SlideShare a Scribd company logo
Ch. 7 Subnetting and Other
    Masking Acrobatics
         Bruce Hartpence
 The Packet Guide to Core Network
             Protocols
Introduction
• Let’s start with the idea of a network
  – The 10,000 foot view is that it is a bunch of
    computers connected together
  – But the technical view is a little more precise
• Computers on the same network
  – Share the same IP address range
  – Have the same default gateway (router)
  – Have the same broadcast address
What is a Mask?
• 192.168.100.0 255.255.255.0
• Used to determine the network for a host
• Also used by routers to determine forwarding
  information
• The normal or natural network mask
  (netmask) is defined by address class type
• Not much flexibility
How do we use the mask?



•Classes vary in size and the number of hosts.
    •Each class has it’s own address range and mask.
•Early networks could be given an entire class.
    •For example, RIT has a Class B network address.
•But, this is inefficient and with more and more folks desiring
connectivity, was not sustainable.
Logical AND

 AND gate
Example: Class C network host
           200.150.100.95
• Steps 1 & 2: Convert the address and mask to
  binary
  11001000.10010110.01100100.01011111
  11111111.11111111.11111111.00000000
• Perform the ANDing operation from RT to LT
  11001000.10010110.01100100.00000000
• Convert back to base 10 numbers
  200.150.100.0
• Easy right?
IP packets
• Network Masks
  are not included
  in the IP packet
• All of the
  processing is
  done on devices
• But, you never
  know the mask
  for the other
  end
Revisiting the mask structure
• From the class structure
  – for a class A address: 255.0.0.0
  – for a class B address: 255.255.0.0
  – for a class C address: 255.255.255.0
• When we convert to binary
  – There 1’s indicate the network portion
  – The 0’s indicate the host portion
From an earlier chapter




• So for our example, the network address is 200.150.100.0 (all
  0’s) and the broadcast address is 200.150.100.255 (all 1’s)
• This also means that after ANDing, the host addresses from
  200.150.100.1 to 200.150.100.254 are on the same network.
What is a subnet?
• “Logically visible sub-      • Created by
  sections” RFC 917              manipulating the
• Work exactly like the          network mask
  classful network and         • This splits the network
  they still have:               into smaller networks
   – Network (subnetwork)      • Bits are “stolen” from
     address                     the host portion of the
   – Broadcast address           network
   – All hosts on the subnet
     typically use the same
                               • A third portion is added
     gateway                     to the IP address
OK, we can subnet but why?
• As a network grows in terms of the number of
  hosts, the traffic grows as well
  – Broadcast (ARP, Windows, DHCP, etc.)
• Users or departments may have varying
  security concerns
• The desire to provide different quality of
  service options
• Other overhead: SNMP, routing
• Rule of thumb: 100/30
Subnet behavior
• Local traffic is limited to the subnet
  – ARP traffic (and everything else) is now limited
  – Limited broadcast address 255.255.255.255
  – Broadcast frame address ff-ff-ff-ff-ff-ff
• MAC addresses belong to the subnet, not the
  classful network
• A router (or routing function) is required to
  get traffic between subnets
So how do you decide?
• First, how many subnets do you need?
  –   Organization of the groups
  –   Addresses required
  –   Growth
  –   Current equipment
• Once this has been determined, “steal the bits”
  – Number of bits stolen is determined by the number of
    required subnets
  – In the host portion, work to the right, converting 0s to
    1’s as you go
Common subnet patterns
• As bits are stolen, the number of subnets
  increases and the number of hosts/subnet
  decreases
Simple example
• A company desires 4 internal subnets within their
  200.150.100.0 network
• This requires 2 bits to be stolen because there are
  four possibilities in 2 bits
   – 00, 01, 10, 11
   – These are seen in the subnet field
   – Stolen bits are revealed in the mask
• New mask
   – Instead of 255.255.255.0 we have 255.255.255.192
Wait, how did this work?
• The classful network characteristics
  – Network 200.150.100.0 mask 255.255.255.0
  – Low useable address 200.150.100.1
  – High useable address 200.150.100.254
     • Often for the router
  – Broadcast address 200.150.100.255
• ANDing puts everyone on the same network
• Mask binary
  11111111.11111111.11111111.00000000
       Network portion       Host portion
Con’t
• Stealing 2 bits changes the mask
  – 255.255.255.192
  – 11111111.11111111.11111111.11000000
• The red bits represent the subnet field
• But what about the binary patterns?
  – The classful network address
  – 200.150.100.0
  – 11001000.10010110.01100100.00000000
  – The red bits are affected by the change to the
    mask
New subnet values
• Mask for all: 255.255.255.192
• Network ranges
  – Subnet ID           Subnet broadcast
  – 200.150.100.0 –     200.150.100.63
  – 200.150.100.64 –    200.150.100.127
  – 200.150.100.128 –   200.150.100.191
  – 200.150.100.192 –   200.150.100.255
Let’s look at an example address
• Node IP address: 200.150.100.137
  • Binary: 11001000.10010110.01100100.10001011
• Subnet mask: 255.255.255.192
  • Binary: 11111111.11111111.11111111.11000000
• AND
  • 11001000.10010110.01100100.10001011
  • 11111111.11111111.11111111.11000000
  • 11001000.10010110.01100100.10000000
• Base 10: 200.150.100.128
   • This is the new subnet for this node
Binary value details
• Node 200.150.100.137
   • 11001000.10010110.01100100.10001011
• Subnet mask: 255.255.255.192
  • 11111111.11111111.11111111.11000000
• Put all 0’s in for the host portion, you get the subnet
  ID
  • 11001000.10010110.01100100.10000000
• Put all 1’s in the host portion, you get the broadcast
  address
  • 11001000.10010110.01100100.10111111
Another look at the binary patterns
• Subnet address and binary
•   200.150.100.0:     11001000.10010110.01100100.00000000
•   200.150.100.64:    11001000.10010110.01100100.01000000
•   200.150.100.128:   11001000.10010110.01100100.10000000
•   200.150.100.192:   11001000.10010110.01100100.11000000
• So, where are the routers?
    –   200.150.100.62
    –   200.150.100.126
    –   200.150.100.190
    –   200.150.100.254
Another problem: 2 techniques
• Problem: Class B network 172.30.0.0, 8 subnets
  desired
  – Another way to ask this is “How many hosts do you
    need in each subnet?”
• Method 1 – Algebra
  –   How many hosts total? 65536
  –   How many subnets? 8
  –   Hosts/subnet? 65536/8 = 8192
  –   Bits for subnets? 3
  –   Mask? 255.255.224.0
  –   Always start at the classful network address.
Subnets
• The only tough question: What does 8191 look like in
  dotted quad notation?
• 172.30.0.0 - 172.30.31.255
• What is the next possible value?
    – 172.30.32.0 – this is the next subnet? Follow the pattern.
•   172.30.32.0 – 172.30.63.255
•   172.30.64.0 – 172.30.95.255
•   172.30.96.0 – 172.30.127.255
•   172.30.128.0 – 172.30.159.255
•   172.30.160.0 – 172.30.191.255
•   172.30.192.0 – 172.30.223.255
•   172.30.224.0 – 172.30.225.255
Method 2 – to the binary!
• Having selected the mask, start at the classful address
  and work through the binary patterns (172.30.0.0)
   –   172.30.00000000.00000000
   –   172.30.00100000.00000000
   –   172.30.01000000.00000000
   –   172.30.01100000.00000000
   –   172.30.10000000.00000000
   –   172.30.10100000.00000000
   –   172.30.11000000.00000000
   –   172.30.11100000.00000000
• Remember that these are the subnet addresses
Upper end of the range
• Broadcast addresses insert 1’s in the host portion
  –   172.30.00011111.11111111 (172.30.31.255)
  –   172.30.00111111.11111111
  –   172.30.01011111.11111111
  –   172.30.01111111.11111111
  –   172.30.10011111.11111111
  –   172.30.10111111.11111111
  –   172.30.11011111.11111111
  –   172.30.11111111.11111111
• Routers would typically be high/low in the range
Review and other ideas
• You should be able to go back to the simpler
  example and work both techniques
• Related ideas
  – Supernetting (combining networks)
  – Classless inter-domain routing (CIDR)
  – Variable length subnet masks (VLSM)
  – Aggregation
• All of these represent different ways to
  manipulate address space via the subnet mask
Thanks!
• Questions?
• Bruce.hartpence@rit.edu
• Keep an eye out for podcasts on itunes
Visit http://oreilly.com
                                       to purchase your copy
                                       of Core Network
                                       Protocols and enter
                                       code 4CAST to save
                                       40% off print book &
                                       50% off ebook with
                                       special code 4CAST



Visit http://oreilly.com webcasts to view upcoming webcasts and online events.

More Related Content

PPTX
Excel Based IP Functions
PPTX
Week10 lec1
PDF
Uccn1003 -may10_-_lect03c_-_ip_subnets_rules
PPT
Ipaddress presentationdemoclass
PPT
Cisco ip-addressing
DOCX
PPTX
Computer networking
PPTX
CCNA IP Address,Subnet mask (part 2)
Excel Based IP Functions
Week10 lec1
Uccn1003 -may10_-_lect03c_-_ip_subnets_rules
Ipaddress presentationdemoclass
Cisco ip-addressing
Computer networking
CCNA IP Address,Subnet mask (part 2)

What's hot (20)

PPTX
PPT
Subnets
PPT
Subneting
PPT
IP Addressing and subnetting
PPT
IP Addressing
PPTX
Subnetting
PPTX
Subentting, Supernetting and VLSM presentation
PPT
Subnetting
PPTX
VLSM & SUPERNETTING
PPTX
CCNA IP Address Presentation(Part 1)
PPTX
Subnetting
PDF
Vlsm workbook instructors edition v2 0-solucionario
PPTX
Subnetting
PDF
IP addressing by Mamun Sir
PPSX
Subnetting
PPTX
IP addressing and Subnetting PPT
PPTX
Subnetting
PPT
Subnetting
Subnets
Subneting
IP Addressing and subnetting
IP Addressing
Subnetting
Subentting, Supernetting and VLSM presentation
Subnetting
VLSM & SUPERNETTING
CCNA IP Address Presentation(Part 1)
Subnetting
Vlsm workbook instructors edition v2 0-solucionario
Subnetting
IP addressing by Mamun Sir
Subnetting
IP addressing and Subnetting PPT
Subnetting
Subnetting
Ad

Viewers also liked (20)

PPTX
Search Different Understanding Apple's New Search Engine State of Search 2016
PDF
WattzOn Personal Energy Audit
PPTX
A Data-driven Look at the Realtime Web
PDF
Hoppala at XMediaLab
PDF
Twitter Webcast Power Tips, Pt 1
PDF
But we're already open source! Why would I want to bring my code to Apache?
PDF
Voice+IP Conference Frankfurt, Germany
PPTX
Nov. 4, 2011 o reilly webcast-hbase- lars george
PDF
Apple earnings q4-2010
ZIP
InsideRIA Outlook for 2009
PDF
Visual Experience 360 Flex
PPT
U.S. Senate Social Graph, 1991 - Present
PDF
Twitter Webcast Power Tips, Pt 2
PPTX
Souders WPO Web 2.0 Expo
PPT
12 13 what is desktop virtualization
PPT
PPT
Test Driven Development
PDF
Allister Frost Speaker Biography
PDF
Hoppala at ARE2011
PDF
Citizen Science on the Move conference 25, 26 & 27 june 2012
Search Different Understanding Apple's New Search Engine State of Search 2016
WattzOn Personal Energy Audit
A Data-driven Look at the Realtime Web
Hoppala at XMediaLab
Twitter Webcast Power Tips, Pt 1
But we're already open source! Why would I want to bring my code to Apache?
Voice+IP Conference Frankfurt, Germany
Nov. 4, 2011 o reilly webcast-hbase- lars george
Apple earnings q4-2010
InsideRIA Outlook for 2009
Visual Experience 360 Flex
U.S. Senate Social Graph, 1991 - Present
Twitter Webcast Power Tips, Pt 2
Souders WPO Web 2.0 Expo
12 13 what is desktop virtualization
Test Driven Development
Allister Frost Speaker Biography
Hoppala at ARE2011
Citizen Science on the Move conference 25, 26 & 27 june 2012
Ad

Similar to Oct. 14, 2011 webcast ch7 subnets bruce hartpence (20)

PDF
13788 3
PPTX
IP_ADDRESSING_AND_SUBNETTING.pptx
PPT
8-Additional_IPSubnetting_KED (2).ppt
PPTX
lecture 33333222234555555555555555556.pptx
PPT
Ipv4 address
PPTX
Ip addressing
PPTX
lecture 6.pptx
PPT
Subnetting and routing
PPT
How IP address works
PPS
Lesson 2: Subnetting basics
PPTX
IPv4 Addressing
PPT
Subnetting ked
PPT
cwest_Sem_1__Ch_10_Supplement__Subnetting.ppt
PPTX
IP subnetting Part II for network desig.pptx
PPT
PDF
Ip -subnetting
PPTX
IP Subneting and Bassic network fundamental.pptx
PPTX
Wipro telecom training i pv4 concepts
PPT
Ip address and subnetting
PPTX
Ccna ppt
13788 3
IP_ADDRESSING_AND_SUBNETTING.pptx
8-Additional_IPSubnetting_KED (2).ppt
lecture 33333222234555555555555555556.pptx
Ipv4 address
Ip addressing
lecture 6.pptx
Subnetting and routing
How IP address works
Lesson 2: Subnetting basics
IPv4 Addressing
Subnetting ked
cwest_Sem_1__Ch_10_Supplement__Subnetting.ppt
IP subnetting Part II for network desig.pptx
Ip -subnetting
IP Subneting and Bassic network fundamental.pptx
Wipro telecom training i pv4 concepts
Ip address and subnetting
Ccna ppt

More from O'Reilly Media (20)

PPT
2 3-2012 Take Control of iCloud
PPTX
2 7-2012 Google how links boost rankings
PDF
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
PPTX
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
PPTX
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
PPTX
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
PPTX
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
PPTX
Oct. 25. 2011 webcast conduct aninterview
PPTX
Nov. 15, 2011 dani nordin talking to clients about drupal projects
PPT
What's New & Cool in Drupal 7
PPT
Dealing with Legacy Perl Code - Peter Scott
PDF
The Science of Social Media
PDF
Web 2.0 Expo Ny--How to Submit a Winning Proposal
PDF
2009 Research Where
PDF
O'Reilly Webcast: Architecting Applications For The Cloud
PDF
Active Facebook Users By Country & Region: August 2009
PPT
Web Squared
PDF
Facebook and Myspace App Platforms: A Brief Update
PDF
U.S. iTunes App Store: Sellers
PDF
The What Why And Who Of Xbrl
2 3-2012 Take Control of iCloud
2 7-2012 Google how links boost rankings
February 8, 2012 Webcast: 10 Things You Didn't Know About Google+
Sept. 28, 2011 webcast become an expert google searcher in an hour stephan ...
Oct. 4, 2011 webcast top 5 tips for building viral social web applications an...
Oct. 27, 2011 webcast practical and pragmatic application of pmi standards
Nov. 8, 2011 webcast desiging mobile interfaces by steven hoober
Oct. 25. 2011 webcast conduct aninterview
Nov. 15, 2011 dani nordin talking to clients about drupal projects
What's New & Cool in Drupal 7
Dealing with Legacy Perl Code - Peter Scott
The Science of Social Media
Web 2.0 Expo Ny--How to Submit a Winning Proposal
2009 Research Where
O'Reilly Webcast: Architecting Applications For The Cloud
Active Facebook Users By Country & Region: August 2009
Web Squared
Facebook and Myspace App Platforms: A Brief Update
U.S. iTunes App Store: Sellers
The What Why And Who Of Xbrl

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I

Oct. 14, 2011 webcast ch7 subnets bruce hartpence

  • 1. Ch. 7 Subnetting and Other Masking Acrobatics Bruce Hartpence The Packet Guide to Core Network Protocols
  • 2. Introduction • Let’s start with the idea of a network – The 10,000 foot view is that it is a bunch of computers connected together – But the technical view is a little more precise • Computers on the same network – Share the same IP address range – Have the same default gateway (router) – Have the same broadcast address
  • 3. What is a Mask? • 192.168.100.0 255.255.255.0 • Used to determine the network for a host • Also used by routers to determine forwarding information • The normal or natural network mask (netmask) is defined by address class type • Not much flexibility
  • 4. How do we use the mask? •Classes vary in size and the number of hosts. •Each class has it’s own address range and mask. •Early networks could be given an entire class. •For example, RIT has a Class B network address. •But, this is inefficient and with more and more folks desiring connectivity, was not sustainable.
  • 6. Example: Class C network host 200.150.100.95 • Steps 1 & 2: Convert the address and mask to binary 11001000.10010110.01100100.01011111 11111111.11111111.11111111.00000000 • Perform the ANDing operation from RT to LT 11001000.10010110.01100100.00000000 • Convert back to base 10 numbers 200.150.100.0 • Easy right?
  • 7. IP packets • Network Masks are not included in the IP packet • All of the processing is done on devices • But, you never know the mask for the other end
  • 8. Revisiting the mask structure • From the class structure – for a class A address: 255.0.0.0 – for a class B address: 255.255.0.0 – for a class C address: 255.255.255.0 • When we convert to binary – There 1’s indicate the network portion – The 0’s indicate the host portion
  • 9. From an earlier chapter • So for our example, the network address is 200.150.100.0 (all 0’s) and the broadcast address is 200.150.100.255 (all 1’s) • This also means that after ANDing, the host addresses from 200.150.100.1 to 200.150.100.254 are on the same network.
  • 10. What is a subnet? • “Logically visible sub- • Created by sections” RFC 917 manipulating the • Work exactly like the network mask classful network and • This splits the network they still have: into smaller networks – Network (subnetwork) • Bits are “stolen” from address the host portion of the – Broadcast address network – All hosts on the subnet typically use the same • A third portion is added gateway to the IP address
  • 11. OK, we can subnet but why? • As a network grows in terms of the number of hosts, the traffic grows as well – Broadcast (ARP, Windows, DHCP, etc.) • Users or departments may have varying security concerns • The desire to provide different quality of service options • Other overhead: SNMP, routing • Rule of thumb: 100/30
  • 12. Subnet behavior • Local traffic is limited to the subnet – ARP traffic (and everything else) is now limited – Limited broadcast address 255.255.255.255 – Broadcast frame address ff-ff-ff-ff-ff-ff • MAC addresses belong to the subnet, not the classful network • A router (or routing function) is required to get traffic between subnets
  • 13. So how do you decide? • First, how many subnets do you need? – Organization of the groups – Addresses required – Growth – Current equipment • Once this has been determined, “steal the bits” – Number of bits stolen is determined by the number of required subnets – In the host portion, work to the right, converting 0s to 1’s as you go
  • 14. Common subnet patterns • As bits are stolen, the number of subnets increases and the number of hosts/subnet decreases
  • 15. Simple example • A company desires 4 internal subnets within their 200.150.100.0 network • This requires 2 bits to be stolen because there are four possibilities in 2 bits – 00, 01, 10, 11 – These are seen in the subnet field – Stolen bits are revealed in the mask • New mask – Instead of 255.255.255.0 we have 255.255.255.192
  • 16. Wait, how did this work? • The classful network characteristics – Network 200.150.100.0 mask 255.255.255.0 – Low useable address 200.150.100.1 – High useable address 200.150.100.254 • Often for the router – Broadcast address 200.150.100.255 • ANDing puts everyone on the same network • Mask binary 11111111.11111111.11111111.00000000 Network portion Host portion
  • 17. Con’t • Stealing 2 bits changes the mask – 255.255.255.192 – 11111111.11111111.11111111.11000000 • The red bits represent the subnet field • But what about the binary patterns? – The classful network address – 200.150.100.0 – 11001000.10010110.01100100.00000000 – The red bits are affected by the change to the mask
  • 18. New subnet values • Mask for all: 255.255.255.192 • Network ranges – Subnet ID Subnet broadcast – 200.150.100.0 – 200.150.100.63 – 200.150.100.64 – 200.150.100.127 – 200.150.100.128 – 200.150.100.191 – 200.150.100.192 – 200.150.100.255
  • 19. Let’s look at an example address • Node IP address: 200.150.100.137 • Binary: 11001000.10010110.01100100.10001011 • Subnet mask: 255.255.255.192 • Binary: 11111111.11111111.11111111.11000000 • AND • 11001000.10010110.01100100.10001011 • 11111111.11111111.11111111.11000000 • 11001000.10010110.01100100.10000000 • Base 10: 200.150.100.128 • This is the new subnet for this node
  • 20. Binary value details • Node 200.150.100.137 • 11001000.10010110.01100100.10001011 • Subnet mask: 255.255.255.192 • 11111111.11111111.11111111.11000000 • Put all 0’s in for the host portion, you get the subnet ID • 11001000.10010110.01100100.10000000 • Put all 1’s in the host portion, you get the broadcast address • 11001000.10010110.01100100.10111111
  • 21. Another look at the binary patterns • Subnet address and binary • 200.150.100.0: 11001000.10010110.01100100.00000000 • 200.150.100.64: 11001000.10010110.01100100.01000000 • 200.150.100.128: 11001000.10010110.01100100.10000000 • 200.150.100.192: 11001000.10010110.01100100.11000000 • So, where are the routers? – 200.150.100.62 – 200.150.100.126 – 200.150.100.190 – 200.150.100.254
  • 22. Another problem: 2 techniques • Problem: Class B network 172.30.0.0, 8 subnets desired – Another way to ask this is “How many hosts do you need in each subnet?” • Method 1 – Algebra – How many hosts total? 65536 – How many subnets? 8 – Hosts/subnet? 65536/8 = 8192 – Bits for subnets? 3 – Mask? 255.255.224.0 – Always start at the classful network address.
  • 23. Subnets • The only tough question: What does 8191 look like in dotted quad notation? • 172.30.0.0 - 172.30.31.255 • What is the next possible value? – 172.30.32.0 – this is the next subnet? Follow the pattern. • 172.30.32.0 – 172.30.63.255 • 172.30.64.0 – 172.30.95.255 • 172.30.96.0 – 172.30.127.255 • 172.30.128.0 – 172.30.159.255 • 172.30.160.0 – 172.30.191.255 • 172.30.192.0 – 172.30.223.255 • 172.30.224.0 – 172.30.225.255
  • 24. Method 2 – to the binary! • Having selected the mask, start at the classful address and work through the binary patterns (172.30.0.0) – 172.30.00000000.00000000 – 172.30.00100000.00000000 – 172.30.01000000.00000000 – 172.30.01100000.00000000 – 172.30.10000000.00000000 – 172.30.10100000.00000000 – 172.30.11000000.00000000 – 172.30.11100000.00000000 • Remember that these are the subnet addresses
  • 25. Upper end of the range • Broadcast addresses insert 1’s in the host portion – 172.30.00011111.11111111 (172.30.31.255) – 172.30.00111111.11111111 – 172.30.01011111.11111111 – 172.30.01111111.11111111 – 172.30.10011111.11111111 – 172.30.10111111.11111111 – 172.30.11011111.11111111 – 172.30.11111111.11111111 • Routers would typically be high/low in the range
  • 26. Review and other ideas • You should be able to go back to the simpler example and work both techniques • Related ideas – Supernetting (combining networks) – Classless inter-domain routing (CIDR) – Variable length subnet masks (VLSM) – Aggregation • All of these represent different ways to manipulate address space via the subnet mask
  • 27. Thanks! • Questions? • Bruce.hartpence@rit.edu • Keep an eye out for podcasts on itunes
  • 28. Visit http://oreilly.com to purchase your copy of Core Network Protocols and enter code 4CAST to save 40% off print book & 50% off ebook with special code 4CAST Visit http://oreilly.com webcasts to view upcoming webcasts and online events.