Beruflich Dokumente
Kultur Dokumente
Date ________________
Chapter 9
Student Version
Chapter 9 Objectives:
Robb Jones
b. First host address All 0 bits plus a right-most 1 bit in the host portion of the
address.
c. Last host address All 1 bits plus a right-most 0 bit in the host portion of the
address.
9.1.3.2. What command would you use to give a Gigabit interface the IP address and
subnet mask 192.168.1.1 255.255.255.0?
R1(config)#interface gigabitethernet 0/0
R1(config-if)#ip address 192.168.1.129 255.255.255.128
9.1.3.3. What is the formula for calculating the number of subnets?
2^n (where n = the number of bits borrowed)
2
Chapter 8
Robb Jones
9.1.3.6. Enter the correct network address in binary and decimal format. Use 9.1.3.6 to
practice.
9.1.3.7. How many usable hosts are available with this network? Use 9.1.3.7 to
practice.
9.1.3.8. Define the range of hosts, the broadcast address and the next network address
in decimal format.
Use 9.1.3.8 to practice.
9.1.3.9. Enter the binary representation of the subnet mask in the octet fields provided.
Use 9.1.3.9 to practice.
3
Chapter 8
Robb Jones
9.1.3.13. Enter the network address in binary and decimal format in the octet fields.
Use 9.1.3.13 to practice.
9.1.3.14. How many usable hosts are available with this network? Use 9.1.3.14 to
practice.
9.1.3.15. Define the range of hosts, the broadcast address and the next network
address in decimal format.
Use 9.1.3.15 to practice.
4
Chapter 8
Robb Jones
5
Chapter 8
Robb Jones
9.1.4.1. There are two considerations when planning subnets. These are:
a. the number of host addresses required for each network
9.1.4.1. What is the key to determine the number of subnets and hosts needed in a
network?
The key is to balance the number of subnets needed and the number of hosts required
for the largest subnet. The more bits borrowed to create additional subnets means fewer
hosts available per subnet.
9.1.4.321. How many addresses are needed for point-to-point WAN links?
Some networks, such as point-to-point WAN links, require only two hosts.
9.1.5.1. What was subnetting a subnet, or using Variable Length Subnet Mask (VLSM),
was designed to avoid?
Subnetting a subnet, or using Variable Length Subnet Mask (VLSM), was designed to
avoid wasting addresses.
9.1.5.2. Traditional subnetting creates subnets of equal size. Each subnet in a traditional
scheme uses the same subnet mask. What does VLSM allow?
VLSM allows a network space to be divided in unequal parts. With VLSM the subnet mask
will vary depending on how many bits have been borrowed for a particular subnet, thus
the variable part of the VLSM.
9.1.5.3. When the number of needed host addresses is known, what formula is used to
determine the hosts?
2^n-2 (where n equals the number of host bits remaining) can be used
6
Chapter 8
Robb Jones
Robb Jones
Similar to borrowing bits from the host portion of an IPv4 address, with IPv6 bits can be
borrowed from the interface ID to create additional IPv6 subnets. This is typically done
for security reasons to create fewer hosts per subnet and not necessarily to create
additional subnets.
9.3.1.3. Explain where are bit borrowed in IPv6?
With IPv6 bits can be borrowed from the interface ID to create additional IPv6 subnets
9.3.1.3. When extending the subnet ID by borrowing bits from the interface ID, the best
practice is to subnet on a nibble boundary.
9.3.1.3. What is a nibble?
A nibble is 4 bits or one hexadecimal digit.
9.3.1.3. Subnetting on nibble boundaries means only using nibble aligned subnet
masks. Starting at /64, the nibble aligned subnet masks are:
a. /68
b. /72
c. /76
d. /80
e. /84
f. /88
g. /92
9.3.1.3. It is possible to subnet within a nibble boundary, within a hexadecimal digit, but
it is not recommended or even necessary. Explain why.
Subnetting within a nibble takes away the advantage easily determining the prefix from
the interface ID. For example, if a /66 prefix length is used, the first two bits would be
part of the subnet ID and the second two bits would be part of the interface ID.
8
Chapter 8
Robb Jones