CIS 192 - Module 8 - Subnetting IP Networks(4) (6)
CIS 192 - Module 8 - Subnetting IP Networks(4) (6)
Introduction to
Networking Introduction to
Networks v6 Companion
Module 8 Guide
Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your network.
2
Broadcast Domains and Segmentation
• Many protocols utilize broadcasts/multicasts (e.g., ARP locates devices, DHCP
discover locates servers).
3
Problems with Large Broadcast Domains
• Large broadcast domains can generate excessive broadcasts, harming the network.
4
Reasons for Segmenting Networks
5
Subnet
223.1.1.2
223.1.1.1 223.1.1.4
223.1.2.6 223.1.3.27
• Networks are most easily subnetted at the octet boundary of /8, /16, and /24.
# of subnet 28
/16 255.255.0.0 NetID SubnetID HostID 216-2
# of subnet 216
/24 255.255.255.0 NetID SubnetID HostID 28-2
• Notice that using longer prefix lengths decreases the number of hosts per subnet.
8
Subnet on an Octet Boundary
# of subnet 28
/24 255.255.0.0 NetID SubnetID HostID 28-2
9
Subnet on an Octet Boundary: Examples
•10.0.0.0/8 is subnetted using /16 mask 10.0.0.0/8 is subnetted using /24 mask.
Subnet Address Host Range Subnet Address
Host Range
(256 Possible (65,534 possible hosts per Broadcast (65,536 Possible Broadcast
(254 possible hosts per subnet)
Subnets) subnet) Subnets)
10
Classless Subnetting: Subnet within an Octet Boundary
• Borrow any number of bits for subnet ID
NetID HostID
nnnnnnnn.nnnnnnnn.nnnnnnhh.hhhhhhhh
/22 255.255.252.0 64 1022
11111111.11111111.11111100.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnh.hhhhhhhh
/23 255.255.254.0 128 510
11111111.11111111.11111110.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh
/24 255.255.255.0 256 254
11111111.11111111.11111111.00000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh
/25 255.255.255.128 512 126
11111111.11111111.11111111.10000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh
/26 255.255.255.192 1024 62
11111111.11111111.11111111.11000000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh
/27 255.255.255.224 2048 30
11111111.11111111.11111111.11100000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh
/28 255.255.255.240 4096 14
11111111.11111111.11111111.11110000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh
/29 255.255.255.248 8192 6
11111111.11111111.11111111.11111000
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh
/30 255.255.255.252 16384 2
11111111.11111111.11111111.11111100
12
Subnet based on Requirements
13
Classless Subnetting: Example 1
Consider a network with address 192.168.1.0/24 subnets this network into
2 subnets
Solution:
Subnet 1
192.168.1.0/25
Subnet 2
192.168.1.128/25
14
Classless Subnetting: Example 2
18
Classless Subnetting: Example 4 (cont.)
• Configuration:
19
Subnet based on Host Requirements: Example 1
20
Traditional Subnetting Wastes Addresses
Example: Given this topology, 7 subnets are required (i.e, four LANs and three WAN links),
the IP address is 192.168.20.0/24
• To satisfy the requirement of 7 subnets for the enterprise, 3 bits would need to be
borrowed (for a total of 23 , 8 subnets)
• New subnet mask /27
192 168 20 000 00000
• Number of host per subnet 25 -2 = 30 host.
21
Traditional Subnetting Wastes Addresses
• The largest number of host is in Building D with 28 hosts.
• The point-to-point WAN links only require two addresses and therefore waste 28
addresses each for a total of 84 unused addresses.
• Applying a traditional subnetting scheme to this scenario is not very efficient and is
wasteful.
22
Variable Length Subnet Masks
• VLSM was developed to avoid wasting addresses by enabling us to subnet a subnet.
0
Host
Addresses
Address Space without
Subnetting
.00000000
255
23
Variable Length Subnet Masks (cont.)
Borrowed Bit
First Bit 0
255
24
Variable Length Subnet Masks (cont.)
Borrowed Bits Second Bit 0 1
First Bit 0 64
191 255
25
Variable Length Subnet Masks (cont.)
Borrowed Bits Second Bit 0 1
First Bit 0 64
63 127
Third Bit Address Space
128 192 3 subnetted
Address Space Subnet 3A with additional
0 bit borrowed
.10000000
159
1 Address Space Subnet 4
160 Address Space Subnet 3B .11000000
1 .10100000
191 255
26
Variable Length Subnet Masks (cont.)
Borrowed Bits Second Bit 0 1
First Bit 0 64
27
Traditional subnetting vs VLSM
• Left side: Traditional subnetting (same subnet mask).
• Right side: VLSM used to subnet, dividing the last
subnet into eight /30 subnets.
• Start with largest subnet's host requirements.
• Continue subnetting to meet smallest subnet's needs.
• Resulting topology shows VLSM application.
• Using VLSM subnets, the LAN and inter-router networks
can be addressed without unnecessary waste as shown
in the logical topology diagram.
28
Subnet an IPv6 Network
29
IPv6-Subnetting Using the Subnet ID
30
IPv6 - Subnetting Example
31
IPv6 Subnet Allocation
•The example topology requires five subnets, one for each LAN as well as for the serial
link between R1 and R2.
•The five IPv6 subnets were allocated, with the subnet ID field 0001 through 0005.
Each /64 subnet will provide more addresses than will ever be needed.
32
Router Configured with IPv6 Subnets
33
Network Address Planning
• IP network planning is essential for scalable enterprise networks.
34
Planning to Address the Network
Three primary considerations for
planning address allocation. Prevent
Duplication
• Prevent Address Duplication: of Addresses
35
Device Address Assignment
Within a network, there are different types of devices that require addresses:
• End user clients – Most use DHCP to reduce errors and burden on network support
staff. IPv6 clients can obtain address information using DHCPv6 or SLAAC.
• Servers and peripherals – These should have a predictable static IP address.
• Servers that are accessible from the internet – Servers must have a public IPv4
address, most often accessed using NAT.
• Intermediary devices – Devices are assigned addresses for network management,
monitoring, and security.
• Gateway – Routers and firewall devices are gateway for the hosts in that network.
36