SlideShare a Scribd company logo
1 of 16
IPv4 Addressing and Subnetting
A brief introduction of IP protocol version 4 and
Subnetting
Hardware Addressing
 A hardware adsress is used to identify a host within a local network
 Hardware addressing is a function of the Data Link layer of OSI model
 Ethernet utilizes the 48-bit MAC address as it hardware address
.
 MAC address is hardcoded on physical network interfaces
 MAC is represented in hexadecimal format
examples – 00:34:AC:F5:22:12
0043.ACF5.2212
Logical addressing
 Logical addressing is a function of the network layer of the OSI
model
 Provides a hierarchical structure to separate networks
 Logical address can be dynamically assigned and changed freely.
 A logical address contains two components:
Network ID – identifies which network a host belongs to.
Host ID – uniquely identifies the host on that network.
Example of logical addressing protocol
 IPX- Internetwork Packet Exchange
 IPX was predominantly used
on Novell networks, but is now almost entirely deprecated
 IP- Internet Protocol – The most widely used logical
address and is backbone protocol of internet
Internet Protocol (IP)
 IP provides two fundamental Network layer services:
 Logical addressing – provides a unique address that identifies
both the host, and the network that host exists on.
 Routing – determines the best path to a particular destination
network, and then routes data accordingly.
 IPv4 employs a 32-bit address, which limits the number of
possible addresses to 4,294,967,296. IPv4 will eventually be
replaced by IP Version 6
(IPv6), due to a shortage of available IPv4 addresses
IP Addressing
 A core function of IP is to provide logical addressing for hosts
 An IP address is most often represented in decimal, in the following
format: 150.10.164.8
 An IP address is comprised of four octets, separated by periods
 First Octet Second Octet Third Octet Fourth Octet
150 10 164 8
 Each octet is an 8-bit number, resulting in a 32-bit IP address.
The smallest possible value of an octet is 0,. The largest possible
value of an octet is 255
The Subnet mask
 The IP address is compose of two parts
 One part is identifies the networks , the other part of address identifies the
host
 A subnet mask is required to provide this distinction
For example – 158.80.164.3 255.255.0.0
 The subnet mask follow two rules:
 If a binary bit is set to a 1 (or on) in a subnet mask, the corresponding bit in
the address identifies the network.
 If a binary bit is set to a 0 (or off) in a subnet mask, the corresponding bit in
the address identifies the host.
Subnet mask contt…
 Looking at the IP address and subnet mask in binary
IP address - 10011110.01010000.10100100.00000011
Subnet mask - 11111111.11111111.00000000.00000000
 The first 16 bits of the subnet mask are set to 1. Thus, the first 16 bits of the
address (158.80) identify the network. The last 16 bits of the subnet mask are set to
0. Thus, the last 16 bits of the address (164.3) identify the unique host on that
network.
 The network portion of the subnet mask must be contiguous.
 Host on the same logical network can communicate freely
 Hosts that are on different networks cannot communicate without an
intermediating device
IP address Classes
Class Octet range Default subnet mask
Class A 1 - 127 255.0.0.0
Class B 128 - 191 255.255.0.0
Class C 192 - 223 255.255.255.0
Class D 224 – 239 -------------------
 IPv4 address space has been structured into several classes
 The value of the first octet of an address determines the class
of the network
IP address contt..
 Class A networks range from 1 to 127. The default subnet mask
is 255.0.0.0
 Class B networks range from 128 to 191. The default subnet
mask is 255.255.0.0.
 Class C networks range from 192 to 223. The default subnet
mask is 255.255.255.0
 Class D networks are reserved for multicast traffic. Class D
addresses do not use a subnet mask.
CIDR (Classless Inter-Domain Routing)
 Classless Inter-Domain Routing (CIDR) is a simplified method of representing
a subnet mask. CIDR identifies the number of binary bits set to a 1 (or on) in a
subnet mask, preceded by a slash.
 a subnet mask of 255.255.255.240 would be represented as follows in binary:
11111111.11111111.11111111.11110000
 The first 28 bits of the above subnet mask are set to 1. The CIDR notation for
this subnet mask would thus be /28.
 The CIDR mask is often appended to the IP address.
 For example 192.168.1.1 and a subnet mask of 255.255.255.0 in CIDR written
as 192.168.1.1 /24
Address Classes vs. Subnet Mask
 The first octet on an address dictates the class of that address.
 The subnet mask determines what part of an address identifies the
network, and what part identifies the host.
 Each class has a default subnet mask. A network using its default
subnet mask is referred to as a classful network.
 It is entirely possible to use subnet masks other than the default.
Subnet and Broadcast Addresses
 On each IP network, two host addresses are reserved for special use
a. The subnet (or network) address
b. The broadcast address
 The subnet address is used to identify the network itself.
 In broadcast address all bits in host portion is set to 0
 Broadcasts are one of three types of IP packets:
a. Unicasts - are packets sent from one host to one other host
b. Multicasts - are packets sent from one host to a group of hosts
c. Broadcasts - are packets sent from one host to all other hosts on the local network
Subnetting
 Subnetting is the process of creating new networks
 New networks are created by stealing bits from the host portion
of a subnet mask.
 stealing bits from hosts creates more networks but fewer hosts
per network.
 The number of useable host per network is calculated by formula
2^n – 2
 it is never possible to assign a host an address with all 0 or all 1
bits in the host portion of the address. These are reserved for the
subnet and broadcast addresses, respectively.
Private vs. Public IPv4 Addresses
 public address- can be routed on the Internet. Thus, hosts that must be
Internet-accessible must be configured with (or reachable by) public
addresses. Allocation of public addresses is governed by the Internet
Assigned Numbers Authority (IANA).
 private address- intended for internal use within a home or organization,
and can be freely used by anyone. However, private addresses can
never be routed on the Internet. In fact, Internet routers are configured to
immediately drop traffic with private addresses.
 It is possible to translate between private and public addresses, using
Network Address Translation (NAT). NAT allows a host configured with a
private address to be stamped with a public address, thus allowing that
host to communicate across the Internet.
Thank You
Shashank Asthana

More Related Content

What's hot (20)

IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
IP addressing
IP addressingIP addressing
IP addressing
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Ip Addressing Basics
Ip Addressing BasicsIp Addressing Basics
Ip Addressing Basics
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip address
Ip address Ip address
Ip address
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About it
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 

Viewers also liked (20)

Ip address
Ip addressIp address
Ip address
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Ipv4
Ipv4Ipv4
Ipv4
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Subnetting
SubnettingSubnetting
Subnetting
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Hub vs-switch
Hub vs-switchHub vs-switch
Hub vs-switch
 
Switching
SwitchingSwitching
Switching
 
Switch & hub
Switch & hubSwitch & hub
Switch & hub
 
IP Address
IP AddressIP Address
IP Address
 
Vlan
VlanVlan
Vlan
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Vlan
VlanVlan
Vlan
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
NAT|PAT
NAT|PATNAT|PAT
NAT|PAT
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Subnetting Made Easy
Subnetting Made EasySubnetting Made Easy
Subnetting Made Easy
 

Similar to IPv4 addressing and subnetting

IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdfnandiaditi2010
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2kurtmctaggart
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxgamerchan1
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3VISHNU N
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/Rathodpradip1
 
-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdf-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdfAreshZabi
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and SubnettingAtakan ATAK
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 

Similar to IPv4 addressing and subnetting (20)

IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
Ip addressing upload
Ip addressing uploadIp addressing upload
Ip addressing upload
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
IP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptxIP_ADDRESSING_AND_SUBNETTING.pptx
IP_ADDRESSING_AND_SUBNETTING.pptx
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
 
ELEC - Lecture 2
ELEC - Lecture 2ELEC - Lecture 2
ELEC - Lecture 2
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
 
IP & MAC Addressing
IP & MAC Addressing IP & MAC Addressing
IP & MAC Addressing
 
-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdf-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdf
 
Subnetting class C
Subnetting class CSubnetting class C
Subnetting class C
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
 
Subnet Design
Subnet DesignSubnet Design
Subnet Design
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 

More from Shashank Asthana

More from Shashank Asthana (6)

Operating system Memory management
Operating system Memory management Operating system Memory management
Operating system Memory management
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
GSM Cell planning and frequency reuse
GSM Cell planning and frequency reuseGSM Cell planning and frequency reuse
GSM Cell planning and frequency reuse
 
Masters porting linux
Masters porting linuxMasters porting linux
Masters porting linux
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTE
 
LTE 3GPP
LTE 3GPPLTE 3GPP
LTE 3GPP
 

Recently uploaded

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

IPv4 addressing and subnetting

  • 1. IPv4 Addressing and Subnetting A brief introduction of IP protocol version 4 and Subnetting
  • 2. Hardware Addressing  A hardware adsress is used to identify a host within a local network  Hardware addressing is a function of the Data Link layer of OSI model  Ethernet utilizes the 48-bit MAC address as it hardware address .  MAC address is hardcoded on physical network interfaces  MAC is represented in hexadecimal format examples – 00:34:AC:F5:22:12 0043.ACF5.2212
  • 3. Logical addressing  Logical addressing is a function of the network layer of the OSI model  Provides a hierarchical structure to separate networks  Logical address can be dynamically assigned and changed freely.  A logical address contains two components: Network ID – identifies which network a host belongs to. Host ID – uniquely identifies the host on that network.
  • 4. Example of logical addressing protocol  IPX- Internetwork Packet Exchange  IPX was predominantly used on Novell networks, but is now almost entirely deprecated  IP- Internet Protocol – The most widely used logical address and is backbone protocol of internet
  • 5. Internet Protocol (IP)  IP provides two fundamental Network layer services:  Logical addressing – provides a unique address that identifies both the host, and the network that host exists on.  Routing – determines the best path to a particular destination network, and then routes data accordingly.  IPv4 employs a 32-bit address, which limits the number of possible addresses to 4,294,967,296. IPv4 will eventually be replaced by IP Version 6 (IPv6), due to a shortage of available IPv4 addresses
  • 6. IP Addressing  A core function of IP is to provide logical addressing for hosts  An IP address is most often represented in decimal, in the following format: 150.10.164.8  An IP address is comprised of four octets, separated by periods  First Octet Second Octet Third Octet Fourth Octet 150 10 164 8  Each octet is an 8-bit number, resulting in a 32-bit IP address. The smallest possible value of an octet is 0,. The largest possible value of an octet is 255
  • 7. The Subnet mask  The IP address is compose of two parts  One part is identifies the networks , the other part of address identifies the host  A subnet mask is required to provide this distinction For example – 158.80.164.3 255.255.0.0  The subnet mask follow two rules:  If a binary bit is set to a 1 (or on) in a subnet mask, the corresponding bit in the address identifies the network.  If a binary bit is set to a 0 (or off) in a subnet mask, the corresponding bit in the address identifies the host.
  • 8. Subnet mask contt…  Looking at the IP address and subnet mask in binary IP address - 10011110.01010000.10100100.00000011 Subnet mask - 11111111.11111111.00000000.00000000  The first 16 bits of the subnet mask are set to 1. Thus, the first 16 bits of the address (158.80) identify the network. The last 16 bits of the subnet mask are set to 0. Thus, the last 16 bits of the address (164.3) identify the unique host on that network.  The network portion of the subnet mask must be contiguous.  Host on the same logical network can communicate freely  Hosts that are on different networks cannot communicate without an intermediating device
  • 9. IP address Classes Class Octet range Default subnet mask Class A 1 - 127 255.0.0.0 Class B 128 - 191 255.255.0.0 Class C 192 - 223 255.255.255.0 Class D 224 – 239 -------------------  IPv4 address space has been structured into several classes  The value of the first octet of an address determines the class of the network
  • 10. IP address contt..  Class A networks range from 1 to 127. The default subnet mask is 255.0.0.0  Class B networks range from 128 to 191. The default subnet mask is 255.255.0.0.  Class C networks range from 192 to 223. The default subnet mask is 255.255.255.0  Class D networks are reserved for multicast traffic. Class D addresses do not use a subnet mask.
  • 11. CIDR (Classless Inter-Domain Routing)  Classless Inter-Domain Routing (CIDR) is a simplified method of representing a subnet mask. CIDR identifies the number of binary bits set to a 1 (or on) in a subnet mask, preceded by a slash.  a subnet mask of 255.255.255.240 would be represented as follows in binary: 11111111.11111111.11111111.11110000  The first 28 bits of the above subnet mask are set to 1. The CIDR notation for this subnet mask would thus be /28.  The CIDR mask is often appended to the IP address.  For example 192.168.1.1 and a subnet mask of 255.255.255.0 in CIDR written as 192.168.1.1 /24
  • 12. Address Classes vs. Subnet Mask  The first octet on an address dictates the class of that address.  The subnet mask determines what part of an address identifies the network, and what part identifies the host.  Each class has a default subnet mask. A network using its default subnet mask is referred to as a classful network.  It is entirely possible to use subnet masks other than the default.
  • 13. Subnet and Broadcast Addresses  On each IP network, two host addresses are reserved for special use a. The subnet (or network) address b. The broadcast address  The subnet address is used to identify the network itself.  In broadcast address all bits in host portion is set to 0  Broadcasts are one of three types of IP packets: a. Unicasts - are packets sent from one host to one other host b. Multicasts - are packets sent from one host to a group of hosts c. Broadcasts - are packets sent from one host to all other hosts on the local network
  • 14. Subnetting  Subnetting is the process of creating new networks  New networks are created by stealing bits from the host portion of a subnet mask.  stealing bits from hosts creates more networks but fewer hosts per network.  The number of useable host per network is calculated by formula 2^n – 2  it is never possible to assign a host an address with all 0 or all 1 bits in the host portion of the address. These are reserved for the subnet and broadcast addresses, respectively.
  • 15. Private vs. Public IPv4 Addresses  public address- can be routed on the Internet. Thus, hosts that must be Internet-accessible must be configured with (or reachable by) public addresses. Allocation of public addresses is governed by the Internet Assigned Numbers Authority (IANA).  private address- intended for internal use within a home or organization, and can be freely used by anyone. However, private addresses can never be routed on the Internet. In fact, Internet routers are configured to immediately drop traffic with private addresses.  It is possible to translate between private and public addresses, using Network Address Translation (NAT). NAT allows a host configured with a private address to be stamped with a public address, thus allowing that host to communicate across the Internet.