Solved

VLSM question

Posted on 2010-08-23
6
305 Views
Last Modified: 2012-05-10
Hi;

I found this link http://fengnet.com/book/CCNA%20Portable/ch02lev1sec2.html#ch02fig01 to explain how VLSM works, it shows step by step to find out each subnet with using VLSM.  This is a good site so far amongs all others site which explain how VLSM works but I still got lost in Step 2.

In Step 2, the ".64"  is picked for Network "A", why it is not ".0"?

The website author used .128/26 to break it into two for network "B", can he use .192/26 to break it instead of .128/26?  If not, why?

0
Comment
Question by:KANEWONG
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 17

Expert Comment

by:Kvistofta
ID: 33503386
0
 
LVL 1

Author Comment

by:KANEWONG
ID: 33503498
Yes, it is right, it will break into 4 subnets like this..

192.168.100.0/26
192.168.100.64/26
192.168.100.128/26
192.168.100.192/26

But why it is picking 192.168.100.64/26 for Network "A", not 192.168.100.0/26?

Also, in step 5 for Serial Link, the author go back to use /26 subnet for the router interface, not keep going to use /28 which is calculated in Step 4.
0
 
LVL 24

Accepted Solution

by:
rfc1180 earned 250 total points
ID: 33503576
>In Step 2, the ".64"  is picked for Network "A", why it is not ".0"?
He could have used .0/26, but he chose not to and decided to use .0/26 to determine network numbers for serial Links.

>The website author used .128/26 to break it into two for network "B", can he use .192/26 to break it instead of .128/26?  If not, why?
Yes he could have used the .192, it is a matter of preference of which one to use.
I typically leave the last (Few of the last subnets alone for growth)

Billy
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 1

Author Comment

by:KANEWONG
ID: 33503635
thanks for point it out.  Yes, I looked back the Step 5, the author is using .0/26 to create another subnet for router interface.  This is the reason why, he picked .64/26 in step 2 for Network "A"

Because both of .0/26 and .64/26 creates 62 hosts.  The author can use .0/26 for Network "A" and .64/26 for router interface either, right?
0
 
LVL 17

Expert Comment

by:Kvistofta
ID: 33503642
In ancient times there were limitations in the routers so that the first subnet could not be used. It hasnt been an issue for the last 10 years but maybe that was the reason not to use the .0 subnet? Besides from that it is just a matter of taste which ones to use, all 4 works equally good today.

/Kvistofta
0
 
LVL 17

Expert Comment

by:Kvistofta
ID: 33512041
No points for me?

/Kvistofta
0

Featured Post

Turn your laptop into a mobile console!

The CV211 Laptop USB Console Adapter provides a direct Laptop-to-Computer connection for fast and easy remote desktop access with no software to install.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: rfc1180
The Maximum Segment size (MSS) is an important consideration when troubleshooting connectivity via the Internet/Intranet. As the packets are routed via the Internet/Intranet, the packets must traverse through multiple routers in the path between two…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question