?
Solved

CCNA1, Topology diagram

Posted on 2009-05-14
3
Medium Priority
?
963 Views
Last Modified: 2012-05-11
Hi

As you can see the image I'm studying the topology diagram but I'm having trouble with

understanding some of question.


Step1: 2 networks || why is there 2 networks??
Step:2: 1 bit borrw || why is it 1 bit?
Step5: 0 || why 0 ?

can you please explain those 3  or is there any website that has instruction similar to this?

so I can have a look at it..and study.

Thanks.
tp.JPG
0
Comment
Question by:bt1942
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
Mick Finley earned 2000 total points
ID: 24388606
I will try to explain this and hopefully it will make some sense.

2 Networks because the link between the routers is on one subnet, the other subnet connects to Fa0/0.
The subnets would be 192.168.26.0/25 and 192.168.26.128/25
Borrowing 1 bit which is the first bit after the 24th, that bits value is 128, the subnet mask would be 255.255.255.128
Add the bits that are left over, they will equal 128, there are 256 addresses possible, 256 divided by 128=2...each of these subnets are 128 addresses apart


Another Example:
If you borrowed 2 bits, you would have 4 networks: 2 bits=192; add the remaining bits which is 64, 4 x 64=256, for every 64 host the network address would change.
The 4 networks would be 192.168.26.0/26, 192.168.26.64/26, 192.168.26.128/26, 192.168.26.192/26....each of these subnets are 64 addresses apart

Remember each octet is has a value of 256
11111111.11111111.11111111.11111111=256.256.256.256
11111111.11111111.11111111.11000000=255.255.255.192

I hope I didn't confuse you too much, subnetting is complicated in  itself, explaining it I think is more complicated.




0
 
LVL 6

Expert Comment

by:Mick Finley
ID: 24388954
Sorry I messed up previously.....it is not 256.256.256.256, it is 255.255.255.255, you start count at zero which adds up to 256
0
 

Author Closing Comment

by:bt1942
ID: 31581348
Than you very much for the comment :)
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article I will be showing you how to subnet the easiest way possible for IPv4 (Internet Protocol version 4). This article does not cover IPv6. Keep in mind that subnetting requires lots of practice and time.
LinkedIn blogging is great for networking, building up an audience, and expanding your influence as well. However, if you want to achieve these results, you need to work really hard to make your post worth liking and sharing. Here are 4 tips that ca…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question