Académique Documents
Professionnel Documents
Culture Documents
• So now we have
192.168.10.1/27 – 192.168.10.30/27 ntk 1
192.168.10.33/27 - 192.168.10.62/27 ntk 2
upto …
192.168.10.225/27 - 192.168.10.254/27 ntk 8
Exercise
• You have been allocated a class A network address of 29.0.0.0. You need to
create at least 20 networks and each network will support of 1000 hosts. What
are the possible subnet masks?
• Subnet the Class C IP address 195.1.1.0. So that you have to create at least 4
subnets each subnet must have room for 48 hosts . What are the possible subnet
masks? Do full subnetting.
• Do full subnetting for the following addresses.
1. 192.168.10.0/28
2. 192.0.10.0/30
VLSM (Variable length subnet mask)
• In all of the previous examples of subnetting, notice that the same subnet mask
was applied for all the subnets.
• This means that each subnet has the same number of available host addresses.
• You can need this in some cases, but, in most cases, having the same subnet mask
for all subnets ends up wasting address space.
• For example, the Class C network of 204.15.5.0, subnet the network in to 5
subnets in order to create the network with the host requirements shown below:
• NetA :14 hosts
• NetB :28 hosts
• NetC :2 hosts
• NetD :7 hosts
• NetE :28 hosts
Cont.…
• The network was split into eight equal-size subnets; however, each
subnet did not utilize all available host addresses, which results in
wasted address space.
• The following figure illustrates this wasted address space.
Cont.…
Cont.…
• NetA, NetC, and NetD have a lot of unused host address space.
• It is possible that this was a deliberate design accounting for future growth, but in
many cases this is just wasted address space due to the fact that the same subnet
mask is used for all the subnets.
• Variable Length Subnet Masks (VLSM) allows you to use different masks for
each subnet, thereby using address space efficiently.
• Given the same network and requirements as in exercise above develop a
subnetting scheme with the use of VLSM, given:
• Net A: must support 14 hosts
• Net B: must support 28 hosts
• Net C: must support 2 hosts
• Net D: must support 7 hosts
• Net E: must support 28 hosts
Cont.…
• Determine what mask allows the required number of hosts.
• Net A requires a /28 (255.255.255.240) to support 14 hosts
• Net B requires a /27 (255.255.255.224) to support 28 hosts
• Net C requires a /30 (255.255.255.252) to support 2 hosts
• Net D requires a /28 (255.255.255.240) to support 7 hosts
• Net E requires a /27 (255.255.255.224) to support 28 hosts
Cont.…
• The easiest way to assign the subnets is to assign the largest first. For example,
you can assign in this manner:
• Net B 204.15.5.0/27 host address range 1 to 30
• Net E 204.15.5.32/27 host address range 33 to 62
• Net A 204.15.5.64/28 host address range 65 to 78
• Net D 204.15.5.80/28 host address range 80 to 87
• Net C 204.15.5.96/30 host address range 97 to 98
• The following figure show how VLSM helped to save more than half of the
address space
Cont.…
Exercise
Given the Class A network of 172.0.0.0, subnet the network in order to create the
network with the host requirements shown below using VLSM:
• Net1 :500 hosts
• Net2 :250 hosts
• Net3 :80 hosts
• Net4 :50 hosts
• Net5 :20 hosts
• Net6 :2 hosts
• Net7 :2 hosts
• Net8 :2 hosts
• Net9 :2 hosts
• Net10 :2 hosts
VLAN
• VLAN is a logical grouping of network users and resources connected to
administratively defined ports on a switch.
• It support smaller broadcast domain and is organized by location, function,
department and application or protocol.
• Virtual LANs (or VLANs) separate a Layer-2 switch into multiple broadcast
domains.
• Each VLAN is its own individual broadcast domain (i.e. IP subnet).
• Individual ports or groups of ports can be assigned to a specific VLAN.
• Only ports belonging to the same VLAN can freely communicate; ports assigned
to separate VLANs require a router to communicate.
• Broadcasts from one VLAN will never be sent out ports belonging to another
VLAN
Cont…
• Ports (interfaces) on switches can be assigned to one or more VLANs, enabling
systems to be divided into logical groups -- based on which department they are
associated with -- and establish rules about how systems in the separate groups are
allowed to communicate with each other.
• Data communications between VLANs is performed by routers. Modern switches
often incorporate routing functionality and are called Layer 3 switches.
Cont…
• Four computers are connected to a Layer-2 switch that supports VLANs.
Computers A and B belong to VLAN 1, and Computers C and D belong to
VLAN 2.
• Because Computers A and B belong to the same VLAN, they belong to the
same IP subnet and broadcast domain.
• They will be able to communicate without the need of a router
• Computers C and D likewise belong to the same VLAN and IP subnet.
• They also can communicate without a router. However, Computers A and B
will not be able to communicate with Computers C and D, as they belong
to separate VLANs, and thus separate IP subnets.
• Broadcasts from VLAN 1 will never go out ports configured for VLAN 2.
• A router will be necessary for both VLANs to communicate.
Benefits of VLANs
• Simplified administration for the network manager: One of the best things
about virtualization is that it simplifies management.
• By logically grouping users into the same virtual networks, you make it easy to set
up and control your policies at a group level.
• When users physically move workstations, you can keep them on the same
network with different equipment. Or if someone changes teams but not
workstations, they can easily be given access to whatever new VLANs they need.
• Improved security: Using VLANs improves security by reducing both internal
and external threats.
• Internally, separating users improves security and privacy by ensuring that users
can only access the networks that apply to their responsibilities. External threats
are also minimized.
• If an outside attacker is able to gain access to one VLAN, they’ll be contained to
that network by the boundaries and controls you have in place to segment it from
your others.
Cont…
• Easier fault management: Troubleshooting problems on the network can be
simpler and faster when your different user groups are segmented and isolated
from one another.
• If you know that complaints are only coming from a certain subset of users, you’ll
be able to quickly narrow down where to look to find the issue.
• Improved quality of service: VLANs manage traffic more efficiently so that
your end users experience better performance. You’ll have fewer latency problems
on your network and more reliability for critical applications.
• VLANs also make prioritizing traffic much easier, allowing you to make sure
critical application data keeps flowing even when lower priority traffic like web
browsing spikes.
In a Class C address, only 8 bits are available for defining the hosts. Remember that
subnet bits start at the left and go to the right, without skipping bits. This means that
the only Class C subnet masks can be the following
Exercise
• You are given an IP address from your ISP: 220.42.56.20
• Design a network having 4 subnets for
• Administrative staff,
• Academic staff and
• Postgraduate students,
• Undergraduate students
Exercise
• You are given two address /mask combinations, written with the
length notation, which have been assigned to two devices.
• Your task is to determine if these devices are on the same subnet or
different subnets.
• Device A: 172.16.17.30 /20
• Device B: 172.16.28.15 /20
• You can use the address and mask of each device in order to determine
to which subnet each address belongs and perform a logical "AND"
between the mask and address