You are on page 1of 23

Indian Institute of Technology Kharagpur

IP Subnetting and
Addressing
Prof Indranil Sengupta
Computer Science and Engineering
Indian Institute of Technology
Kharagpur

Lecture 6: IP Subnetting and Addressing

On completion, the student will be able to:


1. Explain the concept of IP subnets, and subnet
masks.
2. Compare the benefits of using subnets against
multiple address classes.
3. Explain the concept of variable length subnet
mask (VLSM) with example.
4. Explain how classless inter-domain routing
(CIDR) helps in better address assignment.

1
IP Subnetting

IP Subnet

• Basic concept:
¾A subset of a class A, B or C network.
• IP addresses that do not use subnets
consists of
ƒ a network portion, and
ƒ a host portion.
¾Represents a static two-level hierarchical
addressing model.

2
IP Subnet (contd.)

• IP subnets introduces a third level of


hierarchy.
ƒ a network portion
ƒ a subnet portion
ƒ a host portion
¾Allow more efficient (and structured)
utilization of the addresses.
¾Uses network masks.

Natural Masks

• Network mask 255.0.0.0 is applied to


a class A network 10.0.0.0.
¾In binary, the mask is a series of
contiguous 1’s followed by a series of
contiguous 0’s.
11111111 00000000 00000000 00000000

Network Host
portion portion

3
Natural Masks (contd.)
• Provide a mechanism to split the IP
address 10.0.0.20 into
¾a network portion of 10, and
¾a host portion of 20.

Decimal Binary
IP address:10.0.0.20 00001010 00000000 00000000 00010100
Mask: 255.0.0.0 11111111 00000000 00000000 00000000
Network Host

Natural Masks (contd.)

• Class A, B and C addresses


¾Have fixed division of network and host
portions.
¾Can be expressed as masks.
ƒ Called natural masks.
• Natural Masks
¾Class A :: 255.0.0.0
¾Class B :: 255.255.0.0
¾Class C :: 255.255.255.0

4
Creating Subnets using Masks

• Masks are very flexible.


¾Using masks, networks can be divided
into smaller subnets.
• How?
¾By extending the network portion of the
address into the host portion.
• Advantage gained:
¾We can create a large number of subnets
from one network.
¾Can have less number of hosts per
network.

Example: Subnets

• Network mask 255.255.0.0 is applied


to a class A network 10.0.0.0.
¾This divides the IP address 10.5.0.20
into
ƒ a network portion of 10,
ƒ a subnet portion of 5, and
ƒ a host portion of 20.
¾The 255.255.0.0 mask borrows a portion
of the host space, and applies it to
network space.

5
Subnets (contd.)

• What happens?
¾Initially it was a single large Class A
network (224-2 hosts).
¾We have now split the network into
256 subnets.
ƒ From 10.0.0.0 to 10.255.0.0.
ƒ The hosts pet subnet decreases to
65,534.

Subnets (contd.)

Decimal Binary
IP address: 10.5.0.20 00001010 00000101 00000000 00010100
Mask: 255.255.0.0 11111111 11111111 00000000 00000000
Network Subnet Host

6
Default Mask and Subnet mask
Default Mask
IP Address 255.255.0.0
Network Address
144.16.72.57 144.16.0.0
AND

Subnet Mask
255.255.192.0
IP Address Network Address
144.16.72.57 144.16.64.0
AND

192: 1100 0000


72: 0100 1000

Subnets vrs Multiple Address Classes

• Subnets
¾Management of subnets is done by
local network administrator.
¾Single entry in external router tables.
• Multiple Address Classes
¾Multiple entries in external router tables.
¾Additional overhead on the backbone
(external) routers.

7
Comparison

R R
MULTIPLE
SUBNETS ADDRESS
CLASSES
R R
R R

Variable Length Subnet Masks (VLSM)

• Basic concept
¾The same network can be configured
with different masks.
¾Can have subnets of different sizes.
¾Allows better utilization of available
addresses.

8
Example: VLSM

• Suppose we are assigned a Class C


network 192.203.17.0.
¾To be divided into three subnets.
ƒ Corresponding to three departments.
ƒ With 110, 45 and 50 hosts respectively.

D1 D2 D3
(110) (45) (50)

The Example (contd.)

• Available subnet options


¾The network mask will be the Class C
natural mask 255.255.255.0
¾Subnet masks of the form 255.255.255.X
ƒ Can be used to divide the network
into more subnets.

9
The Subnet Options

X X (in No. of No. of


binary) Subnets Hosts
128 1000 0000 2 128
192 1100 0000 4 64
224 1110 0000 8 32
240 1111 0000 16 16
248 1111 1000 32 8
252 1111 1100 64 4

• Cannot satisfy the requirements.

The VLSM Option

• Basic concept:
¾Use the mask 255.255.255.128 to divide
the network address into two subnets
with 128 hosts each.
ƒ 192.203.17.0 (.0 to .127)
ƒ 192.203.17.0 (.128 to .255)

10
The VLSM Option (contd.)

¾Next subnet the second .128 subnet


using a mask of 255.255.255.192.
ƒ Creates two subnets, 64 hosts each
192.213.17.128 (.128 to .191)
192.213.17.128 (.192 to .255)

The VLSM Option (contd.)

192.203.17.0
Mask:
255.255.255.128

192.203.17.0 (.0 to .127) 192.203.17.0 (.128 to .255)

Mask:
255.255.255.192
192.213.17.128 (.128 to .191)

192.213.17.128 (.192 to .255)

11
HIDDEN SLIDE
Interface 1 :: 128 hosts
Network number: 192.203.17.0
Network mask: 255.255.255.128
Address: 192.203.17.0 -- .127

Interface 2 :: 64 hosts
Network number: 192.203.17.128
Network mask: 255.255.255.192
Address: 192.203.17.128 -- .191

Interface 3 :: 64 hosts
Network number: 192.203.17.192
Network mask: 255.255.255.192
Address: 192.203.17.192 -- .255

Running out of IP addresses

• Growing demand for IP addresses.


¾Severe strain on the classful model.
¾Due to wastage of address space.
• Measures taken:
¾Creative allocation of IP addresses.
¾Classless Inter-Domain Routing (CIDR).
¾Private IP addresses, and Network
Address Translation (NAT).
¾IP version 6 (IPv6).

12
CIDR: Introduction

• The size of the global routing tables


have grown very fast in recent years.
¾Caused routers to become saturated.
• CIDR is a new concept to manage IP
networks.
¾Classless Inter Domain Routing.
¾No concept of class A, B, C networks.
¾Reduces sizes of routing tables.

Basic Idea Behind CIDR

• An IP address is represented by a
prefix, which is the IP address of the
network.
• It is followed by a slash, followed by
a number M.
¾M: number of leftmost contiguous bits
to be used for the network mask.
¾Example: 144.16.192.57 / 18

13
CIDR: An Important Rule

• The number of addresses in each


block must be a power of 2.
• The beginning address in each block
must be divisible by the number of
addresses in the block.
¾A block that contains 16 addresses
cannot have beginning address as
144.16.223.36.
¾But the address 144.16.192.64 is
possible.

Example: CIDR

• An organization is allotted a block with


beginning address:
144.16.192.24 / 29
What is the range of the block?

Start addr: 10010000 00011000 11000000 00011000


End addr: 10010000 00011000 11000000 00011111

There are 8 addresses in the block.

14
Recent Trend

• Move on to CIDR addressing.


¾Existing classful networks can also be
represented using this notation.
ƒ Class A: W.X.Y.Z / 8
ƒ Class B: W.X.Y.Z / 16
ƒ Class C: W.X.Y.Z / 24
• Recent routers support CIDR.

15
SOLUTIONS TO QUIZ
QUESTIONS ON
LECTURE 5

Quiz Solutions on Lecture 5

1. What does the port number in a TCP


connection specify?

It specifies the communicating


processes on the two end systems.

2. Why is it necessary to have both IP


address and port number in a packet?

IP address identifies the host computer.


Port number identifies a running process
in the host computer.

16
Quiz Solutions on Lecture 5

3. Which of the layers TCP, UDP and IP


provides for reliable communication?

Only TCP provides reliable


communication.

4. Both UDP and IP transmit datagrams. In


what ways are they different?

UDP carries the port numbers of


source and destination, and an
optional checksum, in addition.

Quiz Solutions on Lecture 5

5. What are well-known port numbers?


Port numbers that are assigned to
standard programs and known publicly
are called well-known port numbers.
They lie in the range 1 and 1023.
6. What are ephemeral port numbers?
They are temporary and short-lived port
numbers assigned by client on a per
connection basis. They range from 1024
to 65535.

17
Quiz Solutions on Lecture 5

7. With respect to a transport level


connection, what are the five components
in an association?

a) The protocol (TCP or UDP).


b) Local host IP address (32-bit value).
c) Local port number (16-bit value).
d) Remote host IP address (32-bit value).
e) Remote port number (16-bit value).

Quiz Solutions on Lecture 5

8. Why is the pseudo-header used in


calculating TCP checksum?

To protect TCP from misdelivery from IP.

9. What are the different fields in the pseudo


header?

Source IP address, destination IP address,


protocol, segment length.

18
Quiz Solutions on Lecture 5

10. Suppose that 5000 bytes are transferred over


TCP. The first byte is numbered 20050. What
are the sequence numbers for each segment
if data is sent in four segments with the first
two segments carrying 1000 bytes and the
last two segment carrying 1500 bytes?

Segment 1 Î 20,050 (20,050 to 21,049)


Segment 2 Î 21,050 (21,050 to 22,049)
Segment 3 Î 22,050 (22,050 to 23,549)
Segment 4 Î 23,550 (23,550 to 25,049)

Quiz Solutions on Lecture 5

11. What is the purpose of the PSH flag in the


TCP header?
To “push” TCP data. Typically used to
indicate end of message.

12. What is the purpose of the ACK flag in the


TCP header?
To indicate that the “Acknowledgement”
field is in use.

19
Quiz Solutions on Lecture 5

13. If you are developing a network application


on a reliable LAN environment, which of TCP
or UDP would you prefer, and why?
UDP, because reliability of transmission
need not be worried about. And UDP is
faster than TCP.

QUIZ QUESTIONS ON
LECTURE 6

20
Quiz Questions on Lecture 6

1. For the subnet mask 255.255.192.0, how


many hosts per subnet are possible?
2. In classful addressing, if we are using the
subnet mask 255.255.192.0, which address
class does it correspond to?
3. What is the subnet address if the
destination IP address is 144.16.34.124 and
the subnet mask is 255.255.240.0 ?
4. What is the natural mask for a class C
network?

Quiz Questions on Lecture 6

5. Using simple subnets, is it possible to


divide a network into unequal sized
subnets?
6. For an IP address 10.17.5.122 and subnet
mask 255.255.128.0, what is the subnet
address? How many hosts per subnet
are possible?
7. Among multiple network classes and
subnets, which alternative imposes more
burden on the external router?

21
Quiz Questions on Lecture 6

8. Using VLSM, give a scheme to split a


class C address into four subnets where
the number of hosts required are:
100, 55, 20, 30
9. If the number of hosts required are 100,
50, 50 and 20, can VLSM be used?
10. Can the following be the beginning
addresses in CIDR based addressing?
144.16.192.32/28 188.15.170.55/28
10.17.18.42/28 200.0.100.80/28

Quiz Questions on Lecture 6

11. For a CIDR address of the form W.X.Y.Z/20,


what is the maximum number of hosts
possible in the network?
12. Which of the following can be the starting
address of a CIDR block that contains 512
addresses?
144.16.24.128 144.16.75.0
144.16.24.0 144.16.0.0

22
Indian Institute of Technology Kharagpur

23

You might also like