January 21st, 2019
Course Development Director in Content
This course will provide the prospective student with the fundamentals of network segmentation. By the end of this course, the student will have a thorough understanding of subnetting and network masking.
Download the Interactive Diagram here: https://interactive.linuxacademy.com/diagrams/SubnettingFundamentals.html
About the Training Architect
Meet Michael Christian, the Subnetting Fundamentals Training Architect.
Course Intro and Overview
An introduction and overview of the course.
What is Subnetting?
Why do we network computers and what are the basic components to do so? In this lesson, we take a very basic look at networking to answer these questions.
In this lesson, we examine the various methods of how data moves through the network. Additionally, we look at the OSI layers, and how data is broken into bits to move across the wire.
Why do we segment a network? In this lesson, we assess why breaking a network into small sections for the purpose of security and/or limiting makes sense.
For information to travel across a network, there must be a source and a destination. This means everything on the network must be addressable. In this lesson, we examine the components of network addresses.
Binary is the base-two number system computers use for their calculations. If we're to understand subnetting, we must understand using binary to represent the numbers of the IPv4 octet.
Every IP address can be written as a binary number. In this lesson, we examine binary representation of IP addresses and why the octet range limits exist. This is a necessary step to understanding network masking in upcoming lessons.
What is a network mask and how is it applied? In this lesson, we examine masking off a portion of the host address for the purpose of giving the network itself an address. Using what we've learned about binary, we can further examine the host bits and network bits.
It's import to be able to calculate the number of host addresses available in a subnet, as well as the address range. In this lesson, we perform these calculations against several examples.
What is a class A network? In this lesson, we examine classful networking, and why classful networks were used in network design. While all but replaced by CIDR, understanding classful networks gives us the needed context to understand why CIDR is such an improvement.
All-Ones and Subnet Zero
When subnetting a classful network, both the first and last available subnet in a range presented particular challenges. In this lesson we examine the all-zeros subnet, as well as the all-ones subnet, and how they imposed a unique challenge to subnetting classful networks.
In this lesson, we examine CIDR and the flexibility of a non-binary boundary in subnetting. We look at a CIDR chart for assistance in determining network size, and expand on our ability to calculate subnet hosts and ranges.
FLSM and VLSM
Classful networking and CIDR apply to IP assignments. FLSM and VLSM apply to how subnets are assigned within the infrastructure. In this lesson, we put together everything we've learned to construct an example network using both FLSM and its replacement, VLSM.
Conclusion and Review
Conclusion and final review of the course.
Additional training to consider after completing this course.