Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 16

IPV4 Address Classes (32-Bit)

CLASS RANGE FIRST USAGE SUBNET NETWORK HOST PRIVATE


BIT MASK BITS BITS ADDRESS
A 1-126 0 Commercially 255.0.0.0 8 24 10.0.0.0/8
available

B 128-191 10 on the 255.255.0.0 16 16 172.16.0.0/1


2

C 192-223 110 internet 255.255.255. 24 8 192.168.0.0/


0 16

D 224-239 1110 Multicasting X X X

E 240-255 11110 Testing/Resea X X X


rch

Multi Cast:

Multicast addressing is a network technology for the delivery of information to a group of


destinations simultaneously using the most efficient strategy to deliver the messages over each
link of the network only once, creating copies only when the links to the multiple destinations
split.

The word "multicast" is typically used to refer to IP Multicast, which is often employed for
streaming media and Internet television applications. In IP Multicast the implementation of the
multicast concept occurs at the IP routing level, where routers create optimal distribution paths
for datagrams sent to a multicast destination address spanning tree in real-time. At the Data Link
Layer, Multicast is also used to describe one-to-many distribution such as Ethernet multicast
addressing, Asynchronous Transfer Mode (ATM) point-to-multipoint virtual circuits or
Infiniband multicast.

Technical description

IP Multicast is a technique for one to many communication over an IP infrastructure. It scales to


a larger receiver population by not requiring prior knowledge of who or how many receivers
there are. Multicast uses network infrastructure efficiently by requiring the source to send a
packet only once, even if it needs to be delivered to a large number of receivers. The nodes in the
network take care of replicating the packet to reach multiple receivers only when necessary. The
most common low-level protocol to use multicast addressing is UDP. By its nature, UDP is not
reliable - messages can be lost or delivered out of order. Reliable multicast protocols such as
PGM have been developed to add loss detection and retransmission on top of IP Multicast.

Key concepts in IP Multicast include an IP Multicast group address, a multicast distribution tree
and receiver driven tree creation.

An IP Multicast group address is used by sources and the receivers to send and receive content.
Sources use the group address as the IP destination address in their data packets. Receivers use
this group address to inform the network that they are interested in receiving packets sent to that
group. For example, if some content is associated with group 239.1.1.1, the source will send data
packets destined to 239.1.1.1. Receivers for that content will inform the network that they are
interested in receiving data packets sent to the group 239.1.1.1. The receiver "joins" 239.1.1.1.
The protocol used by receivers to join a group is called the Internet Group Management Protocol
or IGMP.

Once the receivers join a particular IP Multicast group, a multicast distribution tree is
constructed for that group. The protocol most widely used for this is Protocol Independent
Multicast or PIM. It sets up multicast distribution trees such that data packets from senders to a
multicast group reach all receivers which have "joined" the group. E.g. all data packets sent to
the group 239.1.1.1 are received by receivers who joined 239.1.1.1. There are many different
flavors of PIM: Sparse Mode (SM), Dense Mode (DM), Source Specific Mode (SSM) and
Bidirectional Mode (Bidir) [Also commonly known as Sparse-Dense Mode (SDM)]. Of these
PIM-SM is the most widely deployed as of 2006; SSM and Bidir are simpler and more scalable
variations developed more recently and gaining in popularity.

IP Multicast does not require a source sending to a given group to know about the receivers of
the group. The multicast tree construction is initiated by network nodes which are close to the
receivers or is receiver driven. This allows it to scale to a large receiver population. The IP
Multicast model has been described by Internet architect Dave Clark as "You put packets in at
one end, and the network conspires to deliver them to anyone who asks."

Multicast (top) compared with unicast broadcasting (bottom). Orange circles represent endpoints,
and green circles represent routing points.

IP Multicast creates state information ("state") per multicast distribution tree in the network, i.e.,
current IP Multicast routing protocols do not aggregate state corresponding to multiple
distribution trees. So if a router is part of 1000 multicast trees, it has 1000 multicast routing and
forwarding entries. As a result there are worries about scaling multicast to large numbers of
distribution trees. However, because multicast state exists only along the distribution tree it is
unlikely that any single router in the Internet maintains state for all multicast trees. This is a
common misunderstanding compared to unicast. A unicast router needs to know how to reach all
other unicast addresses in the Internet, even if it does this using just a default route. For this
reason, aggregation is key to scaling unicast routing. Also, there are core routers that carry routes
in the hundreds of thousands because they contain the Internet routing table. On the other hand, a
multicast router does NOT need to know how to reach all other multicast trees in the Internet. It
only needs to know about multicast trees for which it has receivers downstream of it. This is key
to scaling multicast. It is very unlikely that core Internet routers would need to keep state for all
multicast distribution trees, they only need to keep state for trees with downstream membership.
When this type of router joins a shared forwarding tree it is referred to as a graft and when it is
removed it is called a prune.

IP Multicast is widely deployed in enterprises, commercial stock exchanges and multimedia


content delivery networks. A common enterprise use of IP Multicast is for IPTV applications
such as distance learning and televised company meetings.

Other multicast technologies

As of 2006, most efforts at scaling multicast up to large networks have concentrated on the
simpler case of single-source multicast, which seems to be more computationally tractable. [citation
needed]

Still, the large state requirements in routers make applications using a large number of trees
unworkable using IP Multicast. Take presence information as an example where each person
needs to keep at least one tree of its subscribers if not several. No mechanism has yet been
demonstrated that would allow the IP Multicast model to scale to millions of senders and
millions of multicast groups and, thus, it is not yet possible to make fully-general multicast
applications practical. For these reasons, and also reasons of economics, IP Multicast is not in
general use in the commercial Internet.

Explicit Multi-Unicast (XCAST) is an alternate multicast strategy to IP Multicast that provides


reception addresses of all destinations with each packet. As such, since the IP packet size is
limited in general, XCAST cannot be used for multicast groups of large number of destinations.
The XCAST model generally assumes that the stations participating in the communication are
known ahead of time, so that distribution trees can be generated and resources allocated by
network elements in advance of actual data traffic.

Other multicast technologies not based on IP Multicast are more widely used. Notably the
Internet Relay Chat (IRC), which is more pragmatic and scales better for large numbers of small
groups. IRC implements a single spanning tree across its overlay network for all conference
groups. This leads to suboptimal routing for some of these groups however. Additionally IRC
keeps a large amount of distributed state, which limits growth of an IRC network, leading to
fractioning into several non-interconnected networks.[1] The lesser known PSYC technology uses
custom multicast strategies per conference.[2] Also some peer-to-peer technologies employ the
multicast concept when distributing content to multiple recipients.

Internet Protocol version 4 (IPv4):


Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet
Protocol (IP) and it is the first version of the protocol to be widely deployed. Together with IPv6,
it is at the core of standards-based internetworking methods of the Internet, and is still by far the
most widely deployed Internet Layer protocol.
It is described in IETF publication RFC 791 (September 1981) which rendered obsolete RFC 760
(January 1980). The United States Department of Defense also standardized it as MIL-STD-
1777.

IPv4 is a data-oriented protocol to be used on a packet switched internetwork (e.g., Ethernet). It


is a best effort delivery protocol in that it does not guarantee delivery, nor does it assure proper
sequencing, or avoid duplicate delivery. These aspects are addressed by an upper layer protocol
(e.g. TCP, and partly by UDP). IPv4 does, however, provide data integrity protection through the
use of packet checksums.

The Internet Protocol Suite

Application Layer

BGP · DHCP · DNS · FTP · GTP · HTTP ·


IMAP · IRC · Megaco · MGCP · NNTP ·
NTP · POP · RIP · RPC · RTP · RTSP ·
SDP · SIP · SMTP · SNMP · SOAP · SSH ·
Telnet · TLS/SSL · XMPP · (more)

Transport Layer

TCP · UDP · DCCP · SCTP · RSVP · ECN ·


(more)

Internet Layer

IP (IPv4, IPv6) · ICMP · ICMPv6 · IGMP ·


IPsec · (more)

Link Layer

ARP · RARP · NDP · OSPF ·


Tunnels (L2TP) · PPP · Media Access
Control (Ethernet, MPLS, DSL, ISDN,
FDDI) · Device Drivers · (more)

This box: view • talk • edit

Addressing:
IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4,294,967,296 (232)
possible unique addresses. However, some are reserved for special purposes such as private
networks (~18 million addresses) or multicast addresses (~16 million addresses). This reduces
the number of addresses that can be allocated as public Internet addresses. As the number of
addresses available are consumed, an IPv4 address shortage appears to be inevitable, however
network address translation (NAT) has significantly delayed this inevitability.

This limitation has helped stimulate the push towards IPv6, which is currently in the early stages
of deployment and the only contender to replace IPv4.

Address representations

IPv4 addresses are usually written in dot-decimal notation, which consists of the four octets of
the address expressed in decimal and separated by periods. This is the base format used in the
conversion in the following table:

Notation Value Conversion from dot-decimal

Dot-decimal
192.0.2.235 N/A
notation

Dotted Each octet is individually converted to


0xC0.0x00.0x02.0xEB
Hexadecimal hexadecimal form

Dotted Octal 0300.0000.0002.0353 Each octet is individually converted into octal

Concatenation of the octets from the dotted


Hexadecimal 0xC00002EB
hexadecimal

Decimal 3221226219 The 32-bit number expressed in decimal

Octal 030000001353 The 32-bit number expressed in octal

Most of these formats should work in all browsers. Additionally, in dotted format, each octet can
be of any of the different bases. For example, 192.0x00.0002.235 is a valid (though
unconventional) equivalent to the above addresses.

A final form is not really a notation since it is rarely written in an ASCII string notation. That
form is a binary form of the hexadecimal notation in binary. This difference is merely the
representational difference between the string "0xCF8E83EB" and the 32-bit integer value
0xCF8E83EB. This form is used for assigning the source and destination fields in a software
program.

Allocation

Originally, an IP address was divided into two parts:


• Network ID: first octet
• Host ID: last three octets

This created an upper limit of 256 networks. As the networks began to be allocated, this was
soon seen to be inadequate.

To overcome this limit, different classes of network were defined, in a system which later
became known as classful networking. Five classes were created (A, B, C, D, and E), three of
which (A, B, and C) had different lengths for the network field. The rest of an address was used
to identify a host within a network, which meant that each network class had a different
maximum number of hosts. Thus there were a few networks with each having many host
addresses and numerous networks with each only having a few host addresses. Class D was for
multicast addresses and Class E was reserved.

Around 1993, these classes were replaced with a Classless Inter-Domain Routing (CIDR)
scheme, and the previous scheme was dubbed "classful", by contrast. CIDR's primary advantage
is to allow re-division of Class-A, -B and -C networks so that smaller (or larger) blocks of
addresses may be allocated to various entities (such as Internet service providers, or their
customers) or local area networks.

The actual assignment of an address is not arbitrary. The fundamental principle of routing is that
the address of a device encodes information about the device's location within a network. This
implies that an address assigned to one part of a network will not function in another part of the
network. A hierarchical structure, created by CIDR and overseen by the Internet Assigned
Numbers Authority (IANA) and its Regional Internet Registries (RIRs), manages the assignment
of Internet addresses worldwide. Each RIR maintains a publicly-searchable WHOIS database
that provides information about IP address assignments; information from these databases plays
a central role in numerous tools that attempt to locate IP addresses geographically.

Reserved address blocks

CIDR address Referen


Description
block ce

RFC
0.0.0.0/8 Current network (only valid as source address)
1700

RFC
10.0.0.0/8 Private network
1918

Public data networks (per 2008-02-10, RFC


14.0.0.0/8
available for use[1]) 1700

RFC
127.0.0.0/8 Loopback
3330

128.0.0.0/16 Reserved (IANA) RFC


3330

RFC
169.254.0.0/16 Link-Local
3927

RFC
172.16.0.0/12 Private network
1918

RFC
191.255.0.0/16 Reserved (IANA)
3330

RFC
192.0.0.0/24 Reserved (IANA)
3330

RFC
192.0.2.0/24 Documentation and example code
3330

RFC
192.88.99.0/24 IPv6 to IPv4 relay
3068

RFC
192.168.0.0/16 Private network
1918

RFC
198.18.0.0/15 Network benchmark tests
2544

223.255.255.0/ RFC
Reserved (IANA)
24 3330

RFC
224.0.0.0/4 Multicasts (former Class D network)
3171

RFC
240.0.0.0/4 Reserved (former Class E network)
1700

255.255.255.25
Broadcast
5

Private networks
Main article: private network

Of the approximately four billion addresses allowed in IPv4, three ranges of address are reserved
for private networking use. These ranges are not routable outside of private networks and private
machines cannot directly communicate with public networks. They can, however, do so through
network address translation.

The following are the three ranges reserved for private networks (RFC 1918):
Number of Largest CIDR
Name Address range Classful description
addresses block

24-bit 10.0.0.0–
16,777,216 Single Class A 10.0.0.0/8
block 10.255.255.255

20-bit 172.16.0.0– 16 contiguous Class B


1,048,576 172.16.0.0/12
block 172.31.255.255 blocks

16-bit 192.168.0.0– Contiguous range of 192.168.0.0/1


65,536
block 192.168.255.255 256 class C blocks 6

Link-local addressing

RFC 3330 defines an address block, 169.254.0.0/16, for the special use in link-local addressing.
These addresses are only valid on the link, such as a local network segment or point-to-point
connection, that a host is connected to. These addresses are not routable and like private
addresses cannot be the source or destination of packets traversing the Internet. Link-local
addresses are primarily used for address autoconfiguration (Zeroconf) when a host cannot obtain
an IP address from a DHCP server or other internal configuration methods.

When the address block was reserved, no standards existed for mechanisms of address
autoconfiguration. Filling the void, Microsoft created an implementation that called Automatic
Private IP Addressing (APIPA). Due to Microsoft's market power, APIPA has been deployed on
millions of machines and has, thus, become a de facto standard in the industry. Many years later,
the IETF defined a formal standard for this functionality, RFC 3927, entitled Dynamic
Configuration of IPv4 Link-Local Addresses.

Localhost
Main article: localhost

The address range 127.0.0.0–127.255.255.255 (127.0.0.0/8 in CIDR notation) is reserved for


localhost communication. Addresses within this range should never appear outside a host
computer and packets sent to this address are returned as incoming packets on the same virtual
network device (known as loopback).

Main article: IPv4 subnetting reference

It is a common misunderstanding that addresses ending in 255 or 0 can never be assigned to


hosts. This is only true of networks with subnet masks of at least 24 bits — Class C networks in
the old classful addressing scheme, or in CIDR, networks with masks of /24 to /32 (or
255.255.255.0–255.255.255.255).

In classful addressing (now obsolete with the advent of CIDR), there are only three possible
subnet masks: Class A, 255.0.0.0 or /8; Class B, 255.255.0.0 or /16; and Class C, 255.255.255.0
or /24. For example, in the subnet 192.168.5.0/255.255.255.0 (or 192.168.5.0/24) the identifier
192.168.5.0 refers to the entire subnet, so it cannot also refer to an individual device in that
subnet.

A broadcast address is an address that allows information to be sent to all machines on a given
subnet, rather than a specific machine. Generally, the broadcast address is found by obtaining the
bit complement of the subnet mask and performing a bitwise OR operation with the network
identifier. In other words, the broadcast address is the last address in the range belonging to the
subnet. In our example, the broadcast address would be 192.168.5.255, so to avoid confusion this
address also cannot be assigned to a host. On a Class A, B, or C subnet, the broadcast address
always ends in 255.

However, this does not mean that every addresses ending in 255 cannot be used as a host
address. For example, in the case of a Class B subnet 192.168.0.0/255.255.0.0 (or
192.168.0.0/16), equivalent to the address range 192.168.0.0–192.168.255.255, the broadcast
address is 192.168.255.255. However, one can assign 192.168.1.255, 192.168.2.255, etc. (though
this can cause confusion). Also, 192.168.0.0 is the network identifier and so cannot be assigned,
but 192.168.1.0, 192.168.2.0, etc. can be assigned (though this can also cause confusion).

With the advent of CIDR, broadcast addresses do not necessarily end with 255.

In general, the first and last addresses in a subnet are used as the network identifier and broadcast
address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet.

Address resolution
Main article: Domain Name System

Hosts on the Internet are usually known not by IP addresses, but by names (e.g.,
www.wikipedia.org, www.whitehouse.gov, www.freebsd.org, www.berkeley.edu). The routing
of IP packets across the Internet is not directed by such names, but by the numeric IP addresses
assigned to such domain names. This requires translating (or resolving) domain names to
addresses.

The Domain Name System (DNS) provides such a system for converting names to addresses and
addresses to names. Much like CIDR addressing, the DNS naming is also hierarchical and allows
for subdelegation of name spaces to other DNS servers.

The domain name system is often described in analogy to the telephone system directory
information systems in which subscriber names are translated to telephone numbers.

Address space exhaustion


Main article: IP address exhaustion

Since the 1980s it has been apparent that the number of available IPv4 addresses is being
exhausted at a rate that was not initially anticipated in the design of the network. This was the
driving factor for the introduction of classful networks, for the creation of CIDR addressing, and
finally for the redesign of the Internet Protocol, based on a larger address format (IPv6).

Today, there are several driving forces for the acceleration of IPv4 address exhaustion:

• Mobile devices — laptop computers, PDAs, mobile phones


• Always-on devices — ADSL modems, cable modems
• Rapidly growing number of Internet users

The accepted and standardized solution is the migration to IPv6. The address size jumps
dramatically from 32 bits to 128 bits, providing a vastly increased address space that allows
improved route aggregation across the Internet and offers large subnet allocations of a minimum
of 264 host addresses to end-users. Migration to IPv6 is in progress but is expected to take
considerable time.

Methods to mitigate the IPv4 address exhaustion are:

• Network address translation (NAT)


• Use of private networks
• Dynamic Host Configuration Protocol (DHCP)
• Name-based virtual hosting
• Tighter control by Regional Internet Registries on the allocation of addresses
to Local Internet Registries
• Network renumbering to reclaim large blocks of address space allocated in
the early days of the Internet

As of April 2008, predictions of exhaustion date of the unallocated IANA pool seem to converge
to between February 2010[2] and May 2011[3]

Assistive protocols:

The Internet Protocol is the protocol that defines and enables internetworking at the Internet
Layer and thus forms the Internet. It uses a logical addressing system. IP addresses are not tied in
any permanent manner to hardware identifications and, indeed, a network interface can have
multiple IP addresses. Hosts and routers need additional mechanisms to identify the relationship
between device interfaces and IP addresses, in order to properly deliver an IP packet to the
destination host on a link. The Address Resolution Protocol (ARP) perform this IP address to
hardware address (MAC address) translation for IPv4. In addition the reverse correlation is often
necessary, for example, when an IP host is booted or connected to a network it needs to
determine its IP address, unless an address is preconfigured by an administrator. Protocols for
such inverse correlations exist in the Internet Protocol Suite. Currently used methods are
Dynamic Host Configuration Protocol (DHCP) and, infrequently, inverse ARP.
Subnetwork:

A subnetwork, or subnet, describes networked computers and devices that have a common,
designated IP address routing prefix.

Subnetting is used to break the network into smaller more efficient subnets to prevent excessive
rates of Ethernet packet collision in a large network. Such subnets can be arranged hierarchically,
with the organization's network address space (see also Autonomous System) partitioned into a
tree-like structure. Routers are used to manage traffic and constitute borders between subnets.

A routing prefix is the sequence of leading bits of an IP address that precede the portion of the
address used as host identifier. In IPv4 networks, the routing prefix is often expressed as a
"subnet mask", which is a bit mask covering the number of bits used in the prefix. An IPv4
subnet mask is frequently expressed in quad-dotted decimal representation, e.g., 255.255.255.0 is
the subnet mask for the 192.168.1.0 network with a 24-bit routing prefix (192.168.1.0/24). For
IPv6 networks, routing prefixes are always expressed in the standardized CIDR notation
consisting of the network address and the mask length, e.g., 2001:db8::/32.

All hosts within a subnet can be reached in one "hop" (time to live = 1), implying that all hosts in
a subnet are connected to the same link.

A typical subnet is a physical network served by one router, for instance an Ethernet network
(consisting of one or several Ethernet segments or local area networks, interconnected by
network switches and network bridges) or a Virtual Local Area Network (VLAN). However,
subnetting allows the network to be logically divided regardless of the physical layout of a
network, since it is possible to divide a physical network into several subnets by configuring
different host computers to use different routers.

While improving network performance, subnetting increases routing complexity, since each
locally connected subnet is typically represented by one row in the routing tables in each
connected router. However, with a clever design of the network, routes to collections of more
distant subnets within the branches of a tree-hierarchy can be aggregated by single routes.
Existing subnetting functionality in routers made the introduction of Classless Inter-Domain
Routing seamless.

Network address and logical address:

The term network address sometimes refers to logical address, i.e. network layer address such
as the IP address, and sometimes to the first address (the base address) of a classful address range
to an organization.

Computers and devices that are part of an internetworking network such as the Internet each
have a logical address. The network address is unique to each device and can either be
dynamically or statically configured. An address allows a device to communicate with other
devices connected to a network. The most common network addressing scheme is IPv4. An IPv4
address consists of a 32 bit address written, for human readability, into 4 octets and a subnet
mask of like size and notation. In order to facilitate the routing process the address is divided into
two pieces:

• The network prefix (some contiguous range of higher-order bits) that is


significant for routing decisions at that particular topological point.
• The network host (the remaining bits) that specify a particular device in the
network.

This works much like a postal address in that network prefix would represent the city and the
network host would represent the address of a specific house on that street. The subnet mask
(e.g. 255.255.192.0 to specify the top 18 bits; in binary:
11111111.11111111.11000000.00000000) or CIDR suffix address (e.g. /18) is used in
conjunction with the network address to determine how many higher-order bits are used for the
network prefix. For instance, the following are equivalent:

• 192.168.0.0 with netmask 255.255.0.0


• 192.168.0.0/16

Binary subnet masks:

While subnet masks are often represented in dot-decimal form, their use becomes clearer in
binary. Looking at a network address and a subnet mask in binary, a device can determine which
part of the address is the network address and which part is the host address. To do this, it
performs a bitwise "AND" operation.

Example

Dot-decimal
Binary
Address

IP address 192.168.5.10 11000000.10101000.00000101.00001010

Subnet Mask 255.255.255.0 11111111.11111111.11111111.00000000

Network
192.168.5.0 11000000.10101000.00000101.00000000
Portion

Host Portion 0.0.0.10 00000000.00000000.00000000.00001010

Subnet masks consist of 32 bits, usually a block of ones (1) followed by a block of 0s. The last
block of zeros (0) designate that part as being the host identifier. This allows a classful network
to be broken down into subnets. A classful network is a network that has a subnet mask of
255.0.0.0, 255.255.0.0 or 255.255.255.0.

IPv4 classes
Main article: IPv4 subnetting reference
IPv4 addresses are broken down into three parts: the network part, the subnet part (now often
considered part of the network part, although originally it was part of the rest part), and the host
part. Even though classful networks are obsolete, both classful and classless networks are shown
in the following table.

Leading Default Subnet Mask in


Class Start End
bits dotted decimal

A (CIDR / 127.255.255.
0 0.0.0.0 255.0.0.0
8) 255

B (CIDR / 128.0.0 191.255.255.


10 255.255.0.0
16) .0 255

C (CIDR / 192.0.0 223.255.255.


110 255.255.255.0
24) .0 255

224.0.0 239.255.255.
D 1110
.0 255

240.0.0 255.255.255.
E 1111
.0 254

While the 127.0.0.0/8 network is in the Class A area, it is designated for loopback and cannot be
assigned to a network.

Class D multicasting

Class E reserved

Subnetting is the process of allocating bits from the host portion as a network portion. The above
example shows the bitwise "AND" process being performed on a classful network.

Example

Dot-decimal
Binary
Address

11000000.10101000.00000101.1
IP address 192.168.5.130
0000010

11111111.11111111.11111111.1
Subnet Mask 255.255.255.192
1000000
Network 11000000.10101000.00000101.1
192.168.5.128
Portion 0000000

In this example two bits were borrowed from the original host portion. This is beneficial because
it allows this network to be split into four smaller networks. A /24 suffix (Class C block) allows
254 hosts; split into four parts, the prefix is /26, each has 62 hosts.

Subnets and host count:

It is possible to determine the number of hosts and subnetworks available for any subnet mask.
In the above example two bits were borrowed to create subnetworks. Each bit can take the value
1 or 0, giving 4 possible subnets (22 = 4)

Broadcast
Network Network (binary)
address
192.168.5.0/2 11000000.10101000.00000101.0
192.168.5.63
6 0000000
192.168.5.64/ 11000000.10101000.00000101.0
192.168.5.127
26 1000000
192.168.5.128 11000000.10101000.00000101.1
192.168.5.191
/26 0000000
192.168.5.192 11000000.10101000.00000101.1
192.168.5.255
/26 1000000

According to the RFC 950 standard the subnet values consisting of all zeros and all ones are
reserved, reducing the number of available subnets by 2. However due to the inefficiencies
introduced by this convention it is no longer used on the public Internet, and is only relevant
when dealing with legacy equipment that does not understand CIDR. The only reason not to use
the all-zeroes subnet is that it is ambiguous when the exact suffix length is not available. All
CIDR-compliant routing protocols transmit both length and suffix. See RFC 1878 for a
subnetting table with extensive examples.

The remaining bits after the subnet are used for addressing hosts within the subnet. In the above
example the subnet mask consists of 26 bits, leaving 6 bits for the address (32 − 26). This allows
for 64 possible combinations (26), however the all zeros value and all ones value are reserved for
the network ID and broadcast address respectively, leaving 62 addresses.

In general the number of available hosts on a subnet can be calculated using the formula 2n − 2,
where n is the number of bits used for the host portion of the address.

RFC 3021 specifies an exception to this rule when dealing with 31 bit subnet masks (i.e. 1 host
bit). According to the above rule a 31 bit mask would allow for 21 − 2 = 0 hosts. The RFC makes
allowances in this case for certain types of networks (point-to-point) to disregard the network
and broadcast address, allowing two host addresses to be allocated.
Possible subnets for a /24 suffix (traditional Class C):

CIDR Network Available Available Hosts per Total usable


notation Mask Networks network hosts
255.255.255.
/24 1 254 254
0
255.255.255.
/25 2 126 252
128
255.255.255.
/26 4 62 248
192
255.255.255.
/27 8 30 240
224
255.255.255.
/28 16 14 224
240
255.255.255.
/29 32 6 192
248
255.255.255.
/30 64 2 128
252
255.255.255. *
/31 128 2 256
254

* only applicable on point-to-point links

Subnetting in IPv6 networks:

The primary reason for subnetting in IPv4 was to improve efficiency in the utilization of the
relatively small address space available, particularly to enterprises. Subnetting is also used in
IPv6 networks. However, in IPv6 the address space available even to end-users is so large that
address space restrictions no longer exist. The recommended allocation for a site is an address
space comprising 80 address bits (prefix /48), but may be as small as a prefix /56 allocation (72
bits) for a residential customer network.[1] This provides 65,536 subnets for a site, and a
minimum of 256 subnets for the residential size. An IPv6 subnet always has a /64 prefix which
provides 64 bits for the host portion of an address. Although it is technically possible to use
smaller subnets, they are impractical for local area networks because stateless address
autoconfiguration of network interfaces (RFC 4862) requires a /64 address. Subnetting, based on
the concepts of Classless Inter-Domain Routing is however used in the routing between networks
both locally and globally.

Example routing scenario based on subnet concept:

Suppose a home network consists of computers named Foo and Bar, connected to a router, and
then via a cable modem to the Internet. The home network is configured as a subnet: address
17.76.99.1 is assigned to Foo, address 17.76.99.2 to Bar, and address 17.76.99.100 to the router.
The subnet has been configured so that the first three octets of its members' addresses are all the
same subnet id, 17.76.99, and this fact is expressed by the subnet mask 255.255.255.0 (binary
11111111 11111111 11111111 00000000) configured in the router.

When Foo sends data to example.com at 208.77.188.166, the router performs a logical AND of
the destination example.com address with the subnet mask. It also performs a logical AND of the
origin address (17.76.99.1) and recognizes that these two results are different, and therefore
sends the data over the Internet, via the subnet's default gateway.

When Foo sends data to Bar, however, it determines that the results of the two AND operations
are the same, therefore the destination lies within the subnet and the default gateway is not
required. The data is transmitted directly from Foo to Bar within the home network.

You might also like