Ip Addressing and Subnetting
Ip Addressing and Subnetting
The IP address start from 192.0.0.0 to 223.255.255.255, and the mask address is
255.255.255.0
Class E: reserved for future use. From 240 to 255 and the 255.255.255.255 used for
broadcast to all the subnet.
Cont..
One of the benefits of classful addresses is that they provide a hierarchy to
the network through the use of the network ID. This translates into an
efficient routing environment because it is easy for a router to determine
what networks can be grouped together and treated as a single routing
entry.
Cont…
The IP address can be classify into two classes:
Public address:
is globally unique and routable on the Internet. The Internet Assigned Numbers
Authority (IANA) to organizations and individuals assigns it.
Example: The IP address assigned to your home router by your Internet Service
Provider (ISP).
Private Address:
Any number or address assigned to a device on a private TCP/IP Local Area
Network that is accessible only within the Local Area Network and and are not
routable on the public Internet.
Example: Addresses from ranges like 192.168.0.0 to 192.168.255.255,
172.16.0.0 to 172.31.255.255, and 10.0.0.0 to 10.255.255.255.
Static IP Address:- is manually assigned to a device and does not change over time. It
is often used for servers and network devices.
Example: Configuring a printer with a fixed IP address of 192.168.1.100.
Dynamic IP Address: is assigned automatically by a DHCP (Dynamic Host
Configuration Protocol) server. It may change periodically.
Example: Computers and smartphones in a home network obtaining IP addresses from
a router's DHCP server.
Strategies to Conserve Addresses
Several strategies have been developed and implemented to
help the Internet community on how provides a good
managing of IP addresses. These strategies help reduce the
load on Internet routers and help administrators use globally
unique IP addresses more efficiently. There are two common
strategies, which are:
Private Addressing
Classless Inter-Domain Routing (CIDR)
Private Address
It means If the internetwork is limited to one organization, the IP addresses
need only be unique within that organization. Only networks that interface
with public networks such as the Internet need public addresses. Using
public addresses on the outside and private addresses for inside networks is
very effective.
Private Addresses:-
RFC1918 designates three ranges of IP addresses as private:
10.0.0.0 through 10.255.255.255
172.16.0.0 through 172.31.255.255
192.168.0.0 through 192.168.255.255
Cont…
Cont...
There are two ways to convert the private address to public address:
1. Network Address Translation (NAT).
This technique has been used to convert the private address to public address,
the NAT allowing us to access the internet and get services. The basic idea, is
that technique used pool of public addresses and assign for each private
address one public address. Thus, this way is inefficient due to the fact that
there are cost and delay associated with this operation. The table and the
figure below show how the NAT make the mapping.
Private Address Public Address
192.68.5.1 200.1.1.2
192.68.5.2 200.1.1.3
192.68.5.3 200.1.1.3
Cont..
2. Port Address Translation (PAT).
It’s another technique used to convert the private address to public. During PAT,
each computer on LAN is translated to the same IP address (public), but with a
different port number assignment. This way is much better than the NAT because
we can use one public address to translate any private address, therefore we
saved the cost. The table below shows the process of the PAT
Private Address Port address Public Address Port Number
The port address will be any random number in the allowed range, that the
device created it when wants to access the internet.
The packet will contain the port number that assign to the device that wants to
access the internet and through this port number, the router when get the
response message will translate it and make map this message to it is private
address based on the port number.
Subnet masks:-
A mask is a 32-bit binary number that is expressed in dotted decimal
notation. By default, a mask contains two fields, the network field and the
host field. These correspond to the network number and the locally
administered part of the network address. When an administrator subnets,
they are adjusting the way they view the IP address. Table 1: Default masks
for classful addressing
Cont…
Routers and hosts still assume class subnet masks by default:
Class A /8 255.0.0.0
Class B /16 255.255.0.0
Class C /24 255.255.255.0
The first three octets represent the network part and the last octet represent the host part.
Cont...
There three important things that should be taken into our account
when we thinking about subnetting:-
As well as, to find the number of hosts per subnet. We can use formal
2x -2, where (x) is the number of unmasked bits (0’s) .
Cont...
For example, in 11000000, the number of zeros gives us 26 – 2 =62 hosts.
In this example, there are 62 hosts per subnet and we make subtract
because the first IP address reserve for the network address and the last one
for the network broadcast.
While when we want to find number of networks, we can use this formal
2y
When you receive a block of addresses from an ISP, what you get will
look something like this: 192.168.10.32/28. This is telling you what your
subnet mask is. The slash notation (/) means how many bits are turned
on (1s).
The Class A default subnet mask, which is 255.0.0.0. This means that the
first byte of the subnet mask is all ones (1s), or 11111111. When referring
to a slash notation, you need to count all the 1s bits to figure out your
mask. The 255.0.0.0 is considered a /8 because it has 8 bits that are 1s—
that is, 8 bits that are turned on
Subnetting Steps
Step 1: Determining Number of Subnets Needed
Step 2: Determining Number of Subnets Needed
Step 3. Determine how many bits to borrow based on the network
requirements.
The formula for determining the number if bits you must borrow is 2n= # of subnets.
The n represents the number of bits you borrow
You must add the decimal value
Step 4. Determine the new subnet mask.
turn on (set to 1) the number of bits determined you must borrow
Step 5. Determine the subnet multiplier.
you must find the lowest of the high-order bits (bits starting from the left) turned
“on.”
Step 6. List the subnets, including subnetwork address, host range, and
broadcast address.
Determining Range of Addresses
Subnetting Class C Addresses
In a Class C address, only 8 bits are available for defining the
hosts
that subnet bits start at the left and go to the right without skipping
bits. This means that the only Class C subnet masks can be the
following:
No. Subnet address First valid address Last valid Address Broadcast address
1 216.21.5.0 216.21.5.1 216.21.5.30 216.21.5.31
2 216.21.5.32 216.21.5.33 216.21.5.62 216.21.5.63
3 216.21.5.64 216.21.5.65 216.21.5.94 216.21.5.95
4 216.21.5.96 216.21.5.97 216.21.5.126 216.21.5.127
5 216.21.5.128 216.21.5.129 216.21.5.158 216.21.5.159
6 216.21.5.160 216.21.5.161 216.21.5.190 216.21.5.191
7 216.21.5.192 216.21.5.193 216.21.5.222 216.21.5.223
8 216.21.5.224 216.21.5.225 216.21.5.254 216.21.5.255
Cont…
216.21.5.33--62
216.21.5.1--30 216.21.5.129--158
216.21.5.97--126
216.21.5.65--94
Example 5
Example 6
Example 7
128
:
Thank you for your
attention