Preview

Nt1330 Unit 3 Assignment 1

Powerful Essays
Open Document
Open Document
2019 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Assignment 1
Subnetting

IP Addressing
• Internet Protocol (IP)
• A unique indentifier for a host, or node, on an
IP network
• 32-bit binary number, usually expressed as 4
“dotted decimal” values.
• Each decimal value represents 8 bits, in the range of 0 to 255

Example
140.179.220.200
140

Written in binary form:
.179
.220
.200

10001100.10110011.11011100.11001000
We see the address in the decimal form
Your computer sees it in the binary form

Binary Octet:
• An octet is made up of eight “1”s and “0”s, representing the following values:
128 64
32 16 8
4
2 1
• So the value of 140 (the first octet of our example) looks like this:
1
0
0
0
1
1
0 0

Binary Octet:

1
0
128 + 0 +

0
0
0+ 0+

1
1
0 0
8 + 4 + 0 + 0= 140

Address Classes
• There are 5 different
…show more content…
• Your computer performs a bitwise logical AND operation between the address and …show more content…
0.0.0.89

Why Do We Care!?
• You can manipulate your subnet mask in order to create more network addresses. Why?
• If you have a Class C network, how many individual Host addresses can you have?
– 1 to 254
– Remember, you can’t have all “0”s and all “1”s in the host portion of the address.
– So we cannot use 206.25.143.0 (all “0”s) or
206.25.143.255 (all “1”s) as ahost address.

Why Do We Care!?
• So we have 1 Class C Network (206.15.143.0)
• And we have 254 host address (1 to 254)
• But what if our LAN has 5 networks in it and each network has no more than 30 hosts on it?
• Do we apply for 4 more Class C licenses, so we have one for each network?
• We would be wasting 224 addresses on each network, a total of 1120 addresses!

Subnetting
• Subnetting is a way of taking an existing class licence and breaking it down to create more
Network Addresses.
• This will always reduce the number of host addresses for a given network.
• Subnetting makes more efficient use of the address or addresses assigned to you.

How Does Subnetting Work?
• Additional bits can be added (changed from 0 to 1) to the subnet mask to further subnet, or breakdown, a network. • When the logical AND is done by the computer,

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    NT1430 U2G1

    • 433 Words
    • 2 Pages

    Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8.1.3)No it would not be justified as a class c address because it is within the range for a class A address but it can be subnetted as a class C…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    bits (192) creates two usable subnets, three subnet bits (224) creates 6 usable subnets, four bits (240)…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    2. Using Subnet Mask addressing expands the capabilities while holding rules because of the wide variety of numbers that can be assigned. Not just IP address matters, now the Subnet Mask plays a part as well.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    You want to divide a class C network into 12 subnets. Which subnet mask will you use to get the most hosts on each network? How many hosts will be on each subnet? Explain your answer.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. An Ipv4 uses 32 bit IP addresses. The max number of of IPv4 addresses is about 4 billion.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    As discussed in Lesson 1, each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items, including:…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    Is what is used to represent in the form of a binary number for the address bus.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The surveys were designed for three different targeted audiences, survey1 for IT professionals in the IT departments of SCT, CAS and DU, survey 2 for all users types such as staff, employees and students of SCT, CAS and DU from all departments and survey 3 designed for Vendors who are providing technologies to SCT, CAS and DU.…

    • 306 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt2460 Unit 1 Assignment

    • 762 Words
    • 4 Pages

    These addresses are commonly used for home, office, and enterprise local area networks (LANs), when globally routable addresses are not mandatory, or are not available for the intended network applications. Under IPv4, the private IP address spaces were originally defined in an effort to delay IPv4 address exhaustion, but they are also a feature of IPv6, the next generation Internet Protocol.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    From the knowledge gained, the student are requires to draft a new version of OS that include a new name for the OS , LOGO, design principles and so on and prepare for the Report and presentation…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    I think that the organizations requirements for user's passwords to be several character long and have a certain amount of attempts is actually a great security measure. Yes, i think the additional security is worth it. I also think the number of security entry should be limited. The reason I agree with both is because if they were not in place it woud give people an easier chance of unlocking you phone and disappearing with it. For example, I have an Iphone i went to a friends get together. I place my phone down for 5 minute to get a drink someone took my phone and was trying to unlock it. The person could not get my code correct so my phone shut him out completely. I was happy because my information was protected.…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Host Addresses

    • 246 Words
    • 2 Pages

    How many networks will be created using a 255.255.0.0 given a class A IP network (i.e., 10.0.0.0)?…

    • 246 Words
    • 2 Pages
    Satisfactory Essays

Related Topics