Lecture 2 - Network Infrastructure Design_ IPv4 Addressing.pdf
Document Details
Tags
Full Transcript
01/09/2024 IPv4 Addressing Introduction to Networks v7.0 (ITN) 1 Module Objectives Module Title: IPv4 Addressing Modul...
01/09/2024 IPv4 Addressing Introduction to Networks v7.0 (ITN) 1 Module Objectives Module Title: IPv4 Addressing Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your network. Topic Title Topic Objective IPv4 Address Structure Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask. IPv4 Unicast, Broadcast, and Multicast Compare the characteristics and uses of the unicast, broadcast and multicast IPv4 addresses. Types of IPv4 Addresses Explain public, private, and reserved IPv4 addresses. Network Segmentation Explain how subnetting segments a network to enable better communication. Subnet an IPv4 Network Calculate IPv4 subnets for a /24 prefix. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 2 1 01/09/2024 11.1 IPv4 Address Structure © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 3 IPv4 Address Structure Network and Host Portions An IPv4 address is a 32-bit hierarchical address that is made up of a network portion and a host portion. When determining the network portion versus the host portion, you must look at the 32-bit stream. A subnet mask is used to determine the network and host portions. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 4 2 01/09/2024 IPv4 Address Structure The Subnet Mask To identify the network and host portions of an IPv4 address, the subnet mask is compared to the IPv4 address bit for bit, from left to right. The actual process used to identify the network and host portions is called ANDing. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 5 IPv4 Address Structure The Prefix Length A prefix length is a less cumbersome method used to identify a subnet mask address. Prefix Subnet Mask 32-bit Address The prefix length is the number Length of bits set to 1 in the subnet 255.0.0.0 11111111.00000000.00000000.00000000 /8 mask. 255.255.0.0 11111111.11111111.00000000.00000000 /16 255.255.255.0 11111111.11111111.11111111.00000000 /24 It is written in “slash notation” therefore, count the number of 255.255.255.128 11111111.11111111.11111111.10000000 /25 bits in the subnet mask and 255.255.255.192 11111111.11111111.11111111.11000000 /26 prepend it with a slash. 255.255.255.224 11111111.11111111.11111111.11100000 /27 255.255.255.240 11111111.11111111.11111111.11110000 /28 255.255.255.248 11111111.11111111.11111111.11111000 /29 255.255.255.252 11111111.11111111.11111111.11111100 /30 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 6 3 01/09/2024 IPv4 Address Structure Determining the Network: Logical AND A logical AND Boolean operation is used in determining the network address. Logical AND is the comparison of two bits where only a 1 AND 1 produces a 1 and any other combination results in a 0. 1 AND 1 = 1, 0 AND 1 = 0, 1 AND 0 = 0, 0 AND 0 = 0 1 = True and 0 = False To identify the network address, the host IPv4 address is logically ANDed, bit by bit, with the subnet mask to identify the network address. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 7 IPv4 Address Structure Video – Network, Host and Broadcast Addresses This video will cover the following: Network address Broadcast Address First usable host Last usable host © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 8 4 01/09/2024 IPv4 Address Structure Network, Host, and Broadcast Addresses Within each network are three types of IP addresses: Network address Host addresses Broadcast address Host Network Portion Host Bits Portion Subnet mask 255 255 255 0 255.255.255.0 or /24 11111111 11111111 11111111 00000000 Network address 192 168 10 0 All 0s 192.168.10.0 or /24 11000000 10100000 00001010 00000000 First address 192 168 10 1 All 0s and a 1 192.168.10.1 or /24 11000000 10100000 00001010 00000001 Last address 192 168 10 254 All 1s and a 0 192.168.10.254 or /24 11000000 10100000 00001010 11111110 Broadcast address 192 168 10 255 All 1s 192.168.10.255 or /24 11000000 10100000 00001010 11111111 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 9 11.2 IPv4 Unicast, Broadcast, and Multicast © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 10 5 01/09/2024 IPv4 Unicast, Broadcast, and Multicast Unicast Unicast transmission is sending a packet to one destination IP address. For example, the PC at 172.16.4.1 sends a unicast packet to the printer at 172.16.4.253. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 11 IPv4 Unicast, Broadcast, and Multicast Broadcast Broadcast transmission is sending a packet to all other destination IP addresses. For example, the PC at 172.16.4.1 sends a broadcast packet to all IPv4 hosts. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 12 6 01/09/2024 IPv4 Unicast, Broadcast, and Multicast Multicast Multicast transmission is sending a packet to a multicast address group. For example, the PC at 172.16.4.1 sends a multicast packet to the multicast group address 224.10.10.5. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 13 11.3 Types of IPv4 Addresses © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 14 7 01/09/2024 Types of IPv4 Addresses Public and Private IPv4 Addresses As defined in in RFC 1918, public IPv4 addresses are globally routed between internet service provider (ISP) routers. Private addresses are common blocks of Network Address RFC 1918 Private Address Range addresses used by most organizations to and Prefix assign IPv4 addresses to internal hosts. 10.0.0.0/8 10.0.0.0 - 10.255.255.255 172.16.0.0/12 172.16.0.0 - 172.31.255.255 Private IPv4 addresses are not unique and can be used internally within any 192.168.0.0/16 192.168.0.0 - 192.168.255.255 network. However, private addresses are not globally routable. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 15 Types of IPv4 Addresses Routing to the Internet Network Address Translation (NAT) translates private IPv4 addresses to public IPv4 addresses. NAT is typically enabled on the edge router connecting to the internet. It translates the internal private address to a public global IP address. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 16 8 01/09/2024 Types of IPv4 Addresses Special Use IPv4 Addresses Loopback addresses 127.0.0.0 /8 (127.0.0.1 to 127.255.255.254) Commonly identified as only 127.0.0.1 Used on a host to test if TCP/IP is operational. Link-Local addresses 169.254.0.0 /16 (169.254.0.1 to 169.254.255.254) Commonly known as the Automatic Private IP Addressing (APIPA) addresses or self- assigned addresses. Used by Windows DHCP clients to self-configure when no DHCP servers are available. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 17 Types of IPv4 Addresses Legacy Classful Addressing RFC 790 (1981) allocated IPv4 addresses in classes Class A (0.0.0.0/8 to 127.0.0.0/8) Class B (128.0.0.0 /16 – 191.255.0.0 /16) Class C (192.0.0.0 /24 – 223.255.255.0 /24) Class D (224.0.0.0 to 239.0.0.0) Class E (240.0.0.0 – 255.0.0.0) Classful addressing wasted many IPv4 addresses. Classful address allocation was replaced with classless addressing which ignores the rules of classes (A, B, C). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 18 9 01/09/2024 Types of IPv4 Addresses Assignment of IP Addresses The Internet Assigned Numbers Authority (IANA) manages and allocates blocks of IPv4 and IPv6 addresses to five Regional Internet Registries (RIRs). RIRs are responsible for allocating IP addresses to ISPs who provide IPv4 address blocks to smaller ISPs and organizations. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 19 11.4 Network Segmentation © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 20 10 01/09/2024 Network Segmentation Broadcast Domains and Segmentation Many protocols use broadcasts or multicasts (e.g., ARP use broadcasts to locate other devices, hosts send DHCP discover broadcasts to locate a DHCP server.) Switches propagate broadcasts out all interfaces except the interface on which it was received. The only device that stops broadcasts is a router. Routers do not propagate broadcasts. Each router interface connects to a broadcast domain and broadcasts are only propagated within that specific broadcast domain. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 21 Network Segmentation Problems with Large Broadcast Domains A problem with a large broadcast domain is that these hosts can generate excessive broadcasts and negatively affect the network. The solution is to reduce the size of the network to create smaller broadcast domains in a process called subnetting. Dividing the network address 172.16.0.0 /16 into two subnets of 200 users each: 172.16.0.0 /24 and 172.16.1.0 /24. Broadcasts are only propagated within the smaller broadcast domains. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 22 11 01/09/2024 Network Segmentation Reasons for Segmenting Networks Subnetting reduces overall network traffic and improves network performance. It can be used to implement security policies between subnets. Subnetting reduces the number of devices affected by abnormal broadcast traffic. Subnets are used for a variety of reasons including by: Location Group or Function Device Type © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 23 11.5 Subnet an IPv4 Network © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 24 12 01/09/2024 Subnet an IPv4 Network Subnet on an Octet Boundary Networks are most easily subnetted at the octet boundary of /8, /16, and /24. Notice that using longer prefix lengths decreases the number of hosts per subnet. Prefix Length Subnet Mask Subnet Mask in Binary (n = network, h = host) # of hosts nnnnnnnn.hhhhhhhh.hhhhhhhh.hhhhhhhh /8 255.0.0.0 16,777,214 11111111.00000000.00000000.00000000 nnnnnnnn.nnnnnnnn.hhhhhhhh.hhhhhhhh /16 255.255.0.0 65,534 11111111.11111111.00000000.00000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh /24 255.255.255.0 254 11111111.11111111.11111111.00000000 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 25 Subnet an IPv4 Network Subnet on an Octet Boundary (Cont.) In the first table 10.0.0.0/8 is subnetted using /16 and in the second table, a /24 mask. Subnet Address Host Range Subnet Address Host Range (256 Possible (65,534 possible hosts per Broadcast (65,536 Possible Broadcast (254 possible hosts per subnet) Subnets) subnet) Subnets) 10.0.0.0/16 10.0.0.1 - 10.0.255.254 10.0.255.255 10.0.0.0/24 10.0.0.1 - 10.0.0.254 10.0.0.255 10.0.1.0/24 10.0.1.1 - 10.0.1.254 10.0.1.255 10.1.0.0/16 10.1.0.1 - 10.1.255.254 10.1.255.255 10.0.2.0/24 10.0.2.1 - 10.0.2.254 10.0.2.255 10.2.0.0/16 10.2.0.1 - 10.2.255.254 10.2.255.255 … … … 10.3.0.0/16 10.3.0.1 - 10.3.255.254 10.3.255.255 10.0.255.0/24 10.0.255.1 - 10.0.255.254 10.0.255.255 10.4.0.0/16 10.4.0.1 - 10.4.255.254 10.4.255.255 10.1.0.0/24 10.1.0.1 - 10.1.0.254 10.1.0.255 10.5.0.0/16 10.5.0.1 - 10.5.255.254 10.5.255.255 10.1.1.0/24 10.1.1.1 - 10.1.1.254 10.1.1.255 10.1.2.0/24 10.1.2.1 - 10.1.2.254 10.1.2.255 10.6.0.0/16 10.6.0.1 - 10.6.255.254 10.6.255.255 … … … 10.7.0.0/16 10.7.0.1 - 10.7.255.254 10.7.255.255 10.100.0.0/24 10.100.0.1 - 10.100.0.254 10.100.0.255.................. 10.255.0.0/16 10.255.0.1 - 10.255.255.254 10.255.255.255 10.255.255.0/24 10.255.255.1 - 10.2255.255.254 10.255.255.255 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 26 13 01/09/2024 Subnet an IPv4 Network Subnet within an Octet Boundary Refer to the table to see six ways to subnet a /24 network. Subnet Mask in Binary # of Prefix Length Subnet Mask # of hosts (n = network, h = host) subnets nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh /25 255.255.255.128 2 126 11111111.11111111.11111111.10000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh /26 255.255.255.192 4 62 11111111.11111111.11111111.11000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh /27 255.255.255.224 8 30 11111111.11111111.11111111.11100000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh /28 255.255.255.240 16 14 11111111.11111111.11111111.11110000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh /29 255.255.255.248 32 6 11111111.11111111.11111111.11111000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh /30 255.255.255.252 64 2 11111111.11111111.11111111.11111100 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 27 Subnet an IPv4 Network Video – The Subnet Mask This video will demonstrate the process of subnetting. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 28 14 01/09/2024 Subnet an IPv4 Network Video – Subnet with the Magic Number This video will demonstrate subnetting with the magic number. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 29 Subnet an IPv4 Network Packet Tracer – Subnet an IPv4 Network In this Packet Tracer, you will do the following: Design an IPv4 Network Subnetting Scheme Configure the Devices Test and Troubleshoot the Network © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 30 15 01/09/2024 11.6 Subnet a Slash 16 and a Slash 8 Prefix © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 31 Subnet a Slash 16 and a Slash 8 Prefix Create Subnets with a Slash 16 prefix Prefix Length Subnet Mask Network Address (n = network, h = host) # of subnets # of hosts nnnnnnnn.nnnnnnnn.nhhhhhhh.hhhhhhhh /17 255.255.128.0 2 32766 The table highlights all 11111111.11111111.10000000.00000000 nnnnnnnn.nnnnnnnn.nnhhhhhh.hhhhhhhh the possible scenarios for /18 255.255.192.0 11111111.11111111.11000000.00000000 4 16382 subnetting a /16 prefix. /19 255.255.224.0 nnnnnnnn.nnnnnnnn.nnnhhhhh.hhhhhhhh 11111111.11111111.11100000.00000000 8 8190 nnnnnnnn.nnnnnnnn.nnnnhhhh.hhhhhhhh /20 255.255.240.0 16 4094 11111111.11111111.11110000.00000000 nnnnnnnn.nnnnnnnn.nnnnnhhh.hhhhhhhh /21 255.255.248.0 32 2046 11111111.11111111.11111000.00000000 nnnnnnnn.nnnnnnnn.nnnnnnhh.hhhhhhhh /22 255.255.252.0 64 1022 11111111.11111111.11111100.00000000 nnnnnnnn.nnnnnnnn.nnnnnnnh.hhhhhhhh /23 255.255.254.0 128 510 11111111.11111111.11111110.00000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh /24 255.255.255.0 256 254 11111111.11111111.11111111.00000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh /25 255.255.255.128 512 126 11111111.11111111.11111111.10000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh /26 255.255.255.192 1024 62 11111111.11111111.11111111.11000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh /27 255.255.255.224 2048 30 11111111.11111111.11111111.11100000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh /28 255.255.255.240 4096 14 11111111.11111111.11111111.11110000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh /29 255.255.255.248 8192 6 11111111.11111111.11111111.11111000 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh /30 255.255.255.252 16384 2 11111111.11111111.11111111.11111100 32 16 01/09/2024 Subnet a Slash 16 and a Slash 8 Prefix Create 100 Subnets with a Slash 16 prefix Consider a large enterprise that requires at least 100 subnets and has chosen the private address 172.16.0.0/16 as its internal network address. The figure displays the number of subnets that can be created when borrowing bits from the third octet and the fourth octet. Notice there are now up to 14 host bits that can be borrowed (i.e., last two bits cannot be borrowed). To satisfy the requirement of 100 subnets for the enterprise, 7 bits (i.e., 27 = 128 subnets) would need to be borrowed (for a total of 128 subnets). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 33 Subnet a Slash 16 and a Slash 8 Prefix Create 1000 Subnets with a Slash 8 prefix Consider a small ISP that requires 1000 subnets for its clients using network address 10.0.0.0/8 which means there are 8 bits in the network portion and 24 host bits available to borrow toward subnetting. The figure displays the number of subnets that can be created when borrowing bits from the second and third. Notice there are now up to 22 host bits that can be borrowed (i.e., last two bits cannot be borrowed). To satisfy the requirement of 1000 subnets for the enterprise, 10 bits (i.e., 210=1024 subnets) would need to be borrowed (for a total of 128 subnets) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 34 17 01/09/2024 Subnet a Slash 16 and a Slash 8 Prefix Video – Subnet Across Multiple Octets This video will demonstrate creating subnets across multiple octets. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 35 Subnet a Slash 16 and a Slash 8 Prefix Lab – Calculate IPv4 Subnets In this lab, you will complete the following objectives: Part 1: Determine IPv4 Address Subnetting Part 2: Calculate IPv4 Address Subnetting © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 36 18 01/09/2024 11.7 Subnet to Meet Requirements © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 37 Subnet to Meet Requirements Subnet Private versus Public IPv4 Address Space Enterprise networks will have an: Intranet - A company’s internal network typically using private IPv4 addresses. DMZ – A companies internet facing servers. Devices in the DMZ use public IPv4 addresses. A company could use the 10.0.0.0/8 and subnet on the /16 or /24 network boundary. The DMZ devices would have to be configured with public IP addresses. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 38 19 01/09/2024 Subnet to Meet Requirements Minimize Unused Host IPv4 Addresses and Maximize Subnets There are two considerations when planning subnets: The number of host addresses required for each network The number of individual subnets needed Subnet Mask in Binary # of Prefix Length Subnet Mask # of hosts (n = network, h = host) subnets nnnnnnnn.nnnnnnnn.nnnnnnnn.nhhhhhhh /25 255.255.255.128 2 126 11111111.11111111.11111111.10000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnhhhhhh /26 255.255.255.192 4 62 11111111.11111111.11111111.11000000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnhhhhh /27 255.255.255.224 8 30 11111111.11111111.11111111.11100000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnhhhh /28 255.255.255.240 16 14 11111111.11111111.11111111.11110000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnhhh /29 255.255.255.248 32 6 11111111.11111111.11111111.11111000 nnnnnnnn.nnnnnnnn.nnnnnnnn.nnnnnnhh /30 255.255.255.252 64 2 11111111.11111111.11111111.11111100 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 39 Subnet to Meet Requirements Example: Efficient IPv4 Subnetting In this example, corporate headquarters has been allocated a public network address of 172.16.0.0/22 (10 host bits) by its ISP providing 1,022 host addresses. There are five sites and therefore five internet connections which means the organization requires 10 subnets with the largest subnet requires 40 addresses. It allocated 10 subnets with a /26 (i.e., 255.255.255.192) subnet mask. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 40 20 01/09/2024 Subnet to Meet Requirements Packet Tracer – Subnetting Scenario In this Packet Tracer, you will do the following: Design an IP Addressing Scheme Assign IP Addresses to Network Devices and Verify Connectivity © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 41 11.8 VLSM © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 42 21 01/09/2024 VLSM Video – VLSM Basics This video will explain VLSM basics. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 43 VLSM Video – VLSM Example This video will demonstrate creating subnets specific to the needs of the network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 44 22 01/09/2024 VLSM IPv4 Address Conservation Given the topology, 7 subnets are required (i.e, four LANs and three WAN links) and the largest number of host is in Building D with 28 hosts. A /27 mask would provide 8 subnets of 30 host IP addresses and therefore support this topology. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 45 VLSM IPv4 Address Conservation (Cont.) However, the point-to-point WAN links only require two addresses and therefore waste 28 addresses each for a total of 84 unused addresses. Applying a traditional subnetting scheme to this scenario is not very efficient and is wasteful. VLSM was developed to avoid wasting addresses by enabling us to subnet a subnet. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 46 23 01/09/2024 VLSM VLSM The left side displays the traditional subnetting scheme (i.e., the same subnet mask) while the right side illustrates how VLSM can be used to subnet a subnet and divided the last subnet into eight /30 subnets. When using VLSM, always begin by satisfying the host requirements of the largest subnet and continue subnetting until the host requirements of the smallest subnet are satisfied. The resulting topology with VLSM applied. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 47 VLSM VLSM Topology Address Assignment Using VLSM subnets, the LAN and inter-router networks can be addressed without unnecessary waste as shown in the logical topology diagram. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 48 24 01/09/2024 11.9 Structured Design © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 49 Structured Design IPv4 Network Address Planning IP network planning is crucial to develop a scalable solution to an enterprise network. To develop an IPv4 network wide addressing scheme, you need to know how many subnets are needed, how many hosts a particular subnet requires, what devices are part of the subnet, which parts of your network use private addresses, and which use public, and many other determining factors. Examine the needs of an organization’s network usage and how the subnets will be structured. Perform a network requirement study by looking at the entire network to determining how each area will be segmented. Determine how many subnets are needed and how many hosts per subnet. Determine DHCP address pools and Layer 2 VLAN pools. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 50 25 01/09/2024 Structured Design Device Address Assignment Within a network, there are different types of devices that require addresses: End user clients – Most use DHCP to reduce errors and burden on network support staff. IPv6 clients can obtain address information using DHCPv6 or SLAAC. Servers and peripherals – These should have a predictable static IP address. Servers that are accessible from the internet – Servers must have a public IPv4 address, most often accessed using NAT. Intermediary devices – Devices are assigned addresses for network management, monitoring, and security. Gateway – Routers and firewall devices are gateway for the hosts in that network. When developing an IP addressing scheme, it is generally recommended that you have a set pattern of how addresses are allocated to each type of device. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 51 Structured Design Packet Tracer – VLSM Design and Implementation Practice In this Packet Tracer, you will do the following: Examine the Network Requirements Design the VLSM Addressing Scheme Assign IP Addresses to Devices and Verify Connectivity © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 52 26 01/09/2024 11.10 Module Practice and Quiz © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 53 Structured Design Packet Tracer – Design and Implement a VLSM Addressing Scheme In this Packet Tracer, you will do the following: Design a VLSM IP addressing scheme given requirements Configure addressing on network devices and hosts Verify IP connectivity Troubleshoot connectivity issues as required. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 54 27 01/09/2024 Structured Design Lab - Design and Implement a VLSM Addressing Scheme In this lab, you will complete the following objectives: Examine Network Requirements Design the VLSM Address Scheme Cable and Configure the IPv4 Network © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 55 Module Practice and Quiz What did I learn in this module? The IP addressing structure consists of a 32-bit hierarchical network address that identifies a network and a host portion. Network devices use a process called ANDing using the IP address and associated subnet mask to identify the network and host portions. Destination IPv4 packets can be unicast, broadcast, and multicast. There are globally routable IP addresses as assigned by the IANA and there are three ranges of private IP network addresses that cannot be routed globally but can be used on all internal private networks. Reduce large broadcast domains using subnets to create smaller broadcast domains, reduce overall network traffic, and improve network performance. Create IPv4 subnets using one or more of the host bits as network bits. However, networks are most easily subnetted at the octet boundary of /8, /16, and /24. Larger networks can be subnetted at the /8 or /16 boundaries. Use VLSM to reduce the number of unused host addresses per subnet. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 56 28 01/09/2024 Module Practice and Quiz What did I learn in this module? (Cont.) VLSM allows a network space to be divided into unequal parts. Always begin by satisfying the host requirements of the largest subnet. Continue subnetting until the host requirements of the smallest subnet are satisfied. When designing a network addressing scheme, consider internal, DMZ, and external requirements. Use a consistent internal IP addressing scheme with a set pattern of how addresses are allocated to each type of device. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 57 Module 11: IPv4 Addressing New Terms and Commands prefix length Internet Assigned Numbers Authority (IANA) logical AND Regional Internet Registries (RIRs) network address AfriNIC, APNIC, ARIN, LACNIC, and RIPE NCC broadcast address broadcast domains first usable address subnets last usable address octet boundary unicast, broadcast, and multicast transmissions variable-length subnet mask (VLSM) private addresses public addresses Network Address Translation (NAT) loopback addresses Automatic Private IP Addressing (APIPA) addresses classful addressing (Class A, B, C, D, and E) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 58 29 01/09/2024 59 30