0% found this document useful (0 votes)
46 views58 pages

Understanding IPv4 Addressing and Subnetting

Uploaded by

nguyenphuctan30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views58 pages

Understanding IPv4 Addressing and Subnetting

Uploaded by

nguyenphuctan30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chapter

IPv4 Addressing
08
Module Objectives
Module Title: IPv4 Addressing

Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your


network.
Topic Title Topic Objective
IPv4 Address Structure Describe the structure of an IPv4 address
including the network portion, the host
portion, and the subnet mask.
IPv4 Unicast, Broadcast, and Multicast Compare the characteristics and uses of the
unicast, broadcast and multicast IPv4
addresses.
Types of IPv4 Addresses Explain public, private, and reserved IPv4
addresses.
Network Segmentation Explain how subnetting segments a network
to enable better communication.
Subnet an IPv4 Network Calculate IPv4 subnets for a /24 prefix.
8.1 IPv4 Address Structure
Network and Host Portions
• An IPv4 address is a 32-bit hierarchical address that is made up
of a network portion and a host portion.

• When determining the network portion versus the host


portion, you must look at the 32-bit stream.
• A subnet mask is used to determine the network and host
portions.
The Subnet Mask
• To identify the network and host portions of an IPv4 address,
the subnet mask is compared to the IPv4 address bit for bit,
from left to right.
• The actual process used to identify the network and host
portions is called ANDing.
The Prefix Length
• A prefix length is a less cumbersome method used to identify a subnet
mask address.

• The prefix length is the Subnet Mask 32-bit Address


Prefix
Length
number of bits set to 1 in
[Link] 11111111.00000000.00000000.00000000 /8
the subnet mask.
[Link] 11111111.11111111.00000000.00000000 /16

• It is written in “slash [Link] 11111111.11111111.11111111.00000000 /24

notation” therefore, count [Link] 11111111.11111111.11111111.10000000 /25


the number of bits in the
[Link] 11111111.11111111.11111111.11000000 /26
subnet mask and prepend
it with a slash. [Link] 11111111.11111111.11111111.11100000 /27

[Link] 11111111.11111111.11111111.11110000 /28

[Link] 11111111.11111111.11111111.11111000 /29

[Link] 11111111.11111111.11111111.11111100 /30


Determining the Network: Logical AND

• A logical AND Boolean operation is used in determining the network


address.
• Logical AND is the comparison of two bits where only a 1 AND 1 produces a 1 and
any other combination results in a 0.
• 1 AND 1 = 1, 0 AND 1 = 0, 1 AND 0 = 0, 0 AND 0 = 0
• 1 = True and 0 = False

• To identify the network


address, the host IPv4 address
is logically ANDed, bit by bit,
with the subnet mask to
identify the network address.
Video – Network, Host and Broadcast Addresses

This video will cover the following:


• Network address
• Broadcast Address
• First usable host
• Last usable host
Network, Host, and Broadcast Addresses
• Within each network are three types of IP addresses:
• Network address
• Host addresses
• Broadcast address

Host
Network Portion Host Bits
Portion

Subnet mask 255 255 255 0


[Link] or /24 11111111 11111111 11111111 00000000

Network address 192 168 10 0


All 0s
[Link] or /24 11000000 10100000 00001010 00000000

First address 192 168 10 1


All 0s and a 1
[Link] or /24 11000000 10100000 00001010 00000001

Last address 192 168 10 254


All 1s and a 0
[Link] or /24 11000000 10100000 00001010 11111110

Broadcast address 192 168 10 255


All 1s
[Link] or /24 11000000 10100000 00001010 11111111
8.2 IPv4 Unicast, Broadcast, and Multicast
Unicast
• Unicast transmission is sending a packet to one destination IP address.

• For example, the PC at [Link] sends a unicast packet to the printer at


[Link].
Broadcast
• Broadcast transmission is sending a packet to all other destination IP
addresses.

• For example, the PC at [Link] sends a broadcast packet to all IPv4 hosts.
Multicast
• Multicast transmission is sending a packet to a multicast address group.

• For example, the PC at [Link] sends a multicast packet to the multicast


group address [Link].
8.3 Types of IPv4 Addresses
Public and Private IPv4 Addresses
• As defined in in RFC 1918, public IPv4 addresses are globally
routed between internet service provider (ISP) routers.
• Private addresses are common Network Address
RFC 1918 Private Address Range
blocks of addresses used by most and Prefix

organizations to assign IPv4


addresses to internal hosts. [Link]/8 [Link] - [Link]

[Link]/12 [Link] - [Link]


• Private IPv4 addresses are not
unique and can be used internally
within any network. [Link]/16 [Link] - [Link]

• However, private addresses are not globally routable.


Routing to the Internet

• Network Address Translation (NAT) translates private IPv4 addresses to


public IPv4 addresses.

• NAT is typically
enabled on the edge
router connecting to
the internet.

• It translates the
internal private
address to a public
global IP address.
Special Use IPv4 Addresses
Loopback addresses
• [Link] /8 ([Link] to [Link])
• Commonly identified as only [Link]
• Used on a host to test if TCP/IP is operational.

Link-Local addresses
• [Link] /16 ([Link] to [Link])
• Commonly known as the Automatic Private IP Addressing (APIPA) addresses or
self-assigned addresses.
• Used by Windows DHCP clients to self-configure when no DHCP servers are
available.
Legacy Classful Addressing
RFC 790 (1981) allocated IPv4
addresses in classes
• Class A ([Link]/8 to [Link]/8)
• Class B ([Link] /16 – [Link] /16)
• Class C ([Link] /24 – [Link] /24)
• Class D ([Link] to [Link])
• Class E ([Link] – [Link])

• Classful addressing wasted many IPv4


addresses.

Classful address allocation was replaced with


classless addressing which ignores the rules of
classes (A, B, C).
Assignment of IP Addresses

• The Internet Assigned Numbers Authority (IANA) manages and allocates blocks
of IPv4 and IPv6 addresses to five Regional Internet Registries (RIRs).

• RIRs are responsible for


allocating IP addresses to
ISPs who provide IPv4
address blocks to smaller
ISPs and organizations.
8.4 Network Segmentation
Broadcast Domains and Segmentation
• Many protocols use broadcasts or multicasts (e.g., ARP use broadcasts to
locate other devices, hosts send DHCP discover broadcasts to locate a
DHCP server.)
• Switches propagate broadcasts out all interfaces except the interface on
which it was received.

• The only device that stops


broadcasts is a router.
• Routers do not propagate
broadcasts.
• Each router interface
connects to a broadcast
domain and broadcasts
are only propagated within
that specific broadcast
domain.
Problems with Large Broadcast Domains

• A problem with a large broadcast domain


is that these hosts can generate
excessive broadcasts and negatively
affect the network.

• The solution is to reduce the size of the


network to create smaller broadcast
domains in a process called subnetting.

• Dividing the network address [Link]


/16 into two subnets of 200 users each:
[Link] /24 and [Link] /24.
• Broadcasts are only propagated within
the smaller broadcast domains.
Reasons for Segmenting Networks
• Subnetting reduces overall network traffic and improves network
performance.
• It can be used to implement security policies between subnets.
• Subnetting reduces the number of devices affected by abnormal broadcast
traffic.

• Subnets are used for a variety of reasons including by:

Location Group or Function Device Type


8.5 Subnet an IPv4 Network
Subnet on an Octet Boundary
• Networks are most easily subnetted at the octet boundary of
/8, /16, and /24.

• Notice that using longer prefix lengths decreases the number


of hosts per subnet.

Prefix Length Subnet Mask Subnet Mask in Binary (n = network, h = host) # of hosts

[Link]
/8 [Link] 16,777,214
11111111.00000000.00000000.00000000

[Link]
/16 [Link] 65,534
11111111.11111111.00000000.00000000

[Link]
/24 [Link] 254
11111111.11111111.11111111.00000000
Subnet on an Octet Boundary (Cont.)
• In the first table [Link]/8 is subnetted using /16 and in the
second table, a /24 mask.

Subnet Address Host Range Subnet Address


Host Range
(256 Possible (65,534 possible hosts per Broadcast (65,536 Possible Broadcast
(254 possible hosts per subnet)
Subnets) subnet) Subnets)
[Link]/16 [Link] - [Link] [Link] [Link]/24 [Link] - [Link] [Link]
[Link]/24 [Link] - [Link] [Link]
[Link]/16 [Link] - [Link] [Link]
[Link]/24 [Link] - [Link] [Link]
[Link]/16 [Link] - [Link] [Link]
… … …
[Link]/16 [Link] - [Link] [Link] [Link]/24 [Link] - [Link] [Link]

[Link]/16 [Link] - [Link] [Link] [Link]/24 [Link] - [Link] [Link]


[Link]/24 [Link] - [Link] [Link]
[Link]/16 [Link] - [Link] [Link]
[Link]/24 [Link] - [Link] [Link]
[Link]/16 [Link] - [Link] [Link]
… … …
[Link]/16 [Link] - [Link] [Link] [Link]/24 [Link] - [Link] [Link]

... ... ... ... ... ...


[Link]
[Link]/16 [Link] - [Link] [Link] [Link]/24 [Link] - 10.2255.255.254
5
Subnet within an Octet Boundary
• Refer to the table to see six ways to subnet a /24 network.

Subnet Mask in Binary # of


Prefix Length Subnet Mask # of hosts
(n = network, h = host) subnets
[Link]
/25 [Link] 2 126
11111111.11111111.11111111.10000000
[Link]
/26 [Link] 4 62
11111111.11111111.11111111.11000000
[Link]
/27 [Link] 8 30
11111111.11111111.11111111.11100000
[Link]
/28 [Link] 16 14
11111111.11111111.11111111.11110000
[Link]
/29 [Link] 32 6
11111111.11111111.11111111.11111000
[Link]
/30 [Link] 64 2
11111111.11111111.11111111.11111100
Video – The Subnet Mask
• This video will demonstrate the process of subnetting.
Video – Subnet with the Magic Number
• This video will demonstrate subnetting with the magic number.
Packet Tracer – Subnet an IPv4 Network
In this Packet Tracer, you will do the following:

• Design an IPv4 Network Subnetting Scheme

• Configure the Devices

• Test and Troubleshoot the Network


8.6 Subnet a Slash 16 and a Slash 8 Prefix
Create Subnets with a Slash 16 prefix
Prefix Length Subnet Mask Network Address (n = network, h = host) # of subnets # of hosts
[Link]
/17 [Link] 2 32766
11111111.11111111.10000000.00000000

• The table highlights all /18 [Link]


[Link]
11111111.11111111.11000000.00000000
4 16382

the possible scenarios /19 [Link]


[Link]
11111111.11111111.11100000.00000000
8 8190

for subnetting a /16 /20 [Link]


[Link]
16 4094
11111111.11111111.11110000.00000000
prefix. [Link]
/21 [Link] 32 2046
11111111.11111111.11111000.00000000
[Link]
/22 [Link] 64 1022
11111111.11111111.11111100.00000000
[Link]
/23 [Link] 128 510
11111111.11111111.11111110.00000000
[Link]
/24 [Link] 256 254
11111111.11111111.11111111.00000000
[Link]
/25 [Link] 512 126
11111111.11111111.11111111.10000000
[Link]
/26 [Link] 1024 62
11111111.11111111.11111111.11000000
[Link]
/27 [Link] 2048 30
11111111.11111111.11111111.11100000
[Link]
/28 [Link] 4096 14
11111111.11111111.11111111.11110000
[Link]
/29 [Link] 8192 6
11111111.11111111.11111111.11111000
[Link]
/30 [Link] 16384 2
11111111.11111111.11111111.11111100
Create 100 Subnets with a Slash 16 prefix

Consider a large enterprise that requires at least


100 subnets and has chosen the private address
[Link]/16 as its internal network address.

• The figure displays the number of subnets that


can be created when borrowing bits from the
third octet and the fourth octet.
• Notice there are now up to 14 host bits that
can be borrowed (i.e., last two bits cannot be
borrowed).

To satisfy the requirement of 100 subnets for the


enterprise, 7 bits (i.e., 27 = 128 subnets) would
need to be borrowed (for a total of 128 subnets).
Create 1000 Subnets with a Slash 8 prefix
Consider a small ISP that requires 1000
subnets for its clients using network address
[Link]/8 which means there are 8 bits in
the network portion and 24 host bits
available to borrow toward subnetting.
• The figure displays the number of subnets that
can be created when borrowing bits from the
second and third.
• Notice there are now up to 22 host bits that
can be borrowed (i.e., last two bits cannot be
borrowed).

To satisfy the requirement of 1000 subnets


for the enterprise, 10 bits (i.e., 210=1024
subnets) would need to be borrowed (for a
total of 128 subnets)
Video – Subnet Across Multiple Octets
This video will demonstrate creating subnets across multiple octets.
Lab – Calculate IPv4 Subnets
In this lab, you will complete the following objectives:

• Part 1: Determine IPv4 Address Subnetting


• Part 2: Calculate IPv4 Address Subnetting
8.7 Subnet to Meet Requirements
Subnet Private versus Public IPv4 Address Space

Enterprise networks will have an:


• Intranet - A company’s internal network
typically using private IPv4 addresses.
• DMZ – A companies internet facing
servers. Devices in the DMZ use public IPv4
addresses.

• A company could use the [Link]/8 and


subnet on the /16 or /24 network
boundary.

• The DMZ devices would have to be


configured with public IP addresses.
Minimize Unused Host IPv4 Addresses and Maximize Subnets

There are two considerations when planning subnets:


• The number of host addresses required for each network
• The number of individual subnets needed

Subnet Mask in Binary # of


Prefix Length Subnet Mask # of hosts
(n = network, h = host) subnets

[Link]
/25 [Link] 2 126
11111111.11111111.11111111.10000000

[Link]
/26 [Link] 4 62
11111111.11111111.11111111.11000000

[Link]
/27 [Link] 8 30
11111111.11111111.11111111.11100000

[Link]
/28 [Link] 16 14
11111111.11111111.11111111.11110000

[Link]
/29 [Link] 32 6
11111111.11111111.11111111.11111000

[Link]
/30 [Link] 64 2
11111111.11111111.11111111.11111100
Example: Efficient IPv4 Subnetting

• In this example, corporate headquarters


has been allocated a public network
address of [Link]/22 (10 host bits)
by its ISP providing 1,022 host
addresses.

• There are five sites and therefore five


internet connections which means the
organization requires 10 subnets with
the largest subnet requires 40
addresses.

• It allocated 10 subnets with a /26 (i.e.,


[Link]) subnet mask.
Packet Tracer – Subnetting Scenario
In this Packet Tracer, you will do the following:

• Design an IP Addressing Scheme

• Assign IP Addresses to Network Devices and Verify Connectivity


8.8 VLSM
Video – VLSM Basics
• This video will explain VLSM basics.
Video – VLSM Example
• This video will demonstrate creating subnets specific to the needs of the
network.
IPv4 Address Conservation
Given the topology, 7 subnets are required (i.e, four LANs and three WAN
links) and the largest number of host is in Building D with 28 hosts.

• A /27 mask would provide 8 subnets of 30 host IP addresses and therefore


support this topology.
IPv4 Address Conservation (Cont.)

However, the point-to-point WAN links only require two addresses


and therefore waste 28 addresses each for a total of 84 unused
addresses.

• Applying a traditional subnetting scheme to this scenario is not very efficient and is
wasteful.

• VLSM was developed to avoid wasting addresses by enabling us to subnet a subnet.


VLSM
• The left side displays the traditional subnetting
scheme (i.e., the same subnet mask) while the
right side illustrates how VLSM can be used to
subnet a subnet and divided the last subnet into
eight /30 subnets.

• When using VLSM, always begin by satisfying


the host requirements of the largest subnet and
continue subnetting until the host requirements
of the smallest subnet are satisfied.

• The resulting topology with VLSM applied.


VLSM Topology Address Assignment
• Using VLSM subnets, the LAN and inter-router networks can be addressed
without unnecessary waste as shown in the logical topology diagram.
8.9 Structured Design
IPv4 Network Address Planning

IP network planning is crucial to develop a scalable solution to an enterprise


network.
• To develop an IPv4 network wide addressing scheme, you need to know how many
subnets are needed, how many hosts a particular subnet requires, what devices
are part of the subnet, which parts of your network use private addresses, and
which use public, and many other determining factors.

Examine the needs of an organization’s network usage and how the subnets
will be structured.
• Perform a network requirement study by looking at the entire network to
determining how each area will be segmented.
• Determine how many subnets are needed and how many hosts per subnet.
• Determine DHCP address pools and Layer 2 VLAN pools.
Device Address Assignment

Within a network, there are different types of devices that require addresses:
• End user clients – Most use DHCP to reduce errors and burden on network support
staff. IPv6 clients can obtain address information using DHCPv6 or SLAAC.
• Servers and peripherals – These should have a predictable static IP address.
• Servers that are accessible from the internet – Servers must have a public IPv4
address, most often accessed using NAT.
• Intermediary devices – Devices are assigned addresses for network management,
monitoring, and security.
• Gateway – Routers and firewall devices are gateway for the hosts in that network.

When developing an IP addressing scheme, it is generally recommended that


you have a set pattern of how addresses are allocated to each type of device.
Packet Tracer – VLSM Design and Implementation Practice

In this Packet Tracer, you will do the following:

• Examine the Network Requirements

• Design the VLSM Addressing Scheme


• Assign IP Addresses to Devices and Verify Connectivity
8.10 Module Practice and Quiz
Packet Tracer – Design and Implement a VLSM Addressing Scheme

In this Packet Tracer, you will do the following:

• Design a VLSM IP addressing scheme given requirements

• Configure addressing on network devices and hosts

• Verify IP connectivity
• Troubleshoot connectivity issues as required.
Lab - Design and Implement a VLSM Addressing Scheme

In this lab, you will complete the following objectives:

• Examine Network Requirements


• Design the VLSM Address Scheme
• Cable and Configure the IPv4 Networkc
What did I learn in this module?
• The IP addressing structure consists of a 32-bit hierarchical network address that
identifies a network and a host portion. Network devices use a process called
ANDing using the IP address and associated subnet mask to identify the network
and host portions.
• Destination IPv4 packets can be unicast, broadcast, and multicast.
• There are globally routable IP addresses as assigned by the IANA and there are
three ranges of private IP network addresses that cannot be routed globally but
can be used on all internal private networks.
• Reduce large broadcast domains using subnets to create smaller broadcast
domains, reduce overall network traffic, and improve network performance.
• Create IPv4 subnets using one or more of the host bits as network bits. However,
networks are most easily subnetted at the octet boundary of /8, /16, and /24.
• Larger networks can be subnetted at the /8 or /16 boundaries.
• Use VLSM to reduce the number of unused host addresses per subnet.
What did I learn in this module? (Cont.)

• VLSM allows a network space to be divided into unequal parts. Always begin by
satisfying the host requirements of the largest subnet. Continue subnetting until
the host requirements of the smallest subnet are satisfied.
• When designing a network addressing scheme, consider internal, DMZ, and
external requirements. Use a consistent internal IP addressing scheme with a set
pattern of how addresses are allocated to each type of device.

You might also like