You are on page 1of 56

N ETWORK D ESIGN

D ESIGNING M ODELS FOR A DDRESSING AND N AMING

Oppenheimer
2
O BJECTIVES

To provide guidelines for assigning


1 addresses and names to
Internetwork components, including
networks, subnets, routers, servers, and
end systems

To demonstrate the importance of using


2 a structured model for network layer
addressing and naming
2016/2017
3
G UIDELINES FOR ASSIGNING
NETWORK LAYER ADDRESSES
 Design a structured model for addressing before
assigning any addresses.

 Leave room for growth in the addressing model.

 Assign blocks of addresses in a hierarchical fashion to


foster scalability and availability.

 Use dynamic addressing for end systems – for flexibility


and minimize configuration.

 Use private addresses with NAT in IP environment –


maximize security and adaptability.

2016/2017
U SING A STRUCTURED MODEL
4 FOR NETWORK LAYER
ADDRESSING

 A structured model for addressing means that


addresses are meaningful, hierarchical and planned.
 Example: IP address has prefix and host
 A clearly documented structured model for
addressing facilities management and
troubleshooting.

2016/2017
5 P ROBLEMS WITH NO MODEL

 Duplicate network and host addresses


 Illegal addresses that cannot be routed on the
Internet.
 Not enough addresses in total or by group
 Addresses that cannot be used -> waste

2016/2017
6
A DMINISTERING ADDRESSES
BY A CENTRAL AUTHORITY

 A corporate IS should develop a global model for


network layer addressing.
 The model should identify network numbers for the
core of the enterprise and blocks of subnets for the
distribution and access layer (can further divide the
subnets).

2016/2017
7 IP ADDRESS

 The IP address can be public or private.


 Public IP are globally unique and are registered with a
numbering authority.
 Private IP address are never route on global Internet
and are assigned from a special range, documented in
RFC 1918.

2016/2017
8 P UBLIC IP A DDRESSES
 Managed by the Internet Assigned Numbers Authority
(IANA)
 Users are assigned IP addresses by Internet service
providers (ISPs).
 ISPs obtain allocations of IP addresses from their
appropriate Regional Internet Registry (RIR):
• APNIC (Asia Pacific Network Information Centre) – Asia/Pacific
Region
• ARIN (American Registry for Internet Numbers) – North America and
Sub-Sahara Africa
• LACNIC (Regional Latin-American and Caribbean IP Address Registry)
– Latin America and some Caribbean Islands
• RIPE NCC (Réseaux IP Européens) – Europe, the Middle East, Central
Asia, and African countries located north of the equator
2016/2017
9 P UBLIC VS P RIVATE -IP ADDRESS
 Early in address designing process: designer need to
answer the following questions
 Are public, private or both address type required?

 How many end systems need access to private network


only?

 How many end systems need to be visible to the public


address?

 How will translation between private and public address


occur?

 Where in the network topology will the boundary between


private and public address exist?
2016/2017
10
S TATIC VS DYNAMIC
ADDRESSING
 Static address used for /at
 servers, routers, network management systems

 The edge in the e-commerce, internet edge, VPN/remote-


access and WAN edge modules of a modular network design.

 Dynamic address used for end systems, workstations and IP


phones. Dynamic addressing:
 reduces the configuration task required to connect end
systems to an internetwork.

 A station can automatically learn the network segment to


which it is currently attached and adjust its network layer
address accordingly.
2016/2017
O THER CRITERIA FOR USING
11 STATIC VS DYNAMIC
ADDRESSING
 The number of end systems > 30 systems : Dynamic

 Renumbering in the future because the current plan is not


well structured / will run out of number soon: Dynamic

 High availability: Static are available anytime

 Security : Dynamic allowed any device that connect to the


network can acquire a valid address. But very strict security
policy, dynamic is not appropriate.

 Address tracking: Static easier to track

 Additional parameter – e.g DHCP server provides a subnet


mask, default gateway, DNS, WINS server address: Dynamic
2016/2017
D YNAMIC HOST
12 CONFIGURATION PROTOCOL
(DHCP)
 DHCP uses a client/server model.

 Servers allocate network layer addresses and save


information about which addresses have been allocated.

 Clients dynamically request configuration parameters from


servers.

 The goal of DHCP is that clients should require no manual


configuration.

 In addition, the network manager should not have to enter


any per-client configuration parameters into servers.

2016/2017
13 D HCP - CONTINUE ..

 DHCP supports 3 methods for IP address allocation:


 Automatic allocation: a DHCP server assigns a permanent IP
address to a client.

 Dynamic allocation : A DHCP server assigns an IP address to a


client for a limited period of time - most popular.
 A client request the use of an address for a limited period of
time called a lease.

 Manual allocation: A network administrator assigns a


permanent IP address to a client, and DHCP is used simply to
convey the assigned address to the client. (requires per-client
configuration)
2016/2017
14
P RIVATE ADDRESSING IN AN
IP ENVIRONMENT
 Private IP address are addresses that an enterprise network
administrator assigns to internal networks and hosts
without any coordination from an ISP or one of the RIRs.

 Public addresses are not necessary for internal hosts and


networks.

 Addressing for internal hosts that need access to outside


services such as emails, FTP or web servers can be handled
by NAT gateway.

2016/2017
15 P RIVATE A DDRESSING

Ranges for private networks:


 10.0.0.0 – 10.255.255.255
 172.16.0.0 – 172.31.255.255
 192.168.0.0 – 192.168.255.255

2016/2017
16 P RIVATE NETWORK NUMBER

 Advantage: security
 The number is private!!! – it is not advertised to Internet.

 Meets goals for adaptability and flexibility- using private


addressing makes it easier to change ISPs in the future.
 When moved to a new ISP, the only address changes required
are in the router or firewall providing NAT services and in any
public servers.

 Enterprise can advertise one network number or small


block of network numbers to the Internet.
 Easy to manage routing table
2016/2017
17
P RIVATE ADDRESSING -
DISADVANTAGE

 Outsourcing network management is difficult.

 Difficult to communicate with partners, vendors, suppliers


etc.
18
N ETWORK ADDRESS
TRANSLATION (NAT)
 NAT is an IP mechanism that is described in RFC 3022 for
converting addresses from an inside network to addresses
that are appropriate for an outside network vice versa.
 NAT is useful for host that use private address to access the
Internet.
 NAT can be implemented in a separate appliance, router or
firewall.

2016/2017
19 NAT- HOW IT WORK ?

 The NAT administrator


configures a pool of outside
addresses that can be used
for translation.

 When an inside host sends a


packet, the source address is
translated dynamically to an
address from the pool of
outside addresses.

 NAT also has a provision for


static addresses for servers
that need a fixed address –
web server/email server that
must always map to the same
2016/2017
well-known address.
20 NAT- CONTINUE ..

 Some NAT products offer port translation for mapping


several addresses to the same address: Port Address
Translation (PAT) aka NAT overload.

 All traffic from an enterprise has the same address: Port


numbers are used to distinguish separate conversations.

 Reduces the number of required outside addresses.

 NAT gateway must be low delay and higher throughput –


since all traffic will need to passed by it.

2016/2017
21
U SING A HIERARCHICAL MODEL FOR
ASSIGNING ADDRESSES
 Hierarchical addressing is a model for applying structure to
addresses so that numbers in the left part of an address
refer to large blocks of network/nodes and numbers in the
right part of an address refer to individual networks/nodes.

 Benefit of hierarchical addressing = similar to benefit of


hierarchy in topology design

 Allow hierarchical routing (HR) = distribute knowledge of a


network topology among the internetwork routers.

 using HR, no single router needs to understand the


complete topology.

2016/2017
22
T HE T WO PARTS OF AN IP
A DDRESS
32 Bits

Prefix Host

Prefix Length

Prefix identifies a block of host number and is


used for routing to that block.

2016/2017
23 C LASSFULL ADDRESSING

2016/2017
24 D OTTED – DECIMAL NOTATION
 It divides the 32 bit internet address into four 8 fields
and specifies the value of each field independently as
a decimal number.

2016/2017
25 C ONTINUE ..

2016/2017
26 E XAMPLE OF NETWORK

2016/2017
27 SUBNETTING

 A procedure that divide a single class A,B,C network


number into smaller pieces.
 Why need to subnet?
 Internet routing continue to grow
 Local admin need to request new network number
as network grow

2016/2017
28 C ONTINUE ..

2016/2017
29 S UBNET M ASK

 32 bits long
 Specifies which part of an IP address is the network/subnet field
and which part is the host field
 The network/subnet portion of the mask is all 1s in binary.
 The host portion of the mask is all 0s in binary.
 Convert the binary expression back to dotted-decimal
notation for entering into configurations.
 Alternative
 Use slash notation (for example /24)
 Specifies the number of 1s

2016/2017
30 S UBNET M ASK E XAMPLE

 11111111 11111111 11111111 00000000

 11111111 11111111 11110000 00000000

 11111111 11111111 11111000 00000000

Solve:

 What is this in slash notation?

 What is this in dotted-decimal notation?


31
D ESIGNING N ETWORKS WITH
S UBNETS

 Determining subnet size


 Computing subnet mask
 Computing IP addresses

2016/2017
32
D ESIGNING N ETWORKS WITH
H OST

 Determining no. of Host


 Computing subnet mask
 Computing IP addresses

2016/2017
33 P RACTICE

Network is 172.16.0.0

 You will allow 600 nodes per subnet.


 What subnet mask should you use?
 What is the address of the first node on the
first subnet?
 What address would this node use to send to
all devices on its subnet?
2016/2017
34 M ORE P RACTICE

 Network is 172.16.0.0

 You have eight LANs, each of which will be its


own subnet.

 What subnet mask should you use?

 What is the address of the first node on the first


subnet?

 What address would this node use to send to all


devices on its subnet?

2016/2017
35 O NE M ORE

 Network is 192.168.55.0
 You want to divide the network into subnets.
 You will have approximately 25 nodes per subnet.
 What subnet mask should you use?
 What is the address of the last node on the last
subnet?
 What address would this node use to send to all
devices on its subnet?

2016/2017
36 C LASSLESS IP A DDRESSING

 Characteristics of classless routing protocols:


-Routing updates include the subnet mask
-Supports VLSM
-Supports Route Summarization

2016/2017
37
VARIABLE LENGTH SUBNET
MASK (VLSM)

 In the previous subnet example, the same subnet


mask is applied to all the subnets.

 This means each subnet has the same number of


available host addresses.

 However the subnets may not be equally


occupied hence results in wastage in address
space.

 Use VLSM to give different subnet masks for each


subnet so that we will use the address efficiently.

 VLSM = subnetting a subnet.


2016/2017
38 VLSM

 A method to subnetting a subnet

 Using VLSM, we can allocate IPV4 addresses to


the subnets by the exact needs.

 VLSM allows us to use more than one subnet


mask within the same network address space.

 VLSM allows to create subnets from a single


network with unequal number of IPV4 addresses.

Example in class.

2016/2017
39
VLSM DESIGN
CONSIDERATIONS

 When designing a VLSM, network designer must


recursively ask the same questions as for a traditional
subnet design.
 How many total subnets does this level need today?

 How many total subnets will this level need in the future?

 How many hosts are on this level’s largest subnet today?

 How many hosts will be on this level’s largest subnet in


the future?

2016/2017
40 VLSM - CONTINUE
 At each level, the design team must ensure that they have
enough extra bits to support the required number of sub entities
in the next levels of recursion.

 The development of a hierarchical subnetting scheme requires


careful planning.

 It is essential that the designers recursively work their way down


through their addressing plan until they get to the bottom level.

 At the bottom level, they must make sure that the leaf subnets
are large enough to support the required number of hosts.

 When the addressing plan is deployed, the addresses from each


site must be aggregated into a single address block that keeps the
backbone routing table from becoming too large.

2016/2017
41
R EQUIREMENTS FOR
DEPLOYING VLSM

 The successful deployments of VLSM has three


prerequisites;
 The routing protocols must carry extended network prefix
information with each route advertisement.

 All routers must implement a consistent forwarding


algorithm based on the “longest match”

 For route aggregation to occur, addresses must be assigned


so that they have topological significance.

2016/2017
• T H E R O UT IN G P R O TO C O LS M US T C A R RY E X T E N D E D
N E T W O R K P R E F IX IN F O R M AT IO N W IT H E A C H R O UT E
42
A D V E RT IS E M E N T.

 OSPF and IS-IS enable the deployment of the


VLSM by providing the extended network
prefix length or mask value along with each
route advertisement.
 This permits each subnetwork to be
advertised with its corresponding prefix
length/mask.
• A L L R O UT E R S M US T IM P LE M E N T A C O N S IS T E N T
F O RWA R D IN G A LG O R IT H M B A S E D O N T H E “ LO N G E S T
43
M AT C H ”

 A router with a longer extended network prefix is more


specific.
 Example:
 If a packet’s destination IP address was 11.1.2.5 and there
were three network prefixes in the routing table (
11.1.2.0/24,11.1.0.0/16,11.0.0.0/8).
 The router would select the route to 11.1.2.0/24 because its
prefix has the greatest number of corresponding bits in the
destination IP address of the packet.
Destination 11.1.2.5 00001011.00000001.00000010.00000101
Route #1 11.1.2.0/24 00001011.00000001.00000010.00000000
11.1.0.0/16 00001011.00000001.00000000.00000000
11.0.0.0/8 00001011.00000000.00000000.00000000
44 VLSM EXAMPLE

 Suppose a company has 3 departments with the


following host requirement for each department.
 Sales = 50 host

 Marketing = 30 hosts

 Finance = 10 hosts

 Given the IP address block : 192.168.1.0/24, the


company wants to subnet the IP address for each
of the departments using VLSM.
45 VLSM EXAMPLE - CONTINUE

Bits 128 64 32 16 8 4 2 1
Value
BB 1 2 3 4 5 6 7 8
SM 128 192 224 240 248 252 254 255
SP /25 /26 /27 /28 /29 /30

BB = bits borrowed Sales = 50 host


SM= Subnet Mask Marketing = 30 hosts
SP = Subnet Prefix Finance = 10 hosts
46 VLSM EXAMPLE

 Sales = 50 hosts, using the table, we  Marketing =30 hosts, using the
are borrowing 2 bits = 64. (64 is the table, we are borrowing 3 bits =32.
closest to 50 host!!) (32 is the closest to 30 host!!)
 Only 62 can be used  Only 30 can be used
 Network address: 192.168.1.0/26  Network address: 192.168.1.64/27
 Subnet mask:
 Subnet mask:
255.255.255.192(128+64) 255.255.255.224(128+64+32)
 First usable address :
 First usable address :
192.168.1.65/27
192.168.1.1/26
 Last usable address: 192.168.1.94
 Last usable address: 192.168.1.62 /26
/26
 Broadcast address :192.168.1.95
 Broadcast address :192.168.1.63
47 VLSM EXAMPLE

 Finance =10 hosts, using the table, • Assigned the IP for biggest
we are borrowing 4 bits =16. (16 is host first then followed by the
the closest to 10 host!!) second biggest etc.

 Only 14 can be used • In this example, we have


seen that 3 different subnet
 Network address: 192.168.1.96/28
mask has been applied.
 Subnet mask /26, /27 and /28.
:255.255.255.240(128+64+32+16)
 First usable address :
192.168.1.97/28
 Last usable address: 192.168.1.110
/28
 Broadcast address :192.168.1.111/28
48 VLSM – EXERCISE

 An administrator have 192.168.1.0/24 IP address. He is


having 4 departments with the different host numbers.
(listed below). Subnet the address using VLSM.

 Sales =30 host

 Purchase = 20 hosts

 Accounts = 5 hosts

 Management = 10 hosts

 List the network address, usable host address , broadcast


address and subnet mask for all the departments.
49 C LASSLESS A DDRESSING

 Prefix/host boundary can be anywhere


 Less wasteful
 Supports route summarization
 Also known as
 Aggregation
 Supernetting
 Classless routing
 Classless inter-domain routing (CIDR)
 Prefix routing

2016/2017
50
C LASSLESS INTERDOMAIN
ROUTING (CIDR)

 To solve the problem with routing overhead.

 CIDR is a method used for summarized routes.

 It specifies that IP network address should be assigned in


blocks and that routers in the Internet should group routes
to cut down on the quantity of routing information shared
by Internet routers.

2016/2017
51 CIDR

 Use the concept of network prefix

 Routers use the network prefix rather than the first 3


bits of the IP address to determine the dividing point
between the network number and the host number.

 CIDR supports the deployment of arbitrarily sized


networks rather than the standard 8-bit,16-bit or 24-bit
network numbers associated with classful addressing.
52 CIDR

 In CIDR model, each piece of routing information


is advertised with a bit mask /prefix length.

 The prefix length is a way of specifying the


number of leftmost contiguous bits in the
network portion of each routing table entry.

 Example:

 A network with 20 bits of network number and


12 bits of host number will be advertised with a
20-bit prefix length(/20).
53 CIDR

 Example: network 172.16.0.0 with network mask


255.255.0.0 can be represented as 172.16.0.0/16

 The length of network mask does not need follow


nature masks.
54
CIDR USAGE : R OUTE
A GGREGATION
 CIDR allows multiple routes to be aggregated into one
so as to minimize the size of the routing table thus
improving the scalability of the router.
 E.g: The network administrator assigned network
numbers 172.16.0.0 through 172.19.0.0 to networks in a
branch office.

172.16.0.0

172.17.0.0

172.18.0.0

Branch-Office Router

172.19.0.0

Enterprise Core Network


Branch-Office Networks
55 C ONTINUE ..
 The branch office can summarize its local network numbers
and report that it can reach 172.16.0.0/14.

 By advertising this single route, the router is saying” route


packets to me if the destinations has the first 14 bits set to
172.16- the first 14 bits are equal to 10101100000100

Second Octet in Second Octet in


Decimal Binary
16 00010000
17 00010001
18 00010010
19 00010011
56 R OUTE SUMMARIZATION TIPS

 Multiple IP addresses must share the same


leftmost bits

 Routers must base their routing decisions on a


32-bit IP address and prefix length that can be up
to 32 bits

 Routing protocols must carry the prefix length


with 32-bit addresses.

You might also like