Deterining Subnet Configuration

In: Other Topics

Submitted By ajm62
Words 1211
Pages 5
Running head: DETERMINING SUBNET CONFIGURATION

Determining Subnet Configuration for Variety of Networks
Alvin Miles
AIU Online
09/20/2012

Determining Subnet Configuration for Variety of Networks In this final week IP assignment we are given some IP addresses and are ask several questions on anything from what is the broadcast address of this IP, what are the range of valid host IP addresses, to subnet ranges. Before we go too deep in trying to answer these questions I must first explain what classful routing protocol is as this will help explain some of my answers. In classful routing protocol all your networks will be using different classes and are separated only by a router (Lewis, 2011). Also classful routing protocol will only look at IP addresses and not the subnet mask. This is a problem as you can’t change the subnet mask in any of your network (Lewis, 2011). Most networks today use the classless routing protocol. This protocol supports VLSM and different sizes network within the same IP address class (Lewis, 2011).
The first IP address we are given is 12.2.201.2, from this we are ask the question of what is the network address or network number? The network address would fall within the Class “A” and would give us 12.0.0.0.
The second question asks us to find out what the broadcast address of the IP address 211.106.32.0 that has a subnet mask of 255.255.255.224. To get the broadcast address we will need to find out how many subnets and hosts that we have with this subnet mask. So let’s write down this mask into binary form to get 11111111.11111111.11111111.11100000. From this we have borrow 3 bits from the last octet to get the 224. If you used the magic equation 2N-2 = the number of networks and “N” = the number of bits borrow you will get 23-2= 6. The number of zeros that are left in the last octet is the number of host bits. You will…...

Similar Documents

Cisco Switch Configuration

...Router>en Enter the configuration mode: Router#configure terminal Define the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter enable mode (sometimes referred to as privileged mode or privileged-EXEC mode). To set a secret password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Define the privileged-EXEC mode password; remember to use a strong password (combine letters, numbers, nd symbols). The enable secret command uses a one-way encryption hash based on Message Digest 5 (MD5) Ciscozine(config)#enable secret C1sc0z$n3 Secure console port For security reasons, you must define a console password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Enter in the console configuration Ciscozine(config)#line console 0 Define your console password Ciscozine(config-line)#password g4S$%A2 Enable the password defined Ciscozine(config-line)#login Use the “logging synchronous” command, so the messages appear only after you press Return Ciscozine(config-line)#logging synchronous Secure VTY lines For security reasons, you must define a vty line password. The vty lines defines the password needed for a remote access (telnet, ssh, …) Enable administrative privilege Ciscozine>en Enter the configuration......

Words: 621 - Pages: 3

Hcm Configuration

...| HCM 9.0 Configuration Guide WorkCenter PeopleTools 8.51 | Last Revised: 06/04/12 FINAL 07/20/11 REVISION CONTROL Document Title: HCM 9.0 Configuration Guide: WorkCenter PeopleTools 8.51 Author: CMS Central File Reference: [ HCM90_CFG_WorkCenter_PT851.docx ] Date | By | Action | Section(s) | 07/08/11 | N Louie | Created | All | 06/04/12 | N Louie | Added Appendix for Security Info to Web Libraries | Appendix B | | | | | Review/Approval History Date | By | Action | Pages | 07/01/11 | User Group / Review Team | Review and Input | All | 07/25/11 | PMO QA | Standards Review | All | 07/20/11 | Application Manager | Approved for Release | All | Confidentiality Statement This document has been checked and screen shots do not contain any confidential information (staff names, addresses, social security numbers). Please add a new line, verifying that screen shots have been checked each time this document is published. Publishing Date | Name of Individual Checking Screen Shots | 07/21/11 | N Louie | 06/04/12 | N Louie | Table of Contents Page Page Introduction 1 Definitions 2 Process Flow 2 Terms 3 1.0 Template Pagelets 4 1.1 Content Reference Links 4 1.1.1 How To Do This Task 4 1.2 Navigation Collections 6 1.2.1 How To Do This Task 7 2.0 Pagelet Wizard 11 2.1 Navigation Collection Pagelets 11 2.1.1 How To Do This Task 12 2.2 Query Pagelets 16 2.2.1 How To Do This Task 17 2.3 External Links......

Words: 2247 - Pages: 9

Configuration Management

...UNIVERSITY OF PRETORIA 10 CONFIGURATION MANAGEMENT Assignment Jikesh Jagbeer UNIVERSITY OF PRETORIA 10 CONFIGURATION MANAGEMENT Assignment Jikesh Jagbeer Contents Introduction 2 The Project Office: Configuration Management Plan 3 Section 1: Introduction 3 Purpose 3 Project Framework 3 Section 2: Configuration Identification 4 Configuration Items 4 Baseline Documents produced in a typical project 4 Naming Convention for Project Documentation 5 Document Format 5 Section 3: Configuration Organisation 6 Section 4 Configuration Management Phasing and Milestones 8 Section 5: Data Management 8 Section 6: Change Control 9 Change Control Process 9 Change Control Board 10 Change Manager 10 Duties of a CCB Member 11 Change categorization 11 CAB meetings 12 Section 7: Interface Management 13 Section 8: Configuration Status Accounting 13 Status Account Data 13 Configuration Management Database 13 Section 9: Verification 13 CM Process Audits 13 CM Baseline Audit 13 Section 10: Reference Documents 14 Introduction The South African Post Office (SAPO) is constantly under pressure to reduce cost whilst improving its profit margin through innovative products and effective service delivery. SAPO is a multifaceted organisation which operates in various industries e.g. Logistics, IT and Cash Collection etc. Hence SAPO, at any given moment in time, has a large number of projects that are in various stages of execution. ...

Words: 3446 - Pages: 14

Nat Configuration

...use in common network scenarios. The target audience of this document is first time NAT users. Note: In this document, when the internet, or an internet device is referred to, it means a device on any external network. Prerequisites Requirements This document requires a basic knowledge of the terms used in connection with NAT. Some of the definitions can be found in NAT: Local and Global Definitions. Components Used The information in this document is based on these software and hardware versions: • Cisco 2500 Series Routers • Cisco IOS® Software Release 12.2 (10b) The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Quick Start Steps for Configuring and Deploying NAT When you configure NAT, it is sometimes difficult to know where to begin, especially if you are new to NAT. These steps guide you to define what you want NAT to do and how to configure it: 1. Define NAT inside and outside interfaces. ♦ Do users exist off multiple interfaces? ♦ Are there multiple interfaces going to the internet? 2. Define what you're trying to accomplish with NAT. ♦ Are you trying to allow internal users to access the internet? ♦ Are you trying to allow the internet to......

Words: 3234 - Pages: 13

Hardware Configurations

...NT1110 Unit 8: Video Summary 6 Hardware Configurations I watched 4 videos on Hardware Configuration. They were, in order, Device Manager, Driver Signing, Hardware Profile and Regional and Language Options. The 1st, Device Manager went over how to manage all your hardware devices. It covers how they are configured, their settings, drivers and resources. It’s found in System Properties. After this, was Driver Signing which is Microsoft’s way of confirming that its devices and drivers have been tested and are compatible with Microsoft’s operating system. Each driver and device is checked off in the System Properties verifying its authenticity. There is also driving signing options for hardware installations with software that is not Windows. They are Ignore, which means install anyway. Warn, which means the system will prompt you to choose and Block, which blocks unsigned software. The next video was Hardware Profile. This is a list of devices enabled at the start of a computer and loading into the operating system. It too is found in System Properties. It covered how to change your hardware profile. It’s usually used for laptops. We can change what devices our system uses 1st for instance, changing the network connections when traveling. The last video was Regional and Language Options. This is found on the Control Panel. Here, you can set language or choose how you want your numbers, currency, time and dates displayed. You can go to Customize to make changes.......

Words: 498 - Pages: 2

Switch Configuration

...Switch Configuration Switch Configuration First I would unpack the switch along with all of its contents, check for any missing or damaged items and if any our found I would then contact the cisco team but if everything looks great I would then proceed. If I have all the equipment ready for the switch I would then continue on with what they call the express set up. First thing I would do is verify that no devices are connected to the switch when first initializing the setup the switch will start acting like a DHCP server. Since my network has a static IP address I will change it for the time being to DHCP. Once switch is mounted and I have all my devices prepared for it I will then power it on. As the POST initializes I can get a good indication that the switch is functioning properly. I can tell when the POST is complete by SYSLED blinking green and if it fails it would blink an amber color. Next with my laptop I will hook directly in to the switch via CAT5. From there I will log in to the switch by opening my web browser and in the address bar typing in the IP address of the switch, which by default is 10.0.0.1 then you will enter the express setup GUI will open. In the express setup GUI I will configure my VLAN ID, IP, and IP subnet mask then I will enter my routers IP to point the switch through my default gateway. Then I will enable Telnet and set the Telnet password this will allow me to access and manage my switch using the command line interface (CLI). I can...

Words: 585 - Pages: 3

Subnet and Router Configuration

...Subnet and Router Configuration Author Note This research is being submitted on August 18th, 2013, for Christine Stagnetto-Zweig’s N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Subnet and Router Configuration Given the IP address 154.78.0.0 calculate the subnet masks that would offer 18 subnets, and have the ability to add 6 per year for the next five years, with each subnet having up to 580 hosts? With This IP address (154.78.0.0) in order to give my client 18 available Subnets also with an option of adding 6 more subnets for the next five years and with each subnet having up to 580 hosts per subnet. I have given this much thought and the subnet mask I would use is 255.255.252.0 this will give me 64 available subnets for growth along with 1,022 hosts per subnet I know that’s a little more than 580 hosts but in my mind having doubled that wouldn’t hurt. This will make my first host IP address be 154.78.0.1 and my last host address be 154.78.3.254 leaving 154.78.3.255 my broadcast address and 154.78.0.0 my network address. Indicate the steps and command that you would use to access and configure the router/switch. Configuring the Fast Ethernet Interface Steps | Command | Purpose | 1 | Router>enable | EXEC Mode, Privileged/pswd | 2 | Router# configure terminal | global configuration mode | 3 | Router# show ip interface brief | brief status of the interfaces that are configured for IP | 4 | Router(config)# interface......

Words: 423 - Pages: 2

Basic Switch Configuration

...Basic Switch Configuration Switch>enable Switch# Examine the current running configuration file. Switch#show running-config Examine the current contents of NVRAM: Switch#show startup-config Examine the characteristics of the virtual interface VLAN1: Switch#show interface vlan1 Switch#show ip interface vlan1 Examine the following version information that the switch reports. Switch#show version Examine the default properties of the FastEthernet interface used by PC1. Switch#show interface fastethernet 0/18 Switch#show vlan examine the contents of the flash directory. Switch#dir flash: or Switch#show flash Switch#dir flash:c2960-lanbase-mz.122-25.SEE3 To save the contents of the running configuration file to non-volatile RAM (NVRAM), issue the the command copy running-config startup-config. Switch#copy running-config startup-config S1#configure terminal S1(config)#hostname S1 S1(config)#exit S1#configure terminal S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#exit S1(config)#enable secret class First, you will create the new VLAN 99 on the switch. Then you will set the IP address of the switch to 172.17.99.11 with a subnet mask of 255.255.255.0 on the internal virtual interface VLAN 99. S1(config)#vlan 99 S1(config-vlan)#exit S1(config)#interface vlan99 %LINEPROTO-5-UPDOWN: Line protocol on Interface......

Words: 873 - Pages: 4

About Subnet

...Jumlah Subnet, Jumlah Host per Subnet, Blok Subnet, dan Alamat Host- Broadcast. Penulisan IP address umumnya adalah dengan 192.168.1.2. Namun adakalanya ditulis dengan 192.168.1.2/24, apa ini artinya? Artinya bahwa IP address 192.168.1.2 dengan subnet mask 255.255.255.0. Lho kok bisa seperti itu? Ya, /24 diambil dari penghitungan bahwa 24 bit subnet mask diselubung dengan binari 1. Atau dengan kata lain, subnet masknya adalah: 11111111.11111111.11111111.00000000 (255.255.255.0). Konsep ini yang disebut dengan CIDR (Classless Inter-Domain Routing) yang diperkenalkan pertama kali tahun 1992 oleh IEFT. Pertanyaan berikutnya adalah Subnet Mask berapa saja yang bisa digunakan untuk melakukan subnetting? Ini terjawab dengan tabel di bawah: Subnet Mask | Nilai CIDR | 255.128.0.0 | /9 | 255.192.0.0 | /10 | 255.224.0.0 | /11 | 255.240.0.0 | /12 | 255.248.0.0 | /13 | 255.252.0.0 | /14 | 255.254.0.0 | /15 | 255.255.0.0 | /16 | 255.255.128.0 | /17 | 255.255.192.0 | /18 | 255.255.224.0 | /19 | | Subnet Mask | Nilai CIDR | 255.255.240.0 | /20 | 255.255.248.0 | /21 | 255.255.252.0 | /22 | 255.255.254.0 | /23 | 255.255.255.0 | /24 | 255.255.255.128 | /25 | 255.255.255.192 | /26 | 255.255.255.224 | /27 | 255.255.255.240 | /28 | 255.255.255.248 | /29 | 255.255.255.252 | /30 | |   SUBNETTING PADA IP ADDRESS CLASS C Ok, sekarang mari langsung latihan saja. Subnetting seperti apa yang terjadi dengan sebuah NETWORK ADDRESS 192.168.1.0/26 ? ...

Words: 1498 - Pages: 6

Ip Configuration

...For the network configuration, we decided to go with a partial mesh configuration to save on cost and time. With the amount of staff members and estimate growth on a annual basis. For Ip address that’s needed to allow enough for employees and guest for the business the sufficient. ip address 10.0.0.0.0 with 255.255.255.255 subnet with 256 usable ip address with a /25 allow guest to use the network . The configuration of the wireless network would allow the management workgroup to connect wireless on the third floor were the upper management staff. Basement level to the second/ first floor with run unshielded paired Ethernet cabling only to the telemarketers, which is about 85 feet. 15 ft for the security desk and 20 feet to training room. Sales agents will run off the wireless with workgroup allowing minimal access to display product to customers with restricted access to the outside internet with the configurations to allow monitor and packet captures as well as the management group .wireless system will support IEEE 802.11g ,IEEE 802.11b, IEEE 802.11a. Cisco wireless access point will be mounted on the ceiling with a hexagon formation to allow maximum coverage within the infrastructure. Basic information relating to the communication of the wireless network in figure 1.1 and the layout of the cisco wireless access points figure 1.2. each workstation not part of the training or security will be equipped with 150Mbps 2.4GHz Wireless PCI LAN Adapter Card......

Words: 321 - Pages: 2

How to Calculate Subnets

...How to Calculate Subnets Subnets and Hosts Borrow 2 bits S S H H H H H H # of subnets = 22 = 4 Subnet mask = 2 bits = 128 + 64 = 192 Range of hosts = 26 = 64 TT Range Useable Range Network ID 0 – 63 64 – 127 65 - 126 128 – 191 129 - 190 Broadcast 192 – 255 Address Borrow 3 bits S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 Range of hosts = 25 = 32 Range 0 – 31 32 – 63 64 – 95 96 – 127 128 – 159 160 – 191 192 – 223 224 – 255 Useable Range 33 - 62 65 - 94 97 -126 129 -158 161 -190 193 -222 Network ID Broadcast Address ©1999 Dan Foss How to Calculate Subnets Decimal/Binary Subnet Ranges Borrow 2 bits S S H H H H H H # of subnets = 22 = 4 = 00000100 Subnet mask = 2 bits = 128 + 64 = 192 = 11000000 Range of hosts = 26 = 64 = 01000000 [Range ……………………………] [Useable Range …………………...] Network ID 0 – 63 00 000000 – 00 111111 64 – 127 01 000000 – 01 111111 65 - 126 01 000001 – 01 111110 128 – 191 10 000000 – 10 111111 129 – 190 10 000001 – 10 111110 Broadcast 192 – 255 11 000000 – 11 111111 Address Borrow 3 bits S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 = 11100000 Range of hosts = 25 = 32 = 00100000 [Range ……………………………] Network ID 0 – 31 000 00000 – 000 11111 32 – 63 001 00000 – 001 11111 64 – 95 010 00000 – 010 11111 96 – 127 011 00000 – 011 11111 128 – 159 100 00000 – 100 11111 160 – 191 101 00000 – 101 11111 192 – 223 110 00000 – 110 11111 Broadcast 224 – 255 111 00000 – 111 11111......

Words: 942 - Pages: 4

Switch Configuration

...| Switch Configuration | | | Amanda Robertson | 4/20/2014 | | I was Hired By a company as a network engineer. One of my first jobs was to purchase, install, configure and deploy a Cisco Catalyst 2960-S Series Switches. This is a popular choice with the LAN Base Software, which comes with the switches. I found that this switch would be compatible with the companies needs having 48 ports, POE configurations that offer up to 15.4w per port, USB storage, 10 GB Ethernet uplink flexibility. This switch would use either copper or fiber optic cabling however I would prefer the fiber optic. The first step that I would have to take is to connect all hardware properly. “When you first set up the switch, you should use Express Setup to enter the initial IP information. This enables the switch to connect to local routers and the Internet. You can then access the switch through the IP address for further configuration” (Cisco, 2006-2010). Plug in the AC adaptor cord to the Cisco switch to power it on. The switch will go through POST and then verify that the SYST LED light blinks green rapidly. To run Express Set up mode, hold the mode button for 3 seconds, or when all lights above mode buttons turns green. Connect a CAT5 Ethernet cable to the switch and computer, after 30 seconds launch a browser and enter the IP address 10.0.0.1 in the browser and press enter. I would then fill out all the information requested by the Express Set up Mode, the Management interface......

Words: 569 - Pages: 3

Subnet Assignment

...0.0/8 subnetted to 10808 subnets and provide information for subnets #1, #726, #4213, and #10808 SUMMARY Subnet #: 1 |   | Network Address |  64.0.4.0 | Broadcast Address |  64.0.7.255 | Subnet Mask: |  255.255.252.0 | Range of IP Addresses: |  64.0.4.1 to 64.0.7.254 |  Subnet #: 726 |   | Network Address |  64.11.88.0 | Broadcast Address |  64.11.91.255 | Subnet Mask: |  255.255.252.0 | Range of IP Addresses: |  64.11.88.1 – 64.11.91.254 |   Subnet #: 4213 |   | Network Address |  64.65.212.0 | Broadcast Address |  64.65.215.255 | Subnet Mask: |  255.255.252.0 | Range of IP Addresses: |  64.65.212.1 – 64.65.215.254 | Subnet #: 10808 |   |   | Network Address |  64.168.224.0 |   | Broadcast Address |  64.168.227.255 |   | Subnet Mask: |  255.255.252.0 |   | Range of IP Addresses: |  64.168.224.1 – 64.168.227.254 |   | Subnet #1: Converting the IP address 64.0.0.0/8 into binary numbers 64.0.0.0 = 01000000.00000000.00000000.00000000 The /8 at the end of the IP address means that the subnet mask will consist of eight 1’s for the first octet and then 24 0s following Network Bits – Host Bits 11111111.00000000.00000000.00000000 255. 0. 0. 0. Both binary numbers are lined up: 01000000.00000000.00000000.00000000 - IP Address 11111111.00000000.00000000.00000000 - Subnet Mask Left most bits w/ the 1’s = Network Bits The rest is Host bits. We will take host bits and add them to the network portion. Since we have 10808 subnets, 2 to the power of 14 is...

Words: 832 - Pages: 4

Subnet Assignment

...46 subnets and provide information for subnets #1, #4, #5, and #46 Step 1: Convert the network address to binary 215.251.145.0/24 is a class C address with a subnet mask of 24 bits of ones First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=0, 16=1, 8=0, 4=1, 2=1, 1=1 215 = 11010111. Second Octet = 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=0, 2=1, 1=1 251 = 11111011 Third Octet = 128.64.32.16.8.4.2.1, 128=1, 64=0, 32=0, 16=1, 8=0, 4=0, 2=0, 1=1 145 = 10010001 Fourth Octet = 0 11010111.11111011.10010001.00000000 Network address Step 2: Convert Subnet mask into binary First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Second Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Third Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Forth Octet = 0 11111111.11111111.11111111.00000000 Subnet mask Step 3: Calculate the subnets required 46 subnets required per instructions: Use the formula 2 to the power of X to find out how many bits to borrow from the subnet mask. 2^5= 32 and is insufficient to cover the subnets required so, 2^6 = 64 x is 6 we need 6 bits from last octet of the subnet mask to cover our subnets. I need 46 subnets but I have total 64 available so that leaves me with; 64-46 = 18 extra subnets to use at a later date. Original Network address in binary: 11010111.11111011.10010001.00000000 Replace subnet......

Words: 1170 - Pages: 5

Subnet

...TCP/IP Subnetting The core components of TCP/IP are the IP address and the Subnet mask. The entire purpose of the Subnet Mask is to show the computer where to separate the IP Address into the Network ID and the Host ID. When read in Binary, a Subnet Mask will always be a string of 1’s followed by a string of 0’s. The 1’s cover the Network ID while the 0’s cover the Host ID. The IP Address is separated between the last 1 and the first 0. Network ID Host ID 10101010.01010101 11001100.11100011 = IP Address 11111111.11111111 00000000.00000000 = Subnet Mask TCP/IP addresses are made up of 4 sets of numbers called “Octets.” Each octet is an 8 bit binary string. The largest possible value that can be created with 8 characters in binary is 255. There are three classes of IP Address by default. They are determined by the value of their first octet. Each Class address has a particular default Subnet Mask. Class “A” = 1-127 Default Subnet Mask = 255.0.0.0 Class “B” = 128-191 Default Subnet Mask = 255.255.0.0 Class “C” = 192-223 Default Subnet Mask = 255.255.255.0 When viewed in Binary, you’ll notice a pattern. Class “A” always begins with a 0 00000001-01111111 Class “B” always begins with a 10 10000000-10111111 Class “C” always begins with a 110 11000000-11011111 The remaining classes (any with a value of 224 or higher in the first octet) are not used for public use, and are not considered valid. Also, though technically a Class “A” address, 127.0.0.1 is reserved for......

Words: 1137 - Pages: 5