0% found this document useful (0 votes)
1 views

CIS 192 - Module 8 - Subnetting IP Networks(4) (6)

This document provides an overview of subnetting in IPv4 and IPv6 networks, emphasizing the importance of network segmentation for improved performance and security. It outlines objectives for calculating subnet schemes, discusses the implications of large broadcast domains, and presents methods for subnetting based on specific requirements. Examples illustrate how to create subnets and calculate host addresses based on varying organizational needs.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

CIS 192 - Module 8 - Subnetting IP Networks(4) (6)

This document provides an overview of subnetting in IPv4 and IPv6 networks, emphasizing the importance of network segmentation for improved performance and security. It outlines objectives for calculating subnet schemes, discusses the implications of large broadcast domains, and presents methods for subnetting based on specific requirements. Examples illustrate how to create subnets and calculate host addresses based on varying organizational needs.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

CIS 192

Introduction to
Networking Introduction to
Networks v6 Companion
Module 8 Guide

Subnetting IP Networks Cisco Press

CLO: Design different types of IPv4 and IPv6 addressing schemes


Module Objectives

Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your network.

Topic Title Topic Objective


Network Segmentation Explain how subnetting segments a network to enable better communication.

Subnet an IPv4 Network Calculate IPv4 subnets for a /24 prefix.

Subnet an IPv6 Network Implement a subnetted IPv6 addressing scheme.

2
Broadcast Domains and Segmentation
• Many protocols utilize broadcasts/multicasts (e.g., ARP locates devices, DHCP
discover locates servers).

• Switches forward broadcasts


on all interfaces except the
one they were received on.

• Routers do not propagate


broadcasts.
• Each router interface connects
to a broadcast domain,
allowing broadcasts only within
that domain

3
Problems with Large Broadcast Domains

• Large broadcast domains can generate excessive broadcasts, harming the network.

• Solution: Reduce network size via segmenting networks (subnetting).

4
Reasons for Segmenting Networks

• Reduces overall network traffic and improves network performance.


• Reduces the number of devices affected by abnormal broadcast traffic
• It can be used to implement security policies between subnets.
• Additional reasons: location, group or function, devise type

Location Group or Function Device Type

5
Subnet
223.1.1.2

223.1.1.1 223.1.1.4

How many subnet in the figure? 223.1.1.3


• to determine the subnets, detach each
interface from its host or router, creating 223.1.9.2 223.1.7.0

islands of isolated networks, each


isolated network is a subnet
223.1.9.1 223.1.7.1
223.1.8.1 223.1.8.0

223.1.2.6 223.1.3.27

223.1.2.1 223.1.2.2 223.1.3.1 223.1.3.2

Source: Computer Networking: a Top-Down 6


Approach
Subnet an IPv4 Network
Subnet on an Octet Boundary

• Networks are most easily subnetted at the octet boundary of /8, /16, and /24.

Subnet /8 into /16 and /24:

Prefix Subnet Mask Octet/byte Octet/byte Octet/byte Octet/byte # of hosts

/8 255.0.0.0 NetID HostID 224-2

# of subnet 28
/16 255.255.0.0 NetID SubnetID HostID 216-2

# of subnet 216
/24 255.255.255.0 NetID SubnetID HostID 28-2

• Notice that using longer prefix lengths decreases the number of hosts per subnet.

8
Subnet on an Octet Boundary

Subnet /16 into /24:

Prefix Subnet Mask Octet/byte Octet/byte Octet/byte Octet/byte # of hosts

/16 255.255.0.0 NetID HostID 216-2

# of subnet 28
/24 255.255.0.0 NetID SubnetID HostID 28-2

 Subnetting by borrowing bits from host portion.

9
Subnet on an Octet Boundary: Examples
•10.0.0.0/8 is subnetted using /16 mask 10.0.0.0/8 is subnetted using /24 mask.
Subnet Address Host Range Subnet Address
Host Range
(256 Possible (65,534 possible hosts per Broadcast (65,536 Possible Broadcast
(254 possible hosts per subnet)
Subnets) subnet) Subnets)

10.0.0.0/16 10.0.0.1 - 10.0.255.254 10.0.255.255 10.0.0.0/24 10.0.0.1 - 10.0.0.254 10.0.0.255


10.0.1.0/24 10.0.1.1 - 10.0.1.254 10.0.1.255
10.1.0.0/16 10.1.0.1 - 10.1.255.254 10.1.255.255
10.0.2.0/24 10.0.2.1 - 10.0.2.254 10.0.2.255
10.2.0.0/16 10.2.0.1 - 10.2.255.254 10.2.255.255
… … …
10.3.0.0/16 10.3.0.1 - 10.3.255.254 10.3.255.255
10.0.255.0/24 10.0.255.1 - 10.0.255.254 10.0.255.255
10.4.0.0/16 10.4.0.1 - 10.4.255.254 10.4.255.255 10.1.0.0/24 10.1.0.1 - 10.1.0.254 10.1.0.255

10.5.0.0/16 10.5.0.1 - 10.5.255.254 10.5.255.255 10.1.1.0/24 10.1.1.1 - 10.1.1.254 10.1.1.255


10.1.2.0/24 10.1.2.1 - 10.1.2.254 10.1.2.255
10.6.0.0/16 10.6.0.1 - 10.6.255.254 10.6.255.255
… … …
10.7.0.0/16 10.7.0.1 - 10.7.255.254 10.7.255.255
10.100.0.0/24 10.100.0.1 - 10.100.0.254 10.100.0.255
... ... ...
... ... ...
10.255.0.0/16 10.255.0.1 - 10.255.255.254 10.255.255.255 10.255.255.0/24 10.255.255.1 - 10.2255.255.254 10.255.255.255

10
Classless Subnetting: Subnet within an Octet Boundary
• Borrow any number of bits for subnet ID

NetID HostID

NetID Subnet ID HostID

• Classless Subnetting with a /24 prefix


Subnet Mask in Binary # of
Prefix Length Subnet Mask # of hosts
(n = network, h = host) subnets
nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh
/25 255.255.255.128 2 126
11111111.11111111.11111111.10000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh
/26 255.255.255.192 4 62
11111111.11111111.11111111.11000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh
/27 255.255.255.224 8 30
11111111.11111111.11111111.11100000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh
/28 255.255.255.240 16 14
11111111.11111111.11111111.11110000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh
/29 255.255.255.248 32 6
11111111.11111111.11111111.11111000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh
/30 255.255.255.252 64 2
11111111.11111111.11111111.11111100

The last two bits cannot be borrowed. 11


Classless Subnetting: Subnet within an Octet Boundary
Prefix Length Subnet Mask Network Address (n = network, h = host) # of subnets # of hosts
nnnnnnnn.nnnnnnnn.nhhhhhhh.hhhhhhhh
/17 255.255.128.0 2 32766
Classless Subnetting with a /16 prefix 11111111.11111111.10000000.00000000
nnnnnnnn.nnnnnnnn.nnhhhhhh.hhhhhhhh
/18 255.255.192.0 4 16382
11111111.11111111.11000000.00000000
nnnnnnnn.nnnnnnnn.nnnhhhhh.hhhhhhhh
/19 255.255.224.0 8 8190
11111111.11111111.11100000.00000000
• The table highlights all the /20 255.255.240.0
nnnnnnnn.nnnnnnnn.nnnnhhhh.hhhhhhhh
16 4094
11111111.11111111.11110000.00000000
possible scenarios for nnnnnnnn.nnnnnnnn.nnnnnhhh.hhhhhhhh
subnetting a /16 prefix. /21 255.255.248.0
11111111.11111111.11111000.00000000
32 2046

nnnnnnnn.nnnnnnnn.nnnnnnhh.hhhhhhhh
/22 255.255.252.0 64 1022
11111111.11111111.11111100.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnh.hhhhhhhh
/23 255.255.254.0 128 510
11111111.11111111.11111110.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh
/24 255.255.255.0 256 254
11111111.11111111.11111111.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh
/25 255.255.255.128 512 126
11111111.11111111.11111111.10000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh
/26 255.255.255.192 1024 62
11111111.11111111.11111111.11000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh
/27 255.255.255.224 2048 30
11111111.11111111.11111111.11100000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh
/28 255.255.255.240 4096 14
11111111.11111111.11111111.11110000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh
/29 255.255.255.248 8192 6
11111111.11111111.11111111.11111000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh
/30 255.255.255.252 16384 2
11111111.11111111.11111111.11111100
12
Subnet based on Requirements

There are two considerations when planning subnets:


• The number of host addresses required for each network
• The number of individual subnets needed

NetID SubnetID HostID

E.g. an organization chooses to


separate their network traffic based on
internal structure or department setup

13
Classless Subnetting: Example 1
Consider a network with address 192.168.1.0/24 subnets this network into
2 subnets
Solution:

For 2 subnet, we need


to borrow 1 bit

New network mask /25

Subnet 1
192.168.1.0/25

Subnet 2
192.168.1.128/25

14
Classless Subnetting: Example 2

Consider a large enterprise


that requires at least 100
subnets and has chosen the
private address 172.16.0.0/16
as its internal network
address.
Solution
• To satisfy the requirement
of 100 subnets for the
enterprise, 7 bits would
need to be borrowed (for a
total of 27,128 subnets)
• The new subnet mask 16+7
= /23 (255.255.254.0)
15
Classless Subnetting: Example 3

Consider a small ISP that


requires 1000 subnets for its
clients using network
address 10.0.0.0/8
Solution
• To satisfy the requirement
of 1000 subnets for the
enterprise, 10 bits would
need to be borrowed (for
a total of 210, 1024
subnets)
• The new subnet mask is
8+10: /18 or
255.255.192.0
16
Classless Subnetting: Example 4
Consider an enterprise that uses
the private network address
192.168.1.0/24 and requires the
given network topology. Create
subnets, and calculate the number
of host, and address rage for each
subnet.
Solution
• To satisfy the requirement of 3
subnets for the enterprise, 2 bits
would need to be borrowed (for
a total of 22 , 4 subnets)
• New subnet mask 24+ 2: /26 or
255.255.255.192
• Number of hosts per subnet = 25
-2=30 host
17
Classless Subnetting: Example 4 (cont.)
• For each subnet:
• Network address
• First host address
• Last host address
• Broadcast address

18
Classless Subnetting: Example 4 (cont.)

• Configuration:

19
Subnet based on Host Requirements: Example 1

Consider an office building that uses


192 168 2 0000 0000
the private network address
192.168.2.0/24 and requires 10 devices
per subnet. Create subnets to satisfy
Subnet 1: 192.168.2.0/28
this requirement.
192 168 2 0000 0000
Solution
First 192 168 2 0000 0001
• Minimize Unused Host IPv4 Addresses
Last 192 168 2 0000 1110
and Maximize Subnets
• To satisfy the requirement of 10
devices per subnets, 4 bits would be
needed in host id (for a total of 24 - To
2=14 host) Subnet 32: 192.168.2.31/28
• New subnet mask 32- 4: /28 or 192 168 2 1111 0000
255.255.255.240 192 168 2 1111 0001
• Number of subnet = 24 =32 subnet 192 168 2 1111 1110

20
Traditional Subnetting Wastes Addresses
Example: Given this topology, 7 subnets are required (i.e, four LANs and three WAN links),
the IP address is 192.168.20.0/24
• To satisfy the requirement of 7 subnets for the enterprise, 3 bits would need to be
borrowed (for a total of 23 , 8 subnets)
• New subnet mask /27
192 168 20 000 00000
• Number of host per subnet 25 -2 = 30 host.

21
Traditional Subnetting Wastes Addresses
• The largest number of host is in Building D with 28 hosts.

• The point-to-point WAN links only require two addresses and therefore waste 28
addresses each for a total of 84 unused addresses.
• Applying a traditional subnetting scheme to this scenario is not very efficient and is
wasteful.

22
Variable Length Subnet Masks
• VLSM was developed to avoid wasting addresses by enabling us to subnet a subnet.
0

Host
Addresses
Address Space without
Subnetting
.00000000

255

23
Variable Length Subnet Masks (cont.)
Borrowed Bit

First Bit 0

0 Address Space Subnet 1


.00000000 Host
Addresses
with One Bit
127 Borrowed for
128 Subnetting

Address Space Subnet 2


1
.10000000

255

24
Variable Length Subnet Masks (cont.)
Borrowed Bits Second Bit 0 1
First Bit 0 64

0 Address Space Subnet 1 Address Space Subnet 2


.00000000 .01000000 Host
Addresses
63 127 with Two Bits
Borrowed for
128 192
Subnetting

Address Space Subnet 3 Address Space Subnet 4


1
.10000000 .11000000

191 255

25
Variable Length Subnet Masks (cont.)
Borrowed Bits Second Bit 0 1
First Bit 0 64

0 Address Space Subnet 1 Address Space Subnet 2


.00000000 .01000000

63 127
Third Bit Address Space
128 192 3 subnetted
Address Space Subnet 3A with additional
0 bit borrowed
.10000000
159
1 Address Space Subnet 4
160 Address Space Subnet 3B .11000000
1 .10100000

191 255

26
Variable Length Subnet Masks (cont.)
Borrowed Bits Second Bit 0 1
First Bit 0 64

0 Address Space Subnet 1 Address Space Subnet 2


.00000000 .01000000
Address Space
63 127 3B subnetted
Third Bit with additional
128 192 bit borrowed
Address Space Subnet 3A
0
.10000000
159
1 Address Space Subnet 4
160 Address Space Subnet 3B1
Fourth Bit 0 .11000000
.10100000 175
1
176 Address Space Subnet 3B2
1
.10110000 191 255

27
Traditional subnetting vs VLSM
• Left side: Traditional subnetting (same subnet mask).
• Right side: VLSM used to subnet, dividing the last
subnet into eight /30 subnets.
• Start with largest subnet's host requirements.
• Continue subnetting to meet smallest subnet's needs.
• Resulting topology shows VLSM application.
• Using VLSM subnets, the LAN and inter-router networks
can be addressed without unnecessary waste as shown
in the logical topology diagram.

28
Subnet an IPv6 Network

29
IPv6-Subnetting Using the Subnet ID

•IPv6 was designed with subnetting in mind.


• A separate subnet ID field in the IPv6 GUA is used to create subnets.
• The subnet ID field is the area between the Global Routing Prefix and the interface ID.

30
IPv6 - Subnetting Example

•Given the 2001:db8:acad::/48 global


routing prefix with a 16 bit subnet ID.
• Allows 65,536 /64 subnets
• The global routing prefix is the same
for all subnets.
• Only the subnet ID hextet is incremented
in hexadecimal for each subnet.

31
IPv6 Subnet Allocation
•The example topology requires five subnets, one for each LAN as well as for the serial
link between R1 and R2.
•The five IPv6 subnets were allocated, with the subnet ID field 0001 through 0005.
Each /64 subnet will provide more addresses than will ever be needed.

32
Router Configured with IPv6 Subnets

•The example shows that each of the router interfaces on R1


has been configured to be on a different IPv6 subnet.

R1(config)# interface gigabitethernet 0/0/0


R1(config-if)# ipv6 address 2001:db8:acad:1::1/64
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)# interface gigabitethernet 0/0/1
R1(config-if)# ipv6 address 2001:db8:acad:2::1/64
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)# interface serial 0/1/0
R1(config-if)# ipv6 address 2001:db8:acad:3::1/64
R1(config-if)# no shutdown

33
Network Address Planning
• IP network planning is essential for scalable enterprise networks.

• Factors to consider when develop an IPv4 addressing scheme:

• Number of required subnets

• Host requirements per subnet

• Devices within each subnet

• Use of private vs. public addresses

• Other key factors to consider

34
Planning to Address the Network
Three primary considerations for
planning address allocation. Prevent
Duplication
• Prevent Address Duplication: of Addresses

Unique addresses for each host


prevent conflicts.
• Access Control: Documented
addresses enhance server
resource control. Planning Address
Allocation
• Monitor Security and
Performance: Planned Monitor Provide an
Security and Access
addressing helps identify network Performance Control
issues.

35
Device Address Assignment

Within a network, there are different types of devices that require addresses:
• End user clients – Most use DHCP to reduce errors and burden on network support
staff. IPv6 clients can obtain address information using DHCPv6 or SLAAC.
• Servers and peripherals – These should have a predictable static IP address.
• Servers that are accessible from the internet – Servers must have a public IPv4
address, most often accessed using NAT.
• Intermediary devices – Devices are assigned addresses for network management,
monitoring, and security.
• Gateway – Routers and firewall devices are gateway for the hosts in that network.

•When developing an IP addressing scheme, it is generally recommended that you have a


set pattern of how addresses are allocated to each type of device.

36

You might also like