Premium Essay

Ip Addressing Subnetting

In: Computers and Technology

Submitted By goodstuff18
Words 18750
Pages 75
001
1010100 10001111100 1011100101011100 101100011101001 1011110100011010 00001010010110010 1001010101100111 1111010101000101 1101001101010011 001010010101010 1010101000110010 010101001011000 110101100011010 11010100001011 001010100110 1001010010

11010011

10011000

IP Addressing and Subnetting
Workbook
Version 2.0

Instructor’s Edition

11111110 10010101

00011011

10000110

IP Address Classes
Class A Class B Class C Class D Class E 1 – 127 128 – 191 192 – 223 224 – 239 240 – 255 (Network 127 is reserved for loopback and internal testing) 00000000.00000000.00000000.00000000 Leading bit pattern 0 Network . Host . Host . Host Leading bit pattern Leading bit pattern 10 110
10000000.00000000.00000000.00000000
Network . Network . Host . Host

11000000.00000000.00000000.00000000
Network . Network . Network . Host

(Reserved for multicast) (Reserved for experimental, used for research)

Private Address Space
Class A Class B Class C 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255

Default Subnet Masks
Class A Class B Class C 255.0.0.0 255.255.0.0 255.255.255.0
Produced by: Robb Jones jonesr@careertech.net and/or Robert.Jones@fcps.org Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors, and to everyone who has sent in suggestions to improve the series.

Workbooks included in the series: IP Addressing and Subnetting Workbooks ACLs - Access Lists Workbooks VLSM Variable-Length Subnet Mask Workbooks Instructors (and anyone else for that matter) please do not post the Instructors version on public websites. When you do this you are giving everyone else worldwide the answers. Yes, students look for answers this way. It also

Similar Documents

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

Subnetting Made Simple

...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...

Words: 7956 - Pages: 32

Premium Essay

Unknown

...____________________________ Build the OSI Model by providing the following information: Layer # | Layer Name | Function | | | | | | | | | | | | | | | | | | | | | | Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses contained in the packet. IP defines packet structures that encapsulate the data to be delivered and defines the addressing used to identify the source and destination information. IP is a service in the connection-oriented Transmission Control Protocol (TCP) – thus it is often referred to as the TCP/IP Suite. Two versions of IP: IP Version | Number Format | # of Bits | Example | | | | | | | | | Subnets/Subnetting Subnetting is the practice of dividing a large network into two or more smaller networks (subnets) – this is typically done to improve manageability and performance. Subnet Methods | | | | | Classful: Classful subnetting is a method for allocating IP addresses using five classes of...

Words: 1730 - Pages: 7

Premium Essay

Narnia

...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...

Words: 7956 - Pages: 32

Premium Essay

Information Technology

...VLSM is the way of sub netting a network to make for the most efficient use of all the bits, allow networks to be fragmented into any size sub network. VLSM is the breaking down of IP addresses into subnets (multiple levels) and allocating it according to the individual need on a network. It can also be called a classless IP addressing. A classful addressing follows the general rule that has been proven to amount to IP address wastage. Classes subnetting gives you more host, classful subnetting gives you less subnet. Classful network: the original addressing architecture used for the internet When we use classful routing protocol, we only look at the IP address, net the subnet mask and we have to use default subnet mask. We will run out of IP address soon if we want to expand our network in the future. Classless routing: support VLSM and different size network with the same IP address class. You can split the network as you like to meet the requirement of the business. Cisco supports VLSM with RIP version2, Open Shortest Path First (OSPF), Integrated Intermediate System-to-Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol (EIGRP) IP subnet in used should not overlap their address ranges, routers cannot route the packets correctly if 2 hosts have the same IP address. To find the overlap, you have to look at the subnet ID, range of address in each subnet. Add a new subnet to an existing design: * Pick a subnet mask * Make a list of existing...

Words: 411 - Pages: 2

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...

Words: 2573 - Pages: 11

Premium Essay

The History of Ipv4 and Beginning of Ipv6

...Protocols with the advantages and disadvantages of both. There will also be mention of DHCP, and how DHCP servers can be configured to use IPv6. First, it is important to talk about the history of IPv4, but first IP’s, or Internet Protocol, main principle is routing network packets. This essentially creates internetworking, which establishes the Internet. In IP, or at the IP level, the main task is to deliver packets from the host to the destination host. But to do this the host and the destination host needs an address, and this is where IPv4 (and later IPv6) comes into play. IPv4 was then created to hand this, “In the 1980s, when the Internet went live to the public, IPv4 was the fourth revision of Internet Protocol, and the first offered to the public. IPv4 is the general standard of delivery of information between devices connected to the Internet.” (Dooly, 2013) After this, the Department of Defense eventually took on IPv4 as it’s own preferred method. It became the universal method of addressing of the world. IPv4 uses a 32-bit address of numbers and is limited to 4,294,967,296 addresses. The IPv4 addressing scheme uses a dotted decimal notation; an example of an IPv4 address is 192.168.80.5. The following picture is an example of an IPv4 packet (Mlamson’s Weblog, 2008): Some may think that IPv6 is a relatively new concept or idea, but in-fact, IPv6 does have a history of it’s own even as something that is now being looked upon as the...

Words: 935 - Pages: 4

Premium Essay

It Substituting

... | | Q#1: What is IP address and also define classes of IP address? Ans: IP ADDRESS: "IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that governs online communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible. An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to send and retrieve data over our Internet connections, ensuring that our messages, as well as our requests for data and the data we've requested, will reach their correct Internet destinations. Without this numeric protocol, sending and receiving data over the World Wide Web would be impossible. IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and provide a simple and...

Words: 2246 - Pages: 9

Premium Essay

Computer Networks and Ip Addressing

...Understanding IP Addressing: Everything You Ever Wanted To Know Introduction In the mid-1990's, the Internet is a dramatically different network than when it was first established in the early 1980's. Today, the Internet has entered the public consciousness as the world's largest public data network, doubling in size every nine months. This is reflected in the tremendous popularity of the World Wide Web (WWW), the opportunities that businesses see in reaching customers from virtual storefronts, and the emergence of new types and methods of doing business. It is clear that expanding business and social awareness will continue to increase public demand for access to resources on the Internet. There is a direct relationship between the value of the Internet and the number of sites connected to the Internet. As the Internet grows, the value of each site's connection to the Internet increases because it provides the organization with access to an ever expanding user/customer population. Internet Scaling Problems Over the past few years, the Internet has experienced two major scaling issues as it has struggled to provide continuous and uninterrupted growth: - The eventual exhaustion of the IPv4 address space - The ability to route traffic between the ever increasing number of networks that comprise the Internet The first problem is concerned with the...

Words: 7368 - Pages: 30

Premium Essay

It 240 Week4

...Chapter 5 Questions (Subnetting) Brian M. Robinson IT/240 February 1, 2013 Derrick Sorrells Chapter 5 Questions (Subnetting) 1. An IPv6 address is made up of how many bits? An Ipv6 address is made up of 128 bits. Because IPv6 has 128 bits, instead of the 32 bits that IPv4 has, the need for private addressing is eliminated. This is because IPv6 has 3.4 x 10^38 addresses, compared to the 4 billion addresses that IPv4 has. This is more than enough IP addresses to handle the needs of networking for the foreseeable future and beyond. 2. The subnet mask of an IP address does which of the following? The subnet mask defines network and host portions of an IP address. The most important task performed by subnetting is that it helps determine whether the host is communicating with computer that is on the same network, or subnet, or a different network or subnet. The distinction matters because if the host is talking to a computer on the same subnet, then no router is needed. If the two are on separate subnets, then the router must then be involved to facilitate communications. 4. Which of the following is a private IP address and can’t be routed across the Internet? a. 192.156.90.100 b. 172.19.243.254 c. 11.200.99.180 d. 221.24.250.207 e. 12.12.12.12 The IP address 172.19.243.254 is a private address and cannot be routed across the internet. For Class A, addresses beginning with 10; for Class B, addresses starting with 172.16 and running through 172.31; and for Class...

Words: 824 - Pages: 4

Premium Essay

Itm 310

...that start on page 42 where the OSI Model starts and study up to 55 (refer to the book pages). Ch 2: Networking Standards and the OSI Model • The OSI Model o Application Layer o Presentation Layer o Session Layer o Transport Layer o Network Layer o Data Link Layer o Physical Layer Ch 4: Introduction to TCP/IP Protocols • IPv4 Addressing o Subnet Mask • IPv6 Addressing • Assigning IP Addresses o DHCP (Dynamic Host Configuration Protocol) o Private and Link-Local Addresses Ch 6: Network Hardware, Switching, and Routing • Repeaters and Hubs • Bridges • Switches o Switching Methods o VLANs and Trunking o STP (Spanning Tree Protocol) • Routers o Router Characteristics and Functions o Routing Protocols Ch 7: Wide Area Networks • PSTN • X.25 and Frame Relay • T-Carriers o Types of T-Carriers o T-Carrier Connectivity • DSL (Digital Subscriber Line) • Broadband Cable • ATM Ch 9: In-Depth TCP/IP Networking • Designing TCP/IP-Based Networks o Subnetting o CIDR (Classless Interdomain Routing) o Subnetting in IPv6 o Internet Gateways o Address Translation • TCP/IP Mail Services o SMTP o MIME o POP o IMAP • Additional TCP/IP Utilities o Ipconfig o Nbtstat o Hostname, Host, and Nslookup o Traceroute (Tracert) Ch 10: Virtual Networks and Remote Access • Remote Access and Virtual Computing o Dial-Up Networking o Remote Access Servers o Remote Access Protocols • VPNs (Virtual Private Networks) • Cloud Computing Ch 11: Network Security ...

Words: 346 - Pages: 2

Premium Essay

Asdf

... iv. Hubs * Basic Network topologies * Domains v. Collision domain vi. Broadcast domain * Addressing vii. Hardware addressing viii. Logical addressing * OSI model * TCP/UDP ix. Connection oriented/connectionless x. Windowing * Types of destinations xi. Unicast xii. Broadcast xiii. Multicast * Cables xiv. Ethernet xv. Serial * Duplex 2. TCP/IP * OSI model * TCP/IP or DOD model * DHCP * Basic port numbers * TCP xvi. virtual circuits (three-way handshake) xvii. Headers * UDP xviii. Headers * IP xix. Headers * Frame xx. Header * ICMP * ARP * RARP * Proxy ARP 3. IP addressing / Subnetting /VLSM / Summarization * Binary to decimal * IP address classes * CIDR * IP Subnet Zero * Subnetting * VLSM * Summarization 4. Router interface * Router components * Modes * Configuration register * Keyboard shortcuts 5. IOS management * Boot up sequence * Configuration saves and loads * SSH * resolving hostnames 6. dynamic routing * ip address support xxi. classful xxii. classless * types of routing protocols xxiii. distance vector ...

Words: 458 - Pages: 2

Premium Essay

Network and Communication

...COMMUNICATION Presentation Topic: Subnet Masking MBA IN E-GOVERNANCE - Programme III Prepared and Narrated by : KDU/MEG/03/11 – Theshantha Mukirigala Submission Date : 26 November 2015 Subnet Mask • An IP address has 2 parts: – The Network identification. – The Host identification. • Frequently, the Network & Host portions of the address need to be separately extracted. • In most cases, if you know the address class, it’s easy to separate the 2 portions. Subnet Mask (Cont.) • With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. • Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Subnet Mask (Cont.) • The subnet masking process was developed to identify & extract the Network part of the address. • A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. • If it is not, the process of routing it to an outside network begins. Subnet Mask (Cont.) • The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. • It is applied to a message’s destination address to extract the network address. • If the extracted network address...

Words: 770 - Pages: 4

Premium Essay

Ccna Chapter 6

...6 Objectives ■ Upon completion of this chapter, you should be able to answer the following questions: What are the differences between classful and classless IP addressing? What is VLSM, and what are the benefits of classless IP addressing? ■ ■ What is the role of the classless interdomain routing (CIDR) standard in making efficient use of scarce IPv4 addresses? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary at the end of the book. classful IP addressing page 280 prefix aggregation page 285 network prefix page 286 contiguous page 294 discontiguous address assignment page 280 supernet page 280 private addressing page 281 high-order bits page 282 supernetting page 294 This is a prepublication draft of the manuscript. The final book will publish in December and will be available for purchase at http://www.ciscopress.com/title/9781587132063. raft Manuscript Draft Ma cript Draft Manuscript Dra Manuscript Draft Manuscri raft Manuscript Draft Ma uscript Draft Manuscript raft Manuscript Draft Ma script Draft Manuscript D ft Manuscript Draft Manu ript Draft Manuscript Dra Manuscript Draft Manuscri t Draft Manuscript Draft M nuscript Draft Manuscript 280 Routing Protocols and Concepts, CCNA Exploration Companion Guide Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address, limiting the Internet—then known as ARPANET—to 256 networks. Early on, it became...

Words: 10468 - Pages: 42

Premium Essay

Final

...Final Exam Review 8 to 10 Introducing the Internet Protocol (IP)  TCP/IP Model review: Layers 1 and 2 Protocols Example LAN/WAN Standards and Types in the TCP/IP Model 2 Figure 8-1 Introducing the Internet Protocol (IP)  TCP/IP Model review: Upper layers define non-physical (logical) networking functions Various Perspectives on the TCP/IP Model and Roles 3 Figure 8-2 Introducing the Internet Protocol (IP)  Network Layer protocols  IP: Most important protocol defined by Network layer  Almost every computing device on planet communicates, and most use IP to do so  Network layer also defines other protocols 4 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 1 Name ICMP ARP DHCP DNS Full Name Comments Messages that hosts and routers use to manage Internetwork Control and control packet forwarding process; used by Message Protocol ping command Address Resolution Used by LAN hosts to dynamically learn Protocol another LAN host’s MAC address Dynamic Host Used by host to dynamically learn IP address Configuration Protocol (and other information) it can use Allows hosts to use names instead of IP Domain Name address; needs DNS server to translate name System/Service into corresponding IP address (required by IP routing process) Other TCP/IP Network Layer Protocols Table 8-1 5 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 2 Name Full Name RIP ...

Words: 9644 - Pages: 39