07-subnetting.pdf

30
Sub Networking Details by MAZHAR IQBAL BUTT. 1

Upload: suresh1776job

Post on 13-Aug-2015

23 views

Category:

Documents


0 download

DESCRIPTION

subnetting

TRANSCRIPT

Page 1: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.1

Page 2: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.2

In 1985, RFC 950 defined a standardprocedure for subnetting, means asingle IP class A, B, or C network isfurther divided into a smaller group ofhosts to form an IP sub-network.This technique is used to allow a singleIP network address to span multiplephysical networks. IP hosts shouldsupport subnetting. Subnetworks arecreated for security, manageability andperformance of hosts and networks andto reduce network congestion.

Page 3: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.3

MethodSome of the bits of the host ID

portion of an IP address isfurther divided into a physical

sub-network ID part and a hostID part.

The sub-network ID is used touniquely identify the different

sub-networks within a network.

Page 4: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.4

When is subnetting necessary?Subnetting is required when one network numberneeds to be distributed across multiple LAN segments.This may be the case in instances when:

• A company uses two or more types of LANtechnology (for example, Ethernet, Token Ring) ontheir network.

• Two network segments are restricted by distancelimitations (for example, remote offices linked viapoint-to-point circuit).

• Segments need to be localized for networkmanagement reasons (accounting segment, salessegment, etc.).

• Hosts which dominate most of the LAN bandwidthneed to be isolated.

Page 5: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.5

Subnetting is essentially the modification of asingle IP network to create two or morelogically visible sub-sections.It entails changing the subnet mask of the localnetwork number to produce an even number ofsmaller network numbers, each with acorresponding range of IP addresses.e.g. 255.255.255.0, 255.255.127.0,255.255.0.0.When a host "A" needs to communicate withanother host "B", it must know whether host"B" is in the same network or in a differentnetwork.

Page 6: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.6

If the host "B" is in the same networkthen host "A" can send the datagramdirectly to host "B". But if the host B is ina different network, then host "A" mustsend the datagram to a proper router.By determining the network class of theIP address of host "B", host "A" candetermine whether host "B" is in thesame network or in a different network.By using the subnet mask host "A" canfind out whether host "B" is in the samesubnet or in a different subnet.

Page 7: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.7

Every Network Starts from its NetworkID and ends with its Broadcast ID.

Start : 192.168.1.0 (Network ID)End : 192.168.1.255 (Broadcast ID)

A “classful” network is subnetted bydividing its host ID portion, leaving someof the bits for the host ID while allocatingothers to a new subnet ID.These bits are then used to identifyindividual subnets within the network,into which hosts are assigned.

Page 8: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.8

Advantages and DisadvantagesSubnetting is happened before workstationswere assigned IP addresses. This will allowmore flexibility in segment layout. Subnettingcan provide easier network managementcapabilities and also lends itself to fastertroubleshooting.The routing announcement of a network to theoutside world will still be based on singlenetwork number. That subnetting will decreasethe total amount of IP addresses available butmay require purchasing additional hardwaresuch as a router.

Page 9: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.9

Subnet Mask

Subnet mask is a 4 byte (32 bit) numberused to identify the sub-network ID andthe host ID from an IP address.

All the hosts in a sub-network will havethe same subnet mask.

The subnet mask is used to determinethe bits of the network

identifier. All hosts on the same networkshould have the same subnet mask.

Page 10: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.10

In a subnetting environment, the additionalinformation about which bits are for the subnetID and which for the host ID must becommunicated to devices that interpret IPaddresses.

This information is given in the form of a 32-bitbinary number called a subnet mask.

The term “mask” comes from the binarymathematics concept called bit masking. Thisis a technique where a special pattern of onesand zeroes can be used in combination withboolean functions such as AND and OR toselect or clear certain bits in a number.

Page 11: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.11

The subnet mask is a 32-bit binarynumber that accompanies an IP address.It is has a one bit for eachcorresponding bit of the IP address thatis part of its network ID or subnet ID,and a zero for each bit of the IPaddress’s host ID.

The mask thus tells TCP/IP devices whichbits in that IP address belong to thenetwork ID and subnet ID, and which arepart of the host ID.

Page 12: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.12

How It WorksAn IP address is a 32 bit number dividedinto 4 sections of 8 bits called octets.Each octet is converted from binary todecimal form and separated with a dot.The address is split into network andhost portion.The network portion always remainsfixed for a particular network, remainingbits make up the host portion can bealtered to give the range of addresses toassign to hosts.

Page 13: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.13

To determine where the network portion endsand the host portion begins, a subnet mask (ornetmask, or just mask) is used to fix thenetwork portion and allow the host portion tobe changed.For example, the IP number 38.9.211.0 witha subnet mask of 255.255.255.0. Changingto binary, we get:

So, the netmask as 24 bits, or /24 or 38.9.211.0/24

Page 14: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.14

The fixed bits become the networkportion and the remaining bits becomethe host portion, so there are 8 host bitswhich account for a range from 0-255.IP protocol standards dictate that we useaddresses of all 0's to refer to thenetwork as a whole, and addresses of all1's to refer to the broadcast of all hostson the network, so these host addressesmay not be used.This limits our host range from 1 - 254.

Page 15: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.15

Broadcast address of all hostson the network38.9.211.255

Range of valid hosts38.9.211.1 -38.9.211.254

The entire /24 network38.9.211.0/24

Page 16: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.16

After getting network number(/24, /25, or/27), we have the ability to extend the networkportion further into the host-number field bylengthening the netmask.The number of bits that you extend into theoriginal host portion determines how manysegments, or subnets, will be produced.Lengthening the mask by n bits will produce2^n subnets.If we used 2 subnet bits. The host portionwould be reduced to six bits. There are 4different combinations of arranging the 2subnet bits, so we arrive at 4 unique subnets.

Page 17: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.17

(.192 - .255)11000000 - 11111111Subnet 4

(.128 - .191)10000000 - 10111111Subnet 3

(.64 - .127)01000000 - 01111111Subnet 2

(.0 - .63)00000000 - 00111111Subnet 1

Each has 64 Elements.

Page 18: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.18

38.9.211.25538.9.211.193 -38.9.211.254

38.9.211.192/26

38.9.211.19138.9.211.129 -38.9.211.19038.9.211.128/26

38.9.211.12738.9.211.65 -38.9.211.126

38.9.211.64/26

38.9.211.6338.9.211.1 -38.9.211.6238.9.211.0/26

BroadcastHost RangesNetwork

Page 19: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.19

We have a Network ID of Class “C”:

192.168.1.0

and want to make 6 subnets. Class “C”IP address has pattern:

Net.Net.Net.Host

To break-up host portion into subnets,We will use 2n-2 formula by puttingvalues {n=0, 1, 2, 3, …} to get =6 or>=6.

Page 20: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.20

2n-2

For n=0 20-2=1-2=-1 <6

For n=1 21-2=2-2=0 <6

For n=2 22-2=4-2=2 <6

For n=3 23-2=8-2=6 =6

Value of n for required subnets is 3,so we will act upon 3 left most bitsof host portion.

Page 21: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.21

192

160

128

96

64

224

32

0

BID00000111

00000011

00000101

HOST IDNETORK ID

HOST(5 Remaining Bits)

SUBNET(3 Bits)

Net.Net.Net

0

0

0

0

0

1

0000001

0000110

0000010

0000100

NID0000000

248163264128

192.168.1.

Valid

Ran

ge

Page 22: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.22

62

63

33

32

BID11111100

01111100

HOST IDNETORK ID

HOST(5 Remaining Bits)

SUBNET(3 Bits)

Net.Net.Net

1

0

1

………

0000100

NID0000100

248163264128

Subnet-1

192.168.1.

Valid

Ran

ge

Page 23: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.23

94

95

65

64

BID11111010

01111010

HOST IDNETORK ID

HOST(5 Remaining Bits)

SUBNET(3 Bits)

Net.Net.Net

1

0

1

………

0000010

NID0000010

248163264128

Subnet-2

192.168.1.

Valid

Ran

ge

Page 24: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.24

Valid RangeBIDNIDSubnet StartsNo

193 to 222192.168.1.223192.168.1.192192.168.1.1926

161 to 190192.168.1.191192.168.1.160192.168.1.1605

129 to 158192.168.1.159192.168.1.128192.168.1.1284

97 to 126192.168.1.127192.168.1.96192.168.1.963

65 to 94192.168.1.95192.168.1.64192.168.1.642

33 to 62192.168.1.63192.168.1.32192.168.1.321

6-Subnets of 192.168.1.0 have following details

Page 25: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.25

1. STATIC LENGTH(FLSM-Fixed Length Subnet Mask)

2. VARIABLE LENGTH(VLSM-Variable Length Subnet Mask)

Page 26: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.26

Static Length SubnettingIf all the subnetworks in a single network usethe same subnet mask, it is called as 'StaticLength' subnetting.AdvantageIt is easy to configure a network using 'StaticLength' subnetting. In addition, native IProuting understands only static subnetting.DisadvantageA large number of IP addresses will be wastedbecause of Irrespective number of hosts in thesubnetwork and single subnet mask is used forall the subnetworks.

Page 27: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.27

Some Examples of FLSM values

255.255.255.128

255.255.255.192

255.255.255.224

255.255.255.240

255.255.255.248

255.255.255.252

255.128.0.0

255.192.0.0

255.224.0.0

255.240.0.0

255.248.0.0

255.252.0.0

255.254.0.0

255.255.0.0

255.255.128.0

255.255.192.0

255.255.224.0

255.255.240.0

255.255.248.0

255.255.252.0

255.255.254.0

255.255.255.0

Page 28: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.28

Variable Length SubnettingIf the different subnetworks in a single networkuse different subnet masks, it is called as'Variable Length' subnetting.AdvantageIP addresses are allocated depending on thenumber of hosts present in the subnetwork. Soavailable host IP addresses are efficiently usedand are not wasted.DisadvantageAll the routers in a 'Variable Length' subnettednetwork must understand this type ofsubnetting.

Page 29: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.29

Summary

The subnet addresses in which all the bits arezero or one, are special subnet IP addresses.

The subnet address in which all the bits arezero, represents the local subnetwork in whichthe datagram originated.

The subnet address in which all the bits areone represents a subnet broadcast address.

In the broadcast address, all the other bitsincluding the network and host ID must beone.

Page 30: 07-Subnetting.pdf

Sub Networking Details by MAZHAR IQBAL BUTT.30

Assignments

Class C Network ID

202.125.147.200

Default Subnet Mask

255.255.255.0

Find the Default Network ID, Broadcast ID

Divide Default Network ID into 10 Subnets