Subnetting Tutorial: Understanding /24 and /28 Networks
30 Questions
2 Views
3.5 Stars

Subnetting Tutorial: Understanding /24 and /28 Networks

Created by
@EntrancingTennessine

Questions and Answers

What is the subnet ID for host 192.168.29.219/29?

192.168.29.216/29

Which subnet does host 172.21.111.201/20 belong to?

172.21.96.0/20

In binary form, what is the IP address 11001101.01110011.10101000.00110010 in decimal?

205.115.168.50

For the subnet 172.16.0.0/16, how many total subnets can be created?

<p>4096</p> Signup and view all the answers

What is the subnet ID for host 200.10.45.78/26?

<p>200.10.45.64/26</p> Signup and view all the answers

If a host has an IP address of 11011010.00110101.11100011.01001011, what is its subnet ID in decimal form?

<p>218.53.243.64/24</p> Signup and view all the answers

How many host bits are there in a /27 subnet?

<p>5</p> Signup and view all the answers

What is the subnet mask for a /29 network?

<p>255.255.255.248</p> Signup and view all the answers

How many subnets are created when using a block size of 64 in FLSM?

<p>4</p> Signup and view all the answers

Which network range corresponds to the IP address range 192.168.1.0/26 to 192.168.1.63/26?

<p>192.168.1.64/26 to 192.168.1.127/26</p> Signup and view all the answers

If 9 host bits are required for a network, what is the minimum subnet mask length needed?

<p>/28</p> Signup and view all the answers

In binary form, what does assigning 1 to network bits and 0 to host bits look like for an 8-bit subnet?

<p>11111111</p> Signup and view all the answers

What is the main purpose of Spanning Tree Protocol (STP)?

<p>To avoid switching loops in layer-2 devices</p> Signup and view all the answers

What is the significance of BPDU in Spanning Tree Protocol (STP)?

<p>BPDU helps switches determine network topology and prevent loops</p> Signup and view all the answers

What information is included in a Bridge ID (BID) used in STP?

<p>Priority + MAC address of the switch</p> Signup and view all the answers

Why does STP help avoid multiple frame copies at the destination?

<p>By eliminating loops through designated ports</p> Signup and view all the answers

What does STP aim to reduce in a network environment?

<p>Broadcast storms and database instability</p> Signup and view all the answers

Why do switches exchange Bridge Protocol Data Units (BPDUs) in STP?

<p>To determine network topology and prevent loops</p> Signup and view all the answers

How can you check your public IP address?

<p>Go to <a href="http://www.whatismyipaddress.com">www.whatismyipaddress.com</a></p> Signup and view all the answers

What is the purpose of the Type of Service (TOS) field in IPv4 addressing?

<p>Prioritize traffic based on importance</p> Signup and view all the answers

How is an Identification Field used in IPv4 addressing?

<p>Identify fragments belonging to the same packet</p> Signup and view all the answers

What does a header length value of 6 indicate in an IPv4 address?

<p>Presence of options field in the header</p> Signup and view all the answers

In IPv4 addressing, what do the Flags represent?

<p>Three different actions</p> Signup and view all the answers

What is the shortcut to access network connections on a Windows PC?

<p>Press Windows button + R</p> Signup and view all the answers

What is the main characteristic of a flat network?

<p>It has one broadcast domain</p> Signup and view all the answers

How are network security and VLANs related?

<p>VLANs can enhance network security</p> Signup and view all the answers

What is the purpose of Static VLANs?

<p>To manually assign ports to VLANs</p> Signup and view all the answers

How are Static VLANs different from Dynamic VLANs?

<p>Dynamic VLANs can assign a port to multiple VLANs</p> Signup and view all the answers

What is the purpose of using the 'range' command in VLAN configuration?

<p>To configure multiple ports in a VLAN simultaneously</p> Signup and view all the answers

What type of link is an Access link in VLAN terminology?

<p>A link that is part of only one VLAN</p> Signup and view all the answers

Study Notes

Subnetting and IP Addresses

  • Subnet ID for host 192.168.29.219/29 is 192.168.29.216.
  • Host 172.21.111.201/20 belongs to the subnet 172.21.112.0.
  • IP address 11001101.01110011.10101000.00110010 in decimal is 205.115.168.50.
  • For subnet 172.16.0.0/16, a maximum of 2^16 (65,536) total subnets can be created.
  • Subnet ID for host 200.10.45.78/26 is 200.10.45.64.
  • The subnet ID for the host with IP address 11011010.00110101.11100011.01001011 is 218.53.227.128 in decimal.
  • A /27 subnet has 5 host bits available for addressing.
  • The subnet mask for a /29 network is 255.255.255.248.
  • Using a block size of 64 in FLSM results in the creation of 4 subnets.
  • The network range for the IP address range 192.168.1.0/26 to 192.168.1.63/26 corresponds to the subnet 192.168.1.0/26.
  • Minimum subnet mask length required for a network needing 9 host bits is /23.

Networking Protocols

  • In binary form, assigning 1 to network bits and 0 to host bits for an 8-bit subnet produces a maximum of 256 addresses.
  • The main purpose of Spanning Tree Protocol (STP) is to prevent loops in network topologies.
  • Bridge Protocol Data Units (BPDU) in STP carries information to maintain network loop prevention.
  • A Bridge ID (BID) includes the Bridge Priority and the MAC address of the bridge, essential for STP decision-making.
  • STP helps avoid multiple frame copies at the destination by blocking redundant paths in the network.
  • STP aims to reduce broadcast storms and ensure a loop-free topology in a network environment.
  • Switches exchange BPDUs in STP to share their view of the network topology and make decisions on path selection.

Network Configuration

  • Public IP address can be checked through various online services or by using command-line tools such as curl or wget.
  • The Type of Service (TOS) field in IPv4 addressing is used to specify the quality of service for packet transmission.
  • The Identification Field in IPv4 addressing is used to uniquely identify fragments of an original IP packet.
  • A header length value of 6 in an IPv4 address indicates that the header is 24 bytes long.
  • Flags in IPv4 addressing represent control information for fragment handling and indicate whether the packet can be fragmented.
  • Shortcut keys like Win + R followed by "ncpa.cpl" allow accessing network connections quickly on a Windows PC.

VLANs and Network Security

  • A flat network is characterized by having a single broadcast domain with no segmentation.
  • Network security is enhanced through VLANs by isolating traffic and reducing the potential attack surface.
  • The purpose of Static VLANs is to assign ports on a switch to a specific VLAN manually for consistent traffic management.
  • Static VLANs differ from Dynamic VLANs, which assign VLANs based on MAC addresses and user authentication.
  • The 'range' command in VLAN configuration is used to apply configurations to a series of ports simultaneously.
  • An Access link in VLAN terminology refers to a connection that carries traffic for a single VLAN.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Learn about subnetting using /24 and /28 networks, and how to calculate the decimal dotted form for different subnet masks. Explore the concepts of network bits and host bits, and understand how to assign values in the decimal dotted representation.

More Quizzes Like This

Use Quizgecko on...
Browser
Browser