Chapter :2
Subnetting
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Outline
❑The Binary Number System
❑Dotted Decimal Notation
❑Subnetting ▪
▪ Advantages of Subnetting
▪ Default Subnet mask ▪
▪ Custom subnet mask ▪ Disadvantages of Subnetting
▪ Range of subnet
❑Virtual LAN (VLAN)
▪ bit borrowing
▪ No of subnet
▪ No host
▪ No of valid host
2
4.1 INTRODUCTION
▪ The identifier used in the IP layer of the TCP/IP protocol
suite to identify each device connected to the Internet is
called the Internet address or IP address.
▪ An IP address is a 32-bit address that uniquely and
universally defines the connection of a host or a router to
the Internet.
▪ IP addresses are unique. They are unique in the sense that
each address defines one, and only one, connection to the
Internet.
▪ Two devices on the Internet can never have the same
address.
3
TCP/IP Protocol Suite 4
TCP/IP Protocol Suite 5
Note 1:
An IP address is a 32-bit address.
9
Note 2:
The IP addresses are unique.
10
Note 3:
The address space of IPv4 is
232 = 4,294,967,296 Addresses.
11
Figure 4.1 Dotted-decimal notation
12
Note:
The binary, decimal, and hexadecimal
number systems are reviewed in
13
Example 1
Change the following IP addresses from binary notation to
dotted-decimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 11100111 11011011 10001011 01101111
d. 11111001 10011011 11111011 00001111
Solution
We replace each group of 8 bits with its equivalent decimal
number and add dots for separation:
a. 129.11.11.239 b. 193.131.27.255
c. 231.219.139.111 d. 249.155.251.15
14
Example 2
Change the following IP addresses from dotted-decimal
notation to binary notation.
a. 111.56.45.78 b. 221.34.7.82
c. 241.8.56.12 d. 75.45.34.78
Solution
We replace each decimal number with its binary equivalent:
a. 01101111 00111000 00101101 01001110
b. 11011101 00100010 00000111 01010010
c. 11110001 00001000 00111000 00001100
d. 01001011 00101101 00100010 01001110
15
Example 3
Find the error, if any, in the following IP addresses:
a. 111.56.045.78 b. 221.34.7.8.20
c. 75.45.301.14 d. 11100010.23.14.67
Solution
a. There are no leading zeroes in dotted-decimal notation (045).
b. We may not have more than four numbers in an IP address.
c. In dotted-decimal notation, each number is less than or equal
to 255; 301 is outside this range.
d. A mixture of binary notation and dotted-decimal notation is not
allowed.
16
Example 4
Change the following IP addresses from binary notation to
hexadecimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
Solution
We replace each group of 4 bits with its hexadecimal equivalent
(see Appendix B). Note that hexadecimal notation normally has
no added spaces or dots; however, 0X (or 0x) is added at the
beginning or the subscript 16 at the end to show that the
number is in hexadecimal.
a. 0X810B0BEF or 810B0BEF16
b. 0XC1831BFF or C1831BFF16
17
4.2 CLASSFUL ADDRESSING
• IP addresses, when started a few decades ago, used the concept of classes.
• This architecture is called classful addressing.
• In the mid-1990s, a new architecture, called classless addressing, was
introduced and will eventually supersede the original architecture.
• However, part of the Internet is still using classful addressing, but the
migration is very fast.
18
Figure 4.2 Occupation of the address space
19
Table 4.1 Addresses per class
20
Figure 4.3 Finding the class in binary notation
21
Example 5
How can we prove that we have 2,147,483,648 addresses in
class A?
Solution
In class A, only 1 bit defines the class. The remaining 31 bits
are available for the address. With 31 bits, we can have 231
or 2,147,483,648 addresses.
TCP/IP Protocol Suite 22
Example 6
Find the class of each address:
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 10100111 11011011 10001011 01101111
d. 11110011 10011011 11111011 00001111
Solution
See the procedure in Figure 4.3.
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C address.
c. The first bit is 0; the second bit is 1. This is a class B address.
d. The first 4 bits are 1s. This is a class E address..
TCP/IP Protocol Suite 23
Figure 4.4 Finding the class in decimal notation
TCP/IP Protocol Suite 24
Example 7
Find the class of each address:
a. 227.12.14.87 b.193.14.56.22 c.14.23.120.8
d. 252.5.15.111 e.134.11.78.56
Solution
a. The first byte is 227 (between 224 and 239); the class is D.
b. The first byte is 193 (between 192 and 223); the class is C.
c. The first byte is 14 (between 0 and 127); the class is A.
d. The first byte is 252 (between 240 and 255); the class is E.
e. The first byte is 134 (between 128 and 191); the class is B.
TCP/IP Protocol Suite 25
Example 8
▪ In Example 5 we showed that class A has 231 (2,147,483,648)
addresses. How can we prove this same fact using dotted-
decimal notation?
Solution
1. The addresses in class A range from 0.0.0.0 to 127.255.255.255.
2. We need to show that the difference between these two numbers is
2,147,483,648.
3. This is a good exercise because it shows us how to define the range of
addresses between two addresses.
4. We notice that we are dealing with base 256 numbers here.
5. Each byte in the notation has a weight.
6. The weights are as follows (see Appendix B):
TCP/IP Protocol Suite
See Next Slide26
No NetID= 23 = 8
No usable Host= 25 = 32-2 = 30
1 for broadcast ID
No HostID= 25 = 32
1 for network ID
TCP/IP Protocol Suite 27
204.17.5.224
.225
TCP/IP Protocol Suite 28
Note:
In classful addressing, the network
address (the first address in the block)
is the one that is assigned to the
organization. The range of addresses
can automatically be inferred from the
network address.
TCP/IP Protocol Suite 29
Example 9
Given the network address 17.0.0.0, find the class?, the block?,
and the range of the addresses?
Solution
1. The class is A because the first byte is between 0 and 127.
2. The block has a netid of 17.
3. The addresses range from 17.0.0.0 to 17.255.255.255.
00010001.00000000.00000000.00000000 ---00010001.11111111.11111111.11111111
TCP/IP Protocol Suite 30
Example 10
Given the network address 132.21.0.0, find the class, the block,
and the range of the addresses.
Solution
1. The class is B because the first byte is between 128 and 191.
2. The block has a netid of 132.21.
3. The addresses range from 132.21.0.0 to 132.21.255.255.
TCP/IP Protocol Suite 31
Example 11
Given the network address 220.34.76.0, find the class, the
block, and the range of the addresses.
Solution
1. The class is C because the first byte is between 192 and 223.
2. The block has a netid of 220.34.76.
3. The addresses range from 220.34.76.0 to 220.34.76.255.
TCP/IP Protocol Suite 32
Figure 4.10 Masking concept
What is the concept of subnetting and subnet mask?
• A subnet mask is a number that distinguishes the network address and the host
address within an IP address.
• A subnet is a smaller network within a network that requires a subnet mask.
• Subnetting is the process of dividing a network into two or more subnets.
• To get the network Address we apply AND operation.
TCP/IP Protocol Suite 33
Figure 4.11 AND operation
TCP/IP Protocol Suite 34
Table 4.2 Default masks
TCP/IP Protocol Suite 35
Note:
1. The network address is the beginning
address of each block.
2. It can be found by applying the default
mask to any of the addresses in the block
(including itself).
3. It retains the netid of the block and sets
the hostid to zero.
TCP/IP Protocol Suite 36
Example 12
Given the address 23.56.7.91, find the beginning address
(network address).
Solution
1. The default mask is 255.0.0.0, which means that only the first byte is preserved and the
other 3 bytes are set to 0s.
2. The network address is 23.0.0.0.
TCP/IP Protocol Suite 37
Example 13
Given the address 132.6.17.85, find the beginning address
(network address).
Solution
The default mask is 255.255.0.0, which means that the first 2
bytes are preserved and the other 2 bytes are set to 0s.
The network address is 132.6.0.0.
TCP/IP Protocol Suite 38
Example 14
Given the address 201.180.56.5, find the beginning address
(network address).
Solution
The default mask is 255.255.255.0, which means that the first 3
bytes are preserved and the last byte is set to 0. The network
address is 201.180.56.0.
TCP/IP Protocol Suite 39
Note:
Note that we must not apply the default
mask of one class to an address
belonging to another class.
TCP/IP Protocol Suite 40
Loopback address
◼ The IP address with the first byte equal to 127 is used for the loopback
address which is an address used to test the software on a machine.
◼ For example, an application such as (ping ) can send a packet with a
loopback address as the destination address to see it IP software is capable
of receiving and processing a packet.
TCP/IP Protocol Suite 41
Subnet mask
The default mask is used when network is not subnetted.
The defualt mask is used to find the first address in the block or
network address
When network subnetted , the situation is different
We have a subnet mask .
The default mask creates the network address ; the subnet mask
creates the subnetwork address
TCP/IP Protocol Suite 42
Figure 4.24 Default mask and subnet mask
128 64 32 16 8 4 2 1 256
1 1 0 0 0 0 0 0 192
AND
Operation
0 1 0 0 1 0 0 0 72
0 1 0 0 0 0 0 0 64
TCP/IP Protocol Suite 43
Figure 4.24 Default mask and subnet mask
128 64 32 16 8 4 2 1 256
1 1 0 0 0 0 1 0 192
AND
Operation
0 1 0 0 0 1 1 0 70
0 1 0 0 0 0 1 0 66
130.15.66.0
130.15.70.1 130.15.0.0
255.255.194.0
130.15.66.0
130.15..70.1
TCP/IP Protocol Suite 44
Example 15
What is the subnetwork address if the destination address is
200.45.34.56 and the subnet mask is 255.255.240.0?
Solution
We apply the AND operation on the address and the subnet
mask.
Address ➡ 11001000 00101101 00100010 00111000
Subnet Mask ➡ 11111111 11111111 11110000 00000000
Subnetwork Address ➡ 11001000 00101101 00100000 00000000.
TCP/IP Protocol Suite 45
Figure 4.25 Comparison of a default mask and a subnet mask
• The number of 1s in default mask is predetermined
(8,16 or 24) .
• In subnet mask the number of 1s is more than the
number of 1s in the corresponding default mask.
TCP/IP Protocol Suite 46
Benefits of Subnetting
1)Reduced network traffic
2)Optimized network performance
3)Simplified management
4)Facilitated spanning of large
geographical distances
47
Disadvantages of Subnetting
▪ Subnetting increases the network's complexity.
▪ More subnets mean more IP addresses are wasted because each
subnet has its own network address and broadcast address.
▪ We have to face a loss of IP Addresses.
I. This is because two IP Addresses are wasted for each subnet.
II. One IP address is wasted for its network address.
III. Other IP Address is wasted for its direct broadcasting address
48
Implementing VLAN
➢ What is LAN?
➢ What is VLAN?
➢ Why do we need VLAN?
➢ How to configure VLAN?
0
◼ A LAN includes all devices in the same broadcast
domain.
◼ A broadcast domain includes the set of all LAN-
connected devices that when any of the devices sends
a broadcast frame, all the other devices get a copy of
the frame.
◼ Without VLANs, a switch considers all its interfaces
to be in the same broadcast domain; in others words,
all connected devices are in the same LAN.
Hub
Switch
VLAN Basics
◼ With VLANs, a switch can put some interfaces into
one broadcast domain and some into another,
creating multiple broadcast domains
◼ These individual broadcast domains created by the
switch are called virtual LANs.
◼ The more hosts in a single VLAN, the larger the
number of broadcasts, and the greater the processing
time required by each host in the VLAN.
VLAN Definitions
◼ VLAN (virtual LAN) is a logical partition of a layer 2 network
◼ Multiple partition can be created, allowing for multiple VLANs to
co-exist
◼ Each VLAN is a broadcast domain, usually with its own IP
network
◼ VLANS are mutually isolated and packets can only pass between
them through a router
◼ The partitioning of the layer 2 network takes inside a layer 2
device, usually a switch.
◼ The hosts grouped within a VLAN are unaware of the VLAN’s
existence
VLAN Definitions
VLAN Basics by TD
Benefits of VLANs: These are just a few reasons
for separating hosts into different VLANs.
1. To create more flexible designs that group users by
department, or by groups that work together instead of
by physical location.
2. To segment devices into smaller LANs (to shrink
broadcast domains) to reduce overhead caused to each
host in the VLAN
Controlling Broadcast Domains with VLANs
◼ VLANs can be used to limit the reach of broadcast frames
◼ A VLAN is a broadcast domain of its own
◼ Therefore, a broadcast frame sent by a device in a specific
VLAN is forwarded within that VLAN only.
◼ This help controlling the reach of broadcast frames and their
impact in the network
◼ Unicast and multicast frames are forwarded within the
originating VLAN as well
56
▪ To separate traffic sent by an IP phone from traffic
sent by PCs connected to the phones(Better
performance)
▪ Cost reduction
▪ Improved IT staff efficiency
▪ To enforce better security by keeping hosts that work
with sensitive data on a separate VLAN
TCP/IP Protocol Suite 57