0% found this document useful (0 votes)
58 views

Tribhuvan University Institute of Engineering, Pulchowk Campus Lalitpur, Nepal

This document is a lab report that introduces concepts of subnetting, VLSM, and CIDR. It discusses setting up networks using different subnet masks in Packet Tracer to explore how subnets are created. Various activities explore pinging between devices on different subnets and allocating IP addresses from a single IP space to different departments based on host requirements using VLSM. The conclusion is that the lab helped familiarize the author with subnetting, VLSM, and CIDR through practical network simulations and configurations in Packet Tracer.

Uploaded by

Phantom Being
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Tribhuvan University Institute of Engineering, Pulchowk Campus Lalitpur, Nepal

This document is a lab report that introduces concepts of subnetting, VLSM, and CIDR. It discusses setting up networks using different subnet masks in Packet Tracer to explore how subnets are created. Various activities explore pinging between devices on different subnets and allocating IP addresses from a single IP space to different departments based on host requirements using VLSM. The conclusion is that the lab helped familiarize the author with subnetting, VLSM, and CIDR through practical network simulations and configurations in Packet Tracer.

Uploaded by

Phantom Being
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Tribhuvan University

Institute of Engineering, Pulchowk Campus


Lalitpur, Nepal

11th July

A lab report on:

To introduce the Concept of Subnetting, VLSM & CIDR


Report No. 6

Submitted by:

Bijay Shrestha

Roll Number: 074BCT510


Objectives

- To be familiar with subnetting and its use


- To be familiar with VLSM and CIDR

Requirements:

- Network simulation tool: Packet Tracer

Exercises:

I. Observe and note down the output of each of the above-mentioned tasks and
comment on the result by explaining the reason in detail.

Activity A:

The given network:

All PC were pinged from all other PC and it was successful.

After changing the subnet mask to 255.255.255.192, PC1,PC2,PC3 could be pinged


by each other. But PC4 couldn’t receive ping nor ping otherSince PC4 is in different
subnet than PC1-3, the ping was not successful.

After changing the subnet mask to 255.255.255.224, the ping between PC1 and PC2
was successful but the ping between PC3 and PC4 with other PC were not successful.
This is because PC1 and PC2 lie in the same subnet, but PC3 and PC4 lie in different
subnet.

After changing the subnet mask to 255.255.255.240, the ping was not successful from
any PC to another PC. This is because all of the PC belong to different subnet.
Activity B:

The network is as follows:

The IP address for Interface 0-4 is 202.22.22.12, 202.22.22.22, 202.22.22.42 and


202.22.22.82 respectively. The subnet mask is set as 255.255.255.240 for all the
routers. The default gateway for each PC is set appropriately.

Setting up all of these, the ping was successful from all the PC to all other PC.

Activity C:

The network from Activity A was modified by changing the IP address of each PC.
The network is as follows:

The IP address of PC1-4 was set as 202.44.8.2, 202.44.9.2, 202.44.10.2 and


202.44.12.2 respectively. The subnet mask is set as 255.255.255.0 for all the PC.

The ping was not successful from any of the PC to any other PC. This is because each
PC belongs to different subnet.

Next the subnet mask for each PC was changed to 255.255.254.0.


In this case, the ping between P1 and P2 was successful as they belonged to the same
subnet, but P3 and P4 are in different subnets, so they were not able to ping any other
PC.

Now, we change the subnet mask of every PC to 255.255.252.0.

As we reduced the subnet mask, it was able to address more PC, in this case PC1-3
formed a subnet while PC4 was isolated. So, the ping was successful among PC1-
PC3, but PC4 ping was not successful.

Now, the subnet mask for every PC was set to 255.255.248.0. With this subnet mask,
all PC belongs to the same subnet, and so the ping from every PC was successful to
every other PC.

Activity C:

The given IP address 202.20.20.0/24 from the ISP was successful allocated to the
network with four different departments: A, B, C, D and two networks E and F. The
following is the required network:

The range of IP address that are not used are 202.20.20.192/27 and 202.20.20.224/27

Static Route table:

Router 0:

Router 3:
Router 6:

Activity E:

The given IP address 202.70.90.0/24 by IPS is allocated for four departments: A, B,


C, D each department having 50, 25, 10 and 5 numbers of hosts respectively. Two
networks each with 2 hosts is also allocated. The network with the allocated IP
address is given below:

The unused IP address is 202.70.90/27.

The static route table of all the routers are as follows:

Router 0:

Router 3:

Router 6:
II. Explain subnetting and VLSM with their importance in networking with
suitable examples.

Subnetting is the practice of dividing a network into two or smaller networks. It


increases routing efficiency, which helps to enhance the security of the network and
reduces the size of the broadcast domain. IP Subnetting designates high-order bits from
the host as part of the network prefix. For example:

Subnet mask No. of Networks No. of hosts per network


255.0.0.0 256 16777214
255.255.0.0 65536 65536
255.255.255.0 1677216 126

VLSM stands for Variable Length Subnet Mask where the subnet design uses more
than one mask in the same network which means more than one mask is used for
different subnets. It is used to increase the usability of subnets as they can be of variable
size. It is also defined as the process of subnetting of a subnet.

In VLSM, subnets use block size based on requirement so subnetting is required


multiple times. Suppose there is an administrator that has four departments to manage.
These are sales and purchase department with 120 computers, development department
with 50 computers, accounts department with 26 computers and management
department with 5 computers. If the administrator has IP 192.168.1.0/24, department
wise IPs can be allocated by following these steps:

For each segment select the block size that is greater than or equal to the actual
requirement which is the sum of host addresses, broadcast addresses and network
addresses. Make a list of subnets possible:

Notation Hosts
/24 254
/25 126
/26 62
/27 30
/28 14
/29 6
/30 2
Arrange all the segments in descending order based on the block size that is from
highest to lowest requirement.

Sales and Purchase 120


Development 50
Accounts 26
Management 5
The highest IP available has to be allocated to highest requirement so the sales and
purchase department gets 192.168.1.0/25 which has 126 valid addresses that can easily
be available for 120 hosts. The subnet mask used is 255.255.255.128. The network
setup using switch and router was done using Cisco packet tracer. The various
networking setup commands were executed using the terminal of the router present in
Cisco packet tracer. The terminal of the PC was used for setting up IP and default
gateway. The ping command was executed in the terminal of various simulated PC in
cisco packet tracer. The next segment requires an IP to handle 50 hosts. The IP subnet
with network number 192.168.1.128/26 is the next highest which can be assigned to 62
hosts thus fulfilling the requirement of development department. The subnet mask used
is 255.255.255.192. Similarly, the next IP subnet 192.168.1.192/27 can fulfill the
requirements of accounts department as it has 30 valid hosts IP which can be assigned
to 26 computers. The mask used is 255.255.255.224. The last segment requires 5 valid
hosts IP which can be fulfilled by the subnet 192.168.1.224/29 which has the mask as
255.255.255.248 is chosen as per the requirement. The IP with the mask
255.255.255.240 could be chosen but it has 14 valid hosts IPs and the requirement is
less in comparison so the one that is comparable with the requirement is chosen. Thus,
there is less IP wastage in VLSM as compared to FLSM.

III. What is classless routing? Why is it used in the Internet system? Explain with
suitable examples.

Classless Routing imports subnet mask and in this, triggered updates are used. In
classless routing, VLMS (Variable Length Subnet Mask) is supported and also CIDR
(Classless Inter-Domain Routing). In classless routing, hello messages are used for
checking status. In classless routing, subnet mask is not same throughout, it may vary
for all devices, we can see it in the given picture.

Classless routing is used in the Internet system because classless addressing provides
efficient address space as compared to the classful addressing. Memory is allocated in
the form of bits and bytes rather than a chunk of contiguous memory. Classless
addressing eliminates any class imbalance. There are no separate entities for subnetting
in classless addressing. Examples of classless routing protocols include RIPv2, EIGRP,
OSPF, and IS-IS.
Discussion
We set up network in Cisco packet Tracer. The commands were executed using terminal of router
present in the software. We used the terminal for setting up IP and default gateway.
The ping command was executed in the terminal of various simulated PC in cisco packet tracer. The
static route was configured in all of the routers, next the route address was reduced by using
the default route address. The given IP address was allocated for various departments.

Conclusion
In this lab, we became familiar with subnetting, its use, VLSM and CIDR. The network was
setup and simulated using a program called Cisco Packet Tracker. Cisco Packer Tracer is a free
program for network simulation. The IP address and subnet mask was setup in the router, the
IP address and default gateway was setup in the virtual PC, the given IP address was allocated
for various subnets according to the number of hosts required in each network and the network
was simulated.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy