SlideShare a Scribd company logo
1 of 46
Chapter six
Introduction to IP Addressing and Subnetting
IP addressing
• Every host connected to an internet must have a unique IP address on that
network.
• An IP (Internet Protocol) address is a unique identifier for a node or host
connection on a network.
• There are two versions of IP addressing IPv4 and IPv6.
• The address in IPv4 is a 32 bit number. But for IPV6 has 128-bit address length.
• Example:
• IPv4: 12.244.233.165
• IPv6: 2001:0db8:0000:0000:0000:ff00:0042:7879
• IPv4 is a numeric address, and its binary bits are separated by a dot
(.)
• IPv6 is an alphanumeric address whose binary bits are separated by a
colon (:). It also contains hexadecimal.
Cont..
• Number of classes:
• IPv4 offers five different classes of IP Address. Class A to E.
• lPv6 allows storing an unlimited number of IP Address.
• Network Configuration
• Networks need to be configured either manually or with DHCP.
• IPv6 support auto configuration capabilities using Internet Control Message
Protocol version 6 (ICMPv6) or DHCPv6
• Security
• Security is dependent on applications – IPv4 was not designed with security
in mind.
• IPSec(Internet Protocol Security) is built into the IPv6 protocol, usable with
a proper key infrastructure.
Cont.…
• Mapping:
• Uses ARP(Address Resolution Protocol) to map to MAC address
• Uses NDP(Neighbour Discovery Protocol) to map to MAC address
• There are four octets in an IP address. It is very important to understand
that the four octets in an IP address are divided into two parts—a network ID
and a host ID.
• The subnet mask determines the number of bits that make up the network ID
and the number of bits that make up the host ID
• Example: 192.168.1.2
• 192.168.1. Network
• .2 Host
• 192.168.1.0 - network address. 0.0.0.2 - host address.
Cont..
IPv4
• It is usually represented as 4, 8 bit numbers separated by dots
• An IP address looks similar in appearance to 192.168.1.2
• Each decimal value is made up of 8 bits (1s and 0s), and there are
four decimal values. The range 0 to 255 (known as octets) separated
by decimal points.
• Since each of the decimal values is made up of 8 bits for example, the
192 - 11000000.
Address Classes
• Every IP address belongs to a distinct address class.
• The Internet community defined these classes to accommodate networks of
various sizes.
• The class to which the IP address belongs initially determines the network ID
and host ID portions of the address, along with the number of hosts that are
supported on that network.
• The different class addresses are named class A, class B, class C, class D, and class E.
Class A Addresses
• Class A network number values begin at 1 and end at 126.
• A class A address has a default subnet mask of 255.0.0.0, which means that the first
octet is the network ID and the last three octets belong to the host ID portion of the
address
• Each octet can contain 256 possible values (0–255), so a class A address supports
16,777,216 hosts on the network (256 × 256 × 256)
Cont….
Class B Addresses
• Class B network number values begin at 128 and end at 191.
• Class B addresses have a default subnet mask of 255.255.0.0, which
means that the first two octets are the network ID and the last two
octets are the host ID portion of the address
• This means that we can have 65,536 hosts (256 × 256) on the network
Class C Addresses
• Class B network number values begin at 192 and end at 223.
• Class C addresses have a subnet mask of 255.255.255.0, which
means that the first three octets are the network ID and the last
octet is the host ID. Having only one octet as the host ID means
that a class C address can support only 254 hosts (256-2) on the
network
Cont…
Class D Addresses
• Class D addresses are used for special types of applications on the network known as
multicasting applications.
• Multicast means sending some information to some predefined group of users/networks.
• The range is between 224-239.
Class E Addresses
• The funny thing about class E addresses is that they were designed for
experimental purposes only, so you will never see a class E address on a network.
• The range is between 240-255
• 127.0.0.0 for loopback
Subnet Mask
• Used to define which part of the host address will be used as the
subnet address
• A 32-bit value that allows the recipient of IP packets to distinguish
the network ID portion of the IP address from the host ID portion
Cont.…
• When looking at a subnet mask, if there is a 255 in an octet, then the
corresponding octet in the IP address is part of the network ID
• For example, if I had an IP address of 192.168.1.15 and a
subnet mask of 255.255.255.0, the first three octets would make up
the network ID and the last octet would be the host ID
• The network ID assigns a unique address to the network itself,
while the host ID uniquely identifies the system on the network
Cont.…
Private address
• Another type of address you need to be aware of is what is known as a private
address.
• A private IP address is the address space that allow organizations to create their own
private network
• A private address is an address that can be assigned to a system but cannot be used
for any kind of Internet connectivity.
• The private addresses are non routable addresses, so any system using them will not
be able to function off the network.
• The computers, tablets and smartphones sitting behind your home, and the personal
computers within an organizations are usually assigned private IP addresses.
• A network printer residing in your home is assigned a private address so that only
your family can print to your local printer.
Cont.…
• The following are the three address ranges that are private:
• 10.0.0.0–10.255.255.255
• 172.16.0.0–172.31.255.255
• 192.168.0.0–192.168.255.255
Classless Inter-Domain Routing (CIDR)
• It also improved the efficiency of IP address assignments, and overall
significantly improved the availability.
• Used to allocate an amount of IP address space to a given entity
(company, home, customer, etc).
• Example: 192.168.10.32/28
• The slash notation (/) means how many bits are turned on (1s) and
tells you what your subnet mask is.
• Tells you how many bits are used to define the network.
Class A subnets
• In Class A, only the first octet is used as Network identifier and rest of three
octets are used to be assigned to Hosts (i.e. 16,777,214 Hosts per Network).
• To make more subnet in Class A, bits from Host part are borrowed and the
subnet mask is changed accordingly.
• For example, if one bit is borrowed from host bits of second octet and added to
network address, it creates two Subnets (21=2) with (223-2) 8,388,606 Hosts per
Subnet.
Class B Subnets
• By default, using Classful Networking, 16 bits are used as Network bits providing
and (216-2) 65534 Hosts.
• Class B IP Addresses can be subnetted the same way as Class A addresses, by
borrowing bits from Host parts.
Class C Subnets
• Class C IP addresses are normally assigned to a very small size network because
it can only have 254 hosts in a network.
• Given below is a list of all possible combination of subnetted Class B IP address
Exercise
1. Write the IP address 222.1.1.20 mask 255.255.255.192 in CIDR
notation.
2. Write the IP address 135.1.1.0/25 mask in CIDR notation.
Subnetting
• Subnetting is the strategy used to partition a single physical network
into more than one smaller logical sub-networks (subnets).
• An IP address includes a network segment and a host segment.
• Subnets are designed by accepting bits from the IP address's host part
and using these bits to assign a number of smaller sub-networks
inside the original network.
• Subnetting allows an organization to add sub-networks without
the need to acquire a new network number via the Internet
service provider (ISP).
Cont….
• Subnetting is essential when a single network number has to be
allocated over numerous segments of a local area network (LAN).
Benefits of subnetting include:
• Reduced network traffic
• Optimized network performance
• Simplified management
Gateway
• The gateway is a network device that acts as an entry point from one
network to others.
• The host sends all packets directed to other hosts outside the local
network to the default gateway (specifically to the gateway IP
address), which means that a host without the default gateway
address can only exchange packets with computers in the same local
network.
• The concept of a gateway has become virtually parallel with a router.
• When setting an IP address for a gateway, the first available address
in the pool of host addresses in the given network is usually used.
Cont….
Before starting, you need to do is answer five simple questions:
1. How many subnets does the chosen subnet mask produce?
2. How many valid hosts per subnet are available?
3. What are the valid subnets?
4. What’s the broadcast address of each subnet?
5. What are the valid hosts in each subnet?
Cont..
• How many subnets?
• 2x = number of subnets. x is the number of masked bits, or the 1s.
• For example, given a class C subnet mask of 255.255.255.192, the number of
ones gives us 22 = 4 subnets.
• Note that we only count the number of ones that are found in the host part of
the subnet mask.
• For class C address 255.255.255.0 is the default subnet, 192=11000000 in
binary, so there are only 2 ones.
Cont…
• How many hosts per subnet?
• 2y – 2 = number of hosts per subnet. y is the number of unmasked bits, or the
0s. For example, in 11000000, the number of zeros gives us 26 – 2 = 62 hosts
per subnet.
• You need to subtract two for the subnet address and the broadcast address,
which are not valid hosts.
• What are the valid subnets?
• First calculate the block size.
• 256 – subnet mask = block size, or increment number.
• An example would be 256 – 192 = 64. The block size of a 192 mask is always
64.
• Second, start counting at zero in blocks of 64 until you reach the subnet
mask value and these are your subnets. 0, 64, 128, 192.
Cont….
• What’s the broadcast address for each subnet?
• Since we counted our subnets in the last section as 0, 64, 128, and 192, the
broadcast address is always the number right before the next subnet.
• For example, the 0 subnet has a broadcast address of 63 because the next
subnet is 64. The 64 subnet has a broadcast address of 127 because the next
subnet is 128, etc.
• And remember, the broadcast of the last subnet is always 255 for Class C.
• What are the valid hosts?
• Valid hosts are the numbers between the subnets
• For example, if 64 is the subnet number and 127 is the broadcast address,
then 65–126 is the valid host range—it’s always the numbers between the
subnet address and the broadcast address.
• These are the addresses you assign to nodes.
Example for subnetting
We’re going to subnet the network address 192.168.10.0/24
1. How many subnets?
• 224 is 11100000, so our equation would be 23 = 8.
2. How many hosts/valid hosts?
• 25 – 2 = 30.
3. What are the valid subnets?
• 256 – 224 = 32. We just start at zero and count to the subnet mask value in
blocks (increments) of 32: 0, 32, 64, 96, 128, 160, 192, 224.
4. What’s the broadcast address for each subnet?
• always the number right before the next subnet
5. What are the valid hosts for each subnet?
• the numbers between the subnet number and the broadcast address
Cont…
• To answer questions 4 and 5, first just write out the subnets, then write out the
broadcast addresses—the number right before the next subnet. Lastly, fill in the
host addresses.
• So now we have
192.168.10.1/27 – 192.168.10.30/27 ntk 1
192.168.10.33/27 - 192.168.10.62/27 ntk 2
upto …
192.168.10.225/27 - 192.168.10.254/27 ntk 8
Exercise
• You have been allocated a class A network address of 29.0.0.0. You need to
create at least 20 networks and each network will support of 1000 hosts.
What are the possible subnet masks?
• Subnet the Class C IP address 195.1.1.0. So that you have to create at least 4
subnets each subnet must have room for 48 hosts . What are the possible
subnet masks? Do full subnetting.
• Do full subnetting for the following addresses.
1. 192.168.10.0/28
2. 192.0.10.0/30
VLSM (Variable length subnet mask)
• In all of the previous examples of subnetting, notice that the same subnet mask
was applied for all the subnets.
• This means that each subnet has the same number of available host addresses.
• You can need this in some cases, but, in most cases, having the same subnet mask
for all subnets ends up wasting address space.
• For example, the Class C network of 204.15.5.0, subnet the network in to 5
subnets in order to create the network with the host requirements shown below:
• NetA :14 hosts
• NetB :28 hosts
• NetC :2 hosts
• NetD :7 hosts
• NetE :28 hosts
Cont.…
• The network was split into eight equal-size subnets; however, each
subnet did not utilize all available host addresses, which results in
wasted address space.
• The following figure illustrates this wasted address space.
Cont.…
Cont.…
• NetA, NetC, and NetD have a lot of unused host address space.
• It is possible that this was a deliberate design accounting for future growth, but
in many cases this is just wasted address space due to the fact that the same
subnet mask is used for all the subnets.
• Variable Length Subnet Masks (VLSM) allows you to use different masks for each
subnet, thereby using address space efficiently.
• Given the same network and requirements as in exercise above develop a
subnetting scheme with the use of VLSM, given:
• Net A: must support 14 hosts
• Net B: must support 28 hosts
• Net C: must support 2 hosts
• Net D: must support 7 hosts
• Net E: must support 28 hosts
Cont.…
• Determine what mask allows the required number of hosts.
• Net A requires a /28 (255.255.255.240) to support 14 hosts
• Net B requires a /27 (255.255.255.224) to support 28 hosts
• Net C requires a /30 (255.255.255.252) to support 2 hosts
• Net D requires a /28 (255.255.255.240) to support 7 hosts
• Net E requires a /27 (255.255.255.224) to support 28 hosts
Cont.…
• The easiest way to assign the subnets is to assign the largest first. For example,
you can assign in this manner:
• Net B 204.15.5.0/27 host address range 1 to 30
• Net E 204.15.5.32/27 host address range 33 to 62
• Net A 204.15.5.64/28 host address range 65 to 78
• Net D 204.15.5.80/28 host address range 80 to 87
• Net C 204.15.5.96/30 host address range 97 to 98
• The following figure show how VLSM helped to save more than half of the
address space
Cont.…
Exercise
Given the Class B network of 172.0.0.0, subnet the network in order to create the
network with the host requirements shown below using VLSM:
• Net1 :500 hosts
• Net2 :250 hosts
• Net3 :80 hosts
• Net4 :50 hosts
• Net5 :20 hosts
• Net6 :2 hosts
• Net7 :2 hosts
• Net8 :2 hosts
• Net9 :2 hosts
• Net10 :2 hosts
VLAN
• VLAN is a logical grouping of network users and resources connected to
administratively defined ports on a switch.
• It support smaller broadcast domain and is organized by location, function,
department and application or protocol.
• Virtual LANs (or VLANs) separate a Layer-2 switch into multiple broadcast
domains.
• Each VLAN is its own individual broadcast domain (i.e. IP subnet).
• Individual ports or groups of ports can be assigned to a specific VLAN.
• Only ports belonging to the same VLAN can freely communicate; ports assigned
to separate VLANs require a router to communicate.
• Broadcasts from one VLAN will never be sent out ports belonging to another
VLAN
Cont…
• Ports (interfaces) on switches can be assigned to one or more VLANs, enabling
systems to be divided into logical groups -- based on which department they are
associated with -- and establish rules about how systems in the separate groups
are allowed to communicate with each other.
• Data communications between VLANs is performed by routers. Modern switches
often incorporate routing functionality and are called Layer 3 switches.
Cont…
• Four computers are connected to a Layer-2 switch that supports VLANs.
Computers A and B belong to VLAN 1, and Computers C and D belong to
VLAN 2.
• Because Computers A and B belong to the same VLAN, they belong to the
same IP subnet and broadcast domain.
• They will be able to communicate without the need of a router
• Computers C and D likewise belong to the same VLAN and IP subnet.
• They also can communicate without a router. However, Computers A and B
will not be able to communicate with Computers C and D, as they belong
to separate VLANs, and thus separate IP subnets.
• Broadcasts from VLAN 1 will never go out ports configured for VLAN 2.
• A router will be necessary for both VLANs to communicate.
Benefits of VLANs
• Simplified administration for the network manager: One of the best things about
virtualization is that it simplifies management.
• By logically grouping users into the same virtual networks, you make it easy to
set up and control your policies at a group level.
• When users physically move workstations, you can keep them on the same
network with different equipment. Or if someone changes teams but not
workstations, they can easily be given access to whatever new VLANs they need.
• Improved security: Using VLANs improves security by reducing both internal and
external threats.
• Internally, separating users improves security and privacy by ensuring that users
can only access the networks that apply to their responsibilities. External threats
are also minimized.
• If an outside attacker is able to gain access to one VLAN, they’ll be contained to
that network by the boundaries and controls you have in place to segment it
from your others.
Cont…
• Easier fault management: Troubleshooting problems on the network can be
simpler and faster when your different user groups are segmented and isolated
from one another.
• If you know that complaints are only coming from a certain subset of users, you’ll
be able to quickly narrow down where to look to find the issue.
• Improved quality of service: VLANs manage traffic more efficiently so that your
end users experience better performance. You’ll have fewer latency problems on
your network and more reliability for critical applications.
• VLANs also make prioritizing traffic much easier, allowing you to make sure
critical application data keeps flowing even when lower priority traffic like web
browsing spikes.
In a Class C address, only 8 bits are available for defining the hosts. Remember that
subnet bits start at the left and go to the right, without skipping bits. This means that
the only Class C subnet masks can be the following
Exercise
• You are given an IP address from your ISP: 220.42.56.20
• Design a network having 4 subnets for
• Administrative staff,
• Academic staff and
• Postgraduate students,
• Undergraduate students
Exercise
• You are given two address /mask combinations, written with the
length notation, which have been assigned to two devices.
• Your task is to determine if these devices are on the same subnet or
different subnets.
• Device A: 172.16.17.30 /20
• Device B: 172.16.28.15 /20
• You can use the address and mask of each device in order to
determine to which subnet each address belongs and perform a
logical "AND" between the mask and address

More Related Content

What's hot (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Frame relay
Frame relayFrame relay
Frame relay
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
OSI Model
OSI ModelOSI Model
OSI Model
 
C I D R
C I D RC I D R
C I D R
 
Overlay network
Overlay networkOverlay network
Overlay network
 
IPv4
IPv4IPv4
IPv4
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
Dns server
Dns serverDns server
Dns server
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Network Models.ppt
Network Models.pptNetwork Models.ppt
Network Models.ppt
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 

Similar to lecture 6.pptx

Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclassaskme
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.pptssuserf7cd2b
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptFaysalAhamed32
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptssuserde23af
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
 
IP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.pptIP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.pptAkkiKumar26
 
module03-ipaddr.ppt
module03-ipaddr.pptmodule03-ipaddr.ppt
module03-ipaddr.pptImXaib
 
this is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.pptthis is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.pptBlackHat41
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 

Similar to lecture 6.pptx (20)

Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ipaddress presentationdemoclass
Ipaddress presentationdemoclassIpaddress presentationdemoclass
Ipaddress presentationdemoclass
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
08 - IP Subnetting.ppt
08 - IP Subnetting.ppt08 - IP Subnetting.ppt
08 - IP Subnetting.ppt
 
ip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.pptip_addressing_subnetting aaaaaaaaaaa.ppt
ip_addressing_subnetting aaaaaaaaaaa.ppt
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
IP Address
IP AddressIP Address
IP Address
 
chapter 5 (1).ppt
chapter 5 (1).pptchapter 5 (1).ppt
chapter 5 (1).ppt
 
IP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.pptIP and CIDR ipv6 addressing.ppt
IP and CIDR ipv6 addressing.ppt
 
module03-ipaddr.ppt
module03-ipaddr.pptmodule03-ipaddr.ppt
module03-ipaddr.ppt
 
Ray ipv4 addresses
Ray   ipv4 addressesRay   ipv4 addresses
Ray ipv4 addresses
 
this is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.pptthis is a presentationon ip and cidr.ppt
this is a presentationon ip and cidr.ppt
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 

More from MelkamuEndale1

new Call for Innovation Competition - Registration Form (2).docx
new Call for Innovation Competition - Registration Form (2).docxnew Call for Innovation Competition - Registration Form (2).docx
new Call for Innovation Competition - Registration Form (2).docxMelkamuEndale1
 
Switching & Multiplexing
Switching & MultiplexingSwitching & Multiplexing
Switching & MultiplexingMelkamuEndale1
 

More from MelkamuEndale1 (6)

lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
lecture 1.pptx
lecture 1.pptxlecture 1.pptx
lecture 1.pptx
 
new Call for Innovation Competition - Registration Form (2).docx
new Call for Innovation Competition - Registration Form (2).docxnew Call for Innovation Competition - Registration Form (2).docx
new Call for Innovation Competition - Registration Form (2).docx
 
Switching & Multiplexing
Switching & MultiplexingSwitching & Multiplexing
Switching & Multiplexing
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

lecture 6.pptx

  • 1. Chapter six Introduction to IP Addressing and Subnetting
  • 2. IP addressing • Every host connected to an internet must have a unique IP address on that network. • An IP (Internet Protocol) address is a unique identifier for a node or host connection on a network. • There are two versions of IP addressing IPv4 and IPv6. • The address in IPv4 is a 32 bit number. But for IPV6 has 128-bit address length. • Example: • IPv4: 12.244.233.165 • IPv6: 2001:0db8:0000:0000:0000:ff00:0042:7879 • IPv4 is a numeric address, and its binary bits are separated by a dot (.) • IPv6 is an alphanumeric address whose binary bits are separated by a colon (:). It also contains hexadecimal.
  • 3. Cont.. • Number of classes: • IPv4 offers five different classes of IP Address. Class A to E. • lPv6 allows storing an unlimited number of IP Address. • Network Configuration • Networks need to be configured either manually or with DHCP. • IPv6 support auto configuration capabilities using Internet Control Message Protocol version 6 (ICMPv6) or DHCPv6 • Security • Security is dependent on applications – IPv4 was not designed with security in mind. • IPSec(Internet Protocol Security) is built into the IPv6 protocol, usable with a proper key infrastructure.
  • 4. Cont.… • Mapping: • Uses ARP(Address Resolution Protocol) to map to MAC address • Uses NDP(Neighbour Discovery Protocol) to map to MAC address • There are four octets in an IP address. It is very important to understand that the four octets in an IP address are divided into two parts—a network ID and a host ID. • The subnet mask determines the number of bits that make up the network ID and the number of bits that make up the host ID • Example: 192.168.1.2 • 192.168.1. Network • .2 Host • 192.168.1.0 - network address. 0.0.0.2 - host address.
  • 5. Cont.. IPv4 • It is usually represented as 4, 8 bit numbers separated by dots • An IP address looks similar in appearance to 192.168.1.2 • Each decimal value is made up of 8 bits (1s and 0s), and there are four decimal values. The range 0 to 255 (known as octets) separated by decimal points. • Since each of the decimal values is made up of 8 bits for example, the 192 - 11000000.
  • 6. Address Classes • Every IP address belongs to a distinct address class. • The Internet community defined these classes to accommodate networks of various sizes. • The class to which the IP address belongs initially determines the network ID and host ID portions of the address, along with the number of hosts that are supported on that network. • The different class addresses are named class A, class B, class C, class D, and class E. Class A Addresses • Class A network number values begin at 1 and end at 126. • A class A address has a default subnet mask of 255.0.0.0, which means that the first octet is the network ID and the last three octets belong to the host ID portion of the address • Each octet can contain 256 possible values (0–255), so a class A address supports 16,777,216 hosts on the network (256 × 256 × 256)
  • 7. Cont…. Class B Addresses • Class B network number values begin at 128 and end at 191. • Class B addresses have a default subnet mask of 255.255.0.0, which means that the first two octets are the network ID and the last two octets are the host ID portion of the address • This means that we can have 65,536 hosts (256 × 256) on the network Class C Addresses • Class B network number values begin at 192 and end at 223. • Class C addresses have a subnet mask of 255.255.255.0, which means that the first three octets are the network ID and the last octet is the host ID. Having only one octet as the host ID means that a class C address can support only 254 hosts (256-2) on the network
  • 8. Cont… Class D Addresses • Class D addresses are used for special types of applications on the network known as multicasting applications. • Multicast means sending some information to some predefined group of users/networks. • The range is between 224-239. Class E Addresses • The funny thing about class E addresses is that they were designed for experimental purposes only, so you will never see a class E address on a network. • The range is between 240-255 • 127.0.0.0 for loopback
  • 9. Subnet Mask • Used to define which part of the host address will be used as the subnet address • A 32-bit value that allows the recipient of IP packets to distinguish the network ID portion of the IP address from the host ID portion
  • 10. Cont.… • When looking at a subnet mask, if there is a 255 in an octet, then the corresponding octet in the IP address is part of the network ID • For example, if I had an IP address of 192.168.1.15 and a subnet mask of 255.255.255.0, the first three octets would make up the network ID and the last octet would be the host ID • The network ID assigns a unique address to the network itself, while the host ID uniquely identifies the system on the network
  • 12. Private address • Another type of address you need to be aware of is what is known as a private address. • A private IP address is the address space that allow organizations to create their own private network • A private address is an address that can be assigned to a system but cannot be used for any kind of Internet connectivity. • The private addresses are non routable addresses, so any system using them will not be able to function off the network. • The computers, tablets and smartphones sitting behind your home, and the personal computers within an organizations are usually assigned private IP addresses. • A network printer residing in your home is assigned a private address so that only your family can print to your local printer.
  • 13. Cont.… • The following are the three address ranges that are private: • 10.0.0.0–10.255.255.255 • 172.16.0.0–172.31.255.255 • 192.168.0.0–192.168.255.255
  • 14. Classless Inter-Domain Routing (CIDR) • It also improved the efficiency of IP address assignments, and overall significantly improved the availability. • Used to allocate an amount of IP address space to a given entity (company, home, customer, etc). • Example: 192.168.10.32/28 • The slash notation (/) means how many bits are turned on (1s) and tells you what your subnet mask is. • Tells you how many bits are used to define the network.
  • 15. Class A subnets • In Class A, only the first octet is used as Network identifier and rest of three octets are used to be assigned to Hosts (i.e. 16,777,214 Hosts per Network). • To make more subnet in Class A, bits from Host part are borrowed and the subnet mask is changed accordingly. • For example, if one bit is borrowed from host bits of second octet and added to network address, it creates two Subnets (21=2) with (223-2) 8,388,606 Hosts per Subnet.
  • 16.
  • 17. Class B Subnets • By default, using Classful Networking, 16 bits are used as Network bits providing and (216-2) 65534 Hosts. • Class B IP Addresses can be subnetted the same way as Class A addresses, by borrowing bits from Host parts.
  • 18.
  • 19. Class C Subnets • Class C IP addresses are normally assigned to a very small size network because it can only have 254 hosts in a network. • Given below is a list of all possible combination of subnetted Class B IP address
  • 20. Exercise 1. Write the IP address 222.1.1.20 mask 255.255.255.192 in CIDR notation. 2. Write the IP address 135.1.1.0/25 mask in CIDR notation.
  • 21. Subnetting • Subnetting is the strategy used to partition a single physical network into more than one smaller logical sub-networks (subnets). • An IP address includes a network segment and a host segment. • Subnets are designed by accepting bits from the IP address's host part and using these bits to assign a number of smaller sub-networks inside the original network. • Subnetting allows an organization to add sub-networks without the need to acquire a new network number via the Internet service provider (ISP).
  • 22. Cont…. • Subnetting is essential when a single network number has to be allocated over numerous segments of a local area network (LAN). Benefits of subnetting include: • Reduced network traffic • Optimized network performance • Simplified management
  • 23. Gateway • The gateway is a network device that acts as an entry point from one network to others. • The host sends all packets directed to other hosts outside the local network to the default gateway (specifically to the gateway IP address), which means that a host without the default gateway address can only exchange packets with computers in the same local network. • The concept of a gateway has become virtually parallel with a router. • When setting an IP address for a gateway, the first available address in the pool of host addresses in the given network is usually used.
  • 24. Cont…. Before starting, you need to do is answer five simple questions: 1. How many subnets does the chosen subnet mask produce? 2. How many valid hosts per subnet are available? 3. What are the valid subnets? 4. What’s the broadcast address of each subnet? 5. What are the valid hosts in each subnet?
  • 25. Cont.. • How many subnets? • 2x = number of subnets. x is the number of masked bits, or the 1s. • For example, given a class C subnet mask of 255.255.255.192, the number of ones gives us 22 = 4 subnets. • Note that we only count the number of ones that are found in the host part of the subnet mask. • For class C address 255.255.255.0 is the default subnet, 192=11000000 in binary, so there are only 2 ones.
  • 26. Cont… • How many hosts per subnet? • 2y – 2 = number of hosts per subnet. y is the number of unmasked bits, or the 0s. For example, in 11000000, the number of zeros gives us 26 – 2 = 62 hosts per subnet. • You need to subtract two for the subnet address and the broadcast address, which are not valid hosts. • What are the valid subnets? • First calculate the block size. • 256 – subnet mask = block size, or increment number. • An example would be 256 – 192 = 64. The block size of a 192 mask is always 64. • Second, start counting at zero in blocks of 64 until you reach the subnet mask value and these are your subnets. 0, 64, 128, 192.
  • 27. Cont…. • What’s the broadcast address for each subnet? • Since we counted our subnets in the last section as 0, 64, 128, and 192, the broadcast address is always the number right before the next subnet. • For example, the 0 subnet has a broadcast address of 63 because the next subnet is 64. The 64 subnet has a broadcast address of 127 because the next subnet is 128, etc. • And remember, the broadcast of the last subnet is always 255 for Class C. • What are the valid hosts? • Valid hosts are the numbers between the subnets • For example, if 64 is the subnet number and 127 is the broadcast address, then 65–126 is the valid host range—it’s always the numbers between the subnet address and the broadcast address. • These are the addresses you assign to nodes.
  • 28. Example for subnetting We’re going to subnet the network address 192.168.10.0/24 1. How many subnets? • 224 is 11100000, so our equation would be 23 = 8. 2. How many hosts/valid hosts? • 25 – 2 = 30. 3. What are the valid subnets? • 256 – 224 = 32. We just start at zero and count to the subnet mask value in blocks (increments) of 32: 0, 32, 64, 96, 128, 160, 192, 224. 4. What’s the broadcast address for each subnet? • always the number right before the next subnet 5. What are the valid hosts for each subnet? • the numbers between the subnet number and the broadcast address
  • 29. Cont… • To answer questions 4 and 5, first just write out the subnets, then write out the broadcast addresses—the number right before the next subnet. Lastly, fill in the host addresses. • So now we have 192.168.10.1/27 – 192.168.10.30/27 ntk 1 192.168.10.33/27 - 192.168.10.62/27 ntk 2 upto … 192.168.10.225/27 - 192.168.10.254/27 ntk 8
  • 30. Exercise • You have been allocated a class A network address of 29.0.0.0. You need to create at least 20 networks and each network will support of 1000 hosts. What are the possible subnet masks? • Subnet the Class C IP address 195.1.1.0. So that you have to create at least 4 subnets each subnet must have room for 48 hosts . What are the possible subnet masks? Do full subnetting. • Do full subnetting for the following addresses. 1. 192.168.10.0/28 2. 192.0.10.0/30
  • 31. VLSM (Variable length subnet mask) • In all of the previous examples of subnetting, notice that the same subnet mask was applied for all the subnets. • This means that each subnet has the same number of available host addresses. • You can need this in some cases, but, in most cases, having the same subnet mask for all subnets ends up wasting address space. • For example, the Class C network of 204.15.5.0, subnet the network in to 5 subnets in order to create the network with the host requirements shown below: • NetA :14 hosts • NetB :28 hosts • NetC :2 hosts • NetD :7 hosts • NetE :28 hosts
  • 32. Cont.… • The network was split into eight equal-size subnets; however, each subnet did not utilize all available host addresses, which results in wasted address space. • The following figure illustrates this wasted address space.
  • 34. Cont.… • NetA, NetC, and NetD have a lot of unused host address space. • It is possible that this was a deliberate design accounting for future growth, but in many cases this is just wasted address space due to the fact that the same subnet mask is used for all the subnets. • Variable Length Subnet Masks (VLSM) allows you to use different masks for each subnet, thereby using address space efficiently. • Given the same network and requirements as in exercise above develop a subnetting scheme with the use of VLSM, given: • Net A: must support 14 hosts • Net B: must support 28 hosts • Net C: must support 2 hosts • Net D: must support 7 hosts • Net E: must support 28 hosts
  • 35. Cont.… • Determine what mask allows the required number of hosts. • Net A requires a /28 (255.255.255.240) to support 14 hosts • Net B requires a /27 (255.255.255.224) to support 28 hosts • Net C requires a /30 (255.255.255.252) to support 2 hosts • Net D requires a /28 (255.255.255.240) to support 7 hosts • Net E requires a /27 (255.255.255.224) to support 28 hosts
  • 36. Cont.… • The easiest way to assign the subnets is to assign the largest first. For example, you can assign in this manner: • Net B 204.15.5.0/27 host address range 1 to 30 • Net E 204.15.5.32/27 host address range 33 to 62 • Net A 204.15.5.64/28 host address range 65 to 78 • Net D 204.15.5.80/28 host address range 80 to 87 • Net C 204.15.5.96/30 host address range 97 to 98 • The following figure show how VLSM helped to save more than half of the address space
  • 38. Exercise Given the Class B network of 172.0.0.0, subnet the network in order to create the network with the host requirements shown below using VLSM: • Net1 :500 hosts • Net2 :250 hosts • Net3 :80 hosts • Net4 :50 hosts • Net5 :20 hosts • Net6 :2 hosts • Net7 :2 hosts • Net8 :2 hosts • Net9 :2 hosts • Net10 :2 hosts
  • 39. VLAN • VLAN is a logical grouping of network users and resources connected to administratively defined ports on a switch. • It support smaller broadcast domain and is organized by location, function, department and application or protocol. • Virtual LANs (or VLANs) separate a Layer-2 switch into multiple broadcast domains. • Each VLAN is its own individual broadcast domain (i.e. IP subnet). • Individual ports or groups of ports can be assigned to a specific VLAN. • Only ports belonging to the same VLAN can freely communicate; ports assigned to separate VLANs require a router to communicate. • Broadcasts from one VLAN will never be sent out ports belonging to another VLAN
  • 40. Cont… • Ports (interfaces) on switches can be assigned to one or more VLANs, enabling systems to be divided into logical groups -- based on which department they are associated with -- and establish rules about how systems in the separate groups are allowed to communicate with each other. • Data communications between VLANs is performed by routers. Modern switches often incorporate routing functionality and are called Layer 3 switches.
  • 41. Cont… • Four computers are connected to a Layer-2 switch that supports VLANs. Computers A and B belong to VLAN 1, and Computers C and D belong to VLAN 2. • Because Computers A and B belong to the same VLAN, they belong to the same IP subnet and broadcast domain. • They will be able to communicate without the need of a router • Computers C and D likewise belong to the same VLAN and IP subnet. • They also can communicate without a router. However, Computers A and B will not be able to communicate with Computers C and D, as they belong to separate VLANs, and thus separate IP subnets. • Broadcasts from VLAN 1 will never go out ports configured for VLAN 2. • A router will be necessary for both VLANs to communicate.
  • 42. Benefits of VLANs • Simplified administration for the network manager: One of the best things about virtualization is that it simplifies management. • By logically grouping users into the same virtual networks, you make it easy to set up and control your policies at a group level. • When users physically move workstations, you can keep them on the same network with different equipment. Or if someone changes teams but not workstations, they can easily be given access to whatever new VLANs they need. • Improved security: Using VLANs improves security by reducing both internal and external threats. • Internally, separating users improves security and privacy by ensuring that users can only access the networks that apply to their responsibilities. External threats are also minimized. • If an outside attacker is able to gain access to one VLAN, they’ll be contained to that network by the boundaries and controls you have in place to segment it from your others.
  • 43. Cont… • Easier fault management: Troubleshooting problems on the network can be simpler and faster when your different user groups are segmented and isolated from one another. • If you know that complaints are only coming from a certain subset of users, you’ll be able to quickly narrow down where to look to find the issue. • Improved quality of service: VLANs manage traffic more efficiently so that your end users experience better performance. You’ll have fewer latency problems on your network and more reliability for critical applications. • VLANs also make prioritizing traffic much easier, allowing you to make sure critical application data keeps flowing even when lower priority traffic like web browsing spikes.
  • 44. In a Class C address, only 8 bits are available for defining the hosts. Remember that subnet bits start at the left and go to the right, without skipping bits. This means that the only Class C subnet masks can be the following
  • 45. Exercise • You are given an IP address from your ISP: 220.42.56.20 • Design a network having 4 subnets for • Administrative staff, • Academic staff and • Postgraduate students, • Undergraduate students
  • 46. Exercise • You are given two address /mask combinations, written with the length notation, which have been assigned to two devices. • Your task is to determine if these devices are on the same subnet or different subnets. • Device A: 172.16.17.30 /20 • Device B: 172.16.28.15 /20 • You can use the address and mask of each device in order to determine to which subnet each address belongs and perform a logical "AND" between the mask and address

Editor's Notes

  1. An IP address acts as an identifier for a specific device on a particular network. The IP address is also called an IP number or Internet address.
  2. In order to address different networks on an internet the address is structured into a network part and a host part
  3. Class A addresses are for networks with large number of total hosts Number of Networks: 126
  4. 127.0.0.0 for loopback if a host machine can successfully ping 127.0.0.1 or any IP from loopback range, implies that the TCP/IP software stack on the machine is successfully loaded and working.
  5. The idea behind CIDR is to adapt the concept of subnetting to the entire Internet. In short, classless addressing means that instead of breaking a particular network into subnets, we can aggregate networks into larger supernets.
  6. In case of subnetting too, the very first and last IP address of every subnet is used for Subnet Number and Subnet Broadcast IP address respectively. Because these two IP addresses cannot be assigned to hosts, sub-netting cannot be implemented by using more than 30 bits as Network Bits, which provides less than two hosts per subnet.
  7. Decimal 192 =11000000 binary which means that 2 bits of this octet are used for the subnet. Now add the 24 bits 255.255.255 and we have 26 bits. So we write: 222.1.1.20/26
  8. In any network, when we need to send data to a host device connected to the network, a router uses a broadcast address. Additionally, every network has one unique broadcast address.
  9. Sm-255.248.0.0 Host 524286
  10. Sm----/12 500-/23 w/h borrow 15bits 250-/24 w/h borrow 16bits
  11. VLAN stands for Virtual Local Area Network which is used to enhance the performance of LANs.