Preview

Ip Subnet Design Essay Example

Better Essays
Open Document
Open Document
1956 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ip Subnet Design Essay Example
IP Subnet Design Project

Executive Summary The acronym subnet refers to sub - networking. This is the process of logically dividing an IP network into various divisions or sections within a network. Therefore, sub-netting is the technique and practice of dividing a network into two or more logical networks (Narten, Nordmark, Simpson & Soliman 2007). Within a subnet, all computers connected to it are identifiable by their almost identical IP addresses. The use of IP addresses is in order to identify uniquely computers in a subnet by the use of a router or network IP prefix followed by a host or rest field identifier. This IP address composition makes it easy to trace the network within which the sub network is located. Additionally, the second part helps identify the computer on the host sub network. Normally the expression of the network or routing prefix is in a CIDR notation. This is whereby it is annotated as the first address within the network, followed by the slash character, and then ending in the form of the bit - length of the IP prefix. An example of this case would be such as the IPv4 address - 192.168.10.0/24, which is a prefix of the IP address. From it, we get to know that the first IP address in the network is 192.168.10.0 and that it has 24 bits for the network prefix allocated to it. The remaining 8 bits of the 32 are reserved for the host sub network addressing. It must be noted that the network or data traffic between all sub networks of a network are channeled via routers which act as gateways, as well as the logical boundaries, between the various sub networks within the entire network (Singh, Beebee, & Nordmark 2010)..
Advantages of Sub-netting There are various benefits that sub-netting has. The first benefit is the efficient allocation of IP addresses. This can be achieved through the use of DHCP (Dynamic Host Control Protocol) in the various sub networks to dynamically handle all address allocation to all

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1430 U2G1

    • 433 Words
    • 2 Pages

    Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8.1.5)The Slash notation for the Subnet is /24| the slash is /9 and the way I found out is looking at the webpages that were provided.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETW204 Assignment 4

    • 691 Words
    • 4 Pages

    Fill in the blanks below with either the term defined or the definition for the terms listed. Each answer is worth 2 points each, 25 questions X 2 = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox.…

    • 691 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    bits (192) creates two usable subnets, three subnet bits (224) creates 6 usable subnets, four bits (240)…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    2. Using Subnet Mask addressing expands the capabilities while holding rules because of the wide variety of numbers that can be assigned. Not just IP address matters, now the Subnet Mask plays a part as well.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    What is the subnet ID of host 86.212.118.145, given a subnet mask of 255.0.0.0? Explain your answer.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Labs

    • 1237 Words
    • 6 Pages

    What is the slash notation equivalent of subnet mask 255.255.255.0? What is the slash (or CIDR) notation equivalent of subnet mask 255.128.0.0?…

    • 1237 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Comp230 Week 1 Lab Report

    • 941 Words
    • 4 Pages

    Subnet Mask . . . . . . . . . . . : 255.255.0.0…

    • 941 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 122 Words
    • 1 Page

    As for deciding on the subnet mask, the largest would be 255.255.252.0 or /23. There are a total of 365 devices, including 352 computers, 7 servers, 4 switches, and 2 routers that need IP addresses. Using a /23 subnet, that would allow for 508 devices, whereas /24 would only allow for 254.…

    • 122 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP subnetting: The process of taking a class A, B, or C IP network and subdividing it into a number of smaller groups of addresses (subnets).…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Kudler Fine Foods was first founded by Kathy Kudler in La Jolla, California. It has expanded to two more locations, Del Mar, California, and Encinitas, California. The stores are generally spaced, about 8,000 sq ft, and have imported and domestic foods, including Fresh Bakery & Pastries, Fresh Produce, Fresh Meat & Seafood, Condiments & Packaged foods as well as Cheese and other dairy products. Kudler wants to see their company grow by upgrading their communications systems and making it wireless. The wireless technology upgrade will allow the company to have a better way of communicating between the stores as well as to the employees and customers .…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Networking 202

    • 977 Words
    • 5 Pages

    Write a paragraph (a minimum of five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and just as importantly, how you feel it will benefit you in your academic and professional career. (8 points)In this lab the router baseline configuration was erased to begin configuration on a router from scratch. In the lab we chose to enter a basic management setup on the router to place an IP address on one interface, and set an initial configuration dialog for ease of use. A secret and enabled password was created to provide security that avoids others from make configuration changes without the password. A virtual terminal password was also created for authorized users to access switches remotely. In the subnet…

    • 977 Words
    • 5 Pages
    Good Essays