Beruflich Dokumente
Kultur Dokumente
The 8-bit network designation made sense at first, because originally people thought that the Internet would be made up of a few very large universities, governments, and military organizations. Using only 8 bits for the network number enabled the creation of 256 separate networks, each containing over 16 million hosts. It soon became apparent that more organizations, and eventually individuals, would be connecting to the Internet to do research and to communicate with others. More networks were required, and a way to assign more network numbers had to be created.
In order to cope with the demand, more unique network numbers were required. To create more possible network designations, the 32-bit address space was organized into five classes. Three of these classes, A, B, and C, provide addresses that can be assigned to individual hosts or networks. The other two classes, D and E, are reserved for multicast and experimental use. Dividing the original eight-bit networks into smaller classes increased the number of available network designations from 256 to over two million. Until this change, routers examined only the first 8-bits of an IP address for the network ID. Now how would routers know to look beyond the first 8-bits to identify Class B or C networks? It was decided to divide the networks in a manner that would make it easy for routers to determine the correct number of network ID bits. The class of a network is indicated by the values of the first few bits of the IP addresses, called the high order bits. If the first bit is 0, the network is a Class A and the first octet represents the network ID. When the first bit is 1, the router examines the second bit. If that bit is 0, the network is a Class B, and the router uses the first 16 bits for the network ID. If the first 3 bits are 110, it indicates a Class C address. Class C addresses use the first 24 bits, or three octets, to designate the network. Networks grew throughout the 1980s and into the 1990s, with many organizations adding hundreds, even thousands, of hosts. An organization with thousands of hosts should have been well served by a Class B network. Unfortunately there were some problems. Organizations with thousands of hosts rarely had them all in one place. Some organizations wanted to separate individual departments from each other for security purposes. To solve these problems, the organizations leading the development of the Internet chose to partition their networks into mini-networks, or subnets, using a process called subnetting. How does a single class B network get split into multiple networks, in a way that each subnet is treated as a separate network?
RFC 917, Internet Subnets, defines the subnet mask as the method routers use to isolate a subnet from an IP address. When a router receives a packet it uses the destination IP address in the packet and the subnet masks associated with the routes in its routing table to determine the appropriate path on which to forward the packet. The router reads the subnet mask from left to right, bit for bit. If a bit in the subnet mask is set to 1, it indicates that the value in that position is part of the network ID. A 0 in the subnet mask indicates that the value in that position is part of the host ID. The two-level hierarchy of classed addressing included a network ID and a host ID. In classful subnetting, the network ID is left alone, and the host ID is divided into a subnet ID and a new host ID. For example, a Class B network has a 16-bit default subnet mask of 11111111.11111111.00000000.00000000, or 255.255.0.0. That leaves 16-bits for the host ID. One way to divide a class B into multiple networks is to use four of the host bits as a subnet ID. There is now a 20-bit subnet mask of 255.255.240.0, and only 12-bits remain for the host ID. DIAGRAM ON BOARD Partitioning the host ID this way always results in a fixed number of subnets and a fixed number of hosts per subnet. In a situation where an organization has a Class B network with four subnets, thousands of IP addresses can be wasted if some of the subnets have only a few hosts in them. To use IP addresses more efficiently, Classless Inter-Domain Routing (CIDR) was created. With CIDR, there are no more network classes. CIDR uses variable length subnet masks (VLSM) for subnetting. The network ID no longer has to be on an octet boundary. In a classed addressed system, the network represented by the IP address 192.168.5.0 is a class C network address. The minimum number of bits that can make up the network ID is 24 and the maximum number of hosts is 254. Using CIDR addressing, sometimes referred to as classless addressing, the number of bits that can make up the network ID is not restricted by class. Networks can be created that use the 192.168.0.0 address space with fewer than 24 bits indicating the network number. For example the address 192.168.82.174 is part of a network in which the first 18 bits make up the network ID. The network that this host is in would be specified as 192.168.64.0/18, where the /18 indicates an 18-bit subnet mask (255.255.192.0).
Most networks today use a private address structure. Only the devices that connect directly to the Internet are assigned registered Internet routable addresses. By default, most consumer networking devices give out private addresses through DHCP.
Routers distinguish between networks by using the subnet mask to determine which bits make up the network ID and which bits make up the host portion of the address. When a
network is partitioned, the router needs a modified or custom subnet mask to distinguish the subnets from each other.
A default subnet mask and a custom subnet mask differ from each other as follows: Default subnet masks only change on octet boundaries. For instance, the default subnet mask for a Class A network is 255.0.0.0. Custom subnet masks take bits from the host ID portion of the IP address and add them to the default subnet mask.
To create a custom subnet mask, the first question to answer is how many bits to take from the host ID to add to the subnet mask.
The number of bits for a subnet ID that will be added to the subnet mask depends on several factors. In this example, those factors have been limited for the sake of simplicity. Not all situations will be so simple. For instance, in an organization assigned a Class C address, what if there are multiple networks, one network with 7 hosts, another with 60 hosts, and a third with 34 hosts? In classed subnetting, all subnets must be the same size, which means that the minimum number of hosts that each subnet must support is 60. To support a minimum number of 60 hosts, at least 6 bits are required in the host ID, which leaves 2 bits for the subnet identifier. Under these conditions, four subnets can be created, each with 64 hosts. Devices on the network are informed of the subdivision by the use of the subnet mask. Now, it is possible to tell what subnet an IP address is in and to design simple classful subnetted IP address schemes.
In a base Class C network, there are 24 bits in the network portion of the address and 8 bits in the host portion of the address. Each bit in a binary IP address has only one of two possible values, a 0 or a 1. The number of host addresses is calculated by using the power of 2. Therefore, the number of host addresses available using an 8-bit address is 2^8, or 2x2x2x2x2x2x2x2. With an 8-bit host ID, there is one network with 254 possible host addresses. If a Class C network is subnetted and 3 bits are taken from the host ID to use for the subnet ID, there are 5 bits left for host addresses. Five host bits mean that there can be 30 hosts per subnet, or 2^5 - 2. Remember that the all-zeros and all-ones host addresses are reserved for the network designation and the broadcast address. The number of subnets is calculated in a similar manner. If 3 bits are used for the subnet address, the number of subnets is 2x2x2, or 2^3. By subnetting in this manner, there are 8 subnets with 30 hosts each. When determining how many hosts are needed in each subnet, it is necessary to include the router interface as well as the individual host devices. Each router interface must have an IP address in the same subnet as the host network attached to it.
The configuration must ensure that interfaces on routers that connect to each other are assigned IP addresses in the same network or subnet, and that clients are assigned default gateways that they can reach. The interface that connects the wireless ISR to the 1841 ISR must be on a common network. Here the common link shows the two routers connected on the 192.168.1.16/29 subnet with IP addresses 192.168.1.17/29 and 192.168.1.18/29.
What can you gather from the customer subnet mask of 255.255.255.248? 1. 192.168.1.0 has been subnetted 2. That five bits were borrowed 255.255.255.1111100 = 248 There are 6 IP addresses listed. How many SUBnetworks are being used? 3 Subnet work x.x.x.0 .8 .16 .24 .32 .40 1st useable address .1 .9 .17 .25 .33 And so on Range .1-.6 .9-.14 .17-.22 .25-.30 .33-.38 Last useable address .6 .14 .22 .30 .38 Broadcast address .7 .15 .23 .31 .49
4.1.6 IPv6
CIDR and private IP addressing were developed to provide a temporary solution to the problem of IP address depletion. These methods, though useful, did not create more IP addresses. IPv6 does that. IPv6 was first proposed in 1998 with RFC 2460.
Although its primary purpose was to solve IPv4 IP address depletion, there were other good reasons for its development. Since IPv4 was first standardized, the Internet has grown significantly. This growth has uncovered advantages and disadvantages of IPv4, and the possibility for upgrades to include new capabilities. A general list of improvements that IPv6 proposes are: More address space Better address space management Easier TCP/IP administration Modernized routing capabilities Improved support for multicasting, security, and mobility The development of IPv6 intends to address as many of these requests and problems as possible. With IPv6, IP addresses are 128-bits in size with a potential address space of 2^128. In decimal notation, that is approximately a 3 followed by 38 zeroes. If IPv4 address space was represented by the volume of a teaspoon, IPv6 address space would be represented by a volume almost equivalent to the planet Saturn. Working with 128-bit numbers is difficult, so the IPv6 address notation represents the 128 bits as 32 hexadecimal digits, which are further subdivided into eight groups of four hexadecimal digits, using colons as delimiters. The IPv6 address has a three-part hierarchy. The global prefix is the first three blocks of the address and is assigned to an organization by an Internet names registry. The subnet and the Interface Identifier (ID) are controlled by the network administrator. Network administrators will have some time to adjust to this new IPv6 structure. Before the widespread adoption of IPv6 occurs, network administrators still need a way to more efficiently use private address spaces.
One way to provide access to a local host from the Internet is to assign that device a static address translation. Static translations ensure that an individual host private IP address is always translated to the same registered global IP address. It also ensures that no other local host will be translated to the same registered address. Dynamic NAT occurs when a router is configured to assign an IP address from an available pool of outside global addresses to an inside private network device. As long as the session is open, the router watches for that inside global address and sends acknowledgments to the initiating inside device. When the session ends, the router simply returns the inside global address to the pool. Dynamic NAT allows hosts assigned with private IP addresses on a network, or intranet, to access a public network, such as the Internet. Static NAT allows hosts on the public network to access selected hosts on a private network. This means that when configuring NAT for user access to the outside, configure dynamic NAT. If a device on the inside network needs to be accessible from the outside, use static NAT. Both NAT methods can be installed at the same time if it is required.
With all this activity taking place in a router because of NAT, its implementation in a network requires good network design, careful selection of equipment, accurate configuration and regularly scheduled maintenance. As a protocol that supports IPv4, NAT has helped to delay the complete depletion of the IPv4 address space. It has become so commonplace in integrated networking devices, used in homes and small businesses, that for some people, configuring it is a matter of selecting a check box. As business grow and they require more sophisticated gateway and routing solutions, device configurations for NAT and other features and functions, become more complex.