Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Subnetting

By Exforsys | on March 17, 2008 |
Networking

Subnetting

A Subnet is a directory listing of IP numbers that re used to address on the internet. The number is logical divided so that each part of the number represents a certain function. Usually these subnets contain arrange of IP numbers that are assigned to organizations. So numbers falling into a specific range of subnets can immediately be related to certain organizations. All the numbers allotted to a certain organization will start with the same binary sequence.

In the current day internet scenario the network are increasing and as the networks increase there is more need for network address numbers. However this phenomenon has been creating a limitation in numbers. The only solution to this is to Subnet the addresses. By Subnetting you can keep adding to your network without requiring more IP addresses.

What is IP Addressing

The IP addressing system works by assigning IP numbers to the computers on a network. Every IP address is composed of 32 bits. The first half of the bit is used for identifying a certain network and the second half of the IP number is used to identify the host computer on the network. The first half of the IP address is also called the subnet. These IP addresses are further divided into Class A, Class B and Class C. based on these classes also the IP addresses can be identified.

Subnet Mask

While Subnetting the IP addresses in a given network some extra measures are taken to make the functionalities of addressing easier. By using a Subnet mask one can determine how many bits can be used for a Subnet and the host computers from the IP address.

A Subnet mask (or number) is used to determine the number of bits used for the Subnet and host portions of the address. The mask is a 32-bit value that uses one-bits for the network and Subnet portions and zero-bits for the host portion.

Here is an example

191 70 55 130
1011 1111 1000 0110 0011 0111 1000 0010 IP address
1111 1111 1111 1111 0000 0000 0000 0000 Subnet mask
1011 1111 1000 0110 0000 0000 0000 0000 Result

Subnetting Advantages

There are many advantages of Subnetting in a network. The routing process becomes much simplified by using subnets. Because the routers do not have to fully identify each individual address from a network and route them. It can simply identify a given network using the Subnet address and route. Also the Subnet hides the internal; networks numbers by just giving out the main number to the routers. The routing tables become much shorter by using the Subnet addresses and this means that the data flow also becomes faster.

By using Subnet addresses the entire IP address system becomes centralized. There are many advantages to this feature from technical point of view. The network administrators can assign IP numbers to specific departments in an organization so that when they can easily identify the departments on the network using the same numbers. Also the specific department can now handle all the computers in their own network without depending on the network administrator.

Subnet also divides the bigger network into smaller individual networks and it becomes easy to handle the smaller networks than handle one huge network. Also it removes physical barriers and since the networks now are individually identified all the networks can be connected through routers.

Subnetting is basically subcategorizing the network. Whether it is for one whole company or a few departments within the company, every one can have their own individual way of functioning. When it comes to security, the more easily a network or computer is identified the better it is.

« « SQA Project Metrics
Frame Relay » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 0 Followers
  • Popular
  • Recent
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • Network Topology

    February 25, 2008 - 0 Comment
  • Synchronous Data Link Control (SDLC)

    March 13, 2008 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Home Networking

    February 25, 2008 - 0 Comment
  • Switched Multi Megabit Data Service (SMDS)

    March 13, 2008 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Web Server

    February 26, 2008 - 0 Comment
  • Frame Relay

    March 17, 2008 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • High Level Data Link Control (HDLC)

    March 29, 2008 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • High-Speed Serial Interface (HSSI)

    March 20, 2008 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • How to use Hashes to Ensure Integrity
  • Data Protection Protocols
  • How to Effectively Protect Your System
  • Network Security Firewall and Architecture
  • Preventing Network Intrusion

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT