They have given a topology and an example but i am confused with the ip address that how the ip address in the example came and what ip address and subnet mask do i use for this worksheet ahead like this one in the images.
What you need to do firstly is organize your subnets by size largest first
250,000 and etc
Then you need to work out how what power of 2 is just greater than 1,000,000
In the example above you can see it is 2^20 .
The 20 is significant because this is the number of Hosts bit you need for this subnet.
Your given base network is 100.80 /12 which looks like in binary
2^20 -2 gives 1,048,574 hosts which is enough for 1,000,000 hosts
valid host addresses 11111111.01010000.00000000.00000001 to 11111111.01011111.11111111.11111110
Your next subnet add binary 1
how many hosts?
need to find 2 power of just bigger than 500,000 which in this case is 2^19 =524,288 -2 = 524,286 which is enough for 500,000 hosts
Hope this helps you get on with it.
There are worlds out there where the sky is burning, where the sea's asleep and the rivers dream, people made of smoke and cities made of song. Somewhere there's danger, somewhere there's injustice and somewhere else the tea is getting cold" Dr Who
はじめに確認方法Version による Application name の変更について備考参考情報 はじめに本ドキュメントでは Cisco SD-WAN における Policy 上で設定可能な Application を確認する方法について記載しています。 確認方法サポートされている Application name についてはご使用されている vManage へ API を呼び出して確認することが可能です。https://<IP or FQDN>/...
DMVPN (Dynamic Multipoint VPN) Introduced by Cisco in late 2000 is a routing technology you can use to build a VPN network with multiple sites (spokes) without having to statically configure all devices. It’s a “hub and spoke” network, where the spok...
On 24th August 2021, Cisco announced the latest IOS XE release - Cisco IOS XE Bengaluru 17.6.1a
IOS XE 17.6.1a unlocks various routing features and enhancements comprehensively covering different technology segments such as voice, security,...
DMVPN (Dynamic Multipoint VPN) Introduced by Cisco in late 2000 is a routing technology you can use to build a VPN network with multiple sites (spokes) without having to statically configure all devices. It’s a “hub and spoke” network, where th...
SummaryRequirementsConfiguration StepsVerificationFAQTroubleshootingReferences & Tools
In the past when IOS 12.x was hot stuff we used MD5 to authenticate OSPF neighbors. This worked great on ethernet networks because OSPF is a m...