Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Implementation
IP: INTERNET
PROTOCOL
CNR
Implementation
CNR
Implementation
CNR
Implementation
AN IP ADDRESS
Denotes the Host Address
Net ID
Host ID
Denotes the network Address
CNR
Implementation
Classful Addressing
Classless Addressing
Classful addressing:
There are 5 classes of IP address in Classful Addressing.
First Byte
Second Byte
Third Byte
Fourth Byte
Class A
0 - 127
Class B
128-191
Class C
192 - 223
Class D
224-239
Multicast Address
Class E
240-255
/8 or 255.0.0.0
/16 or 255.255.0.0
/24 or 255.255.255.0
CNR
Implementation
CLASSES OF IP ADDRESS:
Default Network: The IP address of 0.0.0.0 is used for the
default network. Class A - This class is for very large networks, such
as a major international company might have. IP addresses with a first
octet from 1 to 126 are part of this class. The other three octets are
used to identify each host. In Class A networks, the high order bit value
(the very first binary number) in the first octet is always 0.
0 127 NET
HOST
HOST
HOST
01000000.00011011.00111101.10001001
Value of bit for decimal in their position
Binary format of the 1st Octet
128
64
32
16
CNR
Implementation
CNR
Implementation
Total no of Host
1-126.XXX.XXX.XXX
27 . 28 . 28 . 28
So, No of Host: 224 -2
= 16, 777, 214
CNR
Implementation
Total no of Host
128-191.XXX.XXX.XXX
26 . 28 . 28 . 28
So, No of Host: 216 -2
= 65,534
CNR
Implementation
size businesses. IP addresses with a first octet from 192 to 223 are
part of this class. Class C addresses also include the second and third
octets as part of the Net identifier. The last octet is used to identify each
host. This means that there are 2,097,152 (221) Class C networks each
with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique
IP addresses.
Class C networks have a first bit value of 1, second bit value of 1 and
a third bit value of 0 in the first octet.
first three classes. It has a first bit value of 1, second bit value of 1, third
bit value of 1 and fourth bit value of 0. The other 28 bits are used to
identify the group of computers the multicast message is intended for.
CNR
Implementation
IP
Class
Network Address
Broadcast
Address
192.168.20.3
Class C
192.168.20.0
192.168.20.255
127.0.4.1
Class A
127.0.0.0
127.255.255.255
185.23.5.1
Class B
185.23.0.0
185.23.255.255
CNR
Implementation
Classful Addressing
Classless Addressing
For example:
In classful adderssing the IP 172.16.5.0/16 denotes a class B address
having just one network 172.16.0.0 and having 2^16=65536 hosts.
But if we just borrow 7 bits from the Host ID, we can have 2^7 = 128
Subnetworks, Each having 2^9 = 512 Hosts.
As a result, we can design our networks with more flexibility and
Separated Broadcast traffic very easily.
CNR
Implementation
Classless addressing
In classless addressing, There is no predefined subnet masks like /
8, /16 or /24.
We can use any subnet mask to feet our need. For example : /15, /
27, /29, /30 etc
We can borrow bits from Host ID Section to increase no of sub
networks.
CNR
Implementation
SUBNETTING
CNR
Implementation
SUBNETTING
Hosts bits from a given class is reassigned as network bits, known as
borrowing bits
Act of making multiple smaller sub-network from a given network
of any of the classes A, B, C
Advantages:
- Improve manageability
- Provided security
CNR
Implementation
CNR
Implementation
Subnet
Subdividing the Host Octets of a Class A Address
CNR
Implementation
(Borrowed bits)
-2
CNR
Implementation
Restriction in Subnetting:
The last two bits in the last octet, regardless of the IP address class,
may never be assigned to the sub network
All 0s and all 1s cant be used as the subnet address
All 0s and all 1s cant be used as the host address
CNR
Implementation
Exmaple
5 bits are borrowed
No of usable hosts: 6
No of bits to borrow: 6
No of usable host: 2
No. of subnet
= 2 (Borrowed bits) - 2
No. of hosts
= 2 (No of remaining host bits) 2
Again,
We are given an IP address 192.168.10.0/24.
We have decided it to subnet using /26
So, no. of borrowed bit: 26-24 = 2
So, no. of subnets: 22 = 4 (due to class C IP address)
CNR
Implementation
Subnet Mask
Used to tell devices which part of the IP address in network number
including subnet and which part is the host
Have all 1s in the network portion and all 0s in the host portion
Uses the same format as IP addressing i.e. 32 bit long and divided into
four octets
CNR
Implementation
CNR
Implementation
11000000.10101000.00001010.
00
000000
128
64
32
16
CNR
Implementation
CNR
Implementation
For Classless :
No. of subnet = 2 (Borrowed bits) - 2
For Classful : No of subnet=2Borrowed Bits
First Network
192.168.10.0
Second Network
192.168.10.64
Third Network
192.168.10.128
Fourth Network
192.168.10.192
CNR
Implementation
Value
128
64
32
16
Mask
128
192
224
240
248
252
254
255
Total Subnets
16
32
64
Total Hosts
64
32
16
Usable Hosts
62
30
14
Class C address with a /25 mask only borrows one bit as shown in the
chart above. However, a class B address with a /25 mask borrows 9bits.
CNR
Implementation
27-24 = 3
Subnet Mask
255.255.255.224
Block Size
256 224 = 32 or 25 = 32
No. of Subnets
23 = 8
No. of Hosts/Subnet
25-2 = 32-2 = 30
Subnet addresses
192. 168.10.224
Since all of these octets are 255, these network address upto /24 will be
unchanged. Rest of the digits should be changed
CNR
Implementation
18-16 = 2
Subnet Mask
255.255.192.0
Block Size
256 192 = 64 or 26 = 64
No. of Subnets
22 = 4
No. of Hosts/Subnet
Subnet addresses
172.16. 192.0
Since all of these octets are 255, these network address upto /16 will be
unchanged. Rest of the digits should be changed
CNR
Implementation
20-8 = 12
Subnet Mask
255.255.240.0
Block Size
256 240 = 16 or 24 = 16
No. of Subnets
212 = 4096
No. of Hosts/Subnet
212 -2 = 4094
Subnet addresses
Since all of these octets are 255, these network address upto /16
will be unchanged. Rest of the digits should be changed
CNR
Implementation
Problems 1
200.200.200.0
5 Subnets
CNR
Implementation
Problems 1 (contd.)
200.200.200.0 and 5 Subnets
1
255.255.255.224
32
Netowrk ID
Fill in Table
Network Id
Range
RANGE
BC
(Reserved for Broadcast Addresses)
Table:
200.200.200.10
BC
200.200.200.0
200.200.200.1 200.200.200.30
200.200.200.31
200.200.200.32
200.200.200.33 200.200.200.62
200.200.200.63
200.200.200.64
200.200.200.65 200.200.200.94
200.200.200.95
200.200.200.96
200.200.200.97 - 200.200.200.126
200.200.200.127
200.200.200.128
200.200.200.129 200.200.200.158
200.200.200.159
200.200.200.160
200.200.200.161 200.200.200.190
200.200.200.191
200.200.200.192
200.200.200.193 200.200.200.222
200.200.200.223
200.200.200.224
200.200.200.225 200.200.200.254
200.200.200.255
CNR
Implementation
Problems 1 (contd.)
Setup subnet
CNR
Implementation
Problems 2
Example : 192.168.10.33 /28
What subnet and broadcast address is the above IP address a
member of?
CNR
Implementation
Problems 3
Example : 172.16.10.33/27
What subnet and broadcast address is the above IP address a
member of?
CNR
Implementation
Problems 4
You need to create a network having 10 host. What should be
the subnet mask?
CNR
Implementation
Problems 5
You need to create a network having 70 host. What should be
the subnet mask?
CNR
Implementation
Problems 6
Find the Valid hosts for 192.168.10.12/30
Subnet mask : 255.255.255.252
B.S : 256-252 = 6
No. of Hosts = 22-2 = 2
So,
Subnet ID 192.168.10.12
First Host
192.168.10.13
Last Host
192.168.10.14
Broadcast 192.168.10.15
CNR
Implementation
Variable Length
Subnet Mask (VLSM)
CNR
Implementation
What is VLSM?
VLSM
VLSM allows you to divide big
networks into smaller, differentsized slices. This enables you to
make maximum use of your
valuable IP address space.
CNR
Implementation
IP : 207.21.24.0
/24
Site A
25 users 25 users
Site B
Site C
10 users
8 users
CNR
Implementation
Subnetting in
a
Box
To begin, in a class
256
addresses
255
CNR
Implementation
Subnetting in
aIf Box
we were to
borrow 1 bit, it
would break the
256 addresses in to
two parts
(networks) with
each part (subnet)
having 128
addresses.
The subnet mask
would be
255.255.255.128.
128
128
addresses
128
addresses
/25
/25
127
255
CNR
Implementation
Subnetting in a
Box
If we were to
borrow 2 bits, it
would break each of
these 2 networks in
half again. This
would give us 4
networks, each with
64 addresses.
128
64
addresse
s
63
64
/26
64
addresse
s
192
191
/26
64
addresse
s
/26
64
addresse
s
127
/26
255
CNR
Implementation
Subnetting in a
Box
If we were to
borrow 3 bits, it
would break each of
these 4 networks in
half again. This
would give us 8
networks, each with
32 addresses.
The subnet mask
would now be
255.255.255.224.
32
128
160
32
address
es
32
address
es
32
address
es
32
address
es
/27
/27
/27
/27
31
64
159
63
192
96
191
224
32
address
es
32
address
es
32
address
es
32
address
es
/27
/27
/27
/27
95
127
223
255
CNR
Implementation
Subnetting in a
Box
If we were to
borrow 4 bits, it
would break each of
these 8 networks in
half again. This
would give us 16
networks, each with
16 addresses.
The subnet mask
would now be
255.255.255.240.
32
128
16
16
16
address address
address
es 15
es 47
es 143
16
48
144
160
16
address
es 175
176
16
16
16
16
address address
address
address
es 31
es 63
es 159
es 191
64
96
192
224
16
16
16
16
address address
address
address
es 79
es 111
es 207
es 239
80
112
208
240
16
16
16
16
address address
address
address
es 95
es 127
es 223
es 255
CNR
Implementation
Addressing a Network
Using VLSM
0
32
/30
/30
Site B
Site A
Site C
128
25 users
31
64
Free For
Future Use
63
104
96
25 users
10 users
/28
/27
/27
79
So
Site A,
100
103
111
112
80
95
127
255
8 users
/28
CNR
Implementation
No. of subnet
= 2 (Borrowed bits) - 2
No. of hosts
= 2 (No of remaining host bits) 2
CNR
Implementation
60 users
Branch 1
12 users
Branch 2
12 users
Branch 3
12 users
Branch 4
12 users
Branch 5
12 users
CNR
Implementation
128
63
191
192
64
127
255
CNR
Implementation
128
64
192
Playing it safe, we
will not use the first
subnet (subnet 0).
We will start
addressing with
195.39.71.64 /26.
Headquarters needs
60 hosts, so we will
assign them .64 - .
127.
Headquarters
60 hosts
26 bit mask or /
26
(255.255.255.19
2)
CNR
Implementation
128
160
Branch 1
12 hosts
/28
(255.255.255.240)
Branch 3
12 hosts
/28
(255.255.255.240)
144
176
Branch 2
12 hosts
/28
(255.255.255.240)
Branch 4
12 hosts
/28
(255.255.255.240)
192
64
Headquarters
60 hosts
26 bit mask or /
26
(255.255.255.1
92)
CNR
Implementation
64
Headquarters
128
160
Branch 1
12 hosts
/28
(255.255.255.240)
Branch 3
12 hosts
/28
(255.255.255.240)
144
176
Branch 2
12 hosts
/28
(255.255.255.240)
Branch 4
12 hosts
/28
(255.255.255.240)
192
224
Branch 5
12 hosts
/28
(255.255.255.240)
60 hosts
26 bit mask or /
26
(255.255.255.1
92)
208
240
CNR
Implementation
0
128
Now we need to
address the 5 WAN
links that connect to
the Branch offices.
These are point-topoint connections
and only require 2
addresses.
Branch 3
Branch 1
12 hosts
12 hosts
/28
/28
(255.255.255.240) (255.255.255.240)
144
176
Branch 4
Branch 2
12 hosts
12 hosts
/28
/28
(255.255.255.240) (255.255.255.240)
192
64
Headquarters
Here we will use a /
30 mask to further
subnet the subnets.
160
60 hosts
Branch 5
12 hosts
/28
(255.255.255.240)
26 bit mask or /
26
208
WA
N1
216
WA
N3
(255.255.255.1
92)
212
WA
N2
220
WA
N4
224
WA
N5
232
228
236
240
CNR
Implementation
Subnet 0 could be
used later if needed
for future growth of
HQ or for more
Branch offices.
128
160
Branch 3
Branch 1
12 hosts
12 hosts
/28
/28
(255.255.255.240) (255.255.255.240)
144
176
Branch 4
Branch 2
12 hosts
12 hosts
/28
/28
(255.255.255.240) (255.255.255.240)
192
64
Headquarters
60 hosts
26 bit mask or /
26
(255.255.255.19
2)
224
WAN
5
Branch 5
12 hosts
/28
228
(255.255.255.240)
208
WAN
1
216
WAN
3
212
WAN
2
220
WAN
4
240
232
236
CNR
Implementation
Address
provided by ISP
9 .7
5.3
19
195.39.71.144 /28
195.39.71.160 /28
5 .3
9 .7
1.2
24
/30
30
0/
195.39.71.128 /28
19
.22
.71
1.2
12
/3 0
30
9
5.3
19
5
19
.7
.39
8/
0
1 .2
195.39.71.216 /30
195.39.71.64 /26
195.39.71.176 /28
195.39.71.192 /28
CNR
Implementation
Thank You