0% found this document useful (0 votes)
59 views

IPV4 and Subnetting Strategy

This document discusses Internet Protocol version 4 (IPv4) and subnetting strategies. It provides information on: - The basic functions and addressing scheme of IPv4. - Types of IPv4 addresses including public, private, and how network address translation (NAT) converts private to public. - IPv6 as an updated replacement for IPv4 that supports more addresses and features. - How subnetting divides a network into smaller subnets to improve performance and management by reducing broadcast domains. - The use of subnet masks to define the network and host portions of an IP address. - Address formats, classes, reserved addresses, and how Classless Inter-Domain Routing (CIDR) assigns

Uploaded by

rolandsabit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

IPV4 and Subnetting Strategy

This document discusses Internet Protocol version 4 (IPv4) and subnetting strategies. It provides information on: - The basic functions and addressing scheme of IPv4. - Types of IPv4 addresses including public, private, and how network address translation (NAT) converts private to public. - IPv6 as an updated replacement for IPv4 that supports more addresses and features. - How subnetting divides a network into smaller subnets to improve performance and management by reducing broadcast domains. - The use of subnet masks to define the network and host portions of an IP address. - Address formats, classes, reserved addresses, and how Classless Inter-Domain Routing (CIDR) assigns

Uploaded by

rolandsabit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

.

Internet Protocol Version4 (IPv4)


& Subnetting Strategy
The Internet Protocol (IP)
•The Internet Protocol is the corner-stone of the TCP/IP
architecture. All computers in the Internet understand IP.
•The main tasks of IP are:
The addressing of the computers, and the fragmentation of
packets.

There are two types of Internet Protocol:

• Internet Protocol version 4 (IPv4): currently used version of Internet


Protocol.

• Internet Protocol version 6 (IPv6): the upcoming replacement for IPv4. It


contains some major improvements and new features.
IPv4 Address:
•An IPv4 address is a 32-bit address that uniquely and
universally defines the connection of a device (for example, a
computer or a router) to the Internet.
• Connectionless protocol
• Fragments (divides) packets where necessary
• Addressing via 32 bit Internet addresses

•However, it contains no functions for end-to-end message


reliability or flow control. IP makes the ‘best effort’ to forward
packets to the next destination, but does not guarantee
delivery because it is connectionless.
Cont…

The IP address can be classified into two classes:

Public address:
This address considered as any valid address assigned to any
user, and the organization who is responsible for registering IP
ranges called Internet Service Providers (ISPs), and this address
will be unique.

Private Address:
Any number or address assigned to a device on a private TCP/IP
Local Area Network that is accessible only within the Local Area
Network.
Internet Protocol Version 6 (IPv6)
SIPP (Simple Internet Protocol Plus)
• Maintains good features of IPv4, discards bad ones.

• Not compatible with IPv4

• Compatible with all other Internet protocols including


TCP, UDP, ICMP, DNS, etc.

• Main features:

– Long addresses (128 bits) ⇒ supports billions of hosts.


– Simplified, fixed size header ⇒ routers can process packets faster.
– Support for authentication and privacy
– Better support for type of service.
Internet addresses

Each network interface connected to the Internet has a unique


address consisting of two parts:

Network address, address of the network within the Internet


(used by gateways for routing IP packets between networks).

Host address, address of the computer within the network (used


for delivering packets to a particular network interface within
the network).
Internet address format
•The 32-bit IP address is separated into four 8-bit octets,
allowing each octet to have a value ranging from 0 to 255.

•Furthermore, the IP address is logically separated into two


distinct components: the network ID and the host ID. The
network ID is used to identify the subnet upon which the host
resides. The host ID is used to identify the host itself within the
given subnet.

IP addresses can be displayed in three typical formats:


• Binary notation Binary notation is the format that systems on
the network use to process the address. An example of binary
notation is 11000000.10101000.00000001.01100100.
• Hexadecimal notation Hexadecimal notation is the format
typically used when identifying IPv6 addresses. An example of
hexadecimal notation of an IPv4 address is C0.A8.01.64
Cont…
• Dotted-decimal notation Dotted-decimal notation is the format that is
typically used for displaying the IP address in a human-readable format. An
example of dotted-decimal notation is 192.168.1.100

Figure 3: Structure of IP Address


Classes of IP addresses
• Different networks have different sizes. Basically, there are many small
networks and few large networks.

• To provide efficient use of 32-bit address space, IPv4 defined several


address classes and associated address formats:

Class A: allows 128 networks, 16 million hosts each.


The IP address start from 1.0.0.0 to 126.255.255.255, and the mask address is
255.0.0.0

Class B: allows 16,382 networks, 65,534 hosts each.


The IP address start from 128.0.0.0 to 191.255.255.255, and the mask address
is 255.255.0.0
Classes of IP addresses
Class C: allows 2 million networks, 254 hosts each.

The IP address start from 192.0.0.0 to 223.255.255.255, and the


mask address is 255.255.255.0

Class D: multicast networks The IP address start from


224.0.0.0 to 239.255.255.255.

Class E: reserved for future use. From 240 to 255 and the
255.255.255.255 used for broadcast to all the subnet.
Cont..
• One of the benefits of classful addresses is that they provide a hierarchy to
the network through the use of the network ID. This translates into an
efficient routing environment because it is easy for a router to determine
what networks can be grouped together and treated as a single routing entry.
Strategies to Conserve Addresses
•Several strategies have been developed and implemented to help
the Internet community on how provides a good managing of IP
addresses. These strategies help reduce the load on Internet
routers and help administrators use globally unique IP addresses
more efficiently. There are two common strategies, which are:

•Private Addressing
•Classless Inter-Domain Routing (CIDR)
Private Address
• It means If the internetwork is limited to one organization, the IP addresses
need only be unique within that organization. Only networks that interface
with public networks such as the Internet need public addresses. Using public
addresses on the outside and private addresses for inside networks is very
effective.
Private Addresses:-
RFC1918 designates three ranges of IP addresses as private:
• 10.0.0.0 through 10.255.255.255
• 172.16.0.0 through 172.31.255.255
• 192.168.0.0 through 192.168.255.255
Cont…
Cont...
• There are two ways to convert the private address to public address:
1. Network Address Translation (NAT).

Network Address Translation (NAT) is a service that enables private IP


networks to use the internet and cloud. NAT translates private IP addresses in
an internal network to a public IP address before packets are sent to an external
network.
Cont..
2. Port Address Translation (PAT).
This is also known as NAT overload. In this, many local (private) IP addresses
can be translated to a single registered IP address. Port numbers are used to
distinguish the traffic i.e., which traffic belongs to which IP address. This is most
frequently used as it is cost-effective as thousands of users can be connected to
the Internet by using only one real global (public) IP address.
Private Address Port address Public Address Port Number
192.68.1.3 50133 200.0.1.2 1
192.68.1.5 63887 200.0.1.2 2

• The port address will be any random number in the allowed range, that the
device created it when wants to access the internet.
• The packet will contain the port number that assign to the device that wants to
access the internet and through this port number, the router when get the
response message will translate it and make map this message to it is private
address based on the port number.
Addressing without Subnets
• If we have a class B with a Flat Network, the number of host will be more
than 216=65536 hosts,
• So the problem is here, that managing this network with this number of host
is too tricky and the performance of this network will get down because of
the heavy load. In other word, any single broadcast can slowdown the
network.

• Therefore, the solution is the subnetting. Subnetting means divide or separate


the single network into multiple networks that can reduce the loading from
one network.
• The advantage of using subnetting is:-
1. Reduce the traffic and the increase the performance.
2. The smaller network can easier to manage.
Subnetting
•As the number of distinct local networks grows, managing them
become a serious headache. Every time a new network is
installed the system administrator get a new network number.

•The solution to the problem is to allow a network to be divided


into several independent parts for internal use but still act like a
single network to the outside world. In the internet literature
these parts are called subnets.
Subnet masks:-
• A mask is a 32-bit binary number that is expressed in dotted decimal
notation. By default, a mask contains two fields, the network field and the
host field. These correspond to the network number and the locally
administered part of the network address. When an administrator subnets,
they are adjusting the way they view the IP address. Table 1: Default masks
for classful addressing
Cont…
Routers and hosts still assume class subnet masks by default:
• Class A /8 255.0.0.0
• Class B /16 255.255.0.0
• Class C /24 255.255.255.0

• The figure below gives an example to class C mask address:

The first three octets represent the network part and the last octet represent the
host part.
Cont...
• There three important things that should be taken into our account when we
thinking about subnetting:-

1. Network address – the first one

2. Broadcast address – the last one

3. Host addresses – everything in between

As well as, to find the number of hosts per subnet. We can use formal 2x -2,
where (x) is the number of unmasked bits (0’s) .
Cont...

Reserved and Restricted Addresses
•In any subnet, there are certain addresses that cannot be assigned
to an individual device because they have a special purpose. The
subnet address is the first address in a range that identifies the
subnet. The broadcast address is the last address in the range, and
all hosts on the subnet receive traffic if anything is sent to it.

•Assume that a subnet address is 172.31.9.0 with a mask of


255.255.255.0. The subnet address is 172.31.9.0, and the
broadcast address is 172.31.9.255.
Classless Inter-Domain Routing (CIDR)
•Classless Inter Domain Routing (CIDR) is a method for
assigning IP addresses without using the standard IP address
classes like Class A, Class B or Class C. In CIDR , an IP
address is represented as A.B.C.D /n, where "/n" is called the IP
prefix or network prefix. The IP prefix identifies the number of
significant bits used to identify a network.

•Example, 192.168.1.22 /25 means, the first 25 bits are used to


represent the network and the remaining 7 bits are used to
identify hosts.
It’s basically the method that ISPs (Internet Service Providers) use to
allocate an amount of addresses to a company, a home—a customer.
They provide addresses in a certain block size

When you receive a block of addresses from an ISP, what you get will
look something like this: 192.168.10.32/28. This is telling you what your
subnet mask is. The slash notation (/) means how many bits are turned on
(1s).

The Class A default subnet mask, which is 255.0.0.0. This means that the
first byte of the subnet mask is all ones (1s), or 11111111. When referring
to a slash notation, you need to count all the 1s bits to figure out your mask.
The 255.0.0.0 is considered a /8 because it has 8 bits that are 1s—that is, 8
bits that are turned on
Subnetting Class C Addresses
✔In a Class C address, only 8 bits are available for defining the hosts
✔ that subnet bits start at the left and go to the right without skipping
bits. This means that the only Class C subnet masks can be the
following:

The Fast Way Method: Subnetting a Class C Address


start by using the second subnet mask available with a Class C address, which
borrows 2 bits for subnetting 192 = 11000000
The 1s represent the subnet bits, and the 0’s represent the host bits available in
each subnet. 192 provides 2 bits for subnetting and 6 bits for defining the hosts in
each subnet.
Example

Network Address 192.168.10.0


Subnet Mask: 255.255.255.192

Question
• How many subnets/network can we create?
• Ans: Since 192 is 2 bits on (11000000)
22 =4
• How many hosts per network?
• Ans: 6 host bits
26=64 -2
62 hosts
Example

Network Address 192.168.10.0


Subnet Mask: 255.255.255.224

Question
• How many subnets/network can we create?
• Ans: Since 224 is 3 bits on (11100000)
23 =8
• How many hosts per network?
• Ans: 5 host bits
25=32 -2
30 hosts
Example 3
•A company is granted the site address 201.70.64.0 (class C).
The company needs six subnets. Design the subnets.
•Solution
• The default is 24 (11111111.11111111.11111111.00000000)
• The company needs six subnets. 23=8
11111111.1111111.1111111.11100000
Subnet mask 255.255.255.224
• Total # of subnets = 8
• Number of hosts is 25=32-2
Network Address mask Range Usable host Broadcast Id

201.70.64.0 /27 1-30 30 201.70.64.31

201.70.64.32 /27 33-62 30 201.70.64.63

201.70.64.64 /27 65-94 30 201.70.64.95

201.70.64.96 /27 97-126 30 201.70.64.127

201.70.64.128 /27 129-158 30 201.70.64.159

201.70.64.160 /27 161-190 30 201.70.64.191


Example 4
An organization has purchased the Class C Address 216.21.5.0 and would like
to use it to address the following 5 networks.
Cont…
Cont…
• Third: Use increment to find the network ranges.

No. Subnet address First valid address Last valid Address Broadcast address
1 216.21.5.0 216.21.5.1 216.21.5.30 216.21.5.31
2 216.21.5.32 216.21.5.33 216.21.5.62 216.21.5.63
3 216.21.5.64 216.21.5.65 216.21.5.94 216.21.5.95
4 216.21.5.96 216.21.5.97 216.21.5.126 216.21.5.127
5 216.21.5.128 216.21.5.129 216.21.5.158 216.21.5.159
6 216.21.5.160 216.21.5.161 216.21.5.190 216.21.5.191
7 216.21.5.192 216.21.5.193 216.21.5.222 216.21.5.223
8 216.21.5.224 216.21.5.225 216.21.5.254 216.21.5.255
Exercise
•A company is granted the site address 181.56.0.0(Class B).
The company needs 1000 networks. Design the subnets.

•Solution
210=1024 networks
We need to borrow 10 bits from the default
= 16 + 10
CIDR=26
11111111.11111111.11111111.11000000
Subnet Mask: 255.255.255.192
Hosts= 26=64-2
62 Addresses can be generated for each network

Address Range
181.56.0.0 --181.56.0.255 -- > 181.56.255.0 ----181.56.0.255
Exercise
•What is the network address if one of the addresses is
167.199.170.82/27?

•Solution
Prefix Length =27
11111111.11111111.11111111.11100000
The host bits affects only the last byte.
Since 82 is equivalent to 01010010, we need to change the last
5 bits to 0s
== 01000000 or 64
• network address is 167.199.170.64/27
Exercise
An ISP is granted a block of addresses starting with
190.100.0.0/16. The ISP needs to distribute these addresses
to 3 groups of customers as follows:
1. The first group has 64 customers; each needs 256
addresses.
2. The second group has 128 customers; each needs 128
addresses.
3. The third group has 128 customers, each needs 64
addresses.

Design the subblocks and give the slash notation/CIDR for


each block. Find out how many address are still available after
these allocations.
Group 1
Requirements
#of Customer 64
#of Addresses = 256

Hosts 28=256
Subnet Mask
11111111.11111111.11111111.00000000

Addresses:
Customer
01: 190.100.0.0/24 190.100.0.255/24
02: 190.100.1.0/24 190.100.1.255/24
……….
64: 190.100.63.0/24 190.100.63.255/24

Total= 64 * 256 = 16,384


Group 2
Requirements
#Customer 128
#Addresses 128
Hosts 27=128
Subnet Mask
11111111.11111111.11111111.10000000
Addresses:
Customer
01: 190.100.64.0/25 190.100.64.127/25
02: 190.100.64.128/25 190.100.64.255/25
……….
128: 190.100.127.128/24 190.100.127.255/25
Total= 128 * 128 = 16,384
Group 3
Requirements
#Customer 128
#Addresses 64
Hosts 26=64
Subnet Mask
11111111.11111111.11111111.11000000
Addresses:
Customer
01: 190.100.128.0/26 190.100.128.63/26
02: 190.100.128.64/26 190.100.128.127/26
……….
128: 190.100.159.192/26 190.100.159.255/26
Total= 128 * 64 = 8,192
End

You might also like