0 ratings0% found this document useful (0 votes) 397 views64 pagesIP Addressing & Subnetting Strategy
i wanna become asucceful dektop engineer,please save me god.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PPTX, PDF or read online on Scribd
Imternet Protocol Yersion4!
(Py)
& SubmeiiiNG Sitratcuy
ash
Mustafa SalamFhe Internet Protocol @
The Internet Protocol is the corner-stone of the TCP/IP
architecture. All computers in the Internet understand IP.
° The main tasks of IP are:
» The addressing of the computers, and the fragmentation of
packets.
There are two types of Internet Protocol:
° Internet Protocol version 4 (IPv4): currently used version of Internet
Protocol.
° Internet Protocol version 6 (IPv6): the upcoming replacement for IPv4. It
contains some major improvements and new features.e An IPv4 address is a 32-bit address that uniquely and
universally defines the connection of a device (for example, a
computer or a router) to the Internet.
* Connectionless protocol
+ Fragments (divides) packets where necessary
+ Addressing via 32 bit Internet addresses
e However, it contains no functions for end-to-end message
reliability or flow control. IP makes the ‘best effort’ to forward
packets to the next destination, but does not guarantee
delivery because it is connectionless._—-Conit
The IP address can be classify into two classes:
> Public address:
This address considered as any valid address assigned to any
user, and the organization who is responsible for registering IP
ranges called Internet Service Providers (ISPs), and this address
will be unique.
» Private Address:
Any number or address assigned to a device on a private TCP/IP
Local Area Network that is accessible only within the Local Area
Network._ Internet-Pr S eet
ae :
~~ SIPP (Simple Internet Protocol Plus)
+ Maintains good features of IPv4, discards bad ones.
* Not compatible with IPv4
* Compatible with all other Internet protocols including
TCP, UDP, ICMP, DNS, ete.
+ Main features:
— Long addresses (128 bits) > supports billions of hosts.
— Simplified, fixed size header > routers can process packets faster.
— Support for authentication and privacy
— Better support for type of service.resses
Each network interface connected to the Internet has a unique
address consisting of two parts:
» Network address, address of the network within the Internet
(used by gateways for routing IP packets between networks).
» Host address, address of the computer within the network
(used for delivering packets to a particular network interface
within the network).\
The 32-bit IP address is separated into four 8-bit octets, allowing
each octet to have a value ranging from 0 to 255.
Furthermore, the IP address is logically separated into two distinct
components: the network ID and the host ID. The network ID is used
to identify the subnet upon which the host resides. The host ID is
used to identify the host itself within the given subnet.
IP addresses can be displayed in three typical formats:
Binary notation Binary notation is the format that systems on the
network use to process the address. An example of binary notation is
11000000.10101000.00000001.01100100.
Hexadecimal notation Hexadecimal notation is the format typically
used when identifying IPv6 addresses. An example of hexadecimal
notation of an IPv4 address is C0.A8.01.64Dotted-decimal notation Dotted-decimal notation is the format that is
typically used for displaying the IP address in a human-readable format. An
example of dotted-decimal notation is 192.168.1.100
32-Bit IP Address
Octet 1
20 + 328 ois] 4 one
102.168.1.5
Dotted Decimal Address:
Figure 3: Structure of IP Addresssses of IP addresses
° Different networks have different sizes. Basically, there are many small
networks and few large networks.
* To provide efficient use of 32-bit address space, IPv4 defined several
address classes and associated address formats:
» Class A: allows 128 networks, 16 million hosts each.
The IP address start from 1.0.0.0 to 127.255.255.255, and the mask address is
255.0.0.0
» Class B: allows 16,382 networks, 65,534 hosts each.
The IP address start from 128.0.0.0 to 191.255.255.255, and the mask address
is 255.255.0.0es of IP addresses —
» Class C: allows 2 million networks, 254 hosts each.
The IP address start from 192.0.0.0 to 223.255.255.255, and the
mask address is 255.255.255.0
» Class D: multicast networks The IP address start from
224.0.0.0 to 239.255.255.255.
» Class E: reserved for future use. From 240 to 255 and the
255.255.255.255 used for broadcast to all the subnet.° One of the benefits of classful addresses is that they provide a hierarchy to
the network through the use of the network ID. This translates into an
efficient routing environment because it is easy for a router to determine
what networks can be grouped together and treated as a single routing entry.
» bol
ce | 110
Network
Host
D | 1110 Multicast address.
E ] 11110 |
Reserved for future use
128.0.0.0 to
191,255,255.255,
192.0.0.0 to
223.255.255.255
224.0.00 to
239,255,255.255
240.0.0.0 to
247.255.255.255ee
_ Strategies to Conserve Addresses
° Several strategies have been developed and implemented to
help the Internet community on how provides a good managing
of IP addresses. These strategies help reduce the load on
Internet routers and help administrators use globally unique IP
addresses more efficiently. There are two common strategies,
which are:
° Private Addressing
© Classless Inter-Domain Routing (CIDR)-rivati
Less
It means If the internetwork is limited to one organization, the IP addresses
need only be unique within that organization. Only networks that interface
with public networks such as the Internet need public addresses. Using
public addresses on the outside and private addresses for inside networks is
very effective.
Private Addresses:-
RFC1918 designates three ranges of IP addresses as private:
10.0.0.0 through 10.255.255.255
172.16.0.0 through 172.31.255.255
192.168.0.0 through 192.168.255.255
Number of
Address Block Classful Equivalent Prefix Length Addresses
70.0.0.0-10.255.255.255 7 Class A 7% 16,777,216
256 Class B
65,536 Class C
172.16.0.0-172.31.255.255 16 Class B nz 1,048,576
4,096 Class C
192.168.0.0-192.168.255.255 1 Class B ne 65,536
256 Class ©Private Addresses Used in Networks without NAT
172.16.0.0
Private Net
192.168.1.0LS
~e There are two ways to convert the private address to public address:
!. Network Address Translation (NAT).
This technique has been used to convert the private address to public address,
the NAT allowing us to access the internet and get services. The basic idea, is
that technique used pool of public addresses and assign for each private
address one public add: Thus, this way is inefficient due to the fact that
there are cost and delay associated with this operation. The table and the figure
below show how the NAT make the mapping.
etn
200.
Source: 2002458
Cu >
Destination: 2002458Cont: —
2. Port Address Translation (PAT).
It’s another technique used to convert the private address to public. During
PAT, each computer on LAN is translated to the same IP address (public), but
with a different port number assignment. This way is much better than the NAT
because we can use one public address to translate any private address, therefore
we saved the cost. The table below shows the process of the PAT
etree ne) eC nts
192.68.1.3 50133
© The port address will be any random number in the allowed range, that the
device created it when wants to access the internet.
© The packet will contain the port number that assign to the device that wants to
access the internet and through this port number, the router when get the
response message will translate it and make map this message to it is private
address based on the port number.—Addressing without Subnets
e If we have a class B with a Flat Network, the number of host will be more
than 2!°=65536 hosts,
So the problem is here, that managing this network with this number of host
is too tricky and the performance of this network will get down because of
the heavy load. In other word, any single broadcast can slowdown the
network.
Therefore, the solution is the subnetting. Subnetting means divide or
separate the single network into multiple networks that can reduce the
loading from one network.
© The advantage of using subnetting is:
1. Reduce the traffic and the increase the performance.
2. The smaller network can easier to manage.e As the number of distinct local networks grows, managing
them become a serious headache. Every time a new network is
installed the system administrator must contact NIC to get a
new network number.
© The solution to the problem is to allow a network to be split
into several independent parts for internal use but still act like a
single network to the outside world. In the internet literature
these parts are called subnets.e A mask is a 32-bit binary number that is expressed in dotted decimal
notation. By default, a mask contains two fields, the network field and the
host field. These correspond to the network number and the locally
administered part of the network address. When an administrator
subnets, they are adjusting the way they view the IP address. Table 1:
Default masks for classful addressing
Address Dotted Decimal
arse USS idesegaa ibis aed
Class A |11111111 00000000 00000000 00000000 | 255.0.0.0
Class B | 11111111 11111111 00000000 00000000 | 256.255.0.0
Class C | 11111114 11111111 11111111 00000000 | 255.255.255.0» Routers and hosts still assume class subnet masks by default:
255.0.0.0
255.255.0.0
255.255.255.0
The first three octets represent the network part and the last octet represent the
Class A ri)
Class B ‘6
Class C 124
The figure below gives an example to class C mask address:
192. 168. 2A% 17
11000000 | 10101000 | 00010101 00010001
t t
octet octet octet octet
network part host part
Prefix /24 Subnet mask:
255. 255. 255. oO
44441114 44441114 44444114 00000000
host part.There three important things that should be taken into our account when we
thinking about subnetting:-
|. Network address — the first one
2. Broadcast address — the last one
3. Host addresses — everything in between
As well as, to find the number of hosts per subnet. We can use formal 2* -2,
where (x) is the number of unmasked bits (0’s) .© For example, in 11000000, the number of zeros gives us 2° — 2 =62 hosts. In
this example, there are 62 hosts per subnet and we make subtract because
the first IP address reserve for the network address and the last one for the
network broadcast.
© While when we want to find number of networks, we can use this formal 2”
Where Y represent the number of masked bits, (1’s). For example, in
11000000, the number of ones gives us 2? =4TESSES==
__ Reserve
In any subnet, there are certain addresses that cannot be assigned
to an individual device because they have a special purpose. The
subnet address is the first address in a range that identifies the
subnet. The broadcast address is the last address in the range, and
all hosts on the subnet receive traffic if anything is sent to it.
e Assume that a subnet address is 172.31.9.0 with a mask of
255.255.255.0. The subnet address is 172.31.9.0, and the
broadcast address is 172.31.9.255,Classless Inter-Domain Routing (cll : RY—
Classless Inter Domain Routing (CIDR) is a method for
assigning IP addresses without using the standard IP address
classes like Class A, Class B or Class C. In CIDR , an IP
address is represented as A.B.C.D /n, where "/n" is called the
IP prefix or network prefix. The IP prefix identifies the number
of significant bits used to identify a network.
Example, 192.9.205.22 /18 means, the first 18 bits are used to
represent the network and the remaining 14 bits are used to
identify hosts.> It’s basically the method that ISPs (Internet Service Providers) use to
allocate an amount of addresses to a company, a home—a customer.
They provide addresses in a certain block size
» When you receive a block of addresses from an ISP, what you get will
look something like this: 192.168.10.32/28. This is telling you what your
subnet mask is. The slash notation (/) means how many bits are turned on
(Is).
> The Class A default subnet mask, which is 255.0.0.0. This means that the
first byte of the subnet mask is all ones (1s), or L111 1111. When referring
to a slash notation, you need to count all the Is bits to figure out your mask.
The 255.0.0.0 is considered a /8 because it has 8 bits that are 1s—that is, 8
bits that are turned onv Ina Class C address, only 8 bits are available for defining the hosts
Y that subnet bits start at the left and go to the right without skipping
bits. This means that the only Class C subnet masks can be the
following:
Decimal CIOR
128 Rs
192 26
224 Rr
11110000 = 240 pe
12111000 = 248 pe
11111100 = 252 730
The Fast Way Method: Subnetting a Class C Address
start by using the second subnet mask available with a Class C address, which
borrows 2 bits for subnetting 192 = 11000000.
The Is represent the subnet bits, and the 0’s represent the host bits available in
each subnet. 192 provides 2 bits for subnetting and 6 bits for defining the hosts in
each subnet.Example 255.255.255.192 (/26)
Let’s use the Class C subnet mask from the preceding example, 255.255.255.192, to see how
much simpler this method is than writing out the binary numbers. We're going to subnet the net-
work address 192.168.10.0 and subnet mask 255.255.255.192.
192.168.10.0 = Network address
00000000 = 0
01000000 = 64 255.255.255.192 = Subnet mask
fee Now, let's answer the big five:
* How many subnets? Since 192 is 2 bits on (11000000), the answer would be 22,
* How many hosts per subnet? We have 6 host bits off (11000000), so the equation would
be 26—2 = 62 hosts.
© What are the valid subnets? 256 - 192 = 64. Remember, we start at zero and count in our
block size, so our subnets are 0, 64, 128, and 192.Example 256.255.255.224 (/27)
Thste, wel subnet the nework adress 192.168, 100 and subnet mask 95.55.58.
192.168.10.0= Network adress
255.255.255.204 = Subnet mask
* How many subnets? 24 is 1110000, so our equation would be 2! = 8,
+ How many hosts? 2'~ = 30.
+ What are the valid subnets? 256 ~ 224 = 32, We just start at zero and count to the subnet
ansk vale in blocks increments of 32:0, 32, 64 96,128, 160, 192, 224ee
Class B subnet masks first. Notice that we have a lot more possible
subnet masks than we do with a Class C network
255.255.128.0 (/17) 255.255.255.0 (/24)
255.255.192.0 (/18) 255.255.255.128 (/25)
255.255.224.0 (/19) 255.255.255.192 (/26)
255.255.240.0 (/20) 255.255.255.224 (/27)
255.255.248.0 (/21) 255.255.255.240 (/28)
255.255.252.0 (/22) 255.255.255.248 (/29)
255.255.254.0 (/23) 255.255.255.252 (/30)
We know the Class B network address has 16 bits available for host
addressing. This means we can use up to 14 bits for subnetting
(because we have to leave at least 2 bits for host addressing).
The process of subnetting a Class B network is pretty much the same
as it is for a Class C, except that you just have more host bits. Use
the same subnet numbers for the third octet with Class B that you
used for the fourth octet with Class C, but add a zero to the network
portionExample 255.255.192.0 (/18)
172.16.0.0 = Network address
255.255.192.0 = Subnet mask
+ Subnets? 2 = 4,
+ Hosts? 2-2 = 16,382 (6 bits in the third octet, and 8 in the fourth).
+ Valid subnets? 256 ~ 192 = 64. 0, 64, 128, 192. Remember the subnetting is performed
in the third octet, so the subnet numbers are really 0.0, 64.0, 128.0, and 192.0, as
shown in the next table.
Subnet 0.0 64.0 128.0 192.0
First host on ol 128.1 192.1
Last host 63.254 127.254 191.254 255.254Class A subnetting is not performed any differently from Classes B and
C, but there are 24 bits to play with instead of the 16 in a Class B
address and the 8 in a Class C address. Let’s start by listing all the
Class A subnets.
255.128.0.0 (/9) 255.255.240.0 (/20)
255.192.0.0 (/10) 255.255.248.0 (/21)
255.224.0.0 (/11) 255.255.252.0 (/22)
255.240.0.0 (/12) 255.255.254.0 (/23)
255.248.0.0 (/13) 255.255.255.0 (/24)
255.252.0.0 (/14) 255.255.255.128 (/25)
255.254.0.0 (/15) 255.255.255.192 (/26)
255.255.0.0 (/16) 255.255.255.224 (/27)
255.255.128.0 (/17) 255.255.255.240 (/28)
255.255.192.0 (/18) 255.255.255.248 (/29)
255.255.224.0 (/19) 255.255.255.252 (/30)
You must leave at least 2 bits for defining hosts. And I hope you can see
the pattern by now. Remember, we’re going to do this the same way as a
Class B or C subnet.Example 255.255.240.0 (/20)
255.255.240.0 gives us 12 bits of subnetting and leaves us 12 bits for host addressing,
© Subnets? 2 = 4096,
© Hosts? 22-2 = 4094,
* Valid subnets? 256-240 = 16. The subnets in the second octet are a block size of 1 and the
subnets in the third octet are 0, 16, 32, etc.
The following table shows some examples of the host ranges—the first three and the
last subnets:
Subnet 10.0.0.0 10.0.16.0 —10.0.32.0 ..—-10.255.240.0
First host 10.0.0.1 10.0.16.1 10.0.32.1 ve 10,255.240.1
Last host 10.0.15.254 10.0.31.254 10.0.47.254... 110.255.255.254a
» To overcome address depletion and give more organizations access to the
Internet, classless addressing was designed and implemented. In this
scheme, there are no classes, but the addresses are still granted in blocks
>» In classless addressing, when an entity, small or large, needs to be connected
to the Internet, it is granted a block (range) of addresses. The size of the block
(the number of addresses) varies based on the nature and_ size of the entity.
For example, a household may be given only two addresses; a large
organization may be given thousands of addresses. An ISP, as the Internet
service provider, may be given thousands or hundreds of thousands based on the
number of customers it may serve
The addresses in a block must be contiguous, one after another
»The number of addresses in a block must be a power of 2 (2,4,8..)
» The first address must be evenly divisible by the number of addressesBlock Block
rust of 205.163732 3
205163733 3
2
Last —>| 205.16.37.47
a Decimal b.Binary
We can see that the restrictions are applied to this block. The addresses
are contiguous. The number 2 of addresses is a power of 4 =16, and the
first address is divisible by 16. The first address, when converted to a
decimal number, is 3,440,387,360, which when divided by 16 results in
215,024,210To convert a binary number to decimal, we use the
weights .We multiply each symbol byits weight and add
all the weighted results. Figure bellow show how we can
change binary 100moto its decimalequivalent78.
6432 16 8 4 2 1 Weights
4 0 0 8 4 2 Q Weighted results
8 Decimal number
a. Binary to decimal* In IPv4 addressing, a block of addresses can be defined as
x.y.z.t/n in which x.y.z.t defines one of the addresses and
the /n defines the mask.
¢ The first address in the block can be found by setting the
rightmost 32 — n bits to Os
¢ The last address in the block can be found by setting the
rightmost 32 — n bits to 1s
¢ The number of addresses in the block can be found by
using the formula 272—
¢ Example: 205.16.37.39/28
— The binary representation is 1100110 00010000 00100101
00100111
— If we set 32 — 28 rightmost bits to 0, we get 11001101
00010000 00100101 00100000
> 205.16.37.32 (First address)
— If we set 32 — 28 rightmost bits to 1, we get 11001101
00010000 00100101 OO101111
> 205.16.37.47 (Last address)
— The value of n is 28, which means that number of addresses
is 232-8or 16Another way to find the first address, the last address, and the number of
addresses is to represent the mask as a 32-bit binary (or 8-digit hexadecimal)
number. This is particularly useful when we are writing a program to find these
pieces of information.
Example 205.16.37.39/28 can be representedas II11I111 11111111 1111111
11110000 (twenty-eight 1’s and four 0’s). Find
a. The first address
b. The last address
c. The number of addressesolution
a. The first address can be found by ANDing the given addresses with the mask. ANDing here is
done bit by bit. The result of ANDing 2 bits is | ifboth bits are Is; the result is 0 otherwise.
Address: 11001101 00010000 00100101 do100111
Mask: WILL PELLETI TIML1ET 11110000
First address: 11001101 00010000 0100101 00100000
b. The last address can be found by ORing the given addresses with the complement of the
mask. ORing here is done bit by bit. The result of ORing 2 bits is 0 if both bits are Os; the
result is 1 otherwise. The complement of a number is found by changing each | to 0 and
each 0 to 1.
Address: 11001101 00010000 oo100101 Go100111
Mask complement: 00000000 00000000 00000000 00001111
Last address: 11001101 00010000 00/00/01 00101111
© The number of addresses can be found by complementing the mask, interpreting it as a
decimal number, and adding. 1 to it,
Mask complement: 000000000 00000000 00000000 00001111
Number of addresses; 15 + 1=16_ Network Add
A very important concept in IP addressing is the network address. When
an organization is given a block of addresses, the organization is free to allocate
the addresses to the devices that need to be connected to the Internet. The first
address in the class, however, is normally (not always) treated as a special address.
The first address is called the network address and defines the organization
network, It defines the organization itself to the rest of the world.
As well as, we will see that the first address is the one that is used by routers to
direct the message sent to the organization from the outside the organization
network is connected to the Internet via a router. The router has two addres
One belongs to the granted block; the other belongs to the network that is at the
other side of the router. We call the second address x.y.z.t/n because we do not
know anything about the network it is connected to at the other side. All messages
destined for addres in the organization block (205.16.37.32 to 205.16.37.47)
are sent, directly or indirectly, to x.y.z./n. We say directly or indirectly because we
do not know the structure of the network to which the other side of the router is
connected208,16.37.32 to 205.16.37.47
are routed to xy.2.Un
1205.16.37.33/28 205,16.37.34/28 205.16.37.39/28
, ff
a= 5
j Network address: 205.16.37.32/28
205.16.37.40/28» An IP address can define only two levels of hierarchy when not subnetted. The
nleft- most bits of the address x.y.z.tJn define the network (organization network);
the 32-n
»Rightmost bits define the particular host (computer or router) to the network.
The two common terms are prefix and suffix. The part of the address that defines the
network is called the prefix—three-Levels of Hierarchy: Subnetting
An organization that is granted a large block of addresses may want to create
clusters of networks (called subnets) and divide the addresses between the
different subnets. The rest of the world still sees the organization as one entity.
However, internally there are several subnets. All messages are sent to the
router address that connects the organization to the rest of the Internet; the router
routes the message to the appropriate subnets.
The organization, however, needs to create small sub-blocks of addresses,
each assigned to specific subnets. The organization has its own mask; each
subnet must also has its ownA network with two levels of
hierarchy (not subnetted)
141.14.0.1 141,14.0.2 141,14.192.2 141,14.255.254 141.14,255.254
a ga g g a
zi 2 a
Network: 141.14.0. 141.14.201.4
RI
To the rest of
the Internet
The network above (network 141.14.0.0) uses class B addressing, it has
therefore 254x254 = 64516 hosts.
ALAN with 64516 hosts is too big. An additional level of hierarchy is
required in order to brake the large number of hosts into several smaller
groups. For example, we can brake the hosts into four groups (subnets):
Subnet 141.14.0.0 has hosts 141.14.0.1
Subnet 141.14.64.0 has hosts 141.14.64.1
Subnet 141.14.128.0 has hosts 141.14.128.1 ... 141.14.191.254
Subnet 141.14.192.0 has hosts 141.14.192.1 ... 141.14.255.254A network with three levels of
hierarchy (subnetted)
M1601 MEMO? MLAS bet Mb MAL IAI27 24
a a eee a Sh see z
Taneaee
Su
MAL 14N2R1 1441 2Re s NAL 14201256
a ch ase a)
Subnet
M114 1280
RI
site: 1411400 Sj
To the rest of
the Interneteee zz
Example 1
IP address: 130.45.34.56
Mask: 255.255.240.0 What is the subnet address?
IP = 10000010 00101101 00100010 00111000
M= 11111111 11111111 11110000 00000000
&& = 10000010 00101101 00100000 00000000
130 45 32 0
The subnetwork address is 130.45.32.0.Finding the subnetwork address
Straight Method
Convert IP address into binary form,
AND with the mask,
convert to dot-decimal form
Short-Cut Method:
If the byte in the mask is 255, copy the byte in the
address.
If the byte in the mask is 0, replace the byte in the
address with 0.
If the byte in the mask is neither 255 nor 0, write the
mask and the address in binary and apply the AND
operation (as above).|
IP = 19.30.80.5
M = 255.255.192.0 What is the subnet address?
IP Address
19— « 30 — . . 5
Mask
19 <4
Subnet Address J
84 Oot Sah 2 2B
192 110000 0 0
64 o 10000 0 0A company is granted the site
address 201.70.64.0 (class C). The
company needs six subnets. Design
the subnets. Istsabnet
Add
+ The number of Is in the default mask is 24
(class C).
+ The company needs six subnets. This number 6
is not a power of 2. The next number that is a
power of 2 is 8 (2). Wenced 3 more Is in the Juin Mall
subnet mask. The total number of Is in the
subnet mask is 27 (24 + 3). ‘
+ The total number of Os is 5 (32 - 27). The mask ’
is ‘
ULDITET D111 1111 11111111 11100000 or
258.255.255.224
+ The number of subnets is 8.
+ The number of addresses in each subnet is 25 ihatnet
(5 is the number of Os) or 32,nple 4
An organization has purchased the Class C Address 216.21.5.0 and would like
to use it to address the following 5 networks.IP: 216.21.5.0
Subnet Mask: 255.255.255.0
‘Networks number = 5
First: Convert the number of networks to binary.
5 = 00000101
[abies
Second: Reserve bits in subnet mask and find your increment
Subnet Mask: 255.255.255.0 = 11111111.11111111.11111111.00000000
10111911.11111111.11111111.
(2S) =30) Hosts number
No. of the hosts= Gijeu=ber of 0% 2
‘The increment value:-
Bit Values ina Octet: 128 64 32 16 8
11 £00
Qa
0 © so our increment value is 32
Lowest incrementing value° Third: Use increment to find the network ranges.
| 216.21.5.0
216.21.5.32
216.21.5.64
EM 216.21.5.96
= 216.21.5.128
216.21.5.160
216.21.5.192
GO 216215.224
216.21.5.1
216.21.5.33
216.21.5.65
216.21.5.97
216.21.5.129
216.21.5.161
216.21.5.193
216.21.5,225
PERC
216.21.5.30
216.21.5.62
216.21.5.94
216.21.5.126
216.21.5.158
216.21.5.190
216.21.5.222
216.21.5.254
rene
216.21.5.31
216.21.5.63
216.21.5.95
216.21.5.127
216.21.5.159
216.21.5.191
216.21.5.223
216.21.5.255216.21.5.1--30 216.21.5.129--158
216.21.5.97--126
216.21.5.65--942 Example 5
A company is granted the site
address 181.56.0.0 (class B). The
company needs 1000 subnets.
Design the subnets.
+ The company needs 1000 subnets. This
number is not a power of 2. The next number
that is a power of 2 is 1024 (2!), We need 10
more Is in the subnet mask.
+ The total number of Is in the subnet mask is 26
(16 + 10).
* The total number of Os is 6 (32 - 26). The mask
is
TEELLEAL TELLEL11 ELL11111 11000000 or
255.255.255.192
+ The number of subnets is 1024.
+ The number of addresses in each subnet is 2°
(6 is the number of 0s) or 64.
Isshnet .
sb |
Hasclasc sab |
5
E
124th subnetExample 6
eet
What is the network address if one of the addresses is
167.199.170.82/27?
The prefix length is 27, which means that we must keep the first 27
bits as is and change the remaining bits (5) to 0s. The 5 bits affect
only the last byte. The last byte is 01010010. Changing the last 5 bits
to Os, we get 01000000 or 64. The network address is
167.199.170.64/27.- Example 7 On soe : ed
ee
An ISP is granted a block of addresses starting with
190.100,0.0/16. The ISP needs to distribute these addresses to three
groups of customers as follows:
1. The first group has 64 customers; each needs 256 addresses.
2. The second group has 128 customers; each needs 128 addresses,
3. The third group has 128 customers; each needs 64 addresses.
Design the subblocks and give the slash notation for each subblock.
Find out how many addresses are still available after these
allocations.Group 1
For this group, each customer needs 256 addresses. This means the
suffix length is 8 (28 = 256). The prefix length is then 32 - 8 = 24.
O1: 190.100.0.0/24 > 190.100.0.255/24
02: 190.100.1.0/24 > 190.100.1.255/24
64: 190.100.63.0/24 > 190.100.63.255/24
Total = 64 x 256 = 16,384Group 2
For this group, each customer needs 128 addresses. This means the
suffix length is 7 (27 = 128). The prefix length is then 32 - 7 = 25,
The addresses are:
O01: 190.100.64.0/25 > 190.100.64.127/25
002: 190.100.64.128/25 > 190.100.64.255/25
128: 90.100.127.128/25 > 190.100.127.255/25
Total = 128 x 128 = 16,384Group 3
For this group, each customer needs 64 addresses. This means the
suffix length is 6 (2° = 64). The prefix length is then 32 — 6 = 26.
001:190.100.128.0/26 > 190.100.128.63/26
002:190.100.128.64/26 > 190.100.128.127/26
128:190.100.159.192/26 > 190.100.159.255/26
Total = 128 x 64 = 8,192
Number of granted address : 65,534
Number of allocated address : 40,960
Number of available address : 24,574An organization has purchased the Class C Address 195.5.20.0 and would to
create networks of 50 hosts each.
IP: 195.5.20.0
Subnet Mask: 255.255.255.0
Hosts number = 50
First: Convert the number of Hosts to binary.
29- o —
6 bits
Second: Reserve bits in subnet mask and find your increment.
subnet Mask: 255.255.255.0 = 11111111.11111111.11111111.00000000
0000220-21121711.11111111 OOOO
[Increment > ] Networks
‘Hosts number
Or
Bit Values ina Octet: 128 64 32 16 8 4.21
1 40 00000
TLewant incrementing valueee
© Third: Use increment to find the network ranges.
ty aera
EU asy
1 195.5.20.0 195.5.20.1
p 195.5.20.64 — 195.5.20.65
195.5.20.128 195.5.20.129
195.5.20.193
B | 195.5.20.192
Last valid Broadcast
er Bln
195.5.20.62 195.5.20.63
195.5.20.126 — 195.5.20.127
195.5.20.190 — 195.5.20.191
195.5.20.254 — 195.5.20.255° Example: An organization has purchased the Class A Address 10.0.0.0 and
would to create networks of 100 hosts each.
EP: 10.0.0.0
Subnet Mask: 255.
Hosts number = 100
First: Convert the number of Hosts to binay
1100 = oX:100160
=.
7 bite
Second: Reserve bits in subnet mask and find your increment.
Subnet Mask: 255.0.0.0 — 11111111.00000000.00000000.00000000
ganna
— 27 bees
(Oincrement > —EEEGSREEEE | Networks
L2ASR2SS 126) Hosts number
or
Bit Values in a Octet 128 64 32 16 8 4.21
1,0 0 0 0000
Lowest incrementing value10.0.
10.0.
10.0.0.128
1.0
1.128
aoa Td
address
10.0.0.1
10.0.0.129
10.0.1.1
10.0.1.129
ber
Brat)
10.0.0.126
10.0.0.254
10.0.1.126
10.0.1.254
eens
Piney
10.0.0.127
10.0.0.255
10.0.1.127
10.0.1.255Thank you for your attention