Module 11: Ipv4 Addressing: Instructor Materials
Module 11: Ipv4 Addressing: Instructor Materials
Module 11: Ipv4 Addressing: Instructor Materials
Instructor Materials
Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your network.
Topic Title Topic Objective
IPv4 Address Structure Describe the structure of an IPv4 address including
the network portion, the host portion, and the
subnet mask.
IPv4 Unicast, Broadcast, and Multicast Compare the characteristics and uses of the
unicast, broadcast and multicast IPv4 addresses.
Types of IPv4 Addresses Explain public, private, and reserved IPv4
addresses.
Network Segmentation Explain how subnetting segments a network to
enable better communication.
Subnet an IPv4 Network Calculate IPv4 subnets for a /24 prefix.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
11.1 IPv4 Address Structure
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
IPv4 Address Structure
Network and Host Portions
• An IPv4 address is a 32-bit hierarchical address that is made up of a network portion
and a host portion.
• When determining the network portion versus the host portion, you must look at the
32-bit stream.
• A subnet mask is used to determine the network and host portions.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
IPv4 Address Structure
The Subnet Mask
• To identify the network and host portions of an IPv4 address, the subnet mask is
compared to the IPv4 address bit for bit, from left to right.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
IPv4 Address Structure
The Prefix Length
• A prefix length is a less cumbersome method used to identify a subnet mask address.
Prefix
Subnet Mask 32-bit Address
• The prefix length is the number Length
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
IPv4 Address Structure
Video – Network, Host and Broadcast Addresses
This video will cover the following:
• Network address
• Broadcast Address
• First usable host
• Last usable host
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
IPv4 Address Structure
Network, Host, and Broadcast Addresses
• Within each network are three types of IP addresses:
• Network address
• Host addresses
• Broadcast address
Host
Network Portion Host Bits
Portion
Subnet mask 255 255 255 0
255.255.255.0 or /24 11111111 11111111 11111111 00000000
Network address 192 168 10 0
11000000 10100000 00001010 00000000 All 0s
192.168.10.0 or /24
First address 192 168 10 1
11000000 10100000 00001010 00000001 All 0s and a 1
192.168.10.1 or /24
Last address 192 168 10 254
11000000 10100000 00001010 11111110 All 1s and a 0
192.168.10.254 or /24
Broadcast address 192 168 10 255
11000000 10100000 00001010 11111111 All 1s
192.168.10.255 or /24
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
11.2 IPv4 Unicast, Broadcast,
and Multicast
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
IPv4 Unicast, Broadcast, and Multicast
Unicast
• Unicast transmission is sending a packet to one destination IP address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
IPv4 Unicast, Broadcast, and Multicast
Broadcast
• Broadcast transmission is sending a packet to all other destination IP addresses.
• For example, the PC at 172.16.4.1 sends a broadcast packet to all IPv4 hosts.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
IPv4 Unicast, Broadcast, and Multicast
Multicast
• Multicast transmission is sending a packet to a multicast address group.
• For example, the PC at 172.16.4.1 sends a multicast packet to the multicast group
address 224.10.10.5.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
11.3 Types of IPv4
Addresses
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Types of IPv4 Addresses
Public and Private IPv4 Addresses
• As defined in in RFC 1918, public IPv4 addresses are globally routed between
internet service provider (ISP) routers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Types of IPv4 Addresses
Routing to the Internet
• Network Address Translation (NAT) translates private IPv4 addresses to public IPv4
addresses.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Types of IPv4 Addresses
Special Use IPv4 Addresses
Loopback addresses
• 127.0.0.0 /8 (127.0.0.1 to 127.255.255.254)
• Commonly identified as only 127.0.0.1
• Used on a host to test if TCP/IP is operational.
Link-Local addresses
• 169.254.0.0 /16 (169.254.0.1 to 169.254.255.254)
• Commonly known as the Automatic Private IP Addressing (APIPA) addresses or self-
assigned addresses.
• Used by Windows DHCP clients to self-configure when no DHCP servers are
available.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Types of IPv4 Addresses
Legacy Classful Addressing
RFC 790 (1981) allocated IPv4 addresses
in classes
• Class A (0.0.0.0/8 to 127.0.0.0/8)
• Class B (128.0.0.0 /16 – 191.255.0.0 /16)
• Class C (192.0.0.0 /24 – 223.255.255.0 /24)
• Class D (224.0.0.0 to 239.0.0.0)
• Class E (240.0.0.0 – 255.0.0.0)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
11.4 Network Segmentation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Network Segmentation
Broadcast Domains and Segmentation
• Many protocols use broadcasts or multicasts (e.g., ARP use broadcasts to locate
other devices, hosts send DHCP discover broadcasts to locate a DHCP server.)
• Switches propagate broadcasts out all interfaces except the interface on which it was
received.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Network Segmentation
Reasons for Segmenting Networks
• Subnetting reduces overall network traffic and improves network performance.
• It can be used to implement security policies between subnets.
• Subnetting reduces the number of devices affected by abnormal broadcast traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
11.5 Subnet an IPv4 Network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Subnet an IPv4 Network
Subnet on an Octet Boundary
• Networks are most easily subnetted at the octet boundary of /8, /16, and /24.
• Notice that using longer prefix lengths decreases the number of hosts per subnet.
Prefix Length Subnet Mask Subnet Mask in Binary (n = network, h = host) # of hosts
nnnnnnnn.hhhhhhhh.hhhhhhhh.hhhhhhhh
/8 255.0.0.0 11111111.00000000.00000000.00000000
16,777,214
nnnnnnnn.nnnnnnnn.hhhhhhhh.hhhhhhhh
/16 255.255.0.0 11111111.11111111.00000000.00000000
65,534
nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh
/24 255.255.255.0 11111111.11111111.11111111.00000000
254
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Subnet an IPv4 Network
Subnet on an Octet Boundary (Cont.)
• In the first table 10.0.0.0/8 is subnetted using /16 and in the second table, a /24 mask.
Subnet Address Host Range Subnet Address
(256 Possible (65,534 possible hosts per Broadcast Host Range
(65,536 Possible Broadcast
Subnets) subnet) (254 possible hosts per subnet)
Subnets)
10.0.0.0/16 10.0.0.1 - 10.0.255.254 10.0.255.255 10.0.0.0/24 10.0.0.1 - 10.0.0.254 10.0.0.255
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh
/26 255.255.255.192 11111111.11111111.11111111.11000000 4 62
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh
/27 255.255.255.224 11111111.11111111.11111111.11100000 8 30
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh
/28 255.255.255.240 11111111.11111111.11111111.11110000 16 14
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh
/29 255.255.255.248 11111111.11111111.11111111.11111000 32 6
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh
/30 255.255.255.252 11111111.11111111.11111111.11111100 64 2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Subnet an IPv4 Network
Video – The Subnet Mask
• This video will demonstrate the process of subnetting.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Subnet an IPv4 Network
Video – Subnet with the Magic Number
• This video will demonstrate subnetting with the magic number.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Subnet an IPv4 Network
Packet Tracer – Subnet an IPv4 Network
In this Packet Tracer, you will do the following:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
11.6 Subnet a Slash 16 and a
Slash 8 Prefix
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Subnet a Slash 16 and a Slash 8 Prefix
Create Subnets with a Slash 16 prefix
Prefix Length Subnet Mask Network Address (n = network, h = host) # of subnets # of hosts
nnnnnnnn.nnnnnnnn.nhhhhhhh.hhhhhhhh
/17 255.255.128.0 2 32766
• The table highlights all 11111111.11111111.10000000.00000000
nnnnnnnn.nnnnnnnn.nnhhhhhh.hhhhhhhh
the possible scenarios for /18 255.255.192.0 11111111.11111111.11000000.00000000 4 16382
nnnnnnnn.nnnnnnnn.nnnnhhhh.hhhhhhhh
/20 255.255.240.0 11111111.11111111.11110000.00000000 16 4094
nnnnnnnn.nnnnnnnn.nnnnnhhh.hhhhhhhh
/21 255.255.248.0 11111111.11111111.11111000.00000000 32 2046
nnnnnnnn.nnnnnnnn.nnnnnnhh.hhhhhhhh
/22 255.255.252.0 11111111.11111111.11111100.00000000 64 1022
nnnnnnnn.nnnnnnnn.nnnnnnnh.hhhhhhhh
/23 255.255.254.0 11111111.11111111.11111110.00000000 128 510
nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh
/24 255.255.255.0 11111111.11111111.11111111.00000000 256 254
nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh
/25 255.255.255.128 11111111.11111111.11111111.10000000 512 126
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh
/26 255.255.255.192 11111111.11111111.11111111.11000000 1024 62
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh
/27 255.255.255.224 11111111.11111111.11111111.11100000 2048 30
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh
/28 255.255.255.240 11111111.11111111.11111111.11110000 4096 14
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh
/29 255.255.255.248 11111111.11111111.11111111.11111000 8192 6
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh
/30 255.255.255.252 © 2016 Cisco and/or its affiliates. All rights reserved. 16384
Cisco Confidential 2
11111111.11111111.11111111.11111100 45
Subnet a Slash 16 and a Slash 8 Prefix
Create 100 Subnets with a Slash 16 prefix
Consider a large enterprise that requires at least 100
subnets and has chosen the private address
172.16.0.0/16 as its internal network address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Subnet a Slash 16 and a Slash 8 Prefix
Create 1000 Subnets with a Slash 8 prefix
Consider a small ISP that requires 1000 subnets for
its clients using network address 10.0.0.0/8 which
means there are 8 bits in the network portion and
24 host bits available to borrow toward subnetting.
• The figure displays the number of subnets that can be
created when borrowing bits from the second and
third.
• Notice there are now up to 22 host bits that can be
borrowed (i.e., last two bits cannot be borrowed).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Subnet a Slash 16 and a Slash 8 Prefix
Video – Subnet Across Multiple Octets
This video will demonstrate creating subnets across multiple octets.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Subnet a Slash 16 and a Slash 8 Prefix
Lab – Calculate IPv4 Subnets
In this lab, you will complete the following objectives:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
11.7 Subnet to Meet
Requirements
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Subnet to Meet Requirements
Subnet Private versus Public IPv4 Address Space
Enterprise networks will have an:
• Intranet - A company’s internal network typically
using private IPv4 addresses.
• DMZ – A companies internet facing servers.
Devices in the DMZ use public IPv4 addresses.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Subnet to Meet Requirements
Minimize Unused Host IPv4 Addresses and Maximize Subnets
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh
/26 255.255.255.192 11111111.11111111.11111111.11000000 4 62
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh
/27 255.255.255.224 11111111.11111111.11111111.11100000 8 30
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh
/28 255.255.255.240 11111111.11111111.11111111.11110000 16 14
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh
/29 255.255.255.248 11111111.11111111.11111111.11111000 32 6
nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh
/30 255.255.255.252 11111111.11111111.11111111.11111100 64 2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Subnet to Meet Requirements
Example: Efficient IPv4 Subnetting
• In this example, corporate headquarters has
been allocated a public network address of
172.16.0.0/22 (10 host bits) by its ISP
providing 1,022 host addresses.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Subnet to Meet Requirements
Packet Tracer – Subnetting Scenario
In this Packet Tracer, you will do the following:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
11.8 VLSM
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
VLSM
Video – VLSM Basics
• This video will explain VLSM basics.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
VLSM
Video – VLSM Example
• This video will demonstrate creating subnets specific to the needs of the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
VLSM
IPv4 Address Conservation
Given the topology, 7 subnets are required (i.e, four LANs and three WAN links) and the
largest number of host is in Building D with 28 hosts.
• A /27 mask would provide 8 subnets of 30 host IP addresses and therefore support
this topology.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
VLSM
IPv4 Address Conservation (Cont.)
However, the point-to-point WAN links only require two addresses
and therefore waste 28 addresses each for a total of 84 unused
addresses.
• Applying a traditional subnetting scheme to this scenario is not very efficient and is
wasteful.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
VLSM
VLSM
• The left side displays the traditional subnetting scheme
(i.e., the same subnet mask) while the right side
illustrates how VLSM can be used to subnet a subnet
and divided the last subnet into eight /30 subnets.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
VLSM
VLSM Topology Address Assignment
• Using VLSM subnets, the LAN and inter-router networks can be addressed without
unnecessary waste as shown in the logical topology diagram.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
11.9 Structured Design
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Structured Design
IPv4 Network Address Planning
IP network planning is crucial to develop a scalable solution to an enterprise network.
• To develop an IPv4 network wide addressing scheme, you need to know how many subnets are
needed, how many hosts a particular subnet requires, what devices are part of the subnet, which
parts of your network use private addresses, and which use public, and many other determining
factors.
Examine the needs of an organization’s network usage and how the subnets will be
structured.
• Perform a network requirement study by looking at the entire network to determining how each
area will be segmented.
• Determine how many subnets are needed and how many hosts per subnet.
• Determine DHCP address pools and Layer 2 VLAN pools.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Structured Design
Device Address Assignment
Within a network, there are different types of devices that require addresses:
• End user clients – Most use DHCP to reduce errors and burden on network support staff. IPv6
clients can obtain address information using DHCPv6 or SLAAC.
• Servers and peripherals – These should have a predictable static IP address.
• Servers that are accessible from the internet – Servers must have a public IPv4 address, most
often accessed using NAT.
• Intermediary devices – Devices are assigned addresses for network management, monitoring,
and security.
• Gateway – Routers and firewall devices are gateway for the hosts in that network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Structured Design
Packet Tracer – VLSM Design and Implementation Practice
In this Packet Tracer, you will do the following:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
11.10 Module Practice and
Quiz
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Structured Design
Packet Tracer – Design and Implement a VLSM Addressing Scheme
In this Packet Tracer, you will do the following:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Structured Design
Lab - Design and Implement a VLSM Addressing Scheme
In this lab, you will complete the following objectives:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Module Practice and Quiz
What did I learn in this module?
• The IP addressing structure consists of a 32-bit hierarchical network address that identifies a
network and a host portion. Network devices use a process called ANDing using the IP
address and associated subnet mask to identify the network and host portions.
• Destination IPv4 packets can be unicast, broadcast, and multicast.
• There are globally routable IP addresses as assigned by the IANA and there are three ranges
of private IP network addresses that cannot be routed globally but can be used on all internal
private networks.
• Reduce large broadcast domains using subnets to create smaller broadcast domains, reduce
overall network traffic, and improve network performance.
• Create IPv4 subnets using one or more of the host bits as network bits. However, networks
are most easily subnetted at the octet boundary of /8, /16, and /24.
• Larger networks can be subnetted at the /8 or /16 boundaries.
• Use VLSM to reduce the number of unused host addresses per subnet.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Module Practice and Quiz
What did I learn in this module? (Cont.)
• VLSM allows a network space to be divided into unequal parts. Always begin by satisfying
the host requirements of the largest subnet. Continue subnetting until the host requirements
of the smallest subnet are satisfied.
• When designing a network addressing scheme, consider internal, DMZ, and external
requirements. Use a consistent internal IP addressing scheme with a set pattern of how
addresses are allocated to each type of device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70