need...
Words: 9957 - Pages: 40
...EIGRP and OSPF Comparison For Client Sponsor Prepared By Scott Hogg Project Number 02 Date March 14, 2002 |Distribution List | |Name |Title/Duties |Company | |John Vogt-Nilsen |Manager – Network Operations | | |Sammy Hutton |Principal Systems Analyst | | |Scott Hogg |Principal Consultant |Lucent | |Phil Colon |Managing Consultant |Lucent | |Revision History | |Version |Date |Author |Comments | |1.0 |03/14/2002 |Scott Hogg |Initial Draft | | | | | | |...
Words: 8531 - Pages: 35
...EIGRP and OSPF Comparison For Client Sponsor Prepared By Scott Hogg Project Number 02 Date March 14, 2002 |Distribution List | |Name |Title/Duties |Company | |John Vogt-Nilsen |Manager – Network Operations | | |Sammy Hutton |Principal Systems Analyst | | |Scott Hogg |Principal Consultant |Lucent | |Phil Colon |Managing Consultant |Lucent | |Revision History | |Version |Date |Author |Comments | |1.0 |03/14/2002 |Scott Hogg |Initial Draft | | | | | | |...
Words: 8531 - Pages: 35
...SECTION 1 - WIDE AREA NETWORK The Washington School District Wide Area Network (WAN) will connect all school and administrative offices with the district office for the purpose of delivering data. The WAN will be based on a two-layer hierarchical model. Three (3) regional Hubs will be established at the District Office/Data Center, Service Center and Shaw Butte Elementary School for the purpose of forming a fast WAN core network. School locations will be connected into the WAN core Hub locations based on proximity to the Hub. TCP/IP and Novell IPX will be the only networking protocols that will be acceptable to traverse the district WAN. All other protocols will be filtered at the individual school sites using access routers. High-end, powerful routers will also be installed at each WAN core location. Access to the Internet or any other outside network connections will be provided through the District Office/Data Center through a Frame Relay WAN link. For security purposes, no other connections will be permitted. SECTION 2 - LOCAL AREA NETWORK & WIRING SCHEME Two Local Area Network (LAN) segments will be implemented in each school and the District Office. The transport speeds will be Ethernet 10BASE-T, 100BASE-TX, and 100BASE-FX. Horizontal cabling shall be Category 5 Unshielded Twisted Pair (CAT5 UTP) and will have the capacity (be tested) to accommodate 100 Mbps. Vertical (Backbone) cabling shall be CAT5 UTP or fiber optic multi-mode cable. The cabling infrastructure...
Words: 1723 - Pages: 7
...* CCNA Routing & Switching 200-120 * Chapter 1 – Understanding Networks and their Building Blocks * 1-1 Introduction to Networks * 1-2 Networking Types * 1-3 OSI Reference Model * 1-4 TCP/IP Model * 1-5 Ethernet Technologies and Cabling * 1-6 Cisco 3 Layer Model * 1-7 Summary * Chapter 2 – IP Addressing and Subnets * 2-1 IP Addresses – Composition, Types and Classes * 2-2 Private and Public IP addresses * 2-3 Subnetting * 2-4 Variable Length Subnet Masks (VLSM) * 2-5 Route Summarization * 2-6 Troubleshooting IP Addressing * Chapter 3 Introduction to Cisco Routers, Switches and IOS * 3-1 Introduction to Cisco Routers, Switches, IOS & the Boot Process * 3-2 Using the Command-Line Interface (CLI) * 3-3 Basic Configuration of Router and Switches * 3-4 Configuring Router Interfaces * 3-5 Gathering Information and Verifying Configuration * 3-6 Configuring DNS & DHCP * 3-7 Saving, Erasing, Restoring and Backing up Configuration & IOS File * 3-8 Password Recovery on a Cisco Router * 3-9 Cisco Discovery Protocol (CDP) * 3-10 Using Telnet on IOS * 3-11 CCNA Lab #1 * Chapter 4 Introduction to IP Routing * 4-1 Understanding IP Routing * 4-2 Static, Default and Dynamic Routing * 4-3 Administrative Distance and Routing...
Words: 95744 - Pages: 383
...COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS 1.What do you mean by data communication? Ans: It is the exchange of data between two devices via some form of transmission medium such as wire cable. The communicating system must be part of a communication system made up of a combination of hardware and software.The effectiveness of a data communication system depends on three fundamental characteristics: delivery, accuracy and timeliness. 2.What is simplex? Ans: It is the mode of communication between two devices in which flow of data is unidirectional. i.e. one can transmit and other can receive. E.g. keyboard and monitor. 3.What is half-duplex? Ans: It is the mode of communication between two devices in which flow of data is bidirectional but not at the same time. ie each station can transmit and receive but not at the same time. E.g walkie-talkies are half-duplex system. 4.What is full duplex? Ans: It is the mode of communication between two devices in which flow of data is bidirectional and it occurs simultaneously. Here signals going in either direction share the capacity of the link. E.g. telephone 5.What is a network? Ans: It is a set of devices connected by communication links. A node can be a computer or any other device capable of sending and/or receiving data generated by other nodes on the network. 6.What is distributed processing? Ans: It is a strategy in which services provided by the network reside at multiple sites. 7.What is point to point connection? Ans:It...
Words: 3493 - Pages: 14
...of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Trademark...
Words: 64092 - Pages: 257