Professional Documents
Culture Documents
Mastering IPv4 Subnetting
Mastering IPv4 Subnetting
1|Page
2|Page
THIS DOCUMENT IS CONSIDERED CISCO PROPERTY AND COPYRIGHTED AS SUCH. NO PORTION OF COURSE CONTENT
OR MATERIALS MAY BE RECORDED, REPRODUCED, DUPLICATED, DISTRIBUTED, OR BROADCAST IN ANY MANNER
WITHOUT CISCOS WRITTEN PERMISSION.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers.
Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative
purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
3|Page
Table of Contents
Introduction...................................................................................................................................................................................................................6
PartOne:TheBitsandBytesofIPv4Addresses............................................................................................................................................................7
Lesson3ReviewandPractice:AStepbyStepGuidetoConvertingBinarytoDecimal.......................................................................................7
4|Page
5|Page
Introduction
This study aid includes worksheets and diagrams that you can use to complete the games and exercises in this series.
6|Page
7|Page
128
64
32
16
Binary Values
Decimal Values
128+
0+
32+
0+
8+
4+
0+
0+
Decoder Key
128
64
32
16
Binary Values
Decoder Key
128
64
32
16
Binary Values
Decoder Key
128
64
32
16
Binary Values
=172
Decimal Values
Decimal Values
Decimal Values
8|Page
248
256
224
16
296
64
9|Page
10 | P a g e
1.____________________________________________________________________________________________
2.____________________________________________________________________________________________
3.____________________________________________________________________________________________
4.____________________________________________________________________________________________
5.____________________________________________________________________________________________
11 | P a g e
222.1.1.0/24
12 | P a g e
13 | P a g e
14 | P a g e
170.38.0.0/16
15 | P a g e
Lesson 4, Practice 1
Task 1: Review the scenario.
What network address has corporate given you?
How many networks (subnets) does corporate need?
What subnets and subnet details do you need to identify?
x.x.x.32/27
16 | P a g e
17 | P a g e
Lesson 4, Practice 2
Task 1: Review the scenario.
What network address has corporate given you?
How many networks (subnets) does corporate need?
What subnets and subnet details do you need to identify?
x.x.x.96/27
18 | P a g e
19 | P a g e
20 | P a g e
21 | P a g e
22 | P a g e
23 | P a g e
Subnet
Broadcast Address
23.0.1.0/24
N/A
N/A
N/A
Network A
Network B
Network C
Network D
Network E
Network F
Network G
24 | P a g e
Lesson 6, Practice 1
Task 1: List the process steps.
List the steps for reverse engineering.
1.____________________________________________________________________________________________
2.____________________________________________________________________________________________
3.____________________________________________________________________________________________
4.____________________________________________________________________________________________
5.____________________________________________________________________________________________
6.____________________________________________________________________________________________
7.____________________________________________________________________________________________
25 | P a g e
Task 2: Identify the broadcast address for the subnet that 10.29.78.94/11 is on.
1. Create your Decoder Key.
2. What is the decimal version of the mask?
3. What is the block size (least significant bit)?
4. Beginning with subnet zero, list the first three
subnets?
26 | P a g e
Lesson 6, Practice 2
Task 1: List the process steps.
List the steps for reverse engineering.
1. ____________________________________________________________________________________________
2. ____________________________________________________________________________________________
3. ____________________________________________________________________________________________
4. ____________________________________________________________________________________________
5. ____________________________________________________________________________________________
6. ____________________________________________________________________________________________
7. ____________________________________________________________________________________________
27 | P a g e
Task 2: Identify the last valid host address for the subnet that 201.201.102.75/26
is on.
1. Create your Decoder Key.
28 | P a g e