Académique Documents
Professionnel Documents
Culture Documents
Beginners:
IP Subnetting And
Binary Math For
Beginners - Learn
How To Easily Pass
Your CCNA!
Bonus Gift For You!
Get free access to your
complimentary book “Amazon
Book Bundle: Complete User
Guides To 5 Amazon
Products” by clicking the link
below.
>>>CLICK HERE TO
DOWNLOAD<<<
(or go to:
https://freebookpromo.leadpage
book-bundle/]
Copyright 2016 - All rights
reserved.
Introduction
Chapter 1: Fundamentals of
Networking and Subnetting
Chapter 2: Rules of IP
addresses
Chapter 3: Subnetting Basics
and Advantages
Chapter 4: What is
Supernetting and Variable
Length Subnet Mask?
Chapter 5: IPv6 for New
Generation
Chapter 6: Implementing
VLSM
Conclusion
Introduction
IP address
The world of subnetting is entirely based
on IP address. You need to understand
all the concepts related to IP address for
understanding subnetting. IP stands for
Internet Protocol. It is a code or address
in the form of a number that is given to
every router, server, computer and other
devices part of a network that is IP
based. It is a unique address that is
assigned to every network on IP for
identification. The whole building of
networking is based on IP address. Any
system cannot exist without it.
It is a 32-bit number which identifies the
sender and receiver of information
packets that are sent and received over
the internet. The address consists of two
parts, and one part consists of particular
network identifier while the other part
consists of the particular device
identifier.
Your device needs to know the IP
address of two devices, and one is its
own while other is the device wants to
communicate with. Every organization
server or router need a single valid IP
address for communication with other
servers over the internet.
If your friend wants to visit your place,
you will tell him or her your house
address. Similar is the case with IP
address if someone wants to
communicate with your server or
computer then you have to tell him or her
your IP address.
As computers, do not understand our
language, it only knows the binary
language. While computer doesn't have
any desire to learn our language, while
we need and want to understand
computers’ language as we have to
communicate with it. For an IP address,
a computer uses eight switches.
While for computer, it is not switches
but bits out of binary language. The
working of these bits is similar to that of
switches. You can say that as switches
have on and off option, similarly one is
for on option and 0 is for off option.
When eight different switches or bits
combined makes an IP address. The bits
are combined in various combinations.
Now you must be thinking that how many
combinations can be made using these 8
bits. You can figure out the answer by
using a simple mathematical formula. A
single bit can take one of the two
possible positions, so it is written as
2x1. While there are two bits, each bit
will represent each of the two positions,
so it is written as 2x2. Similar is the
case with three bits, and you will write
2x2x2.
1. Static IP address
As the word static depicts, it is a
permeant and fixed IP address. ISPs
(Internet Service Provider) assigns a
static IP address to the computers. SSL
encryption can only be used for the static
IP address. When you are sending, or
receiving any sensitive data, over the
internet than this encryption protects that
data. It also prevents any third party to
interfere or intercept the information.
2. Dynamic IP address
When you connect to a certain network,
the IP address assigned to you is called
Dynamic IP address. It is a temporary IP
address that ends when your connection
with that certain computer ends. When
you connect with the other computer, you
will get a new IP address.
The dynamic IP address is given by
DHCP to your computer or every other
computer when it gets connected to a
network. This IP address allows
temporary communication among two
different servers or networks. As soon
as the connection ends, this IP address is
discarded as well.
IP host
When a device can communicate with
any other device that means it can send
and receive data or information in the
form of packets using an IP address, such
device is called IP host.
Chapter 2: Rules of IP
addresses
Duplicate Address
If you do not register or document your
IP address, there is a chance that a
duplicate address may be created. By
recording your IP address, you can keep
it unique and avoid the copying or
duplication of that specified address.
Chapter 3: Subnetting
Basics and Advantages
Classful addressing
The IP addresses in classful addressing
are divided into five classes including
A, B, C, D and E. The class A, class B
and class C are the classes that are
frequently used while Class D is used
only for multicast and is occasionally
used. The class E is not used currently
and is reserved. Each of the IP address
in classful addressing is part of any of
these classes.
Initially, the classes IP addressing has no
name. When the name classless IP
address is derived then it is also named
as classful IP addressing. The main
disadvantage that you will have to bear
while using classful IP address is that it
lacks flexibility. A number of complete
address that is assigned to a certain
device is also restricted.
The information sent to classful IP
address is sent to the whole system
rather than that specific subnet. A subnet
based over the locally configured
subnets will be supplied by a router.
When the subnet mask is similar, classful
IP addressing can be used by a certain
group of networks.
Classes of IP address
Each IP class can have a fixed number of
a host as well as a fixed number of
networks. There is no flexibility
regarding the number of hosts and
networks in any certain class. You can
only have those the fixed numbers for the
proper working of the system. The
contrast from this one, classless routing
is flexible where you can have the
number of hosts and networks according
to go to your choice.
1. Class A subnets
The first octet in the subnets that
belonged to class A is Network
identifier while the other three octets are
for Hosts. For making a subnet in class
A, subnet mask is changed and bits are
borrowed from the Host part of address.
Network Subnet Bits Subn
Bits Mask borrowed
8 255.0.0.0 0 1
9 255.128.0.0 1 2
10 255.192.0.0 2 4
11 255.224.0.0 3 8
12 255.248.0.0 4 16
13 255.254.0.0 5 32
14 255.255.0.0 6 64
1. Class B subnets
You can increase the number of subnets
in class B in the similar way as it is
done in class A that is by borrowing bits
from the Host part of the address.
Fourteen bits are used as the network
bits that provides 214 networks which is
equal to 16384 while 216-2 hosts that is
equal to 65534.
Network Subnet Mask Bits Su
Bits borrowed
16 255.255.0.0 0 0
17 255.255.128.0 1 2
18 255.255.192.0 2 4
19 255.255.224.0 3 8
20 255.255.240.0 4 16
21 255.255.248.0 5 32
2. Class C subnets
It is a type of class that is suitable and
assigned to a network that has small
size. It is given to a small network as it
only contains 254 host.
Network Subnet Mask Bits
Bits borrowed
24 255.255.255.0 0
25 255.255.255.128 1
26 255.255.255.192 2
27 255.255.255.224 3
28 255.255.255.240 4
29 255.255.255.248 5
30 255.255.255.252 6
Classless IP addressing
The system of classless IP address is
also known as Classless Inter-Domain
Routing (CIDR). It is a flexible way of
allocating domains or IP addresses to the
networks. It is not fixed as that of the
classful IP address. For example, if a
person needs hosts more than 254 but
less than 65533, then there is no option
other than to choose class B. With the
invention of CIDR, the internet is getting
consumed with IP address, and space is
getting short. It made the mechanism
easy by not fixing any certain value and
then dividing it into various classes.
• Block size
A valid subnet is calculated with the
help of block size which is a number that
defines the total size of a block. A host
address, network address, and a
broadcast address are included in block
size.
Block size = Subnet mask – 256
• Total hosts
The number of hosts that are present
over a certain subnet is known as total
hosts.
Total Hosts = 2H (H refers to the number
of hosts)
• Valid hosts
Valid hosts are the one that can be
assigned to the devices. You can find out
the total number of valid hosts by taking
out two from the total hosts.
Valid host = Total hosts – 2
Broadcast address
Broadcast address refers to the last
address of any subnet. It can only be
used by network ID and any other host
cannot use it.
IPv4
The first version of IP that was used by
the public was IPv4. DARPA agency
located in US Department of Defense
agency designed this version. It laid the
foundation of World Wide Web and
internet as well. It contains numbers that
are equal to 32 bits. Quad-dotted
notation is used for writing such kind of
IP addresses. It has a capacity to create
almost 4.4 billion of IP addresses.
Well the main aim behind its designing
was to test a networking concept. With
the passage of time, it became a tool that
take the networking space. When the
concept of classless addressing
emerged, it became evident that few
changes are required in the world of
networking and few improvements are
needed in IPv4 version.
Chapter 4: What is
Supernetting and Variable
Length Subnet Mask?
You may have heard about the
supernetting, and it confuses you that
what this concept refers to. The simplest
definition of supernetting, when you are
aware of the subnetting concept, it is
opposite to subnetting. In supernetting,
an IP address is created for the purpose
of routing. Two or more than two small
subnets are combined for making a large
segment of a network.
Main features
IPv6 is loaded with a number of worthy
features, some of which are given as
under.
One of the primary features that it
offers is a better addressing space
It simplifies the operations of IP
address and numbering system of
networks
The responsibility of fragmentation
of packets is placed over the end
points that simplify the mechanism of
routers packets
The portion of host identifier in IPv6
is limited to 64 bits that gives a
standard size of a subnet
It does not follow the procedure of
IPv4 or move forward over its
footprints but it is an independent IP
network
Translator gateways are required for
transferring data or information in
between IPv4 and IPv6
Addressing
The addresses of IPv6 has 128 bits. The
design of the address of IPv6 is quite
different from that of the design of the
IPv4. By having this design, subnetting is
done for improving the efficiency of the
network as it utilizes the small space of
address. The space of IPv6 is large
enough that you can use it easily in
future.
Representation of address
There are eight groups of total 128 bits
of IPv6 where each of the group has 16
bits. Each of the group is written in 4
hexadecimal numbers. Each of the group
is separated by colons.
You can shorten the address in IPv6 into
small notation by following two basic
rules,
Remove the one or more than one
leading zeros from any of the IP
address group, and you can either
remove all zeros or not even a single
one.
The consecutive zeros are replaced
by double colons. You can use these
double colons once in the address
Domain Name System of IPv6
In Domain Name System, AAAA source
records are used for mapping of
hostnames known as quad-A records.
The domain is reserved by the IETF,
where the name of the domain is divided
hierarchically.
Software of IPv6
The host software can handle only one
form either IPv4 and IPv6 or it can also
support dual-stack of both IP addresses
in your software. Most of the computers
that are working under the recent
operating systems supports IPv6.
How IPv6 will affect?
Though the IP address do not have a
major effect on your life but with the
passage of time, it is becoming the need.
One of the major reason that you need to
switch from IPv4 to IPv6, like most, of
the operating systems today support
IPv6. Still there are various devices like
servers and routers that do not support
IPv6. There are still many bugs and
security lapses in IPv6 as it is still in the
growing period.
With the passage of time, manufacturers
are trying to fix these problems. As IPv6
offers more features than that of IPv4.
Therefore, it is better to use the updated
version rather than an outdated version.
No matter you will have to pay few
more bucks for getting the system
installed but your web will function in a
better way.
Chapter 6: Implementing
VLSM
Implementing VLSM
A person need to understand all the data
about the available hosts and blocks of
IP address for implementing VLSM in an
efficient way. You can memorize this
information by creating a table
containing VLSM networks. The table
given below shows the subnetting
process for a subnet of Class C.
Subnet Block Mask Hosts
Prefix Size
26 64 255.255.255.192 62
27 32 255.255.255.224 30
28 14 255.255.255.240 14
29 6 255.255.255.248 6
30 2 255.255.255.252 2
Tips
Following are tips that will help you out
while making the tables for a
preparation of the CCNA tests.
Keep in your mind that for increasing
the size of subnet, bits are taken from
the host part of the address and is
added to the network part
IP address are different when it has
different network bits that mean that
those IP addresses are meant for two
different systems
An IP address must have the total 32
bits
Out of those 32 bits, the host part of
the address must have at least 2 bits
while the network bits must have
minimum of 8 bits
IP address class is fixed and
predefined, and no one can change
the class of any certain address
Subnets are different from ordinary
processing as they move from right
to left rather than left to right
Any host can be assigned a network
address as it is reserved
Similar to network address,
broadcast address cannot be
assigned to any host as well as it is
also reserved
The bits that are allocated to a class
initially cannot be altered
Number of bits and octet in any
subnet can be identified by a subnet
mask
CCNA exams
CCNA stands for Cisco Certified
Network Associate, which is a form of
an exam. It tests or asks about the
general knowledge of candidate related
to the networking process. Subnetting is
a major part of CCNA exams that
includes many numerical sums related to
it.
As subnetting includes a number of
formulas and classes, therefore, you
need to remember all the formulas for
getting good grades in it. Installation,
operation, and configuration of different
networks and routes are also asked. A
person must have any ability to connect
to a number of different WLAN sites
along with verification of this
connection.
Conclusion