0% found this document useful (0 votes)
21 views

Ip Addressing and Subnetting

Uploaded by

Pharoah
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Ip Addressing and Subnetting

Uploaded by

Pharoah
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

IP Addressing, Sub-netting &

VLSM
definitions
 Address:The unique number ID assigned
to one host or interface in a network.
 Subnet: A portion of a network sharing a
particular subnet address.
 ·Subnet mask: A 32−bit combination
used to describe which portion of an
address refers to the subnet and which
part refers to the host.
 Interface: A network connection
Understanding IP Addresses
 An IP address is an address used in order to uniquely identify a
device on an IP network
 The address is made up of 32 binary bits, which can be divisible
into a network portion and host portion with the help of a subnet
mask.
 The 32 binary bits are broken into four octets (1 octet = 8 bits).
 Each octet is converted to decimal and separated by a period
(dot).
 For this reason, an IP address is said to be expressed in dotted
decimal format (for example, 172.16.81.100). The value in each
octet ranges from 0 to 255 decimal, or 00000000 − 11111111
binary.
Cont..
 The right most bit, or least significant bit, of an octet holds
a value of 20.
 This continues until the left−most bit, or most significant
bit, which holds a value of 27. So if all binary bits are a
one, the decimal equivalent would be 255 as shown here:
Cont…
Cont….
 These octets are broken down to provide an
addressing scheme that can accommodate large
and small networks.
 There are five different classes of networks, A to
E. This document focuses on addressing classes
A to C, since classes D and E are reserved
 Given an IP address, its class can be determined
from the three high−order bits
Classes
Class A
 In a Class A address, the first octet is the network
portion, so the Class A example has a major
network address of 1.0.0.0 − 127.255.255.255.
 Octets 2, 3, and 4 (the next 24 bits) are for the
network manager to divide into subnets and hosts
as he/she sees fit.
 Class A addresses are used for networks that have
more than 65,536 hosts (actually, up to 16777214
hosts!).
Class B
 In a Class B address, the first two octets
are the network portion, so the Class B
example has a major network address of
128.0.0.0 − 191.255.255.255.
 Octets 3 and 4 (16 bits) are for local
subnets and hosts.
 Class B addresses are used for networks
that have between 256 and 65534 hosts.
Class C
 In a Class C address, the first three octets
are the network portion.
 The Class C example has a major
network address of 192.0.0.0 −
223.255.255.255.
 Octet 4 (8 bits) is for local subnets and
hosts − perfect for networks with less
than 254 hosts.
Network Masks
 A network mask helps you know which portion
of the address identifies the network and which
portion of the address identifies the node.
 Class A, B, and C networks have default masks,
also known as natural masks, as shown here:
 Class A: 255.0.0.0
 Class B: 255.255.0.0
 Class C: 255.255.255.0
Cont..
 An IP address on a Class A network that has not been
sub-netted would have an address/mask pair similar
to: 8.20.15.1 255.0.0.0.
 To see how the mask helps you identify the network
and node parts of the address, convert the address
and mask to binary numbers.
 8.20.15.1 =
00001000.00010100.00001111.00000001
 255.0.0.0 = 11111111.00000000.00000000.00000000
Cont…
 Any address bits which have
corresponding mask bits set to 1
represent the network ID. Any address
bits that have corresponding mask bits
set to 0 represent the node ID.
Understanding Subnetting
 Sub netting allows you to create multiple logical networks that
exist within a single Class A, B, or C network.
 If you do not subnet, you are only able to use one network from
your Class A, B, or C network, which is unrealistic.
 Each data link on a network must have a unique network ID, with
every node on that link being a member of the same network.
 If you break a major network (Class A, B, or C) into smaller
subnetworks, it allows you to create a network of interconnecting
subnetworks.
 Each data link on this network would then have a unique
network/subnetwork ID
Cont….
 In order to subnet a network, extend the natural mask
using some of the bits from the host ID portion of the
address to create a sub network ID.
 For example, given a Class C network of 204.17.5.0 which
has a natural mask of 255.255.255.0, you can create
subnets in this manner:
Cont….
 By extending the mask to be 255.255.255.224, you have
taken three bits (indicated by "sub") from the original
host portion of the address and used them to make
subnets.
 With these three bits, it is possible to create eight
subnets.
 With the remaining five host ID bits, each subnet can
have up to 32 host addresses, 30 of which can actually be
assigned to a device since host ids of all zeros or all ones
are not allowed (it is very important to remember this)
Cont…
 So, with this in mind, these subnets have
been created.
Note:
 There are two ways to denote these masks. First, since you
are using three bits more than the "natural"Class C mask,
you can denote these addresses as having a 3−bit subnet
mask. Or, secondly, the mask of 255.255.255.224 can also
be denoted as /27 as there are 27 bits that are set in the
mask. This second method is used with CIDR. With this
method, one of these networks can be described with the
notation prefix/length. For example, 204.17.5.32/27
denotes the network 204.17.5.32 255.255.255.224. When
appropriate the prefix/length notation is used to denote the
mask throughout the rest of this document.
The network might appear as:
Cont…
 Notice that each of the routers is attached to four
subnetworks, one subnetwork is common to both
routers.
 Also, each router has an IP address for each
subnetwork to which it is attached. Each subnetwork
could potentially support up to 30 host addresses.
 The more host bits you use for a subnet mask, the
more subnets you have available. However, the more
subnets available, the less host addresses available
per subnet
CIDR
 Classless Inter-domain Routing (CIDR) was introduced to
improve both address space utilization and routing scalability in
the Internet. It was needed because of the rapid growth of the
Internet and growth of the IP routing tables held in the Internet
routers.
 CIDR moves way from the traditional IP classes (Class A, Class
B, Class C, and so on). In CIDR , an IP network is represented
by a prefix, which is an IP address and some indication of the
length of the mask. Length means the number of left−most
contiguous mask bits that are set to one
 So network 172.16.0.0 255.255.0.0 can be represented as
172.16.0.0/16.
Example
 A Class C network of 204.17.5.0 and a
mask of 255.255.255.224 (/27) allows
you to have eight subnets, each with 32
host addresses (30 of which could be
assigned to devices). If you use a mask
of 255.255.255.240 (/28), the break
down is:
Cont…
 Since you now have four bits to make
subnets with, you only have four bits left
for host addresses.
 So in this case you can have up to 16
subnets, each of which can have up to 16
host addresses (14 of which can be
assigned to devices).
Example
 Take a look at how a Class B network might be sub netted. If you
have network 172.16.0.0 ,then you know that its natural mask is
255.255.0.0 or 172.16.0.0/16
 Extending the mask to anything beyond 255.255.0.0 means you are
subnetting.
 You can quickly see that you have the ability to create a lot more
subnets than with the Class C network. If you use a mask of
255.255.248.0 (/21), how many subnets and hosts per subnet does this
allow for?
Cont…
 You are using five bits from the original
host bits for subnets.
 This allows you to have 32 subnets (2 5).
 After using the five bits for subnetting,
you are left with 11 bits for host
addresses.
 This allows each subnet so have 2048
host addresses (211), 2046 of which
could be assigned to devices.
Examples
 Device A: 172.16.17.30/20
 Device B: 172.16.28.15/20
 Determine the Subnet for DeviceA:
 Determine the Subnet for DeviceB:
Examples
 Device A: 172.16.17.30/20
 Device B: 172.16.28.15/20
 Determining the Subnet for DeviceA:

Looking at the address bits that have a corresponding mask bit set to one, and setting
all the other address bits to zero (this is equivalent to performing a logical "AND"
between the mask and address), shows you to which subnet this address belongs
Determining the Subnet for DeviceB:
Sample Exercise 2
 Given the Class C network of
204.15.5.0/24, subnet the network in
order to create the networks in this
diagram with the host requirements
shown.
Cont…
 The largest subnet must support 28 host addresses. Is this
possible with a Class C network? and if so, then how?
 You can start by looking at the subnet requirement. In
order to create the five needed subnets you would need
to use three bits from the Class C host bits. Two bits
would only allow you four subnets (22).
 Since you need three subnet bits, that leaves you with
five bits for the host portion of the address. How many
 hosts does this support? 25 = 32 (30 usable). This meets
the requirement
Cont…
 Therefore you have determined that it is
possible to create this network with a
Class C network. An example of how
you might assign the sub-networks is:
VLSM Example
 In all of the previous examples of subnetting, notice that
the same subnet mask was applied for all the subnets.
 This means that each subnet has the same number of
available host addresses.
 You can need this in some cases, but, in most cases, having
the same subnet mask for all subnets ends up wasting
address space.
 For example class C network was split into eight
equal−size subnets; however, each subnet did not utilize all
available host addresses, which results in wasted address
space
Illustration
Cont…
 Variable Length Subnet Masks (VLSM)
allows you to use different masks for
each subnet, thereby using address space
efficiently.
VLSM Example
 Given the same network and
requirements as in example develop a
subnetting scheme with the use of
VLSM, given:
 netA: must support 14 hosts
 netB: must support 28 hosts
 netC: must support 2 hosts
 netD: must support 7 hosts
 netE: must support 28 host
Determine what mask allows the required
number of hosts.
 netA: requires a /28 (255.255.255.240) mask to support 14 hosts
 netB: requires a /27 (255.255.255.224) mask to support 28 hosts
 netC: requires a /30 (255.255.255.252) mask to support 2 hosts
 netD*: requires a /28 (255.255.255.240) mask to support 7 hosts
 netE: requires a /27 (255.255.255.224) mask to support 28 hosts
 * a /29 (255.255.255.248) would only allow 6 usable host
addresses therefore netD requires a /28 mask.
Cont…
 The easiest way to assign the subnets is to assign
the largest first. For example, you can assign in
this manner:
 netB: 204.15.5.0/27 host address range 1 to 30
 netE: 204.15.5.32/27 host address range 33 to 62
 netA: 204.15.5.64/28 host address range 65 to 78
 netD: 204.15.5.80/28 host address range 81 to 94
 netC: 204.15.5.96/30 host address range 97 to 98
Illustration

You might also like