Sunteți pe pagina 1din 86

Subnetting For

Beginners:
IP Subnetting And
Binary Math For
Beginners - Learn
How To Easily Pass
Your CCNA!
Bonus Gift For You!
Get free access to your
complimentary book “Amazon
Book Bundle: Complete User
Guides To 5 Amazon
Products” by clicking the link
below.

>>>CLICK HERE TO
DOWNLOAD<<<
(or go to:
https://freebookpromo.leadpage
book-bundle/]
Copyright 2016 - All rights
reserved.

This document is geared towards


providing exact and reliable information
in regards to the topic and issue
covered. The publication is sold with
the idea that the publisher is not required
to render legal, financial, medical or any
professional services. If advice is
necessary, legal or professional, a
practiced individual in the profession
should be ordered.
In no way is it legal to reproduce,
duplicate, or transmit any part of this
document in either electronic means or
in printed format. Recording of this
publication is strictly prohibited and any
storage of this document is not allowed
unless with written permission from the
publisher. All rights reserved.

The information provided herein is


stated to be truthful and consistent, in
that any liability, in terms of inattention
or otherwise, by any usage or abuse of
any policies, processes, or directions
contained within is the solitary and utter
responsibility of the recipient reader.
Under no circumstances will any legal
responsibility or blame be held against
the publisher for any reparation,
damages, or monetary loss due to the
information herein, either directly or
indirectly.

The information herein is offered for


informational purposes solely, and is
universal as so. The presentation of the
information is without contract or any
type of guarantee assurance.

The trademarks that are used are without


any consent, and the publication of the
trademark is without permission or
backing by the trademark owner. All
trademarks and brands within the book
are for clarifying purposes only and are
owned by the owners themselves, not
affiliated with this document.
Table Of Contents

Introduction
Chapter 1: Fundamentals of
Networking and Subnetting
Chapter 2: Rules of IP
addresses
Chapter 3: Subnetting Basics
and Advantages
Chapter 4: What is
Supernetting and Variable
Length Subnet Mask?
Chapter 5: IPv6 for New
Generation
Chapter 6: Implementing
VLSM
Conclusion
Introduction

If you want to improve efficiency of your


system, then you need to know the
concept of subnetting. Subnetting is easy
to operate concept, but it requires
information about some of the basics. It
is an important part of networking as
everything in the world of networking is
related to IP addresses. The
communication all over the internet is
done only by IP addresses. You can send
and receive messages or data over the
internet smoothly with the help of IP
addresses.
Every organization either it is small or
large, need to perform subnetting.
Subnetting will enhance the efficiency of
the organization. Today is the world of
internet, and no one can stay away from
it. None of the body can work without
the use of networking or internet. You
can connect your organization to the
internal and external world with the help
of internet.
Other than making your computer or
network useful, if you want to appear in
CCNA exam then you need to know
about subnetting. The major part of the
test is comprised of subnetting concepts.
After reading this book, you will be
prepared for the CCNA test. The tables
and formulas given in the book will help
you out to calculate various concepts
provided in the exam.
Challenge your mind and practice all the
information given in the book. This book
will give you all the required
information about subnetting.
Chapter 1: Fundamentals of
Networking and Subnetting
Before knowing about the process of
subnetting, you need to understand some
of the basic concepts of subnetting.
These basic concepts will make it easy
for you to understand subnetting.

IP address
The world of subnetting is entirely based
on IP address. You need to understand
all the concepts related to IP address for
understanding subnetting. IP stands for
Internet Protocol. It is a code or address
in the form of a number that is given to
every router, server, computer and other
devices part of a network that is IP
based. It is a unique address that is
assigned to every network on IP for
identification. The whole building of
networking is based on IP address. Any
system cannot exist without it.
It is a 32-bit number which identifies the
sender and receiver of information
packets that are sent and received over
the internet. The address consists of two
parts, and one part consists of particular
network identifier while the other part
consists of the particular device
identifier.
Your device needs to know the IP
address of two devices, and one is its
own while other is the device wants to
communicate with. Every organization
server or router need a single valid IP
address for communication with other
servers over the internet.
If your friend wants to visit your place,
you will tell him or her your house
address. Similar is the case with IP
address if someone wants to
communicate with your server or
computer then you have to tell him or her
your IP address.
As computers, do not understand our
language, it only knows the binary
language. While computer doesn't have
any desire to learn our language, while
we need and want to understand
computers’ language as we have to
communicate with it. For an IP address,
a computer uses eight switches.
While for computer, it is not switches
but bits out of binary language. The
working of these bits is similar to that of
switches. You can say that as switches
have on and off option, similarly one is
for on option and 0 is for off option.
When eight different switches or bits
combined makes an IP address. The bits
are combined in various combinations.
Now you must be thinking that how many
combinations can be made using these 8
bits. You can figure out the answer by
using a simple mathematical formula. A
single bit can take one of the two
possible positions, so it is written as
2x1. While there are two bits, each bit
will represent each of the two positions,
so it is written as 2x2. Similar is the
case with three bits, and you will write
2x2x2.

Following are some of the powers of 2


written below.
21 = 2
22 = 4
23 = 8
24 = 16
25 = 32
26 = 64
27 = 128
28 = 256
29 = 512
210 = 1024
211 = 2048
212 = 4096
213 = 8192
214 = 16384
215 = 32768
216 = 65536
217 = 131072
218 = 262144
219 = 524288
220 = 1048576
And so on….

While the original question was related


to eight bits. The answer for 28 equals to
256 therefore in any manner the
combination of 1 and 0 is made, 256
unique combinations can be done. The
counting for computers is quite different
from us.
For example, for us in mathematical
counting, zero has no value, but on a
computer, language zero is a number.
The other different thing from our
counting and computer binary counting is
that we must read them from right to left.
Each bit from right to left will have a
double value from the previous left
number.
IP address is written in the form of
dotted notation. Each number is
separated from another number by a dot.
These dots are often known as decimal
points. For example,
168.0.1.0.
Octet refers to the each of the decimal
numbers in an IP address. The word byte
is replaced with the word octet in the
world of IP addresses. Many people
assume that their computer owns an IP
address, but the reality is that network
card of their computer has an IP address.
For example, a router has various
network interfaces connected with it at
one time. Each network interface in the
router has its unique IP address. Similar
is the case if you place 2 Ethernet cards
in your computer for forwarding
information packets using both cards
then you will need a unique IP address
for both cards.

Basic types of IP address


IP addresses have two main types.
a) Static IP address
b) Dynamic IP address

1. Static IP address
As the word static depicts, it is a
permeant and fixed IP address. ISPs
(Internet Service Provider) assigns a
static IP address to the computers. SSL
encryption can only be used for the static
IP address. When you are sending, or
receiving any sensitive data, over the
internet than this encryption protects that
data. It also prevents any third party to
interfere or intercept the information.

2. Dynamic IP address
When you connect to a certain network,
the IP address assigned to you is called
Dynamic IP address. It is a temporary IP
address that ends when your connection
with that certain computer ends. When
you connect with the other computer, you
will get a new IP address.
The dynamic IP address is given by
DHCP to your computer or every other
computer when it gets connected to a
network. This IP address allows
temporary communication among two
different servers or networks. As soon
as the connection ends, this IP address is
discarded as well.
IP host
When a device can communicate with
any other device that means it can send
and receive data or information in the
form of packets using an IP address, such
device is called IP host.
Chapter 2: Rules of IP
addresses

No need to panic, there are not a huge


list of rules of an IP address. There are
only four basic rules of IP address that
you need to keep in your mind for
understanding them.
1. An IP address is divided into four
main parts or sections known as the
octet.
2. The IP address is written in the form
of dotted notation.
3. The IP address has 32-bits
4. IP address is divided into two
sections of portions, and one is
network portion while other is a host
portion.
An octet is a Latin word for eight. As we
told earlier, that an octet has eight parts
or bits. Every octet can range from 0 to
255 value.
Well, we already mentioned it as well
that each octet is separated by dots or
decimals. Dots are used for breaking the
monotony between eight different octets.
32-bits long refers to that an octet has 32
zeros and ones.
The two portions are discussed in this
chapter later.
For example,
123.32.14.23
The above example has all the four rules
mentioned above. Counting an IP
address is not an easy task. It is tricky to
some extent. Therefore, you need to
learn it. You must be thinking that how
counting of an IP address is tricky, it is
because of each octet in an IP address
work in an independent way. Increment
to the right octet from 0 to 255, and then
the right most number will be one while
the left most number slot will be taken
by zero.

Public and Private IP Addresses


IP addresses are divided into two major
groups
a. IP address for public use
b. IP address for private use

IP address for private use


Like a phone, a network is extended to
any certain organization similarly public
IP address works. For example, on
calling a certain person in any group, an
operator will receive the call. You will
tell him about the person to whom you
want to talk to. The operator will
transfer your call to the phone of that
specific person.
The network administrator of a private
IP address can increase the size of a
system. The private IP address is only
visible to the people that are connected
to that organization. While concerning
Public IP address, all the traffic over the
internet can view it. The logic behind
Private IP address is that the traffic on it
must be local. After understanding this
fact, any person can use it. By having a
Private IP address, you can easily
separate as well as combine the different
departments of an organization without
creating any confusion among them.

Document or register your IP address


Once you got an IP address, you must
have to register it. Documenting your IP
address is as important as creating one.
Documentation of IP address will save
you from a number of issues.
Access to network
Accessibility to the network or to that
specific IP address is improved once
your document it. The overall
performance of your server is enhanced
by getting proper access to your IP
address.

Duplicate Address
If you do not register or document your
IP address, there is a chance that a
duplicate address may be created. By
recording your IP address, you can keep
it unique and avoid the copying or
duplication of that specified address.
Chapter 3: Subnetting
Basics and Advantages

Subnetting refers to a process that


divides a network to various smaller
networks to create subdivisions of an IP
address. The computer networks that
belong to these divisions refers to
subnets. These subnets have different bit
groups. Whether you are a coder or a
newbie in the tech world, understanding
subnetting is important for all of you.
Here a question arises that why there is
a need for subnets or why a person will
need a subnet? Let imagine that as a user
need to talk or communicate with
different networks. For example, email
websites need to talk to servers,
communicate with printers or other such
things. For making this communication
possible and effective, subnetting is
necessary.
For example, there is an organization. A
single organization will have a number
of networks that communicate with each
other and with an external world.
Groups are made where different
systems or even different department
networks’ groups are created. These
groups are created for organizing the
networks in a perfect manner that will as
a return increase the overall efficiency
of the organization.
For example, there is a group of printers
in the finance department of a sugar mill
and a group of printers in the
administration department of that similar
mill. If every person in finance
department will also see all the other
printer available in administration
department, it will create an issue.
For that reason, you need to limit the
number of printers that a person sitting in
any certain department can view. By
giving different subnets to each
department, printers will make it
possible to limit the number of printers
that a person can see.
From the above example, you can also
say that subnetting is a process of
organizing your organization’s networks.
While subnets are organized networks of
various connected devices. Each device
containing a unique subnet is associated
with other similar subnets logically. By
separating different networks with the
help of different subnet, you prevent that
confusion that will be created if all the
networks work in the same place.
Advantages of subnetting
There are several advantages that
subnetting offers to its users. Some of
these advantages are given below.
• Prevents Unnecessary
Broadcasts
Computers which are connected to
networks send information on a regular
basis to all the computers that are in that
certain network, which is known as
broadcast. Malware, viruses and other
such programs create these broadcasts.
For a network that contains few
computers, these broadcasts will not
create many issues.
On the other hand, for a large company,
where a large number of computers are
connected to a network it is an issue.
The broadcast will slow down
computers in such network. Slowing
down of the computers will affect the
overall efficiency of the organization.
Subnets restrict these broadcasts to a
certain limit. By creating small groups of
large networks, these subnets restrict the
virus or malware to that certain small
network and prevent its spread to the
overall system.
• Increases Security Options
The different security networks evaluate
traffic over that networks. By putting
your network over a subnet, you increase
its security. Subnet make it difficult to
deploy or use any of that sensitive
information. When you divide a large
network into different subnets, you
enhance security measures of a network
that are known as firewalls.
When you put your subnet under a
firewall that only the authorized person
can get access to that certain network.
Any third party cannot intercept in the
following network. Many of the
computers connected to a network
contain sensitive information. By using
subnets, you secure that sensitive data.
• Simplifies Administration
Different departments in an organization
need to get access to various kinds of
information or resources. If the accounts
departments and the finance department
of any organization are on the same
network than by host-by-host, their
access to the network will be restricted.
When you place both the departments on
different subnets, then they can make
their security changes according to their
need.
• Controls Growth
When a network is planned, you can
control the number of hosts and subnet
masks available over the network. You
can control the growth of your network
by properly planning it. You can design
the network in such a way that you will
have a certain number of networks
available that is equal to the expected
hosts over each of the subnets. By
controlling the growth of your network,
you can make its working better.
Disadvantages
Like every other thing, subnetting has
few drawbacks as well that force people
to think twice before they create subnets.
Few drawbacks of subnetting that a user
may experience are given below.
• Expensive
The equipment that you may need for
your network like routers, hubs,
switched, bridges, etc. are quite costly.
The prices are decreasing with the
passage of time, and you can find cheap
products today on the market as well, but
the good and reliable stuff is still
expensive.
• Support
An experienced administrator of a
network is required for the process of
network management or subnetting.
Therefore, you need to hire a person for
this purpose. Hiring a person will
increase the cost of an overall project.
You will need the support of an
experienced user while the user will
cost money for his services.
The process is quite confusing and needs
certain information for performing it
properly. You need to pay attention to
every minor detail of the network. For
that purpose, hiring an expert is a better
idea rather than doing it your own. Any
mistake can cost you more money than
that of the expert fee.

Classful and classless addressing

Classful addressing
The IP addresses in classful addressing
are divided into five classes including
A, B, C, D and E. The class A, class B
and class C are the classes that are
frequently used while Class D is used
only for multicast and is occasionally
used. The class E is not used currently
and is reserved. Each of the IP address
in classful addressing is part of any of
these classes.
Initially, the classes IP addressing has no
name. When the name classless IP
address is derived then it is also named
as classful IP addressing. The main
disadvantage that you will have to bear
while using classful IP address is that it
lacks flexibility. A number of complete
address that is assigned to a certain
device is also restricted.
The information sent to classful IP
address is sent to the whole system
rather than that specific subnet. A subnet
based over the locally configured
subnets will be supplied by a router.
When the subnet mask is similar, classful
IP addressing can be used by a certain
group of networks.
Classes of IP address
Each IP class can have a fixed number of
a host as well as a fixed number of
networks. There is no flexibility
regarding the number of hosts and
networks in any certain class. You can
only have those the fixed numbers for the
proper working of the system. The
contrast from this one, classless routing
is flexible where you can have the
number of hosts and networks according
to go to your choice.

1. Class A subnets
The first octet in the subnets that
belonged to class A is Network
identifier while the other three octets are
for Hosts. For making a subnet in class
A, subnet mask is changed and bits are
borrowed from the Host part of address.
Network Subnet Bits Subn
Bits Mask borrowed
8 255.0.0.0 0 1
9 255.128.0.0 1 2
10 255.192.0.0 2 4
11 255.224.0.0 3 8
12 255.248.0.0 4 16
13 255.254.0.0 5 32
14 255.255.0.0 6 64

1. Class B subnets
You can increase the number of subnets
in class B in the similar way as it is
done in class A that is by borrowing bits
from the Host part of the address.
Fourteen bits are used as the network
bits that provides 214 networks which is
equal to 16384 while 216-2 hosts that is
equal to 65534.
Network Subnet Mask Bits Su
Bits borrowed
16 255.255.0.0 0 0
17 255.255.128.0 1 2
18 255.255.192.0 2 4
19 255.255.224.0 3 8
20 255.255.240.0 4 16
21 255.255.248.0 5 32

2. Class C subnets
It is a type of class that is suitable and
assigned to a network that has small
size. It is given to a small network as it
only contains 254 host.
Network Subnet Mask Bits
Bits borrowed
24 255.255.255.0 0
25 255.255.255.128 1
26 255.255.255.192 2
27 255.255.255.224 3
28 255.255.255.240 4
29 255.255.255.248 5
30 255.255.255.252 6

Classless IP addressing
The system of classless IP address is
also known as Classless Inter-Domain
Routing (CIDR). It is a flexible way of
allocating domains or IP addresses to the
networks. It is not fixed as that of the
classful IP address. For example, if a
person needs hosts more than 254 but
less than 65533, then there is no option
other than to choose class B. With the
invention of CIDR, the internet is getting
consumed with IP address, and space is
getting short. It made the mechanism
easy by not fixing any certain value and
then dividing it into various classes.

Important subnetting formulas


• Valid subnet
You can calculate valid subnet in a
simple method that consists of two steps.
a) Start by calculating the total
number of subnets that are present
b) After calculating total number,
calculate the block size of each
subnet

• Block size
A valid subnet is calculated with the
help of block size which is a number that
defines the total size of a block. A host
address, network address, and a
broadcast address are included in block
size.
Block size = Subnet mask – 256
• Total hosts
The number of hosts that are present
over a certain subnet is known as total
hosts.
Total Hosts = 2H (H refers to the number
of hosts)
• Valid hosts
Valid hosts are the one that can be
assigned to the devices. You can find out
the total number of valid hosts by taking
out two from the total hosts.
Valid host = Total hosts – 2

Broadcast address
Broadcast address refers to the last
address of any subnet. It can only be
used by network ID and any other host
cannot use it.
IPv4
The first version of IP that was used by
the public was IPv4. DARPA agency
located in US Department of Defense
agency designed this version. It laid the
foundation of World Wide Web and
internet as well. It contains numbers that
are equal to 32 bits. Quad-dotted
notation is used for writing such kind of
IP addresses. It has a capacity to create
almost 4.4 billion of IP addresses.
Well the main aim behind its designing
was to test a networking concept. With
the passage of time, it became a tool that
take the networking space. When the
concept of classless addressing
emerged, it became evident that few
changes are required in the world of
networking and few improvements are
needed in IPv4 version.
Chapter 4: What is
Supernetting and Variable
Length Subnet Mask?
You may have heard about the
supernetting, and it confuses you that
what this concept refers to. The simplest
definition of supernetting, when you are
aware of the subnetting concept, it is
opposite to subnetting. In supernetting,
an IP address is created for the purpose
of routing. Two or more than two small
subnets are combined for making a large
segment of a network.

Differences between subnetting and


supernetting
There are many differences among both
the terms and few are as under.
In subnetting, a large segment is
broken into smaller subnets while in
supernetting smaller subnets are
combined in a large segment
The primary purpose of subnetting is
to decrease the internet traffic while
supernetting is aimed to reduce the
overall table size of routing
In subnetting broadcast traffic over
the subnets is broken down while in
supernetting, broadcast traffic in
between the routers is curtailed.

Variable Length Subnet Mask


Variable Length Subnet Mask is also
known as VLSM. An IP address is
referred to VLSM when it has more than
one subnet mask. A subnet is divided
into a number of small subnets in VLSM
by the process of subnetting that is done
according to the need of that network.
You can also call VLSM as a form of
classless IP address as there are no
classes available of subnets masks
containing variable lengths.

Process of VLSM subnetting


The process of VLSM subnetting is
divided into various steps that are given
as under,
Look at the host address and locate
the largest number
Do subnetting according to the need
of network
It is time for assigning process of
small subnets to large segments of a
network
After looking at the first largest number
and completing the process, it is now
time to locate second largest number.
After finding second largest number,
repeat the other steps. You need to
continue this process until you have done
the last network as well.
The conventional method that was used
for IP addressing was FLSM, that do not
allow a number of subnets masks on a
similar network that as a result effect the
overall performance of the system.
VLSM eliminated this problem and
allowed the creation of different subnet
masks to same network.
Chapter 5: IPv6 for New
Generation

It is the most recent version of IP


address. IETF (Internet Engineering Task
Force) developed IPv6 after the
exhaustion of IPv4 and replaced it.
There are a number of benefits that IPv6
provides to its users. One of the major
benefits is the large space for
addressing.
The hierarchal method is used for the
allocation of IP address that enhances
the aggregation of a route across the
Internet and restrict the growth of a
number of routing elements or tables. It
is one of the forms of multicast IP
address that is quite simple and easy to
operate. IPv6 boost the usage and data
delivery services of the internet.
Configuration and security were
considered as major elements while
designing IPv6. The manufacturers also
paid attention over the mobility of the
devices which was the major need of
time. Four hexadecimal words or digits
are divided into eight different groups in
IPv6.

Main features
IPv6 is loaded with a number of worthy
features, some of which are given as
under.
One of the primary features that it
offers is a better addressing space
It simplifies the operations of IP
address and numbering system of
networks
The responsibility of fragmentation
of packets is placed over the end
points that simplify the mechanism of
routers packets
The portion of host identifier in IPv6
is limited to 64 bits that gives a
standard size of a subnet
It does not follow the procedure of
IPv4 or move forward over its
footprints but it is an independent IP
network
Translator gateways are required for
transferring data or information in
between IPv4 and IPv6

Comparison of IPv6 with IPv4


As you that sending and receiving of
data over the internet is done in the form
of a packet. IPv6 is a new format of
packet that was introduced recently and
tried to eliminate the problems, people
are facing while using IPv4. As the
designers or manufacturers of the two
packets are different therefore there are
number of differences between both the
format of packets. Most of the systems
can used IPv6 without making so much
changes in their system but there are
various elements where a conflict is
created among both the packet formats.
• Large space
One of the primary element that
differentiate both the packet sizes is
large address size. As you know that
IPv4 offers only 32 bits while IPv6
offers 128 bits which is a huge space.
The allocation method of IPV4 was also
poor that utilized most the addresses
available within few years of its usage.
The method of allocation of IPv6
increases is stable and simplified. The
size of a standard subnet in IPv6 is
almost equal to 264, which is nearly
double to the size of subnet in IPv4. The
rates of IPv6 are even less than that of
IPv4 but the numbering and allocation
method is near to perfect.
• Multicasting
By just selecting the send option one
time, you can send or transmit the packet
to a number of different destinations
which is another major element of IPv6.
It was an optional feature in IPv4 which
is improved in IPv6. IPv6 shares few
common protocols and features with
IPv4. Some changes are also made in
IPv6 and the need for many protocols is
eliminated. There is a number of
multicast groups available over IPv6 for
using various multicast applications.
• Network-layer security
The concept of security was created for
IPv6 with the name of IPsec (Internet
Protocol Security). It is one of the
specification of IPv6 that is mandatory.
The security features made the
transferring of packets of information,
from sender to receiver, easy.
• Mobility
You can move to a connection point of a
new router without renumbering the
router. This feature is missing in IPv4.
This mobility feature was most
demanding one that was recognized by
the manufacturers and they added this
feature in IPv6.
• Options extensibility
The minimum size of the packet header
of IPv6 is equal to 40 octets. You can
extend the size of protocol without
effecting the core structure of the packet.
• Privacy
IPv6 works on the principle of end-to-
end for a network design. Under this
system, every network or computer has a
unique address to which you can reach
globally. IPv6 makes the use of this IP
address more private and there is no
interference from the third party in the
usage of IP address.
• Simplified processing
The processing of routers on IPv6 is
quite simple as compared to that of IPv4.
The processing of sending and receiving
of the packets has become more
efficient. The header of the packet of
IPv6 is in simplified form as well in
comparison to that of IPv4. No IP
fragmentation is required for IPv6. The
header of IPv6 is not under the
protection of checksum.
Format of Packet
The packet of IPv6 is divided into two
parts,
A header
A payload
The header of the packet has minimal
functionality in a fixed portion. For
implementing optional features, you need
to follow some of the extensions that are
optional. The header that is fixed
occupies 320 bits (first forty octets) of
the packet of IPv6. There are destination
and source addresses, options of
classifications of traffic, and an optional
payload that follows the fixed header.
Next Header informs the receiver that
how a receiver can interpret the data
followed by the header. Options for
special treatment of a packet are carried
by extension headers. Without any of the
special option, a payload is less than
sixty-four KB.

Addressing
The addresses of IPv6 has 128 bits. The
design of the address of IPv6 is quite
different from that of the design of the
IPv4. By having this design, subnetting is
done for improving the efficiency of the
network as it utilizes the small space of
address. The space of IPv6 is large
enough that you can use it easily in
future.
Representation of address
There are eight groups of total 128 bits
of IPv6 where each of the group has 16
bits. Each of the group is written in 4
hexadecimal numbers. Each of the group
is separated by colons.
You can shorten the address in IPv6 into
small notation by following two basic
rules,
Remove the one or more than one
leading zeros from any of the IP
address group, and you can either
remove all zeros or not even a single
one.
The consecutive zeros are replaced
by double colons. You can use these
double colons once in the address
Domain Name System of IPv6
In Domain Name System, AAAA source
records are used for mapping of
hostnames known as quad-A records.
The domain is reserved by the IETF,
where the name of the domain is divided
hierarchically.

Software of IPv6
The host software can handle only one
form either IPv4 and IPv6 or it can also
support dual-stack of both IP addresses
in your software. Most of the computers
that are working under the recent
operating systems supports IPv6.
How IPv6 will affect?
Though the IP address do not have a
major effect on your life but with the
passage of time, it is becoming the need.
One of the major reason that you need to
switch from IPv4 to IPv6, like most, of
the operating systems today support
IPv6. Still there are various devices like
servers and routers that do not support
IPv6. There are still many bugs and
security lapses in IPv6 as it is still in the
growing period.
With the passage of time, manufacturers
are trying to fix these problems. As IPv6
offers more features than that of IPv4.
Therefore, it is better to use the updated
version rather than an outdated version.
No matter you will have to pay few
more bucks for getting the system
installed but your web will function in a
better way.
Chapter 6: Implementing
VLSM

Implementing VLSM
A person need to understand all the data
about the available hosts and blocks of
IP address for implementing VLSM in an
efficient way. You can memorize this
information by creating a table
containing VLSM networks. The table
given below shows the subnetting
process for a subnet of Class C.
Subnet Block Mask Hosts
Prefix Size
26 64 255.255.255.192 62
27 32 255.255.255.224 30
28 14 255.255.255.240 14
29 6 255.255.255.248 6
30 2 255.255.255.252 2

When this table is present in front of


you, you can quickly perform the sums.
Well during an exam, you will not have
it in front of you for that reason it is
better to memorize this table.
Create a number of such tables for each
class and then memorize it. Such tables
will help you out to perform the sums
easily during CCNA exams.

Tips
Following are tips that will help you out
while making the tables for a
preparation of the CCNA tests.
Keep in your mind that for increasing
the size of subnet, bits are taken from
the host part of the address and is
added to the network part
IP address are different when it has
different network bits that mean that
those IP addresses are meant for two
different systems
An IP address must have the total 32
bits
Out of those 32 bits, the host part of
the address must have at least 2 bits
while the network bits must have
minimum of 8 bits
IP address class is fixed and
predefined, and no one can change
the class of any certain address
Subnets are different from ordinary
processing as they move from right
to left rather than left to right
Any host can be assigned a network
address as it is reserved
Similar to network address,
broadcast address cannot be
assigned to any host as well as it is
also reserved
The bits that are allocated to a class
initially cannot be altered
Number of bits and octet in any
subnet can be identified by a subnet
mask
CCNA exams
CCNA stands for Cisco Certified
Network Associate, which is a form of
an exam. It tests or asks about the
general knowledge of candidate related
to the networking process. Subnetting is
a major part of CCNA exams that
includes many numerical sums related to
it.
As subnetting includes a number of
formulas and classes, therefore, you
need to remember all the formulas for
getting good grades in it. Installation,
operation, and configuration of different
networks and routes are also asked. A
person must have any ability to connect
to a number of different WLAN sites
along with verification of this
connection.
Conclusion

Subnetting is a simple process of


breaking up a large network segment into
small subnets. The primary purpose of
creating these subnets is to decrease the
burden over your PC as well as to
increase the security of your networks. It
is also effective for an organization as it
separates each of the department of any
certain organization that will eliminate
the chances of confusion.
It is an easy concept but requires general
knowledge related to IP address. Almost
all of the operating systems that are
available today supports the latest
version of IP addressing. The only issue
of drawback that people complain about
before switching to subnetting is that it
will increase the price of the system.
You will have to purchase certain
devices for the conducting the process
correctly but subnetting worth your
money. Once you switch to subnetting,
you will be happy with your decision.
All the basics of subnetting are given in
this book that will help you out to
perform it in an efficient way. Then what
are you waiting for, start subnetting and
increase the efficiency of your system.

S-ar putea să vă placă și