Selective Course
Selective Course
1. Centralized computing.
In this type of system, multiple computers are joined to one powerful mainframe
computer.
The server or mainframe computer has huge storage and processing capabilities.
The computers that are connected to the mainframe or server are called Clients or
Nodes.
These nodes are not connected to each other; they are only connected to server.
2. Distributed computing
If one computer can forcibly start, stop or control another the computers are not
autonomous. A system with one control unit and many slaves, or a large computer with
remote printers and terminals is not called a computer network, it is called a
Distributed System.
Distributed computing means that the task is divided among multiple computers.
In distributed computing, the nodes are capable of processing their own data and rely
on network for services other than data processing.
It allows various services like network sharing, hardware sharing and file sharing.
In collaborative computing, the nodes are able to serve the basic needs of their users
but they are dependent on some other computers for processing some specific request.
The local area network communication can be constructed by using server based model
or peer to peer model. In peer to peer networks, the individual clients share data and
resources but no one computer is treated as server.
Networks can be classified into local area Networks, metropolitan area Networks and
wide area networks. Local area network is the small network that cover a small area of
Network. Metropolitan area networks are created by combining various local area
networks. Wide area networks are the biggest networks that provide connectivity across
the globe.
Networks provide the benefits of exchanging information or Data, sharing resources,
reducing system costs, increased reliability and flexible working environment.
Outlook Express
Outlook Express, an email program | Source
1. Email programs
They allow users to type messages at their local nodes and then send to someone on the network.
It is a fast and easy way of transferring mail from one computer to another. Examples of
electronic mail programs (Clients) are:-
Pegasus mail
Outlook express
Fox mail
Opera
Poco mail
Mozilla Thunderbird
Windows mail
2. File transfer protocol (FTP)
This application facilities transfer of files from one computer to another e.g. from a client to a
server. There are 2 common processes involved in FTP
Downloading: - This is the process of obtaining files from a server to a workstation or a client
(for example when you download programs and music from a server).
Uploading:- This is obtaining of files from a workstation to a server (for instance when you
attach documents and upload them to a server, a good example being when you upload photos to
Facebook).
FTP in Unix
FTP in Linux or
FTP in Windows
4. Groupware
These applications are used to automate the administration functions of a modern office for
instance video conferencing and chatting. They facilitate the work of groups and improve on
their productivity; they can be used to communicate, co-operate, coordinate, solve problems,
compete, negotiate among others.
(ii) Chatting
It is a real-time communication between two users via computer. Once a chat has been initiated,
either user can enter text by typing on the keyboard and the entered text will appear on the other
users monitor. The two must be online for a chat to be initiated. Most networks, cybers and
online services offer a chat feature which enables computer users to chat as they go on with their
work.
OSI MODEL
The Open Systems Interconnect (OSI) model has seven layers. This article describes and explains them,
beginning with the 'lowest' in the hierarchy (the physical) and proceeding to the 'highest' (the
application). The layers are stacked this way:
Application
Presentation
Session
Transport
Network
Data Link
Physical
PHYSICAL LAYER
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception
of the unstructured raw bit stream over a physical medium. It describes the electrical/optical,
mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher
layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better
accommodate the characteristics of the physical medium, and to aid in bit and frame synchronization. It
determines:
How many pins do the connectors have and what is each pin used for?
Transmission technique: determines whether the encoded bits will be transmitted by baseband (digital)
or broadband (analog) signaling.
Physical medium transmission: transmits bits as electrical or optical signals appropriate for the physical
medium, and determines:
How many volts/db should be used to represent a given signal state, using a given physical medium
The data link layer provides error-free transfer of data frames from one node to another over the
physical layer, allowing layers above it to assume virtually error-free transmission over the link. To do
this, the data link layer provides:
Link establishment and termination: establishes and terminates the logical link between two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available.
Media access management: determines when the node "has the right" to use the physical medium.
NETWORK LAYER
The network layer controls the operation of the subnet, deciding which physical path the data should
take based on network conditions, priority of service, and other factors. It provides:
Subnet traffic control: routers (network layer intermediate systems) can instruct a sending station to
"throttle back" its frame transmission when the router's buffer fills up.
Frame fragmentation: if it determines that a downstream router's maximum transmission unit (MTU)
size is less than the frame size, a router can fragment a frame for transmission and re-assembly at the
destination station.
Logical-physical address mapping: translates logical addresses, or names, into physical addresses.
Subnet usage accounting: has accounting functions to keep track of frames forwarded by subnet
intermediate systems, to produce billing information.
Communications Subnet
The network layer software must build headers so that the network layer software residing in the
subnet intermediate systems can recognize them and use them to route data to the destination address.
This layer relieves the upper layers of the need to know anything about the data transmission and
intermediate switching technologies used to connect systems. It establishes, maintains and terminates
connections across the intervening communications facility (one or several intermediate systems in the
communication subnet).
In the network layer and the layers below, peer protocols exist between a node and its immediate
neighbor, but the neighbor may be a node through which data is routed, not the destination station. The
source and destination stations may be separated by many intermediate systems.
TRANSPORT LAYER
The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or
duplications. It relieves the higher layer protocols from any concern with the transfer of data between
them and their peers.
The size and complexity of a transport protocol depends on the type of service it can get from the
network layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is
required. If the network layer is unreliable and/or only supports datagrams, the transport protocol
should include extensive error detection and recovery.
Message segmentation: accepts a message from the (session) layer above it, splits the message into
smaller units (if not already small enough), and passes the smaller units down to the network layer. The
transport layer at the destination station reassembles the message.
Message traffic control: tells the transmitting station to "back-off" when no message buffers are
available.
Session multiplexing: multiplexes several message streams, or sessions onto one logical link and keeps
track of which messages belong to which sessions (see session layer).
Typically, the transport layer can accept relatively large messages, but there are strict message size
limits imposed by the network (or lower) layer. Consequently, the transport layer must break up the
messages into smaller units, or frames, prepending a header to each frame.
The transport layer header information must then include control information, such as message start
and message end flags, to enable the transport layer on the other end to recognize message boundaries.
In addition, if the lower layers do not maintain sequence, the transport header must contain sequence
information to enable the transport layer on the receiving end to get the pieces back together in the
right order before handing the received message up to the layer above.
End-to-end layers
Unlike the lower "subnet" layers whose protocol is between immediately adjacent nodes, the transport
layer and the layers above are true "source to destination" or end-to-end layers, and are not concerned
with the details of the underlying communications facility. Transport layer software (and software above
it) on the source station carries on a conversation with similar software on the destination station by
using message headers and control messages.
SESSION LAYER
The session layer allows session establishment between processes running on different stations. It
provides:
Session establishment, maintenance and termination: allows two application processes on different
machines to establish, use and terminate a connection, called a session.
Session support: performs the functions that allow these processes to communicate over the network,
performing security, name recognition, logging, and so on.
PRESENTATION LAYER
The presentation layer formats the data to be presented to the application layer. It can be viewed as the
translator for the network. This layer may translate data from a format used by the application layer into
a common format at the sending station, then translate the common format to a format known to the
application layer at the receiving station.
Data compression: reduces the number of bits that need to be transmitted on the network.
Data encryption: encrypt data for security purposes. For example, password encryption.
APPLICATION LAYER
The application layer serves as the window for users and application processes to access network
services. This layer contains a variety of commonly needed functions:
Inter-process communication
Network management
Directory services
IP
The Open Systems Interconnect (OSI) model has seven layers. This article describes and explains them,
beginning with the 'lowest' in the hierarchy (the physical) and proceeding to the 'highest' (the
application). The layers are stacked this way:
Application
Presentation
Session
Transport
Network
Data Link
Physical
PHYSICAL LAYER
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception
of the unstructured raw bit stream over a physical medium. It describes the electrical/optical,
mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher
layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better
accommodate the characteristics of the physical medium, and to aid in bit and frame synchronization. It
determines:
What signal state represents a binary 1
How many pins do the connectors have and what is each pin used for?
Transmission technique: determines whether the encoded bits will be transmitted by baseband (digital)
or broadband (analog) signaling.
Physical medium transmission: transmits bits as electrical or optical signals appropriate for the physical
medium, and determines:
How many volts/db should be used to represent a given signal state, using a given physical medium
The data link layer provides error-free transfer of data frames from one node to another over the
physical layer, allowing layers above it to assume virtually error-free transmission over the link. To do
this, the data link layer provides:
Link establishment and termination: establishes and terminates the logical link between two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available.
Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers from errors
that occur in the physical layer by retransmitting non-acknowledged frames and handling duplicate
frame receipt.
Media access management: determines when the node "has the right" to use the physical medium.
NETWORK LAYER
The network layer controls the operation of the subnet, deciding which physical path the data should
take based on network conditions, priority of service, and other factors. It provides:
Subnet traffic control: routers (network layer intermediate systems) can instruct a sending station to
"throttle back" its frame transmission when the router's buffer fills up.
Frame fragmentation: if it determines that a downstream router's maximum transmission unit (MTU)
size is less than the frame size, a router can fragment a frame for transmission and re-assembly at the
destination station.
Logical-physical address mapping: translates logical addresses, or names, into physical addresses.
Subnet usage accounting: has accounting functions to keep track of frames forwarded by subnet
intermediate systems, to produce billing information.
Communications Subnet
The network layer software must build headers so that the network layer software residing in the
subnet intermediate systems can recognize them and use them to route data to the destination address.
This layer relieves the upper layers of the need to know anything about the data transmission and
intermediate switching technologies used to connect systems. It establishes, maintains and terminates
connections across the intervening communications facility (one or several intermediate systems in the
communication subnet).
In the network layer and the layers below, peer protocols exist between a node and its immediate
neighbor, but the neighbor may be a node through which data is routed, not the destination station. The
source and destination stations may be separated by many intermediate systems.
TRANSPORT LAYER
The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or
duplications. It relieves the higher layer protocols from any concern with the transfer of data between
them and their peers.
The size and complexity of a transport protocol depends on the type of service it can get from the
network layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is
required. If the network layer is unreliable and/or only supports datagrams, the transport protocol
should include extensive error detection and recovery.
Message segmentation: accepts a message from the (session) layer above it, splits the message into
smaller units (if not already small enough), and passes the smaller units down to the network layer. The
transport layer at the destination station reassembles the message.
Message traffic control: tells the transmitting station to "back-off" when no message buffers are
available.
Session multiplexing: multiplexes several message streams, or sessions onto one logical link and keeps
track of which messages belong to which sessions (see session layer).
Typically, the transport layer can accept relatively large messages, but there are strict message size
limits imposed by the network (or lower) layer. Consequently, the transport layer must break up the
messages into smaller units, or frames, prepending a header to each frame.
The transport layer header information must then include control information, such as message start
and message end flags, to enable the transport layer on the other end to recognize message boundaries.
In addition, if the lower layers do not maintain sequence, the transport header must contain sequence
information to enable the transport layer on the receiving end to get the pieces back together in the
right order before handing the received message up to the layer above.
End-to-end layers
Unlike the lower "subnet" layers whose protocol is between immediately adjacent nodes, the transport
layer and the layers above are true "source to destination" or end-to-end layers, and are not concerned
with the details of the underlying communications facility. Transport layer software (and software above
it) on the source station carries on a conversation with similar software on the destination station by
using message headers and control messages.
SESSION LAYER
The session layer allows session establishment between processes running on different stations. It
provides:
Session establishment, maintenance and termination: allows two application processes on different
machines to establish, use and terminate a connection, called a session.
Session support: performs the functions that allow these processes to communicate over the network,
performing security, name recognition, logging, and so on.
PRESENTATION LAYER
The presentation layer formats the data to be presented to the application layer. It can be viewed as the
translator for the network. This layer may translate data from a format used by the application layer into
a common format at the sending station, then translate the common format to a format known to the
application layer at the receiving station.
Data compression: reduces the number of bits that need to be transmitted on the network.
Data encryption: encrypt data for security purposes. For example, password encryption.
APPLICATION LAYER
The application layer serves as the window for users and application processes to access network
services. This layer contains a variety of commonly needed functions:
Inter-process communication
Network management
Directory services
IP
IP may refer to any of the following:
1. Short for Internet Protocol address, an IP or IP address is a number (example shown right)
used to indicate the location of a computer or other device on a network using TCP/IP. These
addresses are similar to those of your house, allowing data to reach the appropriate destination on
a network and the Internet.
45.79.151.23
2601:681:4200:c5c0:516:f0bb:ac3b:46bd
IP address classes
With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B, Class C,
Class D and Class E, while only A, B, and C are commonly used. Each class allows for a range
of valid IP addresses, shown in the following table.
128.1.0.1 to
Class B Supports 65,000 hosts on each of 16,000 networks.
191.255.255.254
224.0.0.0 to
Class D Reserved for multicast groups.
239.255.255.255
Ranges 127.x.x.x are reserved for the loopback or localhost, for example, 127.0.0.1 is the
loopback address. Range 255.255.255.255 broadcasts to all hosts on the local network.
IP address breakdown
Every IP address is broken down into four sets of octets and translated into binary to represent
the actual IP address. The below table is an example of the IP 255.255.255.255. If you are new to
binary, we highly recommend reading our binary and hexadecimal conversions section to get a
better understanding of what we're doing in the below charts.
Octet value: 8 8 8 8
For an example, let's break down the IP "166.70.10.23" in the following table. The first row
contains the separate sections of the IP address, the second has binary values, and the third row
shows how the binary value equals the section of the IP address.
IP: 166 70 10 23
192.168.1.3 - 254 Addresses beyond 3 are assigned to computers and devices on the network.
If you have ever connected to your home network, you should be familiar with the gateway
address or 192.168.1.1, which is the address you use to connect to your home network router to
change its settings. Another common IP range that may be used is 10.0.0.3-254.
Getting an IP address
By default, the router you use will assign each of your computers their own IP address, often
using NAT to forward the data coming from those computers to outside networks such as the
Internet. If you need to register an IP address that can be seen on the Internet, you must register
through InterNIC or use a web host that can assign you addresses.
Anyone who connects to the Internet is assigned an IP address by their Internet Service Provider
(ISP), which has registered a range of IP addresses. For example, let's assume your ISP is given
100 addresses, 109.145.93.150-249. In this range, the ISP owns addresses 109.145.93.150 to
109.145.93.249 and can assign any address in that range to its customers. So, all these addresses
belong to your ISP until they are assigned to a customers computer. In the case of a dial-up
connection, you are given a new IP address each time you dial into your ISP. With most
broadband Internet service providers, you are always connected to the Internet your address
rarely changes. It remains the same until the service provider requires otherwise.
The above picture is taken from our "How do computers connect to each other over the Internet"
page and gives a good overview of how a computer can talk to another computer over the
Internet using an IP address.
This lesson is only a part of a series of IPv4 subnetting lessons. Please visit the below links to
learn IPv4 subnetting completely.
In this Class C Subnetting Tutorial - Part 1, you will learn how to subnet a Class C network.
You need good knowledge about binary number system and the conversions between decimal
to binary and binary to decimal. Click the following link to learn more about binary and
hexadecimal number system.
Subnetting (RFC 950) is the process of dividing any classful IP network (Class A, Class B, or
Class C network) into smaller networks.
Before proceeding further deep into subnetting, we should know these terms.
If we take an example for a Class C network, 192.168.10.0, the address part and the subnet
mask can be represented as below.
For a Class C IPv4 address, the first three octets are used to represent the Network part and the
lact octet is used to represent the host part. From the above table, we can see all "1" in the
network part and all "0" in nthe host part. When this subnet mask is converted to a decimals, it
will become 255.2555.255.0. The default subnet mask for a Class C network is 255.255.255.0,
Class B network is 255.255.0.0 and Class A network is 255.0.0.0
A directed broadcast is sent to a specific network identified in the Network part of the IPv4
address. Routers on the network configured to forward-directed broadcasts will send the IP
datagram to the final router that connects the destination specidied in the network part, and the
router at the destination network should forward it to the destination host.
What is CIDR?
Classless Inter-Domain Routing (CIDR, RFC 1517, RFC 1518, RFC 1519, RFC 1520) was
published in 1993 to keep the internet from running out of IPv4 addresses. The "classful"
system of allocating IPv4 addresses can waste many IPv4 addresses. Any organization who
need just a few IPv4 addresses more than 254 must get a Class B address block of 65533 IPv4
addresses. Even much more IPv4 addresses are wasted in the case of Class A, where total
usable IPv4 addresses per network is 16777214 ((2^24) - 2).
The original "IPv4 Class A networks" uses 8 bits to represent the network part, "Class B
networks" uses 16 bits to represent the network part and "Class C networks" uses 24 bits to
represent the network part. CIDR replaced these categories with a more generalized network
prefix. This network prefix could be of any length, not just 8, 16, or 24 bits.
If all the bits in the host part are "0", that represents the network id.
If all the bits in the host part are "0" except the last bit, it is the first usable IPv4 address.
If all the bits in the host part are "1" except the last bit, it is the last usable IPv4 address.
If all the bits in the host part are "1", that represents the directed broadcast address.
All the IPv4 addresses between the first and last IPv4 addresses (including the first and last)
can be used to configure the devices.
11000000.10101000.00001010.0 | 0000000
11111111.11111111.11111111.1 | 0000000
The network 192.168.10.0 is divided into two networks, each network has 128 total IPv4
addresses and 126 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for one bit
subnetting is 255.255.255.128.
11000000.10101000.00001010.00 | 000000
11111111.11111111.11111111.11 | 000000
The network 192.168.10.0 is divided into four networks, each network has 64 total IPv4
addresses and 62 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for two bit
subnetting is 255.255.255.192.
11000000.10101000.00001010.000 | 00000
11111111.11111111.11111111.111 | 00000
The network 192.168.10.0 is divided into eight networks, each network has 32 total IPv4
addresses and 30 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for three
bit subnetting is 255.255.255.224.
Consider the network shown above. If we include one bit from the host part to the network
part, the subnet mask is changed into 255.255.255.128. The single bit can have two values in
last octet, either 0 or 1.
11000000.10101000.00001010.0 | 0000000
11111111.11111111.11111111.1 | 0000000
The network 192.168.10.0 is divided into two networks, each network has 128 total IPv4
addresses and 126 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for one bit
subnetting is 255.255.255.128.
11000000.10101000.00001010.00 | 000000
11111111.11111111.11111111.11 | 000000
The network 192.168.10.0 is divided into four networks, each network has 64 total IPv4
addresses and 62 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for two bit
subnetting is 255.255.255.192.
11000000.10101000.00001010.000 | 00000
11111111.11111111.11111111.111 | 00000
The network 192.168.10.0 is divided into eight networks, each network has 32 total IPv4
addresses and 30 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for three
bit subnetting is 255.255.255.224.
11000000.10101000.00001010.0000 | 0000
11111111.11111111.11111111.1111 | 0000
The four bits added to network part can have sixteen possible values in last (fourth) octet and
that are 0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111, 1000, 1001, 1010, 1011, 1100,
1101, 1110, 1111.
The network 192.168.10.0 is divided into sixteen networks, each network has 16 total IPv4
addresses and 14 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address).
From the above examples, you can can clearly understand how to subnet a Class C network .
2 255.255.255.192 /26 4 62
3 255.255.255.224 /27 8 30
4 255.255.255.240 /28 16 14
5 255.255.255.248 /29 32 6
6 255.255.255.252 /30 64 2
In this Class C Subnetting Tutorial - Part 2, you have learned how to perform a Class C 4 bit
subnetting. To View Class B Subnetting Tutorial - Part 1, Click "Next".
This lesson is only a part of a series of. Please visit the below links to learn IPv4 subnetting
completely.
Class A Subnetting
Remember, the first octet of a Class A network is used to represent the network and the
remaining three octets are used to represent the host. The default format for a Class A IPv4
address is Network.Host.Host.Host.
Let us consider an example of Class A network 10.0.0.0 - 255.0.0.0. The binary representation
of the above network and subnet mask is
Once again,
If all the bits in the host part are "0", that represents the network address.
If all the bits in the host part are "0" except the last bit, it is the first usable IPv4 address.
If all the bits in the host part are "1" except the last bit, it is the last usable IPv4 address.
If all the bits in the host part are "1", that represents the direct broadcast address.
All the IPv4 addresses between the first and last IPv4 addresses (including the first and last)
can be used to configure the devices.
If we include one bit from the host part to the network part, the subnet mask is changed into
255.255.128.0 The single bit can have two values in second octet, either 0 or 1.
00001010.0 | 0000000.00000000.00000000
11111111.1 | 0000000.00000000.00000000
That means, we can get two subnets if we do a single bit subnetting. The subnet mask for one
bit subnetting is 255.128.0.0.
The network 10.0.0.0 is divided into two networks, each network has 8388608 total IPv4
Addresses and 8388606 usable IPv4 Addresses (two IPv4 Addresses are used in each subnet to
represent the network address and the directed broadcast address).
If we include two bits from the host part to the network part, the subnet mask is changed into
255.192.0.0. The two bits added to network part can have four possible values in second octet,
00, 01, 10, and 11.
00001010.00 | 000000.00000000.00000000
11111111.11 | 000000.00000000.00000000
That means, we can get four networks if we do a two bit subnetting. The subnet mask for two
bit subnetting is 255.192.0.0.
The network 10.0.0.0 is divided into four networks, each network has 4194304 total IPv4
Addresses and 4194302 usable IPv4 Addresses (two IPv4 Addresses are used in each subnet to
represent the network address and the directed broadcast address).
If we include three bits from the host part to the network part, the subnet mask is changed into
255.224.0.0 The three bits added to network part can have eight possible values in the second
octet and that are 000, 001, 010, and 011, 100, 101, 110 and 111.
00001010.000 | 00000.00000000.00000000
11111111.111 | 00000.00000000.00000000
That means, we can get eight networks if we do a three bit subnetting and the subnet mask will
be 255.224.0.0.
The network 10.0.0.0 is divided into eight networks, each network has 2097152 total IPv4
Addresses and 2097150 usable IPv4 Addresses (two IPv4 Addresses are used in each subnet to
represent the network address and the directed broadcast address).
In this Class A Subnetting Tutorial - Part 1, you have learned how to subnet a Class A network.
Click "Next" to view .
00001010.0000 | 0000.00000000.00000000
11111111.1111 | 0000.00000000.00000000
The four bits added to network part can have sixteen possible values in second octet and that are
0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111, 1000, 1001, 1010, 1011, 1100, 1101, 1110,
1111.
The network 10.0.0.0 is divided into sixteen networks, each network has 1048576 total IPv4
addresses and 1048574 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address).
From the above examples, you can clearly understand how to subnet a Class A network..
0 255.0.0.0 /8 1 16777214
1 255.128.0.0 /9 2 8388606
Class B Subnetting
Remember, the first two octets of a Class B network is used to represent the network and the
last two octets are used to represent the host. The default format for a Class B IPv4 address is
Network.Network.Host.Host.
Once again,
If all the bits in the host part are "0", that represents the network id.
If all the bits in the host part are "0" except the last bit, it is the first usable IPv4 address.
If all the bits in the host part are "1" except the last bit, it is the last usable IPv4 address.
If all the bits in the host part are "1", that represents the directed broadcast address.
All the IPv4 addresses between the first and last IPv4 addresses (including the first and last)
can be used to configure the devices.
If we include one bit from the host part to the network part, the subnet mask is changed into
255.255.128.0 The single bit can have two values in third octet, either 0 or 1.
10101100.00010000.0 | 0000000.00000000
11111111.11111111.1 | 0000000.00000000
The network 172.16.0.0 is divided into two networks, each network has 32768 total IPv4
addresses and 32766 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for one
bit subnetting is 255.255.128.0.
If we include two bits from the host part to the network part, the subnet mask is changed into
255.255.192.0. The two bits added to network part can have four possible values in third
octet, 00, 01, 10, and 11.
10101100.00010000.00 | 000000.00000000
11111111.11111111.11 | 000000.00000000
The network 172.16.0.0 is divided into four networks, each network has 16384 total IPv4
addresses and 16382 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask for one
bit subnetting is 255.255.192.0.
If we include three bits from the host part to the network part, the subnet mask is changed
into 255.255.224.0 The three bits added to network part can have eight possible values in the
third octet and that are 000, 001, 010, and 011, 100, 101, 110 and 111.
10101100.00010000.000 | 00000.00000000
11111111.11111111.111 | 00000.00000000
The network 172.16.0.0 is divided into eight networks, each network has 8192 total IPv4
addresses and 8190 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address).
In this Class B Subnetting Tutorial - Part 1, you have learned how to subnet a Class B
network. Click "Next" to view Class B Subnetting Tutorial - Part 2.
10101100.00010000.0000 | 0000.00000000
11111111.11111111.1111 | 0000.00000000
The four bits added to network part can have sixteen possible values in third octet and that
are 0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111, 1000, 1001, 1010, 1011, 1100, 1101,
1110, 1111.
The network 172.16.0.0 is divided into sixteen networks, each network has 4096 total IPv4
addresses and 4094 usable IPv4 addresses (two IPv4 addresses are used in each subnet to
represent the network address and the directed broadcast address). The subnet mask is
255.255.240.0.
Class B Subnetting can be summerized as below.
In this Class B Subnetting tutorial Part - 2, you have learned how perform a Class B 4 bit
Subnetting. To view Class A Subnetting Tutorials - Part 1, Click "Next".