{"id":219,"date":"2015-09-07T19:08:12","date_gmt":"2015-09-07T19:08:12","guid":{"rendered":"http:\/\/wiki.thomasandsofia.com\/?p=219"},"modified":"2015-09-07T21:12:41","modified_gmt":"2015-09-07T21:12:41","slug":"ccent-5-s01-e21-adv-tcp-ip-subnetting-part-3","status":"publish","type":"post","link":"https:\/\/wiki.thomasandsofia.com\/?p=219","title":{"rendered":"CCENT 5 S01 E21 \u2013 Adv TCP: IP Subnetting, Part 3"},"content":{"rendered":"<div class=\"notice\">\n<p>Reverse Engineering is the most common form of subnetting. You&#8217;ll start with an IP address and Subnet Mask.<\/p>\n<p>Is this IP Address Valid?<br \/>\nWhat Subnet Range does it belong to?<br \/>\nIs it on the same subnet as the others plugged in?<\/p>\n<\/div>\n<h3>Scenario #1: 192.168.1.127 \/ 255.255.255.224<\/h3>\n<p>\/27 = 11<strong>1<\/strong>00000 = 32 Increment<\/p>\n<ul>\n<li>192.168.1.0 &#8211; 192.168.1.31<\/li>\n<li>192.168.1.32 &#8211; 192.168.1.63<\/li>\n<li>192.168.1.64- 192.168.1.95<\/li>\n<li>192.168.1.96- 192.168.1.<strong>127<\/strong><\/li>\n<\/ul>\n<div class=\"warning\">This address is NOT valid for a Host! It is the Broadcast Address for the 192.168.1.96 network!<\/div>\n<p>&nbsp;<\/p>\n<h3>Scenario #2: 172.16.68.65 \/ 255.255.255.240 \/ GW 172.16.68.62<\/h3>\n<p><a href=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2015\/09\/rsubnet2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-225\" src=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2015\/09\/rsubnet2.png\" alt=\"rsubnet2\" width=\"807\" height=\"737\" srcset=\"https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2015\/09\/rsubnet2.png 807w, https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2015\/09\/rsubnet2-300x274.png 300w, https:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2015\/09\/rsubnet2-150x137.png 150w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/a><\/p>\n<ul>\n<li>.240 = 11110000 = Increment = 16<\/li>\n<li>172.16.68.0 &#8211; .15<\/li>\n<li>.16 &#8211; .31<\/li>\n<li>.32 &#8211; 47<\/li>\n<li><strong>172.16.68.48 &#8211; .63<\/strong><\/li>\n<li>172.16.68.64 &#8211; .80<\/li>\n<\/ul>\n<div class=\"warning\">\n<p>This example fails because the PC is on a different network than the Default Gatway.<\/p>\n<p>Under this example, the PC would need a Default Gateway to reach its Default Gateway!<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<h3>Subnetting Examples Download<\/h3>\n<p><a href=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2015\/09\/Subnetting-Examples.pdf\" target=\"_blank\">Subnetting-Examples<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3>The Great Exception<\/h3>\n<ul>\n<li>Because Binary begins counting from Zero<\/li>\n<ul>\n<li>These NETWORK values may throw off calculations:<br \/>2, 4, 8 , 16, 32, 64, 128<\/li>\n<li>These HOST values may throw off calculations:<br \/> 3. 7, 15, 31, 63, 127<\/li>\n<\/ul>\n<li>To play it safe, always:\n<ul>\n<li>Subtract 1 when finding Networks.<\/li>\n<li>Add 1 when finding Hosts<\/li>\n<\/ul>\n<\/ul>\n<div class=\"notice\">To prevent these &#8220;perfect storm&#8221; calculations, always:<br \/>\nSubtract 1 when calculating for Networks<br \/>\nAdd 1 when calculating for Hosts\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reverse Engineering is the most common form of subnetting. You&#8217;ll start with an IP address and Subnet Mask. Is this IP Address Valid? What Subnet Range does it belong to? Is it on the same subnet as the others plugged in? Scenario #1: 192.168.1.127 \/ 255.255.255.224 \/27 = 11100000 = 32 Increment 192.168.1.0 &#8211; 192.168.1.31 ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/wiki.thomasandsofia.com\/?p=219\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,2,11,10],"tags":[],"class_list":["post-219","post","type-post","status-publish","format-standard","hentry","category-ccent","category-networking","category-subnets","category-tcpip"],"_links":{"self":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=219"}],"version-history":[{"count":9,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/219\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/219\/revisions\/230"}],"wp:attachment":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}