Chapter 4: Introduction to IP Addressing and Subnetting
IP Addressing
Network and host addressing
Classes of IP addresses
Other reserved addresses
Understanding network ID, host ID, & subnet
masks
Subnetting
Subnetting Basics
Purpose of Subnetting
Subnet masks
Subnetting styles (types)
Addressing Fundamentals
What is an IP address?
An IP address is an Internet Protocol address used
as an endpoint identifier in IP-based
communications.
An IP address is just like a telephone number.
When you want to call another person over your
mobile, you use the telephone number of the other
person who receives the call from your telephone
number. Basically, the phone call is between phone
numbers.
In the same way, when a device wants to
communicate using IP communication, it sends the
data to the remote device's IP address.
Every mobile phone has a telephone number. In the
same way, every device needs to have an IP address
to send and receive data over an IP network.
Addressing Fundamentals
Basics of IP Addressing
An IP address is 32 bits in length and is divided into two
parts.
An IP address uniquely identifies a device on an IP
network.
IP Addresses are Logical Address not physical address
that means IP Address of a device may change.
Why do you call transport layer as process to process
address, network layer end to end and data link layer link
to link address?
IP addressing is a network foundation service, which
makes it core to the production network deployment.
IP addresses are typically communicated in a format
known as dotted decimal.
Assigning IP addresses to all the devices including
servers and networking equipment's can be done using:
Using Static IP Addressing---Manual
Using Dynamic Host Configuration Protocol
IP Addressing Basics/Terminology
IP Address uses a combination of Address
Identifier and Mask.
– The mask is used to separate the
address into a network and host function.
IP address has two portions: Network and
Host.
Network address: is the designation used
in routing to send packets to a remote
network for example, 10.0.0.0,
172.16.0.0, and 192.168.10.0.
How do you distinguish the Network and
Host portion of an address?
IP Addressing Basics/Terminology
The network address also called the network
number uniquely identifies each network.
Every machine on the same network shares
that network address as part of its IP address.
In the IP address 172.16.30.56, for example,
172.16 is the network address.
The host address: is uniquely identifies, each
machine on a network.
This part of the address must be unique
because it identifies a particular machine. This
number can also be referred to as a host
address.
In the IP 172.16.30.56, the 30.56 is the host
address.
IP Addressing Basics/Terminology
Broadcast address: The broadcast address is
used by applications and hosts to send
information to all hosts on a network.
Examples include 255.255.255.255, which
designates all networks and all hosts;
172.16.255.255, which specifies all subnets
and hosts on network 172.16.0.0; and
10.255.255.255, which broadcasts to all
subnets and hosts on network 10.0.0.0.
An IP v 4 address consists of 32 bits of
information where as IP v6 128 bits
information.
You can depict an IP address using
4-Dotted-decimal, as in 172.16.30.56
Binary, as in 10101100.00010000.00011110.00111000
IP Addressing Basics/Terminology
IP Addressing Basics/Terminology
Default gateway: Identifies the router to send a packet
to when the destination is not on the same local network
subnet.
When a host sends a packet to a device that is on the
same IP network, the packet is simply forwarded out of
the host interface to the destination device.
When a host sends a packet to a device on a different IP
network, then the packet is forwarded to the default
gateway, because a host device cannot communicate
directly with devices outside of the local network.
The default gateway is the destination that routes traffic
from the local network to devices on remote networks.
It is often used to connect a local network to the
Internet.
The default gateway is usually the address of the interface on
the router connected to the local network.
What is the default gateway of PC1 and PC3 for the above topology
diagram respectively?
A.192.168.10.0 and 192.168.30.0
B.192.168.10.10 and 192.168.30.10
C.192.168.10.2 and 192.168.30.2
D.192.168.10.1 and 192.168.30.1
E.192.168.20.1 and 192.168.30.1
Public IP addresses: are those that can be advertised
and forwarded by network devices in the public
domain (i.e., the Internet).
Addresses that are routed through the public
Internet.
Users are assigned IP addresses by ISPs.
A public IP address is an IP address that can be
accessed directly over the internet and is assigned to
your network router by your internet service provider
(ISP).
Your personal device also has a private IP that
remains hidden when you connect to the internet
through your router’s public IP.
Private IP addresses: are those that cannot be
advertised and forwarded by network devices in the
public domain.
Private addresses are used in Network Address
Classes of IP address (Class full IP Addresses)
Subdividing an IP address into a network and host
address is determined by the class designation of
your network.
E.g. In a Class A network address, the first byte is
assigned to the network address, and the three
remaining bytes are used for the host addresses.
The Class A format is as follows:
IP Address Management
IP address management is the process of
allocating, recycling, and documenting IP
addresses and subnets in a network.
IP addressing standards define subnet size, subnet
assignment, network device assignments, and
dynamic address assignments within a subnet
range.
Recommended IP address management standards
reduce the opportunity for overlapping or
duplicate subnets, non-summarization in the
network, duplicate IP address device assignments,
wasted IP address space, and unnecessary
complexity.
Addressing Mechanisms for a production
1.network
Classful addressing
–is applying predetermined mask lengths to addresses in
order to support a range of network sizes
2. Subnetting
– A better way to distribute addresses and solve problems
with classfull addressing (Fixed size Subnetting).
3. Variable-length subnetting
– Even more refined than subnetting
4. Supernetting and Classless Inter-Domain Routing
(CIDR).
– is aggregating network addresses, An efficient way to
advertise addresses, and currently used on the Internet.
5. Private Addressing and NAT.
is using IP addresses that cannot be advertised and
forwarded by network and user devices in the public
domain
– A way to re-use certain IP addresses without collision with
the rest of Internet.
1. Classful Addressing
Outdated form of addressing strategies that offers a
simplistic solution for addressing schemes. Five common
classes of IP add..
It address devices Based on pre-determined mask lengths
Class A= The first octet denotes the network address, and
the last three octets are the host portion.
Class A = Mask 255.0.0.0 (126 Networks & over 16M
Addresses per Hosts), First Octet Range between 0-127
these two numbers 0 & 127 are reserved and cannot be used
as a network address. Or 1st bit start with a “0”. Thus 1st bit
is dedicated to determine that it is class A not used for
finding number of networks.
Therefore, any IP address whose first octet is between 1
and 126 is a Class A address. Note that 0 is reserved as a
part of the default address, and 127 is reserved for internal
loopback testing.
The IP address 127.0. 0.1 is called a loopback address. Packets sent to
this address never reach the network but are looped through the
network interface card only. This can be used for diagnostic purposes to
verify that the internal path through the TCP/IP protocols is working.
1. Classfull Addressing……………
•Class B =The first two octets denote the network address,
and the last two octets are the host portion.
•Any address whose first octet is in the range 128 to 191 is a
Class B address.
– Class B = Mask 255.255.0.0 (16K Networks & 64K
Addresses/Hosts),
---First Octet Range 128-191 or first two bits“10”===Class B
•Class C The first three octets denote the network address,
and the last octet is the host portion. The first octet range of
192 to 223 is a Class C address.
Class C= Mask 255. 255. 255.0 (2M Networks & 254
Addresses/Hosts), First Octet Range 192-223 or start with
“110”
– Class D = Multicast address, First Octet Range 224-239 or
strat with “1110”. Class D does not possess any subnet mask.
– Class E is reserved, First Octet Range 240-255 or start with
“1111”.
What are the limitations of classful addressing? What is the
solution?
1. Classfull Addressing……………
•Class D does not possess any subnet mask. IP
addresses belonging to class D range from
224.0.0.0 – 239.255.255.255.
•The higher-order bits of the first octet of IP
addresses belonging to class D is always set to
1110. The remaining bits are for the address that
interested hosts recognize.
•IP addresses belonging to class E are reserved for
experimental and research purposes. IP addresses
of class E range from 240.0.0.0 – 255.255.255.254.
This class doesn’t have any subnet mask. The
higher-order bits of the first octet of class E are
1. Classfull Addressing……………
Range of Special IP Addresses
•169.254.0.0 – 169.254.0.16 : Link-local addresses
•127.0.0.0 – 127.255.255.255 : Loop-back addresses
•0.0.0.0 – 0.0.0.8: used to communicate within the
current network.
Rules for Assigning Host ID
Host IDs are used to identify a host within a network. The host
ID is assigned based on the following rules:
Within any network, the host ID must be unique to that
network.
A host ID in which all bits are set to 0 cannot be assigned
because this host ID is used to represent the network ID of the
IP address.
Host ID in which all bits are set to 1 cannot be assigned because
this host ID is reserved as a broadcast address to send packets to
all the hosts present on that particular network.
The loopback address, also called localhost address. It is
an internal address that routes back to the local system.
The loopback address in IPv4 is 127.0.01.
1. Classfull Addressing……………
•Rules for Assigning Network ID
Hosts that are located on the same physical
network are identified by the network ID, as all
host on the same physical network is assigned
the same network ID. The network ID is
assigned based on the following rules:
The network ID cannot start with 127 because
127 belongs to the class A address and is
reserved for internal loopback functions.
All bits of network ID set to 1 are reserved for
use as an IP broadcast address and therefore,
cannot be used.
All bits of network ID set to 0 are used to
denote a specific host on the local network and
are not routed and therefore, aren’t used.
Discuss on this
1.Limitations of Classful addressing?
2.Why most companies use class A network
addresses?
3.How do you distinguish the network ID
portion of the IP address from the host ID
portion the IP address?
4.How classful addressing determine the net
mask?
5.What is the longest subnet mask available
for your network project?
6.Is 127.0.0.1 is a valid host address? Why or
why not
Limitations
The problem with this classfull addressing method is
that millions of class A addresses are wasted, many of the
class B addresses are wasted, whereas, the number of
addresses available in class C is so small that it cannot
cater to the needs of organizations.
First, since there are relatively few Class A and B
addresses, they have already been allocated. This leaves
new networks with only Class C address space. Thus, a
network may require many Class C addresses.
Second, these class boundaries are not an efficient use
of network addresses.
Not flexible method to match address space to the
requirements of each network.
Many networks require more addresses than a single
Class C can provide, yet are not large enough to justify a
Class A or B, even if such network addresses were
available. There are networks that have Class A or B
addresses but can only use a small fraction 20 of the total
address space. (Wastage of addresses)
3. From the following which one of the following
is class B IP address?
A.11110000.01100010.10001001.00010101
B.10110001.10001000.01010111.01010111
C.11010001.10001000.01010111.01010111
D.11101001.10001000.01010111.01010111
4. When a packet travels from router to router to
its destination, what address continually changes
from hop to hop?
A.Source and destination Layer 2 address
B.Source Layer 3 address
C.Destination Layer 3 address
D.Destination port
2.Subnetting:dividing a network into
multiple subnetworks.
It is a way how to break a network into
multiple smaller networks/segments.
Allows a classful network address to be
segmented into smaller sections by using
part of the device address to create another
level of hierarchy.
Basically it takes address space away from
the devices and gives it to the network.
Useful for Internal addressing and routing
– Allows you to assign subnets to specific
buildings, or specific groups, hence
localizing traffic and simplifying routing.
23
Subnetting…
Benefits of subnetting
Reduced network traffic--Routers create broadcast
domains. The more broadcast domains you create, the
smaller the broadcast domains are and the less network
traffic is on each network segment.
Optimized network performance-- This is the very cool
reward you get when you reduce network traffic!
Simplified management--- It’s easier to identify and
isolate network problems in a group of smaller
connected networks than within one gigantic network.
Facilitated spanning of large geographical distances--
Because WAN links are considerably slower and more
expensive than LAN links, a single large network that
spans long distances can create problems in every area
previously listed. Connecting multiple smaller networks
makes the system more efficient.
There are 3 ways to assign addresses for
devices by using subnetting for your network
deployment.
1.Subnetting when given a required number
of networks
2.Subnetting when given a required number
of clients
3.Given an IP address and subnet mask then
finding original network range (Reverse-
Engineering subnet problem).
Subnetting style 1: Subnetting when given a
required number of networks
Ex-1. A service provider has given you the class
C network range 209.50.1.0. Your company
must break the network into 20 separate
subnets.
Solve?
Ex-2, Your company would like to break the
class B private IP address 172.16.0.0 into 60
different subnets.
Solve?
Ex-3, Class A 10.0.0.0 and need: 500 networks.
Solve?
Ex-4, Class B break into 1000 networks? Solve
Ex-5, Class C 195.5.20.0 and 26 need: 50
Ex-5 subnet this network senario
Ex-6 A company has bought IP class address
136.178.0.0. It has 14 departments and it wants to
give each its own subnet. What will be each of the
subnets, and their subnet mask?
To do such subnetting problems for a specified
network deployment we use the following three
steps.
Step-1. determine the number of networks and
convert to binary.
Step-2. reserve required bits in the subnet mask
and find incremental value.
Step-3. use increment to find network ranges.
To create subnetworks, you take bits from the
host portion of the IP address and reserve them
to define the subnet address. This means fewer
bits for hosts, so the more subnets, the fewer
bits are left available for defining hosts.
What can we figure out from this
subnetting/workout
We can assign valid network ranges to our
networks.
We can reduce complexity of address assignment
First and last addresses from each range
(network/broadcast IP) are unusable.
It helps as to identify IP address problems that
may occur during implementations (Easy for
troubleshooting problems)
It localizes traffic flows and simplifying routing
traffic!
Reduces congestions
Optimizes the router performance as well as the
whole network system performance
It reduces queueing algorithms
We can forward or discard the information or
What can we figure out from this
subnetting/workout
It provides security to one network from
another network. e.g.) In an Organization, code
of the Developer department must not be
accessed by another department.
It may be possible that a particular subnet
might need higher network priority than others.
For example, a Finance department need to host
webcasts or video conferences b/c they have their
own network ranges.
In the case of Small networks, maintenance
or troubleshooting is is easy.
Subnetting and network management require an
experienced network administrator. This adds to the
overall cost as well. So it gives time for the network
owner to think over the IT professionals to get for
Subnetting style-2: when given a required
number of clients
Ex-1 A service provider has given you the class
C network range 209.50.1.0. Your company
must break the network into as many subnets
as possible as long as there are at least 50
clients per network.
Solve ?
Ex-2, Your company would like to break the
class B private IP address 172.16.0.0 into as
many subnets as possible, provided that they
can get at least 300 clients per subnet. Solve?
Ex-3, Class B 150.5.0.0 and need: 500hosts per
n/w. Solve?
Ex-4, Class C 195.5.20.0 and need: 3150 clients.
Solve?
Ex-5
To do such subnetting problems for a
specified network design we use the
following three steps.
Step-1. determine the number of clients and
convert to binary.
Step-2. reserve required bits in the subnet
mask and find incremental value.
Step-3. use increment to find network ranges.
Subnetting style-3 Reverse Engineering
subnetting
This helps us in determining IP address
problems/identify the original range of IP
addresses.
Ex-1
1.Is this IP address valid?
2.What is the range of this pc address it belongs
to when it is designed during its last
implementation?
Ex-3
1.Determine that if this PC can communicate
with the router interface.
2.Is the pc IP address valid?
3.What network range the router interface
address belongs to?
4.If there is any problem in this configuration
Ex-4 determine this IP address problem
Does the pc’s from the sales department can
communicate with all of the pc’s in the
marketing department?
Is the default gateway address of Lab_A valid?
If there is any problem how do you fix the IP
problems? Put your solution.
Ex-5 Find the valid host ranges
Find the following. What IP address, subnet
mask, and valid host address could be assigned to
the hosts in the two figures below?
Fig#1 Fig#2
Five big questions of
Subnetting
When you’ve chosen a possible subnet mask
for your network and need to determine the
number of subnets, valid hosts, and broadcast
addresses of a subnet that the mask provides,
all you need to do is answer these five
questions:
1.How many subnets does the chosen subnet
mask produce?
2.How many valid host addresses per subnet
are available?
3.What are the valid subnets?
4.What’s the broadcast address of each subnet?
5.What are the valid host addresses in each
subnet?
1.How many subnets? 2 x
= number of subnets. x is the
number of masked bits, or the 1s. For example, in
11000000, the number of 1s gives us 22 subnets. In
this example, there are 4 subnets.
2.How many hosts per subnet? 2 – 2 = number of hosts
y
per subnet. y is the number of unmasked bits, or the
0s. For example, in 11000000, the number of 0s gives
us 26 – 2 hosts. In this example, there are 62 hosts
per subnet. You need to subtract 2 for the subnet
address and the broadcast address, which are not
valid hosts.
3.What are the valid subnets? 256 – subnet mask =
block size, or increment number. An example would
be 256 – 192 = 64. The block size of a 192 mask is
always 64. Start counting at zero in blocks of 64 until
you reach the subnet mask value, and these are your
4. What’s the broadcast address for each subnet?
broadcast address is always the number right
before the next subnet. For example, the 0 subnet
has a broadcast address of 63 because the next
subnet is 64. The 64 subnet has a broadcast
address of 127 because the next subnet is 128.
5. What are the valid hosts addresses? Valid
hosts are the numbers between the subnets,
omitting all the 0s and all 1s. For example, if 64 is
the subnet number and 127 is the broadcast
address, then 65–126 is the valid host range it’s
always the numbers between the subnet address
and the broadcast address.
Example Questions
1. Given an IP address and subnet mask of
192.168.20.10 and 255.255.255.240 then
calculate the following.
A. Network address
B. 1st host address
C. Broadcast address
D. Last host address
2. You have given a class B IP address of
140.200.100.50 then determine the above in ex-
1 A-D.
3. A router receives a packet on an interface
with a destination address of 172.16.46.191/26.
What will the router do with this packet?
Practice Questions
Practice Example #1: 255.255.255.128 (/ 25)
We’re going to subnet the Class C network
address 192.168.10.0.
Answer the five questions based on your subnet
Practice Example #2: 255.255.255.192 (/26).
We ’re going to subnet the network address
192.168.10.0 using the subnet mask
255.255.255.192.
Answer the five questions based on your subnet
Practice Example #3: 255.255.192.0 (/18).
Let’s take a look at a second example with
class B. 172.16.0.0 = Network address and
255.255.192.0 = Subnet mask
Answer the five questions based on your subnet
Practice Example #4: 255.255.240.0 (/20).
Given that 172.16.0.0 = Network address and
255.255.240.0 = Subnet mask
41
Answer the five questions based on your subnet
The great Exceptions in
subnetting
Because binary begins counting from zero
The following network values through off your
calculations
2, 4, 8, 16, 32, 64, 128
The following host values through off your
calculations
3, 7, 15, 31, 63, 127
Solution to such kind of subnetting problems
Subtract 1 when finding networks
Add 1 when finding hosts
Examples
for 200.0.10.0 class C do for 16 subnets
For 192.168.10.0 class C do for 7 hosts
What problems do you notice in providing IP
address using subnetting address strategies?
Wastage of many IP addresses
Cost of the overall Network also increases.
Because Subnetting requires internal routers,
Switches, Hubs, Bridges etc. which are very
costly.
Subnetting increases the network's complexity
even for an experienced network administrator
It increases Time complexity. In the case of
Subnet, more time is required for
communication or data transfer. for example
four steps are required for Inter-Network
Communication. i.e. Source Host to Destination
Network, Destination Network to proper Subnet,
then Subnet to Host and finally Host Hence, it
increases Time come to Process.
3. Variable-length subnetting
Subnetting divides the network into a number of
equal-sized subnets which is often inefficient &
Wastage of many addresses.
Variable-length subnetting is subnetting in
which non-equal or variable length subnets are
used.
Ex-1 subnet 192.168.1.0/24 to address this
network given below and use the most efficient
addressing possible. Start from >no.
End of Chapter 4
What problems do you notice in providing IP
address using Variable-length-address strategies?
Limitations of VLSM
It increases the number of routing tables in an IP network
It follows flat routing, in which every routing table carries a
unique entry for each route which decrease router
performance
It is easy to make mistakes in address assignment, so
double-check your calculations before deploying them.
It is more confusing and difficult to monitor your network
with all the new subnets.
There are more routing entries, and it is difficult to
configure summarization.
There is an increased possibility of assigning overlapping
subnets.
When using VLSM, be careful about assigning addresses,
for example, with a Class B network number of 131.108.0.0.
4. Supernetting and CIDR =Route
Summarization
Subnetting is the process of lengthening the mask
to create multiple smaller subnetworks, or subnets.
Route summarization is the opposite of subnetting.
It involves shortening the mask to include several
smaller networks into one larger network address.
This is why it is also known as supernetting.
Supernetting is aggregating network addresses, by
changing the address mask to decrease the number
of bits recognized as the network.
By decreasing the number of bits recognized as the
network, we are in effect ignoring part of the
network address, which results in aggregating
network addresses.
Supernetting reduced the number of
advertisements in the Internet and changed the
way that most people view addressing.
4. Supernetting and CIDR =Route
Summarization
As the network size increases, the number of
individual networks listed in the IP route table
also increases, as does packet size.
Routers cannot effectively handle a large number
of subnetworks, which leads to slowdowns,
packet losses and even crashes.
That's why it's important to reduce the number
of entries in the route table, which is what route
summarization accomplishes.
With route summarization, many routes are
advertised with just one line in an update
packet, which not only reduces the packet
size, but also allows more bandwidth for data
4. Supernetting and CIDR
CIDR is a mechanism developed to help alleviate the
problem of IP address exhaustion and growth of routing
tables.
It is an Address Assignment and Aggregation Strategy.
With route summarization, also referred to as
route aggregation or supernetting, one route in the
routing table represents many other routes.
CIDR is a convention defined in RFCs 1517 through 1520
that calls for aggregating routes for multiple
classful network numbers into a single routing table entry.
The primary goal of CIDR is:
to improve the scalability of Internet routers' routing
tables.
to reduce the size of the Internet routing tables.
reduces the routing update traffic
reduces the number of routes in the routing table
reduces overall router overhead in the router receiving
the routes.
4. Supernetting and CIDR
The term classless interdomain routing (CIDR) is
used to denote the absence of class boundaries in
network routing.
(CIDR)- It’s basically the method that Internet
service providers (ISPs) use to allocate a number of
addresses to a company or a home connection. They
provide addresses in a certain block size; When you
receive a block of addresses from an ISP,
192.168.10.32/28. telling you what your subnet mask
is. Slash notation (/)-how many bits are turned on
(1s).
There are some conventions that are followed in
Supernetting: The number of addresses in a CIDR
block is a power of 2, and the block of addresses is
contiguous, meaning that there are no holes in this
E.g. Addressing for a company with 10,000
devices. If you use a single Class B, it could
support up to 65,534 devices, it is plenty and
cost for this company, but a Class B is not
available, so Class C addresses are used instead.
A single Class C can support up to 254 devices,
so 40 Class C networks are needed (40 networks
× 254 addresses= 10,160 total addresses).
So, when 40 Class C networks are allocated to
this company (e.g., 192.92.240.0 through
192.92.279.0), routes to each network have to
be advertised to the Internet.
So instead of advertising 40 different networks
use aggregating those networks and advertise
to the Internet via one network ID.
The solution was Supernetting to aggregate the
networks.
Steps to do Supernetting
Step1: write all given IP numbers in binary
Step2: find matching bits left to write up to
match
Spep3: write up to match as it is and “0” up to
end then convert it back to decimal and that is
our network ID or
(supernet NID)=aggregated NID to be
advertised to the Internet.
Step4: Make all “1” up to match and “0” up to
end (new mask)=supernet mask to be advertised
to be the Internet together with the supernetted
NID
Step 5: Then we finally write Supernet NID/CIDR
E.g#1 Find the supernet NID and the
supernet mask for the given addresses?
---199.10.5.0/24
---199.10.6.0/24
---199.10.7.0/24
4. Supernetting and CIDR
Ex#2 how to advertise routes to the corporate
network (ISP)
1.Find the new network ID or aggregated
network ID to be advertised(supernet NID)?
2.What is the new network mask/supernet
mask?
3.What is the CIDR or /notation value for the
new network?
Limitations of route
Summarization
There are two main limitations of route aggregation:
Suboptimal routing. Misconfigured route summarization may result in
suboptimal routing.
Route summarization may also create inconsistent routing if a network has
noncontiguous subnetworks. When using summaries, the router may prefer
another path where it has learned a more specific network form, which may not
be the most optimal routing method.
Forwarding traffic for unused networks. If the router doesn't find a matching
destination in its routing table, it will start dropping traffic, leading to data loss.
To avoid suboptimal or incorrect routing and to prevent routers from
inaccurately advertising networks or duplicating other routers' advertisements,
it's important to design networks with summarization in mind. Advance
planning and leaving room for future network growth can help with the design
of a scalable network that supports route summarization.
What is IPv6?
Internet Protocol version 6, or IPv6, was first introduced in the late
1990s as a replacement for IPv4.
It uses 128-bit addresses formatted as eight groups of four
hexadecimal numbers separated by colons.
IPv6 is the solution that addresses the relatively limited number of
IP addresses possible under IPv4.
Under IPv6, there will no longer be a shortage of the total number
of possible addresses.
IPv6 allows for a theoretical
340,282,366,920,938,463,463,374,607,431,768,211
,456, or
340 undecillionth addresses. This means that every
device on the internet can have a unique IPv6
address. An example IPv6 address looks like this —
2002:0de6:0001:0042:0100:8c2e:0370:7234 — but
there are ways to abbreviate this rather clunky
What is IPv6?
IPv4 vs. IPV6
The advent of IPv6 brought more functionality, in addition to more IP
addresses. For example, IPv6 supports multicast addressing, which
allows bandwidth-intensive packet flows (such as multimedia streams) to
be sent to multiple destinations simultaneously, reducing network
bandwidth. But is IPv6 better than IPv4? Let’s find out.
IPv6 has a new feature called auto-configuration, which allows a device
to generate an IPv6 address as soon as it powers up and puts itself on the
network. The device begins by looking for an IPv6 router. If one is
present, the device can generate a local address and a globally routable
address, allowing access to the wider internet. In IPv4-based networks,
the process of adding devices often has to be done manually.
IPv6 allows devices to stay connected to several
networks simultaneously. This is due to
interoperability and configuration capabilities that
enable the hardware to automatically assign multiple
IP addresses to the same device.
IPv4 vs. IPV6
IP v6 Addressing
p
IP v6 Addressing…..
p
IP v6 Addressing…..
p
Possible ways for IPv6 Address assignment
Each IPv6 node on the network needs a globally unique
address to communicate outside its local segment. But
where a node get such an address from? There are a few
options:
Manual assignment - Every node can be configured
with an IPv6 address manually by an administrator. It is
not a scalable approach and is prone to human error.
DHCPv6 (The Dynamic Host Configuration Protocol
version 6) - The most widely adopted protocol for
dynamically assigning addresses to hosts. Requires a
DHCP server on the network and additional
configuration.
SLAAC (Stateless Address Autoconfiguration) - It was
designed to be a simpler and more straight-forward
approach to IPv6 auto-addressing. In its current
implementation as defined in RFC 4862, SLAAC does
not provide DNS server addresses to hosts and that is
why it is not widely adopted at the moment.
Possible ways for IPv6 Address assignment…..
What is SLAAC?
•SLAAC stands for Stateless Address Autoconfiguration and
the name pretty much explains what it does. It is a mechanism
that enables each host on the network to auto-configure a
unique IPv6 address without any device keeping track of which
address is assigned to which node.
•Stateless and Stateful in the context of address assignment
mean the following:
•A stateful address assignment involves a server or other
device that keeps track of the state of each assignment. It
tracks the address pool availability and resolves duplicated
address conflicts. It also logs every assignment and keeps track
of the expiration times.
•Stateless address assignment means that no server keeps
track of what addresses have been assigned and what
addresses are still available for an assignment. Also in the
stateless assignment scenario, nodes are responsible to resolve
any duplicated address conflicts following the logic: Generate
an IPv6 address, run the Duplicate Address Detection (DAD), if
the address happens to be in use, generate another one and
Quiz #5%
1. Break down this network as per the needs
given the fig below For 201.16.3.0/24 net.
2. Find the supernet NID and the supernet mask
for the given addresses show all the steps?
---192.168.10.0/24
---192.168.11.0/24
---192.168.12.0/24
---192.168.13.0/24
---192.168.14.0/24
3. Write out the complete unabbreviated IPv6
addresses that correspond to 6721:0:4a::ce1:0
and ff2c:37bd::2:c9:ce1:7a. Are either of these a
What is Network Management
Software
Network Management Software is software
that allows an administrator to manage a
network and the devices attached to the
network.
Network Management Software may perform
functions such as monitoring and reporting
on data transmission or tracking the health
of routers and switches.
Network management software aims to help
an administrator maintain the health of a
network.
Example
Network management and monitoring tools are software
platforms that connect with network components and
other IT systems to measure, analyze, and report on
network topology, performance, and health.
top 10 tools you can deploy in 2022/23.
1.PRTG Network Monitor
2.SolarWinds Network Performance Monitor
3.Auvik
4.Domotz
5.Datadog Network Performance Monitoring
6.Entuity
7.ManageEngine OpManager
8.Nagios XI
9.Spiceworks Connectivity Dashboard
10.Wireshark
Network monitoring tools
What is network monitoring?
A subset of network management task,
monitoring tracks your network activity
for anomalies.
Performed on a dedicated system
Executed from command line or GUI
applications
Network monitoring/troubleshooting
tools
67
Network monitoring tools
Network monitoring tools….
68
Network monitoring tools
u
69
By doing correct IP addressing and Subnetting,
it is flexible to the following network problems.
Troubleshooting Logical issues
1.Incorrect VLAN
2.Incorrect IP address
3.Wrong gateway
4.Wrong DNS
5.Wrong subnet mask
6.Network Loops
7.Routing issues (Check on routing table)
8.Wireless Issues
End
Thank You