F5F Stay Refreshed Power Users Networks Basic and intermediate network segmentation techniques

Basic and intermediate network segmentation techniques

Basic and intermediate network segmentation techniques

Pages (2): 1 2 Next
P
pixcake
Member
99
01-03-2016, 09:47 AM
#1
Good morning. We have a network 192.168.10.0 /24. The host 192.168.10.1 /27 can be accessed in two ways: first by one-level subnetting, splitting the /24 into eight parts, making the first host of each subnet 192.168.10.1 /27. Second, by two-level subnetting, dividing the /24 into four parts, with the first subnet starting at 192.168.10.0 /26. In both scenarios, the same host is reached and it belongs to the same subnet range. However, we can determine whether it came from one-level or two-level subnetting by analyzing the number of subnets created.
P
pixcake
01-03-2016, 09:47 AM #1

Good morning. We have a network 192.168.10.0 /24. The host 192.168.10.1 /27 can be accessed in two ways: first by one-level subnetting, splitting the /24 into eight parts, making the first host of each subnet 192.168.10.1 /27. Second, by two-level subnetting, dividing the /24 into four parts, with the first subnet starting at 192.168.10.0 /26. In both scenarios, the same host is reached and it belongs to the same subnet range. However, we can determine whether it came from one-level or two-level subnetting by analyzing the number of subnets created.

O
orangehf
Member
76
01-22-2016, 03:40 PM
#2
I'm not familiar with one and two level subnetting. It sounds like you're referring to breaking a large network into smaller segments, but without specific details about how many times or the process used, it's hard to explain. You'd need more information about the method or examples to understand it better.
O
orangehf
01-22-2016, 03:40 PM #2

I'm not familiar with one and two level subnetting. It sounds like you're referring to breaking a large network into smaller segments, but without specific details about how many times or the process used, it's hard to explain. You'd need more information about the method or examples to understand it better.

T
theHesh
Member
159
01-26-2016, 09:29 AM
#3
Are you referring to monitoring access or data flow across a network using the subnet approach? If so, consider IPv6 subnetting—it simplifies things. It provides ample addresses and avoids conflicts.
T
theHesh
01-26-2016, 09:29 AM #3

Are you referring to monitoring access or data flow across a network using the subnet approach? If so, consider IPv6 subnetting—it simplifies things. It provides ample addresses and avoids conflicts.

W
W33DWIZARD444
Junior Member
4
01-27-2016, 07:38 PM
#4
I understand correctly. The phrase "one or two level" isn't standard; using "one or two steps" would be clearer. My perspective matches yours—if no additional details indicate a specific number of subnetting instances, we can't determine how many times it happened and must work backward. I'm focusing on the scenario where you're given exact numbers and asked to calculate the subnetting steps. As Lurick mentioned, without further clues, we can't proceed that way.
W
W33DWIZARD444
01-27-2016, 07:38 PM #4

I understand correctly. The phrase "one or two level" isn't standard; using "one or two steps" would be clearer. My perspective matches yours—if no additional details indicate a specific number of subnetting instances, we can't determine how many times it happened and must work backward. I'm focusing on the scenario where you're given exact numbers and asked to calculate the subnetting steps. As Lurick mentioned, without further clues, we can't proceed that way.

Y
Yodeuu
Member
163
01-28-2016, 12:25 AM
#5
That's understandable
Y
Yodeuu
01-28-2016, 12:25 AM #5

That's understandable

D
Dwarki
Member
58
01-28-2016, 07:32 AM
#6
I believe I grasp your question but worry about being incorrect. Still, trying it out would be helpful if we're discussing on an exam. Since both subnet options give the same result, it's hard to tell which one was used without more details. If you provided numbers for subnets or required hosts per set, you could figure it out. After all, this is my assumption based on what you said.
D
Dwarki
01-28-2016, 07:32 AM #6

I believe I grasp your question but worry about being incorrect. Still, trying it out would be helpful if we're discussing on an exam. Since both subnet options give the same result, it's hard to tell which one was used without more details. If you provided numbers for subnets or required hosts per set, you could figure it out. After all, this is my assumption based on what you said.

Z
zP3DRO_1
Member
118
01-31-2016, 03:36 AM
#7
The two options are essentially the same. A fixed-length mask limits the number of possible binary combinations. /27 remains /27 regardless of whether the supernet uses an 8-bit or 26-bit representation.
Z
zP3DRO_1
01-31-2016, 03:36 AM #7

The two options are essentially the same. A fixed-length mask limits the number of possible binary combinations. /27 remains /27 regardless of whether the supernet uses an 8-bit or 26-bit representation.

K
ko94
Member
222
01-31-2016, 09:31 AM
#8
Great job, you've just learned about CIDR and Classless Inter-Domain Routing.
K
ko94
01-31-2016, 09:31 AM #8

Great job, you've just learned about CIDR and Classless Inter-Domain Routing.

B
Bonnibel
Posting Freak
794
01-31-2016, 04:29 PM
#9
Similar to overlapping VLSM
B
Bonnibel
01-31-2016, 04:29 PM #9

Similar to overlapping VLSM

X
XxLollyPopxX
Member
70
02-19-2016, 01:04 PM
#10
Yes, your concern is valid. Without additional details, it's impossible to determine the source of the number. You're correct, more context would be needed. Appreciate the insights!
X
XxLollyPopxX
02-19-2016, 01:04 PM #10

Yes, your concern is valid. Without additional details, it's impossible to determine the source of the number. You're correct, more context would be needed. Appreciate the insights!

Pages (2): 1 2 Next