Skip to main content

Subnetting In Practice


Imagine that you need to make four different networks(LAN’s). Then you ask form ISP(Internet Service Provider) to four different IP’s. But each of network has less than 20 computers. So ISP will say we cannot give four IP’s and we give you one IP and Split it into four difference networks. Let see how we done it.
ISP given network address: 192.168.5.0 255.255.255.0                                                                                                                                 
The number of networks that we have : 4 (2^2)
192.168.5.00000000        (we take two bits from available host’s bits because we need four different networks).
   
  0     0    0   0   0  0  0   0        (consider last 8 bits)
128  64  32 16  8  4  2   1


00  -> 192.168.5.0       LAN A                               
01 -> 192.168.5.64      LAN B
10 ->192.168.5.128     LAN C
11->192.168.5.192      LAN D


LAN Name
Network Address
Broadcast Address
Host’s IP Range
LAN A
192.168.5.0/26
192.168.5.63
192.168.5.1 to 62
LAN B
192.168.5.64/26
192.168.5.127
192.168.5.65 to 126
LAN C
192.168.5.128/26
192.168.5.191
192.168.5.129 to 190
LAN D
192.168.5.192/26
192.168.5.255
192.168.5.193 to 254

 Each network(LAN) should have network address and broadcast address.
let we discuss how we find network and broadcast address.I take LAN B for this work.
LAN B network address : 192.168.5.64/26    final 8 bits->  01000000  
01 (left very first two bits) goes to network side and remaining 6 bits are only available for hosts.

When we give all that 6 bits to 0(zero) that number gives network address of LAN B -> 192.168.5.01000000



When we give all that 6 bits to 1(one's) that number gives broadcast address of LAN B -> 192.168.5.01111111


    0         1    1    1   1  1  1  1
128*0 +64+32+16+8+4+2+1 = 127
That is the way we define network and broadcast address.



Comments

Post a Comment

Popular posts from this blog

IP based vertual hosting in apache2

I think most of the people used ubuntu as their linux OS. There will be a little bit conflict when you are trying to use virtual hosting in apache2 according to centOS. In this article I will try to explain how it should done in ubuntu apache2. Anyway there is a few more things to know before you start. 1. httpd.conf  file is equal to apache2.conf in /etc/apache2/ 2. In apache2.conf includes some other conf file so that necessary settings should be done those files. e.g. changing port numbers should be done in ports.conf I will explain step by step vertual hosting using apacge2. I take /etc/var/www as a DocumentRoot any way if you want to change it, Change the default file which locate in /etc/apache2/sites-available/default file. To easy access create a folder called www.bict.lk (any choice)  and create htdocs and logs two folders inside www.bict.lk. Don't forget to create index.html file in htdocs folder. (html file which shows www.bict.lk ). These folders should b...

Variable Length Subnet Mask

I think it is better to tell the difference of Subnet Mask and Variable Length Subnet Mask(VLSM) at the beginning. As I discuss in earlier article Subnet Mask is there to split one IP address into several IP’s which can use in difference LAN’s. But the question is it limit the number of accessible hosts(computers) in each LAN.  Let takes the previous example,  192.168.5.0/26 (LAN A) can only have 62 (2^6 -2) computers(hosts). But Imagine that we need to keep 100 computers in LAB A? Now I think you can understand how Subnet Mask is questioned. The answer is Variable Length Subnet Mask. I try to discuss how we use VLSM in practice in this article. I rearrange the previous example as following. ISP given address -> 192.168.5.0 /24 LAN A -> 100  (lets think LAN A need 100 computers). LAN B ->50 LAN C -> 50 LAN D ->50 Let see how we solve this problem. 192.168.5.0 /24 is the given IP and we take one bit from host side of that IP. We can define two di...

SSL Certificate

SSL stands as secure socket layer, of the main protocol which is used to secure the data transmission.  In this article I am trying to discuss how this SSL certificate is used in client server architecture. First of all you should know the difference of "Authentication" and "Authorization".  Authentication means validate the correct user, for instance most of times when you tried to log to the system, it will ask user name and password to log it. That is called as authentication. Only user who is given correct user name and password allow to log to the system. When you log to a particular site what are the things you are allowed to do and not to do, in other words the privileges that you have in that site called as Authorization. These two concepts are used when client (your browser) requests from server through SSL protocol.  You may wonder what is the reason of having such a system. This all about trust. Once you type your favorite site, www.facebook...