SlideShare a Scribd company logo
Network Layer
Subnetting
Subnetting
• Subnetting is a method of dividing a single physical network into logical sub-
networks (subnets).
• Subnetting allows a business to expand its network without requiring a new
network number from its Internet service provider.
• Advantages
• Subnetting helps to reduce the network traffic and also conceals network complexity.
• Reallocating IP Addresses:- A limited number of host allocations are available for each class; so to allocate
more ip adreesses ,we can do subnetting.
• Improves Network Speed:- It reduces traffic so increases speed.
• Improving Network Security:- Subnetting helps network administrators to reduce network-wide threats
• Reliving Network Congestion:- Without a subnet, data packets from every other computer on the network
would be visible to all computers and servers.
• Efficiency:- Subnetting is used to simplify network traffic by eliminating the need for additional routers.
Subnetting
• Two level of hierarchy(No Subnetting)
• Each address in the block can be considered
as a two-level hierarchical structure:
the leftmost n bits (prefix) define the network;
the rightmost 32 - n bits define the host.
• Three-Levels of Hierarchy: Subnetting
• An organization that is granted a large block
of addresses may want to create clusters of
networks (called subnets) and divide the
addresses between the different subnets. The
rest of the world still sees the organization as
one entity; however, internally there are
several subnets
Example of subnetwork
• suppose an organization is given the block 17.12.40.0/26, which
contains 64 addresses.
• The organization has three offices and needs to divide the
addresses into three subblocks of 32, 16, and 16 addresses. We can find
the new masks
by using the following arguments:
1. Suppose the mask for the first subnet is n1, then 2 32- n1 must be 32,
which means
that n1 = 27.
2. Suppose the mask for the second subnet is n2, then 2 32- n2 must be
16, which
means that n2 = 28.
3. Suppose the mask for the third subnet is n3, then 232- n3 must be 16,
which means
that n3 = 28.
19.5
Figure 1 Configuration and addresses in a subnetted network
Finding Subnet address
• find the subnet addresses from one of the addresses in
the subnet.
a) In subnet 1, the address 17.12.14.29/27 can give us the subnet address if we use the
mask /27 because
Host: 00010001 00001100 00001110 00011101
Mask: /27
Subnet:00010001 00001100 00001110 00000000 .... (17.12.14.0)
b) In subnet 2, the address 17.12.14.45/28 can give us the subnet address if we use the
mask /28
Host: 00010001 00001100 00001110 00101101
Mask: /28
Subnet: 00010001 00001100 00001110 00100000 .... (17.12.14.32)
c) In subnet 3, the address 17.12.14.50/28 can give us the subnet address if we use the
mask /28 because
Host: 00010001 00001100 00001110 00110010
Mask: /28
Subnet: 00010001 00001100 00001110 00110000 .... (17.12.14.48)
19.7
Three-level hierarchy in an IPv4 address
19.8
An ISP is granted a block of addresses starting with
190.100.0.0/16 (65,536 addresses). The ISP needs to
distribute these addresses to three groups of customers as
follows:
a. The first group has 64 customers; each needs 256
addresses.
b. The second group has 128 customers; each needs 128
addresses.
c. The third group has 128 customers; each needs 64
addresses.
Design the subblocks and find out how many addresses are
still available after these allocations.
Example 1
Figure 2
19.10
Solution
Figure 2 shows the situation.
Example 1 (continued)
Group 1
For this group, each customer needs 256 addresses. This
means that 8 (log2 256) bits are needed to define each
host. The prefix length is then 32 − 8 = 24. The addresses
are
19.11
Example 1(continued)
Group 2
For this group, each customer needs 128 addresses. This
means that 7 (log2 128) bits are needed to define each
host. The prefix length is then 32 − 7 = 25. The addresses
are
19.12
Example 1 (continued)
Group 3
For this group, each customer needs 64 addresses. This
means that 6 (log264) bits are needed to each host. The
prefix length is then 32 − 6 = 26. The addresses are
Number of granted addresses to the ISP: 65,536
Number of allocated addresses by the ISP: 40,960
Number of available addresses: 24,576

More Related Content

PDF
Subnetting-Addressing.pdf lectures for networks
PPT
ch19 (1).ppt
PPTX
Oct. 14, 2011 webcast ch7 subnets bruce hartpence
PPTX
3_IP_Address-RP. By bsnl rttc Hyderabad pptx
PPT
4a logical laddressing
PDF
Subnetting in network layer in computer networks
PPT
Subneting.ppt
PPTX
Subnetting
Subnetting-Addressing.pdf lectures for networks
ch19 (1).ppt
Oct. 14, 2011 webcast ch7 subnets bruce hartpence
3_IP_Address-RP. By bsnl rttc Hyderabad pptx
4a logical laddressing
Subnetting in network layer in computer networks
Subneting.ppt
Subnetting

Similar to subnetting _ (20)

PPTX
Network Layer Part 1
PPT
design and data anaylysis software development
PPT
network Addressing
PPTX
Subnetting Presentation
PDF
13788 3
PPTX
ch18-IPv4 and subnetvvvvvvvvvvvvting.pptx
PPTX
IP subnetting Part II for network desig.pptx
PPT
Subnetting
PPTX
subnetting
PPT
8-Additional_IPSubnetting_KED (2).ppt
PDF
How to subnet
PPT
c3b8c2b4c3b8c2a8c3b9c692c3b8c2a7c3b8c2aa3.ppt
PPT
Unit III-IP addressing.ppt from computer Networks
PPTX
IP Subneting and Bassic network fundamental.pptx
PPTX
Lecture 03 networking
PPTX
Subnetting
PPSX
Subnetting
PPT
Subnetting ked
PPTX
IP_ADDRESSING_AND_SUBNETTING.pptx
PPTX
IP addressing and subnetting.pptx
Network Layer Part 1
design and data anaylysis software development
network Addressing
Subnetting Presentation
13788 3
ch18-IPv4 and subnetvvvvvvvvvvvvting.pptx
IP subnetting Part II for network desig.pptx
Subnetting
subnetting
8-Additional_IPSubnetting_KED (2).ppt
How to subnet
c3b8c2b4c3b8c2a8c3b9c692c3b8c2a7c3b8c2aa3.ppt
Unit III-IP addressing.ppt from computer Networks
IP Subneting and Bassic network fundamental.pptx
Lecture 03 networking
Subnetting
Subnetting
Subnetting ked
IP_ADDRESSING_AND_SUBNETTING.pptx
IP addressing and subnetting.pptx
Ad

More from SwatiHans10 (20)

PPT
ip addressing _
PPT
stop and wait _
PPT
PPT
PipelineHazards _
PPT
Pipelining _
PPTX
Mobile Customer Experience Management.pptx
PPTX
Social Web multimedia analytics goals _
PPTX
Hardwires and Microprogrammed Control ,
PPTX
Restoring Algorithm _
PPTX
Non -Restoring Algorithm _
PPTX
loops _
PPT
functions _
PDF
Instruction execution cycle _
PPT
RTL,Instruction set _
PPT
Data representation _
PPTX
CAO PPT-Lect 1 _
PPTX
CIRCULAR LINKED LIST _
PPT
Transmission control protocol _
PPTX
Numpy _
PPTX
Lecture 1 .
ip addressing _
stop and wait _
PipelineHazards _
Pipelining _
Mobile Customer Experience Management.pptx
Social Web multimedia analytics goals _
Hardwires and Microprogrammed Control ,
Restoring Algorithm _
Non -Restoring Algorithm _
loops _
functions _
Instruction execution cycle _
RTL,Instruction set _
Data representation _
CAO PPT-Lect 1 _
CIRCULAR LINKED LIST _
Transmission control protocol _
Numpy _
Lecture 1 .
Ad

Recently uploaded (20)

PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
Artificial Intelligence
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Design Guidelines and solutions for Plastics parts
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
introduction to high performance computing
PPT
Occupational Health and Safety Management System
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
communication and presentation skills 01
PPTX
Safety Seminar civil to be ensured for safe working.
III.4.1.2_The_Space_Environment.p pdffdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Artificial Intelligence
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Abrasive, erosive and cavitation wear.pdf
Design Guidelines and solutions for Plastics parts
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
R24 SURVEYING LAB MANUAL for civil enggi
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
introduction to high performance computing
Occupational Health and Safety Management System
Module 8- Technological and Communication Skills.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
communication and presentation skills 01
Safety Seminar civil to be ensured for safe working.

subnetting _

  • 2. Subnetting • Subnetting is a method of dividing a single physical network into logical sub- networks (subnets). • Subnetting allows a business to expand its network without requiring a new network number from its Internet service provider. • Advantages • Subnetting helps to reduce the network traffic and also conceals network complexity. • Reallocating IP Addresses:- A limited number of host allocations are available for each class; so to allocate more ip adreesses ,we can do subnetting. • Improves Network Speed:- It reduces traffic so increases speed. • Improving Network Security:- Subnetting helps network administrators to reduce network-wide threats • Reliving Network Congestion:- Without a subnet, data packets from every other computer on the network would be visible to all computers and servers. • Efficiency:- Subnetting is used to simplify network traffic by eliminating the need for additional routers.
  • 3. Subnetting • Two level of hierarchy(No Subnetting) • Each address in the block can be considered as a two-level hierarchical structure: the leftmost n bits (prefix) define the network; the rightmost 32 - n bits define the host. • Three-Levels of Hierarchy: Subnetting • An organization that is granted a large block of addresses may want to create clusters of networks (called subnets) and divide the addresses between the different subnets. The rest of the world still sees the organization as one entity; however, internally there are several subnets
  • 4. Example of subnetwork • suppose an organization is given the block 17.12.40.0/26, which contains 64 addresses. • The organization has three offices and needs to divide the addresses into three subblocks of 32, 16, and 16 addresses. We can find the new masks by using the following arguments: 1. Suppose the mask for the first subnet is n1, then 2 32- n1 must be 32, which means that n1 = 27. 2. Suppose the mask for the second subnet is n2, then 2 32- n2 must be 16, which means that n2 = 28. 3. Suppose the mask for the third subnet is n3, then 232- n3 must be 16, which means that n3 = 28.
  • 5. 19.5 Figure 1 Configuration and addresses in a subnetted network
  • 6. Finding Subnet address • find the subnet addresses from one of the addresses in the subnet. a) In subnet 1, the address 17.12.14.29/27 can give us the subnet address if we use the mask /27 because Host: 00010001 00001100 00001110 00011101 Mask: /27 Subnet:00010001 00001100 00001110 00000000 .... (17.12.14.0) b) In subnet 2, the address 17.12.14.45/28 can give us the subnet address if we use the mask /28 Host: 00010001 00001100 00001110 00101101 Mask: /28 Subnet: 00010001 00001100 00001110 00100000 .... (17.12.14.32) c) In subnet 3, the address 17.12.14.50/28 can give us the subnet address if we use the mask /28 because Host: 00010001 00001100 00001110 00110010 Mask: /28 Subnet: 00010001 00001100 00001110 00110000 .... (17.12.14.48)
  • 8. 19.8 An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The ISP needs to distribute these addresses to three groups of customers as follows: a. The first group has 64 customers; each needs 256 addresses. b. The second group has 128 customers; each needs 128 addresses. c. The third group has 128 customers; each needs 64 addresses. Design the subblocks and find out how many addresses are still available after these allocations. Example 1
  • 10. 19.10 Solution Figure 2 shows the situation. Example 1 (continued) Group 1 For this group, each customer needs 256 addresses. This means that 8 (log2 256) bits are needed to define each host. The prefix length is then 32 − 8 = 24. The addresses are
  • 11. 19.11 Example 1(continued) Group 2 For this group, each customer needs 128 addresses. This means that 7 (log2 128) bits are needed to define each host. The prefix length is then 32 − 7 = 25. The addresses are
  • 12. 19.12 Example 1 (continued) Group 3 For this group, each customer needs 64 addresses. This means that 6 (log264) bits are needed to each host. The prefix length is then 32 − 6 = 26. The addresses are Number of granted addresses to the ISP: 65,536 Number of allocated addresses by the ISP: 40,960 Number of available addresses: 24,576