SlideShare a Scribd company logo
1 of 28
Ch. 7 Subnetting and Other
    Masking Acrobatics
         Bruce Hartpence
 The Packet Guide to Core Network
             Protocols
Introduction
• Let’s start with the idea of a network
  – The 10,000 foot view is that it is a bunch of
    computers connected together
  – But the technical view is a little more precise
• Computers on the same network
  – Share the same IP address range
  – Have the same default gateway (router)
  – Have the same broadcast address
What is a Mask?
• 192.168.100.0 255.255.255.0
• Used to determine the network for a host
• Also used by routers to determine forwarding
  information
• The normal or natural network mask
  (netmask) is defined by address class type
• Not much flexibility
How do we use the mask?



•Classes vary in size and the number of hosts.
    •Each class has it’s own address range and mask.
•Early networks could be given an entire class.
    •For example, RIT has a Class B network address.
•But, this is inefficient and with more and more folks desiring
connectivity, was not sustainable.
Logical AND

 AND gate
Example: Class C network host
           200.150.100.95
• Steps 1 & 2: Convert the address and mask to
  binary
  11001000.10010110.01100100.01011111
  11111111.11111111.11111111.00000000
• Perform the ANDing operation from RT to LT
  11001000.10010110.01100100.00000000
• Convert back to base 10 numbers
  200.150.100.0
• Easy right?
IP packets
• Network Masks
  are not included
  in the IP packet
• All of the
  processing is
  done on devices
• But, you never
  know the mask
  for the other
  end
Revisiting the mask structure
• From the class structure
  – for a class A address: 255.0.0.0
  – for a class B address: 255.255.0.0
  – for a class C address: 255.255.255.0
• When we convert to binary
  – There 1’s indicate the network portion
  – The 0’s indicate the host portion
From an earlier chapter




• So for our example, the network address is 200.150.100.0 (all
  0’s) and the broadcast address is 200.150.100.255 (all 1’s)
• This also means that after ANDing, the host addresses from
  200.150.100.1 to 200.150.100.254 are on the same network.
What is a subnet?
• “Logically visible sub-      • Created by
  sections” RFC 917              manipulating the
• Work exactly like the          network mask
  classful network and         • This splits the network
  they still have:               into smaller networks
   – Network (subnetwork)      • Bits are “stolen” from
     address                     the host portion of the
   – Broadcast address           network
   – All hosts on the subnet
     typically use the same
                               • A third portion is added
     gateway                     to the IP address
OK, we can subnet but why?
• As a network grows in terms of the number of
  hosts, the traffic grows as well
  – Broadcast (ARP, Windows, DHCP, etc.)
• Users or departments may have varying
  security concerns
• The desire to provide different quality of
  service options
• Other overhead: SNMP, routing
• Rule of thumb: 100/30
Subnet behavior
• Local traffic is limited to the subnet
  – ARP traffic (and everything else) is now limited
  – Limited broadcast address 255.255.255.255
  – Broadcast frame address ff-ff-ff-ff-ff-ff
• MAC addresses belong to the subnet, not the
  classful network
• A router (or routing function) is required to
  get traffic between subnets
So how do you decide?
• First, how many subnets do you need?
  –   Organization of the groups
  –   Addresses required
  –   Growth
  –   Current equipment
• Once this has been determined, “steal the bits”
  – Number of bits stolen is determined by the number of
    required subnets
  – In the host portion, work to the right, converting 0s to
    1’s as you go
Common subnet patterns
• As bits are stolen, the number of subnets
  increases and the number of hosts/subnet
  decreases
Simple example
• A company desires 4 internal subnets within their
  200.150.100.0 network
• This requires 2 bits to be stolen because there are
  four possibilities in 2 bits
   – 00, 01, 10, 11
   – These are seen in the subnet field
   – Stolen bits are revealed in the mask
• New mask
   – Instead of 255.255.255.0 we have 255.255.255.192
Wait, how did this work?
• The classful network characteristics
  – Network 200.150.100.0 mask 255.255.255.0
  – Low useable address 200.150.100.1
  – High useable address 200.150.100.254
     • Often for the router
  – Broadcast address 200.150.100.255
• ANDing puts everyone on the same network
• Mask binary
  11111111.11111111.11111111.00000000
       Network portion       Host portion
Con’t
• Stealing 2 bits changes the mask
  – 255.255.255.192
  – 11111111.11111111.11111111.11000000
• The red bits represent the subnet field
• But what about the binary patterns?
  – The classful network address
  – 200.150.100.0
  – 11001000.10010110.01100100.00000000
  – The red bits are affected by the change to the
    mask
New subnet values
• Mask for all: 255.255.255.192
• Network ranges
  – Subnet ID           Subnet broadcast
  – 200.150.100.0 –     200.150.100.63
  – 200.150.100.64 –    200.150.100.127
  – 200.150.100.128 –   200.150.100.191
  – 200.150.100.192 –   200.150.100.255
Let’s look at an example address
• Node IP address: 200.150.100.137
  • Binary: 11001000.10010110.01100100.10001011
• Subnet mask: 255.255.255.192
  • Binary: 11111111.11111111.11111111.11000000
• AND
  • 11001000.10010110.01100100.10001011
  • 11111111.11111111.11111111.11000000
  • 11001000.10010110.01100100.10000000
• Base 10: 200.150.100.128
   • This is the new subnet for this node
Binary value details
• Node 200.150.100.137
   • 11001000.10010110.01100100.10001011
• Subnet mask: 255.255.255.192
  • 11111111.11111111.11111111.11000000
• Put all 0’s in for the host portion, you get the subnet
  ID
  • 11001000.10010110.01100100.10000000
• Put all 1’s in the host portion, you get the broadcast
  address
  • 11001000.10010110.01100100.10111111
Another look at the binary patterns
• Subnet address and binary
•   200.150.100.0:     11001000.10010110.01100100.00000000
•   200.150.100.64:    11001000.10010110.01100100.01000000
•   200.150.100.128:   11001000.10010110.01100100.10000000
•   200.150.100.192:   11001000.10010110.01100100.11000000
• So, where are the routers?
    –   200.150.100.62
    –   200.150.100.126
    –   200.150.100.190
    –   200.150.100.254
Another problem: 2 techniques
• Problem: Class B network 172.30.0.0, 8 subnets
  desired
  – Another way to ask this is “How many hosts do you
    need in each subnet?”
• Method 1 – Algebra
  –   How many hosts total? 65536
  –   How many subnets? 8
  –   Hosts/subnet? 65536/8 = 8192
  –   Bits for subnets? 3
  –   Mask? 255.255.224.0
  –   Always start at the classful network address.
Subnets
• The only tough question: What does 8191 look like in
  dotted quad notation?
• 172.30.0.0 - 172.30.31.255
• What is the next possible value?
    – 172.30.32.0 – this is the next subnet? Follow the pattern.
•   172.30.32.0 – 172.30.63.255
•   172.30.64.0 – 172.30.95.255
•   172.30.96.0 – 172.30.127.255
•   172.30.128.0 – 172.30.159.255
•   172.30.160.0 – 172.30.191.255
•   172.30.192.0 – 172.30.223.255
•   172.30.224.0 – 172.30.225.255
Method 2 – to the binary!
• Having selected the mask, start at the classful address
  and work through the binary patterns (172.30.0.0)
   –   172.30.00000000.00000000
   –   172.30.00100000.00000000
   –   172.30.01000000.00000000
   –   172.30.01100000.00000000
   –   172.30.10000000.00000000
   –   172.30.10100000.00000000
   –   172.30.11000000.00000000
   –   172.30.11100000.00000000
• Remember that these are the subnet addresses
Upper end of the range
• Broadcast addresses insert 1’s in the host portion
  –   172.30.00011111.11111111 (172.30.31.255)
  –   172.30.00111111.11111111
  –   172.30.01011111.11111111
  –   172.30.01111111.11111111
  –   172.30.10011111.11111111
  –   172.30.10111111.11111111
  –   172.30.11011111.11111111
  –   172.30.11111111.11111111
• Routers would typically be high/low in the range
Review and other ideas
• You should be able to go back to the simpler
  example and work both techniques
• Related ideas
  – Supernetting (combining networks)
  – Classless inter-domain routing (CIDR)
  – Variable length subnet masks (VLSM)
  – Aggregation
• All of these represent different ways to
  manipulate address space via the subnet mask
Thanks!
• Questions?
• Bruce.hartpence@rit.edu
• Keep an eye out for podcasts on itunes
Visit http://oreilly.com
                                       to purchase your copy
                                       of Core Network
                                       Protocols and enter
                                       code 4CAST to save
                                       40% off print book &
                                       50% off ebook with
                                       special code 4CAST



Visit http://oreilly.com webcasts to view upcoming webcasts and online events.

More Related Content

What's hot (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnets
SubnetsSubnets
Subnets
 
Subneting
SubnetingSubneting
Subneting
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
Vlsm
VlsmVlsm
Vlsm
 
Subnetting
SubnettingSubnetting
Subnetting
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)CCNA IP Address Presentation(Part 1)
CCNA IP Address Presentation(Part 1)
 
Subnetting
SubnettingSubnetting
Subnetting
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
CCNA part 2 ip addressing
CCNA part 2 ip addressingCCNA part 2 ip addressing
CCNA part 2 ip addressing
 

Viewers also liked

Search Different Understanding Apple's New Search Engine State of Search 2016
Search Different   Understanding Apple's New Search Engine State of Search 2016Search Different   Understanding Apple's New Search Engine State of Search 2016
Search Different Understanding Apple's New Search Engine State of Search 2016Andrew Shotland
 
WattzOn Personal Energy Audit
WattzOn Personal Energy AuditWattzOn Personal Energy Audit
WattzOn Personal Energy AuditWeb 2.0 Expo
 
A Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime WebA Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime WebHilary Mason
 
Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1O'Reilly Media
 
But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?gagravarr
 
Voice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, GermanyVoice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, GermanyMarc René Gardeya
 
Nov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars georgeNov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars georgeO'Reilly Media
 
Apple earnings q4-2010
Apple earnings q4-2010Apple earnings q4-2010
Apple earnings q4-2010O'Reilly Media
 
InsideRIA Outlook for 2009
InsideRIA Outlook for 2009InsideRIA Outlook for 2009
InsideRIA Outlook for 2009AndreCharland
 
Visual Experience 360 Flex
Visual Experience 360 FlexVisual Experience 360 Flex
Visual Experience 360 FlexJuan Sanchez
 
U.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - PresentU.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - PresentO'Reilly Media
 
Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2O'Reilly Media
 
Souders WPO Web 2.0 Expo
Souders WPO Web 2.0 ExpoSouders WPO Web 2.0 Expo
Souders WPO Web 2.0 ExpoSteve Souders
 
12 13 what is desktop virtualization
12 13 what is desktop virtualization12 13 what is desktop virtualization
12 13 what is desktop virtualizationO'Reilly Media
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven DevelopmentJohn Blanco
 
Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012Ronald Lenz
 

Viewers also liked (20)

Search Different Understanding Apple's New Search Engine State of Search 2016
Search Different   Understanding Apple's New Search Engine State of Search 2016Search Different   Understanding Apple's New Search Engine State of Search 2016
Search Different Understanding Apple's New Search Engine State of Search 2016
 
WattzOn Personal Energy Audit
WattzOn Personal Energy AuditWattzOn Personal Energy Audit
WattzOn Personal Energy Audit
 
A Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime WebA Data-driven Look at the Realtime Web
A Data-driven Look at the Realtime Web
 
Hoppala at XMediaLab
Hoppala at XMediaLabHoppala at XMediaLab
Hoppala at XMediaLab
 
Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1Twitter Webcast Power Tips, Pt 1
Twitter Webcast Power Tips, Pt 1
 
But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?But we're already open source! Why would I want to bring my code to Apache?
But we're already open source! Why would I want to bring my code to Apache?
 
Voice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, GermanyVoice+IP Conference Frankfurt, Germany
Voice+IP Conference Frankfurt, Germany
 
Nov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars georgeNov. 4, 2011 o reilly webcast-hbase- lars george
Nov. 4, 2011 o reilly webcast-hbase- lars george
 
Apple earnings q4-2010
Apple earnings q4-2010Apple earnings q4-2010
Apple earnings q4-2010
 
InsideRIA Outlook for 2009
InsideRIA Outlook for 2009InsideRIA Outlook for 2009
InsideRIA Outlook for 2009
 
Visual Experience 360 Flex
Visual Experience 360 FlexVisual Experience 360 Flex
Visual Experience 360 Flex
 
U.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - PresentU.S. Senate Social Graph, 1991 - Present
U.S. Senate Social Graph, 1991 - Present
 
Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2Twitter Webcast Power Tips, Pt 2
Twitter Webcast Power Tips, Pt 2
 
Souders WPO Web 2.0 Expo
Souders WPO Web 2.0 ExpoSouders WPO Web 2.0 Expo
Souders WPO Web 2.0 Expo
 
12 13 what is desktop virtualization
12 13 what is desktop virtualization12 13 what is desktop virtualization
12 13 what is desktop virtualization
 
Mate
MateMate
Mate
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
 
Allister Frost Speaker Biography
Allister Frost Speaker BiographyAllister Frost Speaker Biography
Allister Frost Speaker Biography
 
Hoppala at ARE2011
Hoppala at ARE2011Hoppala at ARE2011
Hoppala at ARE2011
 
Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012Citizen Science on the Move conference 25, 26 & 27 june 2012
Citizen Science on the Move conference 25, 26 & 27 june 2012
 

Similar to Oct. 14, 2011 webcast ch7 subnets bruce hartpence

08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.pptssuserf7cd2b
 
Chapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingChapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingVishnu Vardhan
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptxaida alsamawi
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptFaysalAhamed32
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7mlrbrown
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).pptjaycallaga
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and SubnettingAtakan ATAK
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 conceptsJAIGANESH SEKAR
 

Similar to Oct. 14, 2011 webcast ch7 subnets bruce hartpence (20)

08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.ppt
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
Chapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routingChapter 3. fundamentals of wan and ip routing
Chapter 3. fundamentals of wan and ip routing
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptx
 
Mod10
Mod10Mod10
Mod10
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.ppt
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt8-Additional_IPSubnetting_KED (2).ppt
8-Additional_IPSubnetting_KED (2).ppt
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
CCNP Routing
CCNP Routing CCNP Routing
CCNP Routing
 
CCNP Routing Workbook
CCNP Routing WorkbookCCNP Routing Workbook
CCNP Routing Workbook
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
Mod6
Mod6Mod6
Mod6
 

More from O'Reilly Media

2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloudO'Reilly Media
 
2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankings2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankingsO'Reilly Media
 
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+O'Reilly Media
 
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...O'Reilly Media
 
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...O'Reilly Media
 
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standardsOct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standardsO'Reilly Media
 
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast   desiging mobile interfaces by steven hooberNov. 8, 2011 webcast   desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast desiging mobile interfaces by steven hooberO'Reilly Media
 
Oct. 25. 2011 webcast conduct aninterview
Oct. 25. 2011 webcast   conduct aninterviewOct. 25. 2011 webcast   conduct aninterview
Oct. 25. 2011 webcast conduct aninterviewO'Reilly Media
 
Nov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projectsNov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projectsO'Reilly Media
 
What's New & Cool in Drupal 7
What's New & Cool in Drupal 7What's New & Cool in Drupal 7
What's New & Cool in Drupal 7O'Reilly Media
 
Dealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter ScottDealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter ScottO'Reilly Media
 
The Science of Social Media
The Science of Social MediaThe Science of Social Media
The Science of Social MediaO'Reilly Media
 
Web 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalWeb 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalO'Reilly Media
 
O'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The CloudO'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The CloudO'Reilly Media
 
Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009O'Reilly Media
 
Facebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief UpdateFacebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief UpdateO'Reilly Media
 
U.S. iTunes App Store: Sellers
U.S. iTunes App Store: SellersU.S. iTunes App Store: Sellers
U.S. iTunes App Store: SellersO'Reilly Media
 
The What Why And Who Of Xbrl
The What Why And Who Of XbrlThe What Why And Who Of Xbrl
The What Why And Who Of XbrlO'Reilly Media
 

More from O'Reilly Media (20)

2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud2 3-2012 Take Control of iCloud
2 3-2012 Take Control of iCloud
 
2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankings2 7-2012 Google how links boost rankings
2 7-2012 Google how links boost rankings
 
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
 
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...Sept. 28, 2011 webcast become an expert google searcher in an hour   stephan ...
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
 
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
 
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standardsOct. 27, 2011 webcast practical and pragmatic application of pmi standards
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
 
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast   desiging mobile interfaces by steven hooberNov. 8, 2011 webcast   desiging mobile interfaces by steven hoober
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
 
Oct. 25. 2011 webcast conduct aninterview
Oct. 25. 2011 webcast   conduct aninterviewOct. 25. 2011 webcast   conduct aninterview
Oct. 25. 2011 webcast conduct aninterview
 
Nov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projectsNov. 15, 2011 dani nordin talking to clients about drupal projects
Nov. 15, 2011 dani nordin talking to clients about drupal projects
 
What's New & Cool in Drupal 7
What's New & Cool in Drupal 7What's New & Cool in Drupal 7
What's New & Cool in Drupal 7
 
Dealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter ScottDealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter Scott
 
The Science of Social Media
The Science of Social MediaThe Science of Social Media
The Science of Social Media
 
Web 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning ProposalWeb 2.0 Expo Ny--How to Submit a Winning Proposal
Web 2.0 Expo Ny--How to Submit a Winning Proposal
 
2009 Research Where
2009 Research Where2009 Research Where
2009 Research Where
 
O'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The CloudO'Reilly Webcast: Architecting Applications For The Cloud
O'Reilly Webcast: Architecting Applications For The Cloud
 
Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009Active Facebook Users By Country & Region: August 2009
Active Facebook Users By Country & Region: August 2009
 
Web Squared
Web SquaredWeb Squared
Web Squared
 
Facebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief UpdateFacebook and Myspace App Platforms: A Brief Update
Facebook and Myspace App Platforms: A Brief Update
 
U.S. iTunes App Store: Sellers
U.S. iTunes App Store: SellersU.S. iTunes App Store: Sellers
U.S. iTunes App Store: Sellers
 
The What Why And Who Of Xbrl
The What Why And Who Of XbrlThe What Why And Who Of Xbrl
The What Why And Who Of Xbrl
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Oct. 14, 2011 webcast ch7 subnets bruce hartpence

  • 1. Ch. 7 Subnetting and Other Masking Acrobatics Bruce Hartpence The Packet Guide to Core Network Protocols
  • 2. Introduction • Let’s start with the idea of a network – The 10,000 foot view is that it is a bunch of computers connected together – But the technical view is a little more precise • Computers on the same network – Share the same IP address range – Have the same default gateway (router) – Have the same broadcast address
  • 3. What is a Mask? • 192.168.100.0 255.255.255.0 • Used to determine the network for a host • Also used by routers to determine forwarding information • The normal or natural network mask (netmask) is defined by address class type • Not much flexibility
  • 4. How do we use the mask? •Classes vary in size and the number of hosts. •Each class has it’s own address range and mask. •Early networks could be given an entire class. •For example, RIT has a Class B network address. •But, this is inefficient and with more and more folks desiring connectivity, was not sustainable.
  • 6. Example: Class C network host 200.150.100.95 • Steps 1 & 2: Convert the address and mask to binary 11001000.10010110.01100100.01011111 11111111.11111111.11111111.00000000 • Perform the ANDing operation from RT to LT 11001000.10010110.01100100.00000000 • Convert back to base 10 numbers 200.150.100.0 • Easy right?
  • 7. IP packets • Network Masks are not included in the IP packet • All of the processing is done on devices • But, you never know the mask for the other end
  • 8. Revisiting the mask structure • From the class structure – for a class A address: 255.0.0.0 – for a class B address: 255.255.0.0 – for a class C address: 255.255.255.0 • When we convert to binary – There 1’s indicate the network portion – The 0’s indicate the host portion
  • 9. From an earlier chapter • So for our example, the network address is 200.150.100.0 (all 0’s) and the broadcast address is 200.150.100.255 (all 1’s) • This also means that after ANDing, the host addresses from 200.150.100.1 to 200.150.100.254 are on the same network.
  • 10. What is a subnet? • “Logically visible sub- • Created by sections” RFC 917 manipulating the • Work exactly like the network mask classful network and • This splits the network they still have: into smaller networks – Network (subnetwork) • Bits are “stolen” from address the host portion of the – Broadcast address network – All hosts on the subnet typically use the same • A third portion is added gateway to the IP address
  • 11. OK, we can subnet but why? • As a network grows in terms of the number of hosts, the traffic grows as well – Broadcast (ARP, Windows, DHCP, etc.) • Users or departments may have varying security concerns • The desire to provide different quality of service options • Other overhead: SNMP, routing • Rule of thumb: 100/30
  • 12. Subnet behavior • Local traffic is limited to the subnet – ARP traffic (and everything else) is now limited – Limited broadcast address 255.255.255.255 – Broadcast frame address ff-ff-ff-ff-ff-ff • MAC addresses belong to the subnet, not the classful network • A router (or routing function) is required to get traffic between subnets
  • 13. So how do you decide? • First, how many subnets do you need? – Organization of the groups – Addresses required – Growth – Current equipment • Once this has been determined, “steal the bits” – Number of bits stolen is determined by the number of required subnets – In the host portion, work to the right, converting 0s to 1’s as you go
  • 14. Common subnet patterns • As bits are stolen, the number of subnets increases and the number of hosts/subnet decreases
  • 15. Simple example • A company desires 4 internal subnets within their 200.150.100.0 network • This requires 2 bits to be stolen because there are four possibilities in 2 bits – 00, 01, 10, 11 – These are seen in the subnet field – Stolen bits are revealed in the mask • New mask – Instead of 255.255.255.0 we have 255.255.255.192
  • 16. Wait, how did this work? • The classful network characteristics – Network 200.150.100.0 mask 255.255.255.0 – Low useable address 200.150.100.1 – High useable address 200.150.100.254 • Often for the router – Broadcast address 200.150.100.255 • ANDing puts everyone on the same network • Mask binary 11111111.11111111.11111111.00000000 Network portion Host portion
  • 17. Con’t • Stealing 2 bits changes the mask – 255.255.255.192 – 11111111.11111111.11111111.11000000 • The red bits represent the subnet field • But what about the binary patterns? – The classful network address – 200.150.100.0 – 11001000.10010110.01100100.00000000 – The red bits are affected by the change to the mask
  • 18. New subnet values • Mask for all: 255.255.255.192 • Network ranges – Subnet ID Subnet broadcast – 200.150.100.0 – 200.150.100.63 – 200.150.100.64 – 200.150.100.127 – 200.150.100.128 – 200.150.100.191 – 200.150.100.192 – 200.150.100.255
  • 19. Let’s look at an example address • Node IP address: 200.150.100.137 • Binary: 11001000.10010110.01100100.10001011 • Subnet mask: 255.255.255.192 • Binary: 11111111.11111111.11111111.11000000 • AND • 11001000.10010110.01100100.10001011 • 11111111.11111111.11111111.11000000 • 11001000.10010110.01100100.10000000 • Base 10: 200.150.100.128 • This is the new subnet for this node
  • 20. Binary value details • Node 200.150.100.137 • 11001000.10010110.01100100.10001011 • Subnet mask: 255.255.255.192 • 11111111.11111111.11111111.11000000 • Put all 0’s in for the host portion, you get the subnet ID • 11001000.10010110.01100100.10000000 • Put all 1’s in the host portion, you get the broadcast address • 11001000.10010110.01100100.10111111
  • 21. Another look at the binary patterns • Subnet address and binary • 200.150.100.0: 11001000.10010110.01100100.00000000 • 200.150.100.64: 11001000.10010110.01100100.01000000 • 200.150.100.128: 11001000.10010110.01100100.10000000 • 200.150.100.192: 11001000.10010110.01100100.11000000 • So, where are the routers? – 200.150.100.62 – 200.150.100.126 – 200.150.100.190 – 200.150.100.254
  • 22. Another problem: 2 techniques • Problem: Class B network 172.30.0.0, 8 subnets desired – Another way to ask this is “How many hosts do you need in each subnet?” • Method 1 – Algebra – How many hosts total? 65536 – How many subnets? 8 – Hosts/subnet? 65536/8 = 8192 – Bits for subnets? 3 – Mask? 255.255.224.0 – Always start at the classful network address.
  • 23. Subnets • The only tough question: What does 8191 look like in dotted quad notation? • 172.30.0.0 - 172.30.31.255 • What is the next possible value? – 172.30.32.0 – this is the next subnet? Follow the pattern. • 172.30.32.0 – 172.30.63.255 • 172.30.64.0 – 172.30.95.255 • 172.30.96.0 – 172.30.127.255 • 172.30.128.0 – 172.30.159.255 • 172.30.160.0 – 172.30.191.255 • 172.30.192.0 – 172.30.223.255 • 172.30.224.0 – 172.30.225.255
  • 24. Method 2 – to the binary! • Having selected the mask, start at the classful address and work through the binary patterns (172.30.0.0) – 172.30.00000000.00000000 – 172.30.00100000.00000000 – 172.30.01000000.00000000 – 172.30.01100000.00000000 – 172.30.10000000.00000000 – 172.30.10100000.00000000 – 172.30.11000000.00000000 – 172.30.11100000.00000000 • Remember that these are the subnet addresses
  • 25. Upper end of the range • Broadcast addresses insert 1’s in the host portion – 172.30.00011111.11111111 (172.30.31.255) – 172.30.00111111.11111111 – 172.30.01011111.11111111 – 172.30.01111111.11111111 – 172.30.10011111.11111111 – 172.30.10111111.11111111 – 172.30.11011111.11111111 – 172.30.11111111.11111111 • Routers would typically be high/low in the range
  • 26. Review and other ideas • You should be able to go back to the simpler example and work both techniques • Related ideas – Supernetting (combining networks) – Classless inter-domain routing (CIDR) – Variable length subnet masks (VLSM) – Aggregation • All of these represent different ways to manipulate address space via the subnet mask
  • 27. Thanks! • Questions? • Bruce.hartpence@rit.edu • Keep an eye out for podcasts on itunes
  • 28. Visit http://oreilly.com to purchase your copy of Core Network Protocols and enter code 4CAST to save 40% off print book & 50% off ebook with special code 4CAST Visit http://oreilly.com webcasts to view upcoming webcasts and online events.