Академический Документы
Профессиональный Документы
Культура Документы
IP Networks
Introduction to Networking
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Network Segmentation
Reasons for Subnetting
Large networks need to be segmented into smaller sub-networks,
creating smaller groups of devices and services in order to:
Control traffic by containing broadcast traffic within subnetwork
Reduce overall network traffic and improve network performance
Subnetting - process of segmenting a network into multiple smaller
network spaces called subnetworks or Subnets.
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Basic Subnetting
Subnetting allows for creating multiple logical networks from a
single address block.
We create subnets by using one or more of the host bits as network bits.
This is done by extending the mask to borrow some of the bits from the
host portion of the address to create additional network bits.
The more host bits used, the more subnets that can be defined.
For each bit borrowed, we double the number of subnetworks available.
For example, if we borrow 1 bit, we can define 2 subnets. If we borrow 2 bits,
we can have 4 subnets.
But, with each bit we borrow, fewer host addresses are available per subnet.
Borrowing 1 Bit from the host portion creates 2 subnets with the same subnet mask
Subnet 0 Subnet 1
Network 192.168.1.0-127/25 Network 192.168.1.128-255/25
Mask: 255.255.255.128 Mask: 255.255.255.128
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
PC 1
192.168.1.2 /25
Sw PC 192.168.1.3 /25
Broadcast Domain
PC
192.168.1.130 /25
Sw PC 192.168.1.131 /25
Subnet 1
Subnet Add: 192.168.1.128
Broadcast: 192.168.1.255
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Subnet 0
Network 192.168.1.0-127/25
Subnet 1
Network 192.168.1.128-255/25
1) The calculation 2number_ of_ host_ bits yields the "magic" number.
We have 5 host bits remaining so..
25 = 32 - our "magic" number.
2) Given a mask for example 255.255.255.224
Magic number = 256
-224
Presentation_ID 32 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Subnetting - Class B
Let's try one.
You are the network administrator for a world-wide organization
with 7,500 users.
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Subnetting - Class B
You have decided to use the Class B private address of
172.25.0.0 / 16
Head Office
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Subnetting Class B
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Subnet a subnet..
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Structured Design
Planning to Address the Network
Allocation of network addresses should be planned and
documented for the purposes of:
Preventing duplication of addresses
Providing and controlling access
Monitoring security and performance
Addresses for Clients - usually dynamically assigned using
Dynamic Host Configuration Protocol (DHCP)
Sample Network
Addressing Plan
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Subnet 0
(Student) 192.168.1.63 Broadcast Address
Subnet 1 192.168.1.64 Network Address 30 usable addresses, 25
(Lecturer) 192.168.1.65 /27 1st Usable Hostt required so 5 waste
addresses.
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36