0% found this document useful (0 votes)
2 views

3.3 subnetting

Uploaded by

SUDHAN R CSE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

3.3 subnetting

Uploaded by

SUDHAN R CSE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Subnetting

1
Subnetting

 name given to piece of broken network or can also be called as Substitute network
is known as Subnet.
 Subnets are legal small parts of IP (Internet Protocol) Addressing process

Purpose of Subnetting in Computer Networks

Efficiency of the Network- data being transmitted can get to its destination as fast as possible

Provides Network Security - harder for intruders to move through a company's network,
Internet Protocol (IP) Addressing Relocation

2
Subnetting Example

3
SUBNETTING AND SUPERNETTING

To alleviate address depletion, two strategies were proposed and, to some extent, implemented:

 subnetting - class A or class B block is divided into several subnets.


 supernetting – Devised to combine several class blocks

4
5
Public and Private Address

Public Address
 A public IP address is a public address assigned to your network by your internet
service provider (ISP)
 It is used to provide access over the internet.
Private Address
 A private IP address- one that is assigned to your device directly by your network
router.

6
Network address

7
Compare Public and Private Address
Sr. No Key Private IP Address Public IP Address
 It is a local IP address, A public IP address is the public-facing IP address
1. Definition  It is the IP address that your network provided to your network by your internet service
router allocates to your device. provider (ISP).

 These addresses have local scope.


2. Scope  Devices within a network use this to These addresses have global scope.
communicate.

 used to communicate with any other


A public IP address is usually used to communicate
3. Communication device in your house or office that is
outside your network.
connected to your private network.

Private IP Addresses differ in a uniform


4. Format Public IP Addresses differ in varying ranges.
manner.
All data transfers using a private IP address
The Internet Service Provider (ISP) controls the data
5. Traffic stay within the network and are unaffected by
transfers using a public IP address.
external factors.
8
Compare Public and Private Address
A Local Network Provider creates the private IP The public IP addresses are controlled by
6. Provider
addresses by the use of network operating systems. internet service providers (ISP).
7. Cost Private IP Addresses are free of cost. Public IP Address comes with a cost.
Private IP Address can be found by entering "ipconfig" Public IP Address needs to be searched on search
8. Locate
on the command prompt. engine like google.
Private IP addresses use numeric code that is not unique
Public IP addresses use a numeric code that is
9. Numeric code and can be reused by any device connected to a private
unique to each device and cannot be repeated.
network.
Public IP addresses are vulnerable to attack since
10. Security Private IP addresses are secure.
they have no security.
The private IP addresses range
Except for private IP addresses, all other IP
11. Range from: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.
addresses are public IP.
31.255.255, and 192.168.0.0 to 192.168.255.255
12. Example 192.168.11.20 is an example of a private IP address. 17.5.7.3 is an example of a public IP address.

9
How to do Subnetting?

10
Subnetting

11
Subnetting Example

12
Subnetting Example

13
Subnetting Example

14
Subnetting Example

15
Subnetting Example

16
Subnetting Example

17
Subnetting Example

18
Subnetting Example

19
Subnetting Example

20
Subnetting Example

21
classless interdomain routing or CIDR

Slash Notation

22
23
24
25
Network Address Translation(NAT)

• Before the ISP can forward this packet, it must


translate the source IPv4 address, which is a
private address, to a public IPv4 address using
Network Address Translation (NAT).

• NAT is used to translate between private


IPv4 and public IPv4 addresses.

• This is usually done on router that connects


the internal network to the ISP network.

• Private IPv4 addresses in organization’s


intranet will be translated to public IPv4
addresses before routing to the internet.

26
Loopback Address

 A loopback address is a distinct reserved IP address range

 These are special addresses used by a host to direct traffic to itself.

 It starts from 127.0.0.0 ends at 127.255.255.255


 127.255.255.255 is the broadcast address for 127.0.0.0/8.
 loopback addresses are built into the IP domain system, enabling devices to
transmit and receive the data packets.
 The loopback address 127.0.0.1 is generally known as localhost.

27
Link-Local Address /APIPA

 Link-local addresses (169.254.0.0 /16 or 169.254.0.1 to 169.254.255.254) are more

commonly known as the Automatic Private IP Addressing (APIPA) addresses


 It is also called self-assigned addresses.
 They are used by a Windows client to self-configure in the event
 Client cannot obtain an IP addressing through other methods.
 Link-local addresses can be used in a peer-to-peer connection but are not
commonly used for this purpose.

28
29
30
 Datagram is a variable-length packet with two parts: header and data.

 Header - 20 to 60 bytes in length and contains information essential to routing and delivery

 Version (VER) - 4-bit field defines the version of the IPv4 protocol.
 Currently version is 4.
 IPv4 software running in processing machine - format of version 4.
 If machine is some other version of IPv4 - datagram is discarded
Header length (HLEN).
 4-bit field defines total length of datagram header in 4-byte words.
 length of the header is variable (between 20 and 60 bytes).
 When there are no options, the header length is 20 bytes - value of this field is 5 (5 x 4 = 20).
 When option field is at its maximum size, value of this field is 15 (15 x 4 = 60)
 Services
 IETF has changed the interpretation - 8-bit field.
 Previously called service type, called differentiated services.

31
Service type or differentiated services

Types of service

32
Default Type of Services

33
Total length (16 bits)
 To find the length of the data coming from the upper layer, subtract header length from total length.
 The header length - multiplying value in the HLEN field by 4
 Length of data =total length - header length
Identification. This field is used in fragmentation.
Flags - This field is used in fragmentation
Fragmentation offset. This field is used in fragmentation
Time to live - A datagram has limited lifetime in its travel through an internet.
 This field was originally designed to hold a timestamp, which was decremented by each visited router.
 The datagram was discarded when the value became zero.
Protocol.
 8-bit field defines higher-level protocol that uses the services of the IPv4 layer.
 IPv4 datagram can encapsulate data from several higher-level protocols such as TCP, UDP, ICMP, and IGMP.
 This field specifies final destination protocol to which the IPv4 datagram is delivered.

34
Checksum.
Source address.
 This 32-bit field defines the IPv4 address of the source.
 This field must remain unchanged during the time the IPv4 datagram travels from the source host to destination host.
Destination address.
 This 32-bit field defines the IPv4 address of the destination.
 This field must remain unchanged during the time the IPv4 datagram travels from source host to the destination host.
Fragmentation
 A datagram can travel through different networks.
 Each router decapsulates the IPv4 datagram from frame it receives, processes it.
 Encapsulates it in another frame.
 The format and size of received frame depend on protocol used by physical network through which frame has just
travelled

35
Session Handler Details
(Dr. L.RAJA)
P/ECE
[email protected]

36

You might also like