SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 9: Subnetting
IP Networks
Introduction to Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 9
9.0 Introduction
9.1 Subnetting an IPv4 Network
9.2 Addressing Schemes
9.3 Design Considerations for IPv6
9.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 9: Objectives
Upon completion of this chapter, you will be able to:
 Explain why routing is necessary for hosts on different networks to
communicate.
 Describe IP as a communication protocol used to identify a single
device on a network.
 Given a network and a subnet mask, calculate the number of host
addresses available.
 Calculate the necessary subnet mask in order to accommodate the
requirements of a network.
 Describe the benefits of variable length subnet masking (VLSM).
 Explain how IPv6 address assignments are implemented in a
business network.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
9.1 Subnetting an IPv4
Network
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Segmentation
Reasons for Subnetting
Subnetting is the process of segmenting a network into multiple
smaller network spaces called subnetworks or subnets.
 Large networks must be segmented into smaller subnetworks,
creating smaller groups of devices and services to:
• Control traffic by containing broadcast traffic within each
subnetwork.
• Reduce overall network traffic and improve network performance.
Communication Between Subnets
 A router is necessary for devices on different networks and subnets
to communicate.
 Each router interface must have an IPv4 host address that belongs to
the network or subnet that the router interface is connected.
 Devices on a network and subnet use the router interface attached to
their LAN as their default gateway.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IP Subnetting is FUNdamental
The Plan
Planning the Network
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv4 Network
Basic Subnetting
 Borrowing Bits to Create Subnets
 Borrowing 1 bit 21 = 2 subnets
Subnet 1
Network 192.168.1.128-255/25
Mask: 255.255.255.128
Subnet 0
Network 192.168.1.0-127/25
Mask: 255.255.255.128
Borrowing 1 Bit from the host portion creates 2 subnets with the same subnet mask
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv4 Network
Subnets in Use
Subnet 0
Network 192.168.1.0-127/25
Subnet 1
Network 192.168.1.128-255/25
Subnets in Use
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv4 Network
Subnetting Formulas
Calculate number
of subnets
Calculate number
of hosts
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv4 Network
Creating 4 Subnets
Borrowing 2 bits to create 4 subnets. 22 = 4 subnets
Creating 4 Subnets
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv4 Network
Creating Eight Subnets
Borrowing 3 bits to Create 8 Subnets. 23 = 8 subnets
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv4 Network
Creating Eight Subnets (Cont.)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv4 Network
Creating Eight Subnets (Cont.)
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Determining the Subnet Mask
Subnetting Based on Host Requirements
Two considerations when planning subnets:
 Number of subnets required
 Number of host addresses required
Formula to determine number of usable hosts: 2^n-2
 2^n (where n is the number of remaining host bits) is used to
calculate the number of hosts.
 -2 (The subnetwork ID and broadcast address cannot be used on
each subnet.)
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Determining the Subnet Mask
Subnetting Network-Based Requirements
Calculate the
number of subnets:
 2^n (where n is the
number of bits
borrowed)
 Subnet needed for
each department.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Determining the Subnet Mask
Subnetting To Meet Network Requirements
 Balance the
required number of
subnets and hosts
for the largest
subnet.
 Design the
addressing scheme
to accommodate
the maximum
number of hosts for
each subnet.
 Allow for growth in
each subnet.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Determining the Subnet Mask
Subnetting To Meet Network Requirements
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Variable Length Subnet Masking
Traditional Subnetting Wastes Addresses
 Traditional subnetting –
Uses the same number
of addresses is allocated
for each subnet.
 Subnets that require
fewer addresses have
unused (wasted)
addresses; for example,
WAN links only need two
addresses.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Variable Length Subnet Masking
Variable Length Subnet Masks (VLSM)
 The variable-length subnet
mask (VLSM) or
subnetting a subnet
provides more efficient
use of addresses.
 VLSM allows a network
space to be divided in
unequal parts.
 Subnet mask varies,
depending on how many
bits have been borrowed
for a particular subnet.
 Network is first subnetted,
and then the subnets are
resubnetted.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Variable Length Subnet Masking
Basic VLSM
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Variable Length Subnet Masking
VLSM in Practice
 Using VLSM subnets, the LAN and WAN segments in example
below can be addressed with minimum waste.
 Each LANs will be assigned a subnet with /27 mask.
 Each WAN link will be assigned a subnet with /30 mask.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Variable Length Subnet Masking
VLSM Chart
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23
9.2 Addressing Schemes
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Structured Design
Planning to Address the Network
Allocation of network addresses should be planned and documented
for the purposes of:
 Preventing duplication of addresses
 Providing and controlling access
 Monitoring security and performance
Client addresses – Usually dynamically assigned using the Dynamic
Host Configuration Protocol (DHCP).
Sample
Network
Addressing
Plan
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25
9.3 Design Considerations
for IPv6
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv6 Network
Subnetting Using the Subnet ID
An IPv6 Network Space is subnetted to support hierarchical, logical
design of the network
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv6 Network
IPV6 Subnet Allocation
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subnetting an IPv6 Network
Subnetting into the Interface ID
IPv6 bits can be borrowed from the interface ID to create additional
IPv6 subnets.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
9.3 Summary
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 9: Summary
In this chapter, you learned that:
 Subnetting is the process of segmenting a network, by dividing it into
multiple smaller network spaces.
 Subnetting a subnet, or using VLSM, was designed to avoid wasting
addresses.
 IPv6 address space is subnetted to support the hierarchical, logical
design of the network.
 Size, location, use, and access requirements are all considerations
in the address planning process.
 IP networks must be tested to verify connectivity and operational
performance.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

DOCX
PPTX
Birch Algorithm With Solved Example
PPTX
Group policy Best Practices
PPTX
PDF
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
PPTX
Huffman Coding
PPT
Data Mining: Concepts and Techniques (3rd ed.) — Chapter 5
PPT
Lesson08_static11
Birch Algorithm With Solved Example
Group policy Best Practices
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
Huffman Coding
Data Mining: Concepts and Techniques (3rd ed.) — Chapter 5
Lesson08_static11

What's hot (11)

PPTX
Subnetting made simple
PPTX
Decision Tree - C4.5&CART
PPT
IP Subnetting
PPTX
Token bus
PPTX
Sub Netting
PPTX
iP Address ,
PPTX
Chapter 4 Classification
PPT
Network Layer
PPTX
Knn 160904075605-converted
PDF
Matroid Basics
PDF
Wireless Networking Security
Subnetting made simple
Decision Tree - C4.5&CART
IP Subnetting
Token bus
Sub Netting
iP Address ,
Chapter 4 Classification
Network Layer
Knn 160904075605-converted
Matroid Basics
Wireless Networking Security
Ad

Similar to Chapter 9 : Subnetting IP networks (20)

PPTX
Ccna v5-S1-Chapter 9
PPTX
Itn instructor ppt_chapter9_subnetting_ip_networks
PPTX
Subnetting
PPTX
8. Subnetting8. Subnetting8. Subnetting.pptx
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 9
PPTX
CCNA RS_ITN - Chapter 9
PPTX
CCNA RS_NB - Chapter 8
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
PDF
08_Subnetting_IP_Networks.pdf
PDF
08_Subnetting_IP_Networks.pdf
PPT
CCNA Discovery 2 - Chapter 4
PPTX
CCNA RS_NB - Chapter 7
PPTX
CCNA RS_ITN - Chapter 8
PPT
Exploration routing chapter_6
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 8
PDF
Week5 f2017(1)
PPTX
Ccna v5-S1-Chapter 8
PPT
CCNA Discovery 3 - Chapter 4
PPTX
10. Network Design10. Network Design.pptx
PDF
CCNAv5 - S1: Chapter 8 - Ip Addressing
Ccna v5-S1-Chapter 9
Itn instructor ppt_chapter9_subnetting_ip_networks
Subnetting
8. Subnetting8. Subnetting8. Subnetting.pptx
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA RS_ITN - Chapter 9
CCNA RS_NB - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
08_Subnetting_IP_Networks.pdf
08_Subnetting_IP_Networks.pdf
CCNA Discovery 2 - Chapter 4
CCNA RS_NB - Chapter 7
CCNA RS_ITN - Chapter 8
Exploration routing chapter_6
CCNA 1 Routing and Switching v5.0 Chapter 8
Week5 f2017(1)
Ccna v5-S1-Chapter 8
CCNA Discovery 3 - Chapter 4
10. Network Design10. Network Design.pptx
CCNAv5 - S1: Chapter 8 - Ip Addressing
Ad

More from teknetir (20)

PDF
آموزش کوتاه و کاربردی Nmap
PDF
CEHv9 : module 18 - cryptography
PDF
CEHv9 : module 17 - cloud computing
PDF
CEHv9 : module 16 - evading ids firewalls and honeypots
PDF
CEHv9 : module 14 - hacking wireless networks
PDF
CEHv9 : module 15 - hacking mobile platforms
PDF
CEHv9 : module 13 - SQL injection
PDF
CEHv9 : module 12 - hacking web applications
PDF
CEHv9 : module 11 - hacking web servers
PDF
CEHv9 : module 10 - session hijacking
PDF
CEHv9 : module 09 : denial of service
PDF
CEHv9 : module 08 - social engineering
PDF
CEHv9 : module 07 - sniffing
PDF
CEHv9 : module 06 - malware threats
PDF
CEHv9 : module 05 - system hacking
PDF
CEHv9 : module 03 - scanning networks
PDF
CEHv9 : module 02 - footprinting and reconnaissance
PDF
CEHv9 : module 01 - introduction to ethical hacking
PPTX
Chapter 22 : network address translation for IPv4
PPTX
Chapter 21 : DHCP
آموزش کوتاه و کاربردی Nmap
CEHv9 : module 18 - cryptography
CEHv9 : module 17 - cloud computing
CEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 14 - hacking wireless networks
CEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 13 - SQL injection
CEHv9 : module 12 - hacking web applications
CEHv9 : module 11 - hacking web servers
CEHv9 : module 10 - session hijacking
CEHv9 : module 09 : denial of service
CEHv9 : module 08 - social engineering
CEHv9 : module 07 - sniffing
CEHv9 : module 06 - malware threats
CEHv9 : module 05 - system hacking
CEHv9 : module 03 - scanning networks
CEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 01 - introduction to ethical hacking
Chapter 22 : network address translation for IPv4
Chapter 21 : DHCP

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Classroom Observation Tools for Teachers
PPTX
Cell Types and Its function , kingdom of life
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
RMMM.pdf make it easy to upload and study
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Insiders guide to clinical Medicine.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharma ospi slides which help in ospi learning
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Computing-Curriculum for Schools in Ghana
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Classroom Observation Tools for Teachers
Cell Types and Its function , kingdom of life
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Microbial diseases, their pathogenesis and prophylaxis
RMMM.pdf make it easy to upload and study
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
102 student loan defaulters named and shamed – Is someone you know on the list?
Insiders guide to clinical Medicine.pdf
PPH.pptx obstetrics and gynecology in nursing
Pharma ospi slides which help in ospi learning
human mycosis Human fungal infections are called human mycosis..pptx
Supply Chain Operations Speaking Notes -ICLT Program
O5-L3 Freight Transport Ops (International) V1.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Computing-Curriculum for Schools in Ghana
2.FourierTransform-ShortQuestionswithAnswers.pdf

Chapter 9 : Subnetting IP networks

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 9: Subnetting IP Networks Introduction to Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 9 9.0 Introduction 9.1 Subnetting an IPv4 Network 9.2 Addressing Schemes 9.3 Design Considerations for IPv6 9.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 9: Objectives Upon completion of this chapter, you will be able to:  Explain why routing is necessary for hosts on different networks to communicate.  Describe IP as a communication protocol used to identify a single device on a network.  Given a network and a subnet mask, calculate the number of host addresses available.  Calculate the necessary subnet mask in order to accommodate the requirements of a network.  Describe the benefits of variable length subnet masking (VLSM).  Explain how IPv6 address assignments are implemented in a business network.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 9.1 Subnetting an IPv4 Network
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Segmentation Reasons for Subnetting Subnetting is the process of segmenting a network into multiple smaller network spaces called subnetworks or subnets.  Large networks must be segmented into smaller subnetworks, creating smaller groups of devices and services to: • Control traffic by containing broadcast traffic within each subnetwork. • Reduce overall network traffic and improve network performance. Communication Between Subnets  A router is necessary for devices on different networks and subnets to communicate.  Each router interface must have an IPv4 host address that belongs to the network or subnet that the router interface is connected.  Devices on a network and subnet use the router interface attached to their LAN as their default gateway.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential IP Subnetting is FUNdamental The Plan Planning the Network
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv4 Network Basic Subnetting  Borrowing Bits to Create Subnets  Borrowing 1 bit 21 = 2 subnets Subnet 1 Network 192.168.1.128-255/25 Mask: 255.255.255.128 Subnet 0 Network 192.168.1.0-127/25 Mask: 255.255.255.128 Borrowing 1 Bit from the host portion creates 2 subnets with the same subnet mask
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv4 Network Subnets in Use Subnet 0 Network 192.168.1.0-127/25 Subnet 1 Network 192.168.1.128-255/25 Subnets in Use
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv4 Network Subnetting Formulas Calculate number of subnets Calculate number of hosts
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv4 Network Creating 4 Subnets Borrowing 2 bits to create 4 subnets. 22 = 4 subnets Creating 4 Subnets
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv4 Network Creating Eight Subnets Borrowing 3 bits to Create 8 Subnets. 23 = 8 subnets
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv4 Network Creating Eight Subnets (Cont.)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv4 Network Creating Eight Subnets (Cont.)
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Determining the Subnet Mask Subnetting Based on Host Requirements Two considerations when planning subnets:  Number of subnets required  Number of host addresses required Formula to determine number of usable hosts: 2^n-2  2^n (where n is the number of remaining host bits) is used to calculate the number of hosts.  -2 (The subnetwork ID and broadcast address cannot be used on each subnet.)
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Determining the Subnet Mask Subnetting Network-Based Requirements Calculate the number of subnets:  2^n (where n is the number of bits borrowed)  Subnet needed for each department.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Determining the Subnet Mask Subnetting To Meet Network Requirements  Balance the required number of subnets and hosts for the largest subnet.  Design the addressing scheme to accommodate the maximum number of hosts for each subnet.  Allow for growth in each subnet.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Determining the Subnet Mask Subnetting To Meet Network Requirements
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Variable Length Subnet Masking Traditional Subnetting Wastes Addresses  Traditional subnetting – Uses the same number of addresses is allocated for each subnet.  Subnets that require fewer addresses have unused (wasted) addresses; for example, WAN links only need two addresses.
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Variable Length Subnet Masking Variable Length Subnet Masks (VLSM)  The variable-length subnet mask (VLSM) or subnetting a subnet provides more efficient use of addresses.  VLSM allows a network space to be divided in unequal parts.  Subnet mask varies, depending on how many bits have been borrowed for a particular subnet.  Network is first subnetted, and then the subnets are resubnetted.
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Variable Length Subnet Masking Basic VLSM
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Variable Length Subnet Masking VLSM in Practice  Using VLSM subnets, the LAN and WAN segments in example below can be addressed with minimum waste.  Each LANs will be assigned a subnet with /27 mask.  Each WAN link will be assigned a subnet with /30 mask.
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Variable Length Subnet Masking VLSM Chart
  • 23. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23 9.2 Addressing Schemes
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Structured Design Planning to Address the Network Allocation of network addresses should be planned and documented for the purposes of:  Preventing duplication of addresses  Providing and controlling access  Monitoring security and performance Client addresses – Usually dynamically assigned using the Dynamic Host Configuration Protocol (DHCP). Sample Network Addressing Plan
  • 25. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25 9.3 Design Considerations for IPv6
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv6 Network Subnetting Using the Subnet ID An IPv6 Network Space is subnetted to support hierarchical, logical design of the network
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv6 Network IPV6 Subnet Allocation
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Subnetting an IPv6 Network Subnetting into the Interface ID IPv6 bits can be borrowed from the interface ID to create additional IPv6 subnets.
  • 29. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29 9.3 Summary
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 9: Summary In this chapter, you learned that:  Subnetting is the process of segmenting a network, by dividing it into multiple smaller network spaces.  Subnetting a subnet, or using VLSM, was designed to avoid wasting addresses.  IPv6 address space is subnetted to support the hierarchical, logical design of the network.  Size, location, use, and access requirements are all considerations in the address planning process.  IP networks must be tested to verify connectivity and operational performance.
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential