Chapter 8: Subnetting 
IP Networks 
Network Fundamentals 
© 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
Chapter 8 
8.1 Subnetting an IPv4 Network 
8.2 Addressing Schemes 
8.3 Design Considerations for IPv6 
8.4 Summary 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 8: Objectives 
 Explain why routing is necessary for hosts on different 
networks to communicate. 
 Describe IP as a communication protocol used to identify a 
single device on a network. 
 Given a network and a subnet mask, calculate the number of 
host addresses available. 
 Calculate the necessary subnet mask in order to 
accommodate the requirements of a network. 
 Describe the benefits of variable length subnet masking 
(VLSM) 
 Explain how IPv6 address assignments are implemented in 
a business network. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Network Segmentation 
Reasons for Subnetting 
Large networks need to be segmented into smaller sub-networks, 
creating smaller groups of devices and services in order to: 
 Control traffic by containing broadcast traffic within subnetwork 
 Reduce overall network traffic and improve network performance 
Subnetting - process of segmenting a network into multiple smaller 
network spaces called subnetworks or Subnets. 
Communication Between Subnets 
 A router is necessary for devices on different networks and subnets 
to communicate. 
 Each router interface must have an IPv4 host address that belongs to 
the network or subnet that the router interface is connected to. 
 Devices on a network and subnet use the router interface attached to 
their LAN as their default gateway. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Subnetting an IPv4 Network 
Basic Subnetting 
 Borrowing Bits to Create Subnets 
 Borrowing 1 bit 21 = 2 subnets 
Borrowing 1 Bit from the host portion creates 2 subnets with the same subnet mask 
Subnet 1 
Network 192.168.1.128-255/25 
Mask: 255.255.255.128 
Subnet 0 
Network 192.168.1.0-127/25 
Mask: 255.255.255.128 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Subnetting an IPv4 Network 
Subnets in Use 
Subnet 0 
Network 192.168.1.0-127/25 
Subnet 1 
Network 192.168.1.128-255/25 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Subnetting an IPv4 Network 
Subnetting Formulas 
Calculate Number of Subnets 
Calculate Number of Hosts 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Subnetting an IPv4 Network 
Creating 4 Subnets 
Borrowing 2 bits to create 4 subnets. 22 = 4 subnets 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Subnetting an IPv4 Network 
Creating 8 Subnets 
Borrowing 3 bits to Create 8 Subnets. 23 = 8 subnets 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Subnetting an IPv4 Network 
Creating 8 Subnets(continued) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Determining the Subnet Mask 
Subnetting Based on Host Requirements 
There are two considerations when planning 
subnets: 
 Number of Subnets required 
 Number of Host addresses required 
Formula to determine number of useable hosts 2^n-2 
2^n (where n is the number the number of host 
bits remaining) is used to calculate the number 
of hosts 
-2 Subnetwork ID and broadcast address 
cannot be used on each subnet 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Determining the Subnet Mask 
Subnetting Based on Network Requirements 
Calculate number of subnets 
Formula 2^n (where n is the number of bits borrowed) 
Subnet needed for 
each department in 
graphic 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Determining the Subnet Mask 
Subnetting To Meet Network Requirements 
It is important to balance the number of subnets needed 
and the number of hosts required for the largest subnet. 
 Design the addressing scheme to accommodate the 
maximum number of hosts for each subnet. 
Allow for growth in each subnet. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Determining the Subnet Mask 
Subnetting To Meet Network Requirements (cont) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Benefits of Variable Length Subnet Masking 
Traditional Subnetting Wastes Addresses 
Traditional subnetting - same number of addresses is 
allocated for each subnet. 
Subnets that require fewer addresses have unused 
(wasted) addresses. For example, WAN links only need 2 
addresses. 
Variable Length Subnet Mask (VLSM) or subnetting a 
subnet provides more efficient use of addresses. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Benefits of Variable Length Subnet Masking 
Variable Length Subnet Masks (VLSM) 
VLSM allows a network space to be divided in unequal 
parts. 
Subnet mask will vary depending on how many bits have 
been borrowed for a particular subnet. 
Network is first subnetted, and then the subnets are 
subnetted again. 
Process repeated as necessary to create subnets of 
various sizes. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Benefits of Variable Length Subnet Masking 
Basic VLSM 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Benefits of Variable Length Subnet Masking 
VLSM in Practice 
Using VLSM subnets, the LAN and WAN segments in 
example below can be addressed with minimum waste. 
 Each LANs will be assigned a subnet with /27 mask. 
Each WAN link will be assigned a subnet with /30 mask. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Benefits of Variable Length Subnet Masking 
VLSM Chart 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Structured Design 
Planning to Address the Network 
Allocation of network addresses should be planned and 
documented for the purposes of: 
Preventing duplication of addresses 
Providing and controlling access 
Monitoring security and performance 
Addresses for Clients - usually dynamically assigned using 
Dynamic Host Configuration Protocol (DHCP) 
Sample Network 
Addressing Plan 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Subnetting an IPv6 Network 
Subnetting Using the Subnet ID 
An IPv6 Network Space is subnetted to support 
hierarchical, logical design of the network 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Subnetting an IPv6 Network 
IPV6 Subnet Allocation 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Subnetting an IPv6 Network 
Subnetting into the Interface ID 
IPv6 bits can be borrowed from the interface ID to create 
additional IPv6 subnets 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Chapter 8: Summary 
 Process of segmenting a network, by dividing it into to 
multiple smaller network spaces, is called subnetting. 
 Subnetting a subnet, or using Variable Length Subnet 
Mask (VLSM) was designed to avoid wasting 
addresses. 
 IPv6 address space is subnetted to support the 
hierarchical, logical design of the network. 
 Size, location, use, and access requirements are all 
considerations in the address planning process. 
 IP networks need to be tested to verify connectivity 
and operational performance. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25

More Related Content

PPTX
CCNA 1 Routing and Switching v5.0 Chapter 5
PPTX
CCNA v6.0 ITN - Chapter 11
PPTX
CCNA RS_NB - Chapter 5
PPTX
CCNA RS_ITN - Chapter 1
PPTX
CCNA RS_NB - Chapter 7
PPT
Ccna r&s overview presentation
PPTX
CCNA RS_ITN - Chapter 6
PPT
CCNA Exploration 1 - Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA v6.0 ITN - Chapter 11
CCNA RS_NB - Chapter 5
CCNA RS_ITN - Chapter 1
CCNA RS_NB - Chapter 7
Ccna r&s overview presentation
CCNA RS_ITN - Chapter 6
CCNA Exploration 1 - Chapter 2

What's hot (20)

PDF
CCNAv5 - S1: Chapter 1 Exploring The Network
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 3
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 11
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 10
PPTX
CCNA v6.0 ITN - Chapter 04
PPTX
CCNA RS_ITN - Chapter 9
PDF
Ccna4
PPTX
CCNA RS_ITN - Chapter 11
PPTX
CCNA RS_ITN - Chapter 4
PPTX
CCNA RS_NB - Chapter 4
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 9
PPTX
CCNA v6.0 ITN - Chapter 03
PPTX
CCNA RS_NB - Chapter 1
PDF
CCNAv5 - S1: Chapter 10 Application Layer
PDF
CCNAv5 - S4: Chapter2 Connecting To The Wan
PPTX
CCNA RS_ITN - Chapter 2
PPTX
CCNA RS_ITN - Chapter 5
PPTX
CCNA RS_NB - Chapter 6
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 1
PPTX
CCNA RS_NB - Chapter 11
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA v6.0 ITN - Chapter 04
CCNA RS_ITN - Chapter 9
Ccna4
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 4
CCNA RS_NB - Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA v6.0 ITN - Chapter 03
CCNA RS_NB - Chapter 1
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 5
CCNA RS_NB - Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA RS_NB - Chapter 11
Ad

Viewers also liked (20)

PPT
CCNA Security - Chapter 7
PPT
CCNA Security 011- implementing ios-based ips
PPT
ITE - Chapter 7
PPT
ITE - Chapter 2
PPT
CCNA Security 09- ios firewall fundamentals
PPT
CCNA Discovery 1 - Chapter 1
PPT
CCNA Security 06- AAA
PPT
CCNA Security - Chapter 6
PPT
CCNA Security - Chapter 8
PPTX
VMware vShield - Overview
PPT
CCNA Exploration 4 - Chapter 8
PPT
CCNA Security - Chapter 3
PPT
CCNA Exploration 4 - Chapter 7
PPT
CCNA Discovery 1 - Chapter 4
PPT
CCNA Security 012- cryptographic systems
PPT
CCNA Security 010-configuring cisco asa
PPT
CCNA Security - Chapter 4
PPT
ITE - Chapter 9
PPT
CCNA Security - Chapter 5
PPT
CCNA Security - Chapter 9
CCNA Security - Chapter 7
CCNA Security 011- implementing ios-based ips
ITE - Chapter 7
ITE - Chapter 2
CCNA Security 09- ios firewall fundamentals
CCNA Discovery 1 - Chapter 1
CCNA Security 06- AAA
CCNA Security - Chapter 6
CCNA Security - Chapter 8
VMware vShield - Overview
CCNA Exploration 4 - Chapter 8
CCNA Security - Chapter 3
CCNA Exploration 4 - Chapter 7
CCNA Discovery 1 - Chapter 4
CCNA Security 012- cryptographic systems
CCNA Security 010-configuring cisco asa
CCNA Security - Chapter 4
ITE - Chapter 9
CCNA Security - Chapter 5
CCNA Security - Chapter 9
Ad

Similar to CCNA RS_NB - Chapter 8 (20)

PPTX
8. Subnetting8. Subnetting8. Subnetting.pptx
PPTX
Itn instructor ppt_chapter9_subnetting_ip_networks
PPTX
Ccna v5-S1-Chapter 9
PPTX
Subnetting
PDF
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
PPTX
Chapter 9 : Subnetting IP networks
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
PPTX
CCNA v6.0 ITN - Chapter 08
PDF
08_Subnetting_IP_Networks.pdf
PDF
08_Subnetting_IP_Networks.pdf
PDF
It nv51 instructor_ppt_ch8
PPT
CCNA Discovery 3 - Chapter 4
PDF
IP Addressing (Subnetting, VLSM, Supernetting)
PPT
CCNA IP Addressing
PPT
Addressing the Network – IPv4
PDF
IP_Addressing_and Subnetting.pdf
PPT
CCNA Icnd110 s04l03
PPTX
Lecture 1-Addressing,Devices,Performance (view only).pptx
PPT
Ccna1v3 mod10
PDF
subnet network Addressing Network v1.pdf
8. Subnetting8. Subnetting8. Subnetting.pptx
Itn instructor ppt_chapter9_subnetting_ip_networks
Ccna v5-S1-Chapter 9
Subnetting
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
Chapter 9 : Subnetting IP networks
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA v6.0 ITN - Chapter 08
08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf
It nv51 instructor_ppt_ch8
CCNA Discovery 3 - Chapter 4
IP Addressing (Subnetting, VLSM, Supernetting)
CCNA IP Addressing
Addressing the Network – IPv4
IP_Addressing_and Subnetting.pdf
CCNA Icnd110 s04l03
Lecture 1-Addressing,Devices,Performance (view only).pptx
Ccna1v3 mod10
subnet network Addressing Network v1.pdf

More from Irsandi Hasan (14)

PPTX
CCNA v6.0 ITN - Chapter 10
PPTX
CCNA v6.0 ITN - Chapter 09
PPTX
CCNA v6.0 ITN - Chapter 07
PPTX
CCNA v6.0 ITN - Chapter 06
PPTX
CCNA v6.0 ITN - Chapter 05
PPTX
CCNA v6.0 ITN - Chapter 02
PPTX
CCNA v6.0 ITN - Chapter 01
PPTX
CCNA RS_NB - Chapter 10
PPTX
CCNA RS_NB - Chapter 9
PPTX
CCNA RS_NB - Chapter 3
PPTX
CCNA RS_NB - Chapter 2
PPTX
CCNA RS_ITN - Chapter 10
PPTX
CCNA RS_ITN - Chapter 8
PPTX
CCNA RS_ITN - Chapter 7
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 01
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 2
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 7

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
August Patch Tuesday
PPTX
The various Industrial Revolutions .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
DP Operators-handbook-extract for the Mautical Institute
PPT
What is a Computer? Input Devices /output devices
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Getting Started with Data Integration: FME Form 101
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Tartificialntelligence_presentation.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
O2C Customer Invoices to Receipt V15A.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
STKI Israel Market Study 2025 version august
1 - Historical Antecedents, Social Consideration.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
August Patch Tuesday
The various Industrial Revolutions .pptx
Zenith AI: Advanced Artificial Intelligence
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Assigned Numbers - 2025 - Bluetooth® Document
DP Operators-handbook-extract for the Mautical Institute
What is a Computer? Input Devices /output devices
Group 1 Presentation -Planning and Decision Making .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Chapter 5: Probability Theory and Statistics
Getting Started with Data Integration: FME Form 101
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
sustainability-14-14877-v2.pddhzftheheeeee
Tartificialntelligence_presentation.pptx
observCloud-Native Containerability and monitoring.pptx

CCNA RS_NB - Chapter 8

  • 1. Chapter 8: Subnetting IP Networks Network Fundamentals © 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
  • 2. Chapter 8 8.1 Subnetting an IPv4 Network 8.2 Addressing Schemes 8.3 Design Considerations for IPv6 8.4 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 8: Objectives  Explain why routing is necessary for hosts on different networks to communicate.  Describe IP as a communication protocol used to identify a single device on a network.  Given a network and a subnet mask, calculate the number of host addresses available.  Calculate the necessary subnet mask in order to accommodate the requirements of a network.  Describe the benefits of variable length subnet masking (VLSM)  Explain how IPv6 address assignments are implemented in a business network. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Network Segmentation Reasons for Subnetting Large networks need to be segmented into smaller sub-networks, creating smaller groups of devices and services in order to:  Control traffic by containing broadcast traffic within subnetwork  Reduce overall network traffic and improve network performance Subnetting - process of segmenting a network into multiple smaller network spaces called subnetworks or Subnets. Communication Between Subnets  A router is necessary for devices on different networks and subnets to communicate.  Each router interface must have an IPv4 host address that belongs to the network or subnet that the router interface is connected to.  Devices on a network and subnet use the router interface attached to their LAN as their default gateway. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Subnetting an IPv4 Network Basic Subnetting  Borrowing Bits to Create Subnets  Borrowing 1 bit 21 = 2 subnets Borrowing 1 Bit from the host portion creates 2 subnets with the same subnet mask Subnet 1 Network 192.168.1.128-255/25 Mask: 255.255.255.128 Subnet 0 Network 192.168.1.0-127/25 Mask: 255.255.255.128 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Subnetting an IPv4 Network Subnets in Use Subnet 0 Network 192.168.1.0-127/25 Subnet 1 Network 192.168.1.128-255/25 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Subnetting an IPv4 Network Subnetting Formulas Calculate Number of Subnets Calculate Number of Hosts Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Subnetting an IPv4 Network Creating 4 Subnets Borrowing 2 bits to create 4 subnets. 22 = 4 subnets Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Subnetting an IPv4 Network Creating 8 Subnets Borrowing 3 bits to Create 8 Subnets. 23 = 8 subnets Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Subnetting an IPv4 Network Creating 8 Subnets(continued) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Determining the Subnet Mask Subnetting Based on Host Requirements There are two considerations when planning subnets:  Number of Subnets required  Number of Host addresses required Formula to determine number of useable hosts 2^n-2 2^n (where n is the number the number of host bits remaining) is used to calculate the number of hosts -2 Subnetwork ID and broadcast address cannot be used on each subnet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Determining the Subnet Mask Subnetting Based on Network Requirements Calculate number of subnets Formula 2^n (where n is the number of bits borrowed) Subnet needed for each department in graphic Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Determining the Subnet Mask Subnetting To Meet Network Requirements It is important to balance the number of subnets needed and the number of hosts required for the largest subnet.  Design the addressing scheme to accommodate the maximum number of hosts for each subnet. Allow for growth in each subnet. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Determining the Subnet Mask Subnetting To Meet Network Requirements (cont) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Benefits of Variable Length Subnet Masking Traditional Subnetting Wastes Addresses Traditional subnetting - same number of addresses is allocated for each subnet. Subnets that require fewer addresses have unused (wasted) addresses. For example, WAN links only need 2 addresses. Variable Length Subnet Mask (VLSM) or subnetting a subnet provides more efficient use of addresses. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Benefits of Variable Length Subnet Masking Variable Length Subnet Masks (VLSM) VLSM allows a network space to be divided in unequal parts. Subnet mask will vary depending on how many bits have been borrowed for a particular subnet. Network is first subnetted, and then the subnets are subnetted again. Process repeated as necessary to create subnets of various sizes. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Benefits of Variable Length Subnet Masking Basic VLSM Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Benefits of Variable Length Subnet Masking VLSM in Practice Using VLSM subnets, the LAN and WAN segments in example below can be addressed with minimum waste.  Each LANs will be assigned a subnet with /27 mask. Each WAN link will be assigned a subnet with /30 mask. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Benefits of Variable Length Subnet Masking VLSM Chart Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. Structured Design Planning to Address the Network Allocation of network addresses should be planned and documented for the purposes of: Preventing duplication of addresses Providing and controlling access Monitoring security and performance Addresses for Clients - usually dynamically assigned using Dynamic Host Configuration Protocol (DHCP) Sample Network Addressing Plan Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. Subnetting an IPv6 Network Subnetting Using the Subnet ID An IPv6 Network Space is subnetted to support hierarchical, logical design of the network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Subnetting an IPv6 Network IPV6 Subnet Allocation Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Subnetting an IPv6 Network Subnetting into the Interface ID IPv6 bits can be borrowed from the interface ID to create additional IPv6 subnets Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Chapter 8: Summary  Process of segmenting a network, by dividing it into to multiple smaller network spaces, is called subnetting.  Subnetting a subnet, or using Variable Length Subnet Mask (VLSM) was designed to avoid wasting addresses.  IPv6 address space is subnetted to support the hierarchical, logical design of the network.  Size, location, use, and access requirements are all considerations in the address planning process.  IP networks need to be tested to verify connectivity and operational performance. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25