PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

Size: px
Start display at page:

Download "PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R"

Transcription

1 PUCPR Internet Protocol ClassFul and Classless Address Model Edgard Jamhour 2014 E N G L I S H S E M E S T E R

2 1. Internet Topology The IP protocol defines a network architecture formed by the interconnection of physical networks. In the IP topology, the physical network is usually an Ethernet network (LAN), formed by Hubs or Switches. As we will see later in the course, nowadays, this concept is a bit more complex due to the introduction of private addressing. But in this chapter, we will consider that all IP addresses are unique (public). Routers are used to interconnect the physical networks together. They offer multiple paths for interconnecting physical networks. The path is chosen according to information previously configured on the routers, called "routing tables". The routing tables for each router indicate how it should forward a packet so that it reaches a certain physical destination network. On the Internet, the routing tables are populated automatically through standard routing protocols such as BGP (Border Gateway Protocol) and OSPF (Open Shortest Path First).

3 2. Dotted Decimal Notation The IPv4 (Internet Protocol version 4) currently used on the Internet, defines 32-bit addresses. The 32-bit addresses correspond to four octets (bytes). In dotted decimal notation, each octet is represented by a decimal number, calculated as if each octet was independent of the others. The figure shows the representation of the IP address An IP address identifies a computer, but also identifies which network the computer belongs. In fact, the most significant part of the IP address matches the network (or prefix) identifier, and the least significant part the host identifier. The exact amount of bits corresponding to the network identifier is variable. Currently, there are two strategies to determine the size of this identifier: The classful addressing model: The network identifier (prefix) is determined by the value of the IP address and cannot be changed. The classless addressing model: The network identifier (prefix) is independent of the value of IP and is determined by another number, called subnet mask.

4 3. IP Addresses IP Address: Network ID (Prefix) + Host ID In an IP network, the assignment of IP addresses is directly related to the network topology. Regardless of the strategy used to determine the size of the network identifier, the IP address assigned to any host in the network must obey the following rules: RULE 1: Host and network equipment interfaces on the same physical network (LAN) must have the same network identifier. RULE 2: Different physical networks must have different network identifiers. Please, observe that the subnet term, frequently used in IP networks, is commonly used as a synonym for LAN or physical network. There is an implicit behavior of host and routers that is based on these rules. When an IP address is assigned to the interface of a host or a router, it is assumed that all other IPs in the same subnet can be accessed directly, i.e., the corresponding device is connected in the same LAN. This approach significantly simplifies the process of configuring the routing tables. It is possible to configure a network without respecting the rules above. However, such a practice would be very unsuitable because it would lead to an unnecessary increase in the complexity of the routing tables of host and routers.

5 4. Classful IP Addressing (The OLD METHOD) The old method used to determine the size of the network identifier was based on the table shown in the figure above. The method divided the IP address space into four classes, called A, B, C and D. Classes A, B and C are unicast addresses, i.e., they are used to assign addresses to individual hosts. When the destination address of a packet is unicast type, just one computer across the network should receive it. Class D is multicast addresses, which is used to assign addresses for groups of computers. When the destination address of a packet is multicast type, it can be received by multiple computers or network devices that share the same address. Only classes A through C have the concept of the network identifier. In this case, the size of the identifier is defined for each class. In class A the identifier has eight bits (one byte). In class B, 16 bits (two bytes) and class C bits, 24 bits (three bytes). To determine which class an address belongs to it is necessary to examine the first bits of the address, as shown in the table. A simple method to identify the class of an IP address is to use the concept of addresses range. For example, an address where the first byte is between 1 and 127 is a class A (for example, ). An address where the first octet is between 128 and 191 is a class B (e.g., ), and so on (see the table).

6 5. Prefix Size Interpretation The classful address model scheme was created in an era where the Internet network was very small. As we are going to see, having only three classes leads to a huge waste of addresses. A Class A subnet is a physical network with 16 million addresses. Considering network technologies currently used, this number does not make much sense. Early in the history of IP network, however, it was believed that the Internet would be formed by a small number of physical networks. It was very desirable to limit the size of the routing tables, as routers in the beginning of the 80`s had very limited processing and memory capacities. In the original design, the Internet network could interconnect larger networks of different technologies, which do not necessarily follow the philosophy of LANs. Initially, B classes were the most used to assign IP addresses to networks that connect to the Internet. Around 1992, however, half of the available B classes had already been used, and the prefixes of C classes began to be used. The problem with this allocation strategy is that the number of prefixes for B classes is very limited (16384 prefixes). In addition, when a class B is assigned to an organization with 10,000 computers, for example, the remaining 55,000 addresses are lost. The classful model was defined to simplify the hardware deployment, however this approach does not permit to define networks with intermediate sizes between the tree classes.

7 6. Address Assignment The figure shows an example of address allocation using C classes. In the example, two LANs (or subnets) were connected: the subnet and the subnet Because the prefix is a C class, it contains the address range from to The first and last address these prefix range cannot be used as unicast addresses (the first is used to identify the network and the last one is the broadcast address to all hosts in the subnet). Similarly, the subnet defines the address range from to Note that the router has two IP addresses, one for each of its interfaces. Each router interface belongs to the subnet it is connected and must have an address within the range of the subnet. The router address can be any address in the subnet. A good practice, however, is to assign the first valid address of the subnet to the router. Before a computer could send a packet to another computer, it must decide if the destination address is in the same network or not. If not, it sends the packet to a network router. To make this decision, the computer checks if the destination address is included in the address range defined by its own subnet.

8 7. Limitations of the Classful Address Model The classful IP addressing scheme implies a waste of addresses. The most widely used class until the early 90 s was the B class. However, when the amount of available prefixes in this class began to decline dramatically with the growth of the Internet, the class C prefixes began to be used. To illustrate how the use of class B addresses implies in a huge waste of addresses and the use of C classes was also harmful, consider the scenario above. Imagine that you need to connect two networks of different sizes, one with 2000 and other with 200 computers using the IP technology. The first step is to choose a network identifier for each of the subnets. For the subnet with two hundred computers, a class C prefix is sufficient. The network needs 200 addresses for computers and one address to the internal interface of the router. A class C has 254 valid unicast addresses. The remaining 53 addresses are lost because they cannot be allocated to any other network. For the network with 2000 computers, the waste tends to be higher. There are two possible solutions for this network. One possible solution is to use a class B prefix (in this case the loss of addresses would be in the order of 63534). A second possible solution is to use eight class C prefixes. In this case, only 32 addresses are lost, but it will cause a degradation in the network performance, as it will be discussed in the next section.

9 8. Number of Prefixes and Network Topology The figure illustrates the two options to choose the prefix classes for the subnet with 2000 computers (Organization A). The option of using a class B prefix, as indicated in the figure on the right is the simplest. Using a class B prefix implies that addresses are lost. That is, they are reserved for the use of Organization A in a future expansion. The figure on the left side illustrates the option of using eight class C prefixes. The problem of adopting this option is that the Organization A would be divided into several subnets. It requires a router with multiple interfaces or multiple routers to connect all the subnets together. In other works, this option implies a trouble to the network administrator, as he needs to adapt the topology of the network to the prefix size. The most important problem is that the number of entries in the routing table of other Internet routers would be unnecessarily higher. While just one entry would be enough to represent the network using a class B prefix, eight table entries are needed to represent the same network with a class C prefix. That was the reason for using only class B prefixes in the beginning of the Internet.

10 9. Classless IP Addressing The way the prefix length of an IP address is determined has changed in 1993, when a new addressing scheme called CIDR (Classless Inter-Domain Routing) was introduced. This new strategy permits to define prefixes of any size, by introducing the concept of subnet mask. The subnet mask is a number that follows an IP address, and indicates which part of the IP address is interpreted as a network prefix. In its most general form, subnet mask is a 32-bit number written in decimal dotted notation. In a more compact form, the subnet mask is just an integer number that indicates how many bits of the IP address should be used as the network prefix. These forms of representation will be discussed later in this chapter. The concept of subnet mask is also referred in the literature as VLSM (Variable Length Subnet Masking). This term is used to distinguish from the classful addressing scheme, where the subnets masks are fixed. The subnet masks for the A, B and C classes are now referred as default masks (as they can be changed), and are defined as follows: Class A: mask or /8 (prefix of 8 bits) Class B: mask or /16 (prefix of 16 bits) Class C: mask or /24 (prefix of 24 bits)

11 10. Subnet Mask 1 bit in the mask indicates that the corresponding IP bit is a prefix. In its most general form, the subnet mask is a 32-bit number, represented in dotted decimal notation, similar to the IP format. As its name implies, this number serves as a mask for the IP, in the sense that if we perform a logical "AND" bit-by-bit operation between an IP address and its mask, we obtain as a result the network prefix of the IP address. For this purpose, the subnet mask adopts the following principle: if a bit in the subnet mask is 1, then the corresponding bit in the IP address belongs to the network prefix. If a bit in the subnet mask is 0, then the corresponding bit belongs to the host identifier. The most recommended way to use the subnet mask is to make the most significant bits of the subnet mask equal to 1 in a contiguous way (i.e., don t spread out the 1 s throughout the subnet mask). Only when this approach is followed, a subnet mask can be represented in a compact form using the "/" followed by the prefix length. Can you figure out the consequences of using a mask where the 1 bits are not contiguous, such as instead of ? The next section will help you to answer this question.

12 11. Subnetting In the IP nomenclature, a subnet corresponds to a contiguous block of addresses. These addresses should be assigned to hosts and routers interfaces in a same LAN. The "subnet name" matches the first address of this block, followed by subnet mask. For example, a class C subnet /24 defines a block of 256 addresses ranging from to The first and last addresses of a block cannot be used as "unicast" addresses. The first address is used to identify the network, and the last one is a broadcast to all addresses within the block. Using mask of different lengths allows to defined blocks of any size multiple of two. Indeed, the size of a block is given by: 2 (32 -length of the subnet mask). One way to illustrate this is to show how a class C subnet, /24 (256 addresses), can be transformed into several independent blocks of addresses. The process of dividing a block of addresses into smaller subnets is quite simple. Each time we increase the size of the mask by 1 bit, we defined two subnets with half the size of the original address block. For example, the mask /25 splits the subnet /24 into the subnets /25 and /25, each one with 128 addresses. Note that the last address of each block remains always a broadcast to the subnet.

13 12. Supernetting Masks of variable size also allow you to group subnets together into a bigger subnet. The term supernet is sometimes used to designate the block of addresses formed by the aggregation of smaller subnets. A condition for the creation of a supernet is that the blocks of addresses to be grouped must be contiguous. For example, consider the following four class C subnets: /24, /24, /24 and /24. Note that these four blocks are contiguous as the last address of a block is immediately followed by the first address of the next block. The process of grouping subnets is simple. Each time we decrement the length of a subnet mask by 1, we define a supernet that is twice the size of the original subnet. In practice, the concept of supernet is very useful to reduce the number of entries in the routing tables of the routers on the Internet. Consider, for example, the previous scenario in which we had assigned eight class C prefixes to the organization A with 2000 computers. Using the concept of supernet, all addresses belonging to the Organization A can be represented by a single prefix of size / 21.

14 13. Masks in Decimal Dotted Notation Where configuring a router or a host IP address, is common that the software interface accepts only the input of masks in decimal dotted notation. The subnet mask can be represented in dotted decimal notation, as shown above. The /25 mask corresponds to a sequence of 25 bits with value 1, followed by 7 bits of value 0. The octets of the mask that are formed only by numbers 1 get the decimal representation 255. As the last octet of the mask has only the most significant bit equal to 1, its decimal representation is 128. Therefore, a /25 subnet mask in dotted decimal notation becomes Similarly, the /26 mask has only the two most significant bits of the last byte equal to 1. Therefore, the decimal representation of the last octet is = 192. The same principle applies to smaller masks. For example, a /17 mask has two 255 octets and only the most significant bit of the third octet equal to 1. Therefore, the dotted decimal notation of a /17 mask is A /18 mask is represented by Similarly, a /9 mask is represented by , a /10 mask by and so forth. There are two important masks, which are frequently used. The /32 mask ( ) represents a single IP address. The /0 mask ( ), can only be used with the subnet /0, and represents the Internet.

15 14. Exercise of Subnet Assignment To illustrate how the CIDR strategy benefits both the user's network and the Internet routers, consider the problem of assigning IP addresses to the scenario illustrated in figure. A company wants to connect to the Internet, and it has obtained from the registration authorities of the Internet the addresses corresponding to the network prefix /24. Despite receiving a single prefix, the company needs to interconnect three subnets, one with 100 computers and two with 50 computers. The prefix /24 corresponds to a block of 256 addresses, a quantity enough to connect all computers. First, consider a division of the /24 subnet into two /25 blocks. Each /25 block has 128 addresses: /25 and /25. The first of these blocks is sufficient to supply addresses for the network with 100 computers. To fit the requirements of the subnets with 50 computers, the prefix must be divided again into two blocks with 64 addresses: /26 and /26 Our final prefix assignment is as follows: Subnet 1: /25 Subnet 2: /26 Subnet 3: /26

16 15. Solution The figure shows the assignment of IP addresses after the division into subnets. We have divided the original subnet into three network prefixes: subnet 1: /25 (128 addresses) Unicast addresses from to Subnet 3: /26 (64 addresses) Unicast addresses from to Subnet 2: /26 (64 addresses) Unicast addresses from to In all subnets, the router interface connected to subnet receives the first unicast address of subnet. The other computers receive the remaining addresses of the subnet. It is important to note that the Internet routers do not need to perceive this internal division of the company into smaller networks. Internet routers continue to see all three subnets as a single prefix /24, whose only access point is the router r1.

17 16. Special IP Addresses Can t be used as unicast addresses. Apart from class D, which should be only used for multicast addresses, there are other IP addresses that cannot be used in unicast mode, i.e., as individual computers addresses. As we have seen, regardless the length of a network prefix, the first and last addresses of a subnet are always reserved. The first address along with the subnet mask is used to identify the subnet. The last address is always a broadcast to all addresses in the subnet. The IANA (Internet Assigned Number Authority), responsible for regulating how IP addresses are used also states that all the address in the prefix /8 (i.e., to ) correspond to loopback addresses. That is, they have only local meaning for a computer, and cannot be used to route packets over the network. Try to ping any address in this range, and you will that all address will return an almost instantaneous answer. All these addresses represent the local computer where the ping command was executed. The address followed by the subnet mask represents the Internet. However, the address /32 has a different meaning. It is used by computers to report that they still do not have a valid IP address (for example, when requesting an IP address for the first time to a DHCP server). A packet with the destination address of is broadcast to all subnets, regardless of their prefix. It is a general broadcast. However, routers are configured by default to not forward these packets. That means that broadcast is restricted to the LAN.

18 Loopback = Local Communication IP packets with destination loopback address are not sent to lower layers of the TCP / IP stack, but handled locally by the station itself. Recommendation of the IETF: /8 is reserved for loopback. The loopback addresses always represent a local communication between two processes in a computer's operating system. These addresses indicate that a packet must not be encapsulated by the data link layer, but be directly forwarded to another process, as illustrated by the figure. In theory, if you do a ping to your own computer using its unicast address, the packet should go down to the link layer to be sent to the network and then be received back by the NIC and return to the upper layers. The loopback addresses eliminates this problem because introduce addresses with a special behavior. In practice, the operating systems implement a redirection of packets sent to the unicast address of the computer to the loopback, to avoid wasting resources of the network when two processes in the same computer are communicating. Even though all addresses in the /8 prefix present the same behavior, it is common to consider the address as being the loopback address.

19 17. Conclusion In this chapter we have seen that the interpretation of IP addresses defined by IANA has changed in the beginning 90`s. In the initial model, called classful addressing scheme, the length of the network prefix was determined by the first bits of the IP address itself, and only three sizes of unicast addresses were available. In the current model, called classless (also CIDR Classless Inter Domain Routing), the prefix length of an IP address is independent of its value, and is determined by another number called subnet mask. Presently, an IP address that is not followed by a subnet mask assumes a default mask corresponding to the A, B or C class that it belongs. When the IP address is followed by the subnet mask, the classes are ignored, as the subnet mask can set any prefix length to any IP address. The classless addressing scheme is also called VLSM (Variable Length Subnet Mask), due to this flexibility.

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Internetworking and IP Address

Internetworking and IP Address Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

More information

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

More information

Advanced IP Addressing

Advanced IP Addressing Advanced IP Addressing CS-765 A Aspects Of Systems Administration Spring-2005 Instructure: Jan Schauman Stevens Institute Of Technology, NJ. Prepared By: Modh, Jay A. M.S. NIS SID: 999-14-0352 Date: 05/02/2005

More information

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting Expert Reference Series of White Papers Binary and IP Address Basics of Subnetting 1-800-COURSES www.globalknowledge.com Binary and IP Address Basics of Subnetting Alan Thomas, CCNA, CCSI, Global Knowledge

More information

Internet Protocols. Addressing & Services. Updated: 9-29-2012

Internet Protocols. Addressing & Services. Updated: 9-29-2012 Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is

More information

http://computernetworkingnotes.com/ccna-study-guide/basic-of-network-addressing.html

http://computernetworkingnotes.com/ccna-study-guide/basic-of-network-addressing.html Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address. Every computer on network has an IP address that represent its location on network. Two version

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series SUBNETTING CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Chapter 19 Network Layer: Logical Addressing 19.1

Chapter 19 Network Layer: Logical Addressing 19.1 Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that

More information

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3

More information

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

More information

Lab#2: IP Addressing and Subnetting

Lab#2: IP Addressing and Subnetting IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1 Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg

More information

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe

More information

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers. Basics of IP Address Subnetting Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

More information

Type of addressing in IPv4

Type of addressing in IPv4 Type of addressing in IPv4 Within the address range of each IPv4 network, we have three types of addresses: Network address - The address by which we refer to the network Broadcast address - A special

More information

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Desirable Properties Of An Internet Addressing Scheme

Desirable Properties Of An Internet Addressing Scheme Desirable Properties Of An Internet Addressing Scheme Compact Universal Works with all network hardware Supports efficient decision making - Test whether a destination can be reached directly - Decide

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Tutorial (03) IP addresses & Sub netting

Tutorial (03) IP addresses & Sub netting Tutorial (03) IP addresses & Sub netting Dr. Ahmed M. ElShafee ١ Agenda IP Addressing Conventions Original IPv4 Address Classes Subnetting CIDR (Classless InterDomain Routing) ٢ IP Addressing Conventions

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

TCP/IP Addressing and Subnetting. an excerpt from: A Technical Introduction to TCP/IP Internals. Presentation Copyright 1995 TGV Software, Inc.

TCP/IP Addressing and Subnetting. an excerpt from: A Technical Introduction to TCP/IP Internals. Presentation Copyright 1995 TGV Software, Inc. TCP/IP Addressing and Subnetting an excerpt from: A Technical Introduction to TCP/IP Internals Presentation Copyright 1995 TGV Software, Inc. IP Addressing Roadmap Format of IP Addresses Traditional Class

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,

More information

How To Make A Network Address Prefix Smaller

How To Make A Network Address Prefix Smaller CSC521 Communication Protocols 網 路 通 訊 協 定 Ch.9 Classless And Subnet Address Extensions (CIDR) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Review Of Relevant Facts 3. Minimizing Network Numbers

More information

Internet Protocol version 4 Part I

Internet Protocol version 4 Part I Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

IPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011

IPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011 IPv4 Addressing Simplified by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011 The concept of IP Addressing is foundational to overall routing in general. Without

More information

Chapter 3: IP Addressing and VLSM

Chapter 3: IP Addressing and VLSM Chapter 3: IP Addressing and VLSM QUESTION 54 What is the principle reason to use a private IP address on an internal network? A. Subnet strategy for private companies. B. Manage and scale the growth of

More information

IP Addressing and Subnetting for New Users

IP Addressing and Subnetting for New Users IP Addressing and Subnetting for New Users Document ID: 13788 Contents Introduction Prerequisites Requirements Components Used Additional Information Conventions Understanding IP Addresses Network Masks

More information

IP Addressing. IP Addresses. Introductory material.

IP Addressing. IP Addresses. Introductory material. IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Table of Contents. Cisco IP Addressing and Subnetting for New Users

Table of Contents. Cisco IP Addressing and Subnetting for New Users Table of Contents IP Addressing and Subnetting for New Users...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Additional Information...1 Understanding IP

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP Addressing Overview Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d Module 10 Subnetting Class A, B and C addresses Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d 10.3.5a Basic Subnetting Use the following information and answer the following subnet

More information

2.1.2.2.2 Variable length subnetting

2.1.2.2.2 Variable length subnetting 2.1.2.2.2 Variable length subnetting Variable length subnetting or variable length subnet masks (VLSM) allocated subnets within the same network can use different subnet masks. Advantage: conserves the

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Future Internet Technologies

Future Internet Technologies Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address. SUBNET MASK To define the network and host portions of an address, the devices use a separate 32-bit pattern called a subnet mask. We express the subnet mask in the same dotted decimal format as the IPv4

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

The Subnet Training Guide

The Subnet Training Guide The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Network layer. Assignment 3

Network layer. Assignment 3 Network layer Chapter 4 in the textbook Assignment 3 UWO Abstractly, your server is essentially a simple router Maybe more of a switch than a router Your server gets messages ( packets ) These messages

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

Network and Host Addresses 1.3. 2003, Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4

Network and Host Addresses 1.3. 2003, Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4 IP Addressing To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a 32-bit logical address known as an IP address. This topic introduces the components of an IP address.

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

IP Address Structure

IP Address Structure Motivation A virtual network operates like a physical network and needs an addressing scheme, a packet format, and delivery techniques. An addressing scheme is critical and must appear to be a single uniform

More information

256 4 = 4,294,967,296 ten billion. 256 16 = 18,446,744,073,709,551,616 ten quintillion. IP Addressing. IPv4 Address Classes

256 4 = 4,294,967,296 ten billion. 256 16 = 18,446,744,073,709,551,616 ten quintillion. IP Addressing. IPv4 Address Classes IP Addressing With the exception of multicast addresses, Internet addresses consist of a network portion and a host portion. The network portion identifies a logical network to which the address refers,

More information

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 IPv4 Addresses TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Outline TCP/IP Protocol Suite 2 5-1 INTRODUCTION The

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing

CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing CE363 Data Communications & Networking Chapter 6 Network Layer: Logical Addressing TCP/IP and OSI model APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT NETWORK Host-Network TRANSPORT NETWORK DATA

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

- Classful vs. Classless Routing -

- Classful vs. Classless Routing - lassful vs lassless outing v1.10 Aaron Balchunas 1 - lassful vs. lassless outing - lassful vs lassless routing protocols lassful routing protocols do not send subnet mask information with their routing

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Classful IP Addressing (cont.)

Classful IP Addressing (cont.) Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful

More information

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1 Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Lab 10.3.5a Basic Subnetting

Lab 10.3.5a Basic Subnetting Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet

More information

Table of Contents 1 IP Addressing Configuration 1-1

Table of Contents 1 IP Addressing Configuration 1-1 Table of Contents 1 IP Addressing Configuration 1-1 IP Addressing Overview 1-1 IP Address Classes 1-1 Special IP Addresses 1-2 Subnetting and Masking 1-2 Configuring IP Addresses 1-3 Assigning an IP Address

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Objectives. Upon completing this chapter, you will be able to

Objectives. Upon completing this chapter, you will be able to 1358_fmi.book Page 30 Thursday, May 27, 2004 2:21 PM Objectives Upon completing this chapter, you will be able to Create and configure IPv4 addresses Understand and resolve IP addressing crises Assign a

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification Wayne M. Pecena, CPBE, CBNE Texas A&M Information Technology Educational Broadcast Services IP Networking,

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University

More information

Internet Addresses (You should read Chapter 4 in Forouzan)

Internet Addresses (You should read Chapter 4 in Forouzan) Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013 CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented

More information

VLSM Static routing. Computer networks. Seminar 5

VLSM Static routing. Computer networks. Seminar 5 VLSM Static routing Computer networks Seminar 5 IP address (network and host part) Address classes identified by first three bits Subnet mask determines how the IP address is divided into network and host

More information