Solved

CCNA1, Topology diagram

Posted on 2009-05-14
3
882 Views
Last Modified: 2012-05-11
Hi

As you can see the image I'm studying the topology diagram but I'm having trouble with

understanding some of question.


Step1: 2 networks || why is there 2 networks??
Step:2: 1 bit borrw || why is it 1 bit?
Step5: 0 || why 0 ?

can you please explain those 3  or is there any website that has instruction similar to this?

so I can have a look at it..and study.

Thanks.
tp.JPG
0
Comment
Question by:bt1942
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
mickfinley earned 500 total points
ID: 24388606
I will try to explain this and hopefully it will make some sense.

2 Networks because the link between the routers is on one subnet, the other subnet connects to Fa0/0.
The subnets would be 192.168.26.0/25 and 192.168.26.128/25
Borrowing 1 bit which is the first bit after the 24th, that bits value is 128, the subnet mask would be 255.255.255.128
Add the bits that are left over, they will equal 128, there are 256 addresses possible, 256 divided by 128=2...each of these subnets are 128 addresses apart


Another Example:
If you borrowed 2 bits, you would have 4 networks: 2 bits=192; add the remaining bits which is 64, 4 x 64=256, for every 64 host the network address would change.
The 4 networks would be 192.168.26.0/26, 192.168.26.64/26, 192.168.26.128/26, 192.168.26.192/26....each of these subnets are 64 addresses apart

Remember each octet is has a value of 256
11111111.11111111.11111111.11111111=256.256.256.256
11111111.11111111.11111111.11000000=255.255.255.192

I hope I didn't confuse you too much, subnetting is complicated in  itself, explaining it I think is more complicated.




0
 
LVL 6

Expert Comment

by:mickfinley
ID: 24388954
Sorry I messed up previously.....it is not 256.256.256.256, it is 255.255.255.255, you start count at zero which adds up to 256
0
 

Author Closing Comment

by:bt1942
ID: 31581348
Than you very much for the comment :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now