24 subnet how many hosts




















However, you can use the same formula to determine how many hosts a subnet supports. For example, how many hosts can you fit on this network: Remember that the formula for determining the number of hosts a network supports is 2 n -2, where n is the number of bits used for the host. With 28 bits used for the subnet mask, that leaves 4 bits for the hosts You cannot take a calculator into the exam room. However, some exams provide access to a simple calculator. With this in mind, you should be able to recreate the following table from memory.

This ensures you can identify the value of 2 n Answer: C is correct. It indicates a subnet mask of The formula to determine how many hosts can operate on a network is 2 n -2, where n is the number of 0 bits in the subnet mask. A subnet mask has 32 bits. Using the 2 n -2 formula, or 2 5 — 2, or 32 — 2, you see the answer is This is how many hosts you can have on the network.

A is incorrect. Using the 2 n -2 formula, or 2 7 — 2, or — 2, you see the answer is The process so far is straightforward:. The only big problem occurs when the mask is tricky, which is true in the last two examples. When the mask is tricky, you have two alternatives for deciding how many host bits are defined:. These are the only nine valid decimal values used in a subnet mask.

Converting a mask to binary without having to convert from decimal to binary will be much faster. Table lists the only valid decimal values in a mask and their binary equivalents. Memorizing these values will help you convert masks from between their decimal and binary forms more quickly on the exam.

Without the use of a calculator, PC, or decimal-to- binary conversion chart , binary conversion of a subnet mask becomes easy after memorizing this chart. The binary equivalents of and decimal 0 are obvious. The other seven values are not.

But notice the values in succession: Each value has an additional binary 1 and one less binary 0. Each mask value, in succession, shows a mask value that reduces the number of host bits by 1 and adds 1 to the size of the subnet field.

If you simply memorize each decimal value and its binary equivalent, converting masks from decimal to binary will be a breeze. In fact, you could sit down to take the exam, and before starting, go ahead and write down the information in the table so you could easily refer to it during the exam.

Given an address and mask, how many subnets are there? And how many hosts are there in a single subnet? Well, two simple formulas provide the answers, and the formulas are based on the information that you just learned how to derive:. The formulas calculate the number of things that can be numbered using a binary number and then subtract 2 for two special cases.

IP addressing conventions define that two subnets per network should not be used and that two hosts per subnet should not be used. One reserved subnet, the subnet that has all binary 0s in the subnet field, is called the zero subnet. The subnet with all binary 1s in the subnet field is called the broadcast subnet —and it also is reserved. Well, in fact, you can use both these subnets on a Cisco router, but it is recommended that you avoid using them.

Whenever a bit in a binary subnet mask is 1, then the same bit in a binary IP address is part of the network, not the host. Since the octet is in binary, that whole octet in the IP address is part of the network. So the first three octets, In other words, if the device at Another way to express this is with a network ID, which is just the network portion of the IP address. So the network ID of the address And it's the same for the other devices on the local network CIDR was introduced in as a way to slow the usage of IPv4 addresses, which were quickly being exhausted under the older Classful IP addressing system that the internet was first built on.

And those subnets could be different sizes, so there would be fewer unused IP addresses. CIDR notation is really just shorthand for the subnet mask, and represents the number of bits available to the IP address. To figure out the CIDR notation for a given subnet mask, all you need to do is convert the subnet mask into binary, then count the number of ones or "on" digits.

For example:. This is usually done with an IP address, so let's take a look at the same subnet mask with an IP address:.

The first three octets of the subnet mask are all "on" bits, so that means that the same three octets in the IP address are all network bits. In this case, because all the bits for this octet in the subnet mask are "off", we can be certain that all of the corresponding bits for this octet in the IP address are part of the host. Now that we've gone over some basic examples of subnetting and CIDR, let's zoom out and look at what's known as Classful IP addressing.

Note that there are class D and E IP addresses, but we'll go into these in more detail a bit later. Classful IP addresses gave network engineers a way to provide different organizations with a range of valid IP addresses. There were a lot of issues with this approach that eventually lead to subnetting. But before we get into those, let's take a closer look at the different classes.

Class A IP addresses range from 1. This means that Class A addressing can have a total of 2 7 networks and 16,, 2 24 -2 usable addresses per network. Also, note that the range Class B IP addresses range from Class B addressing can have 16, 2 14 network addresses and 65, 2 16 usable addresses per network.

Class C IP Addresses range from Class C translates to 2,, 2 21 networks and 2 8 -2 usable addresses per network. Class D IP addresses are reserved for multicasts. They occupy the range from The main issue with classful IP addresses is that it wasn't efficient, and could lead to a lot of wasted IP addresses. For example, imagine that you're part of a large organization back then.



0コメント

  • 1000 / 1000