If you have ever dabbled with network devices or managed a network, you have surely heard about the TCP/IP; directly or indirectly. Well, TCP/IP is a suite of protocols used for communicating and connecting devices. Any device or hardware, say a router, switch, or a computer, connected to a TCP/IP-based network is assigned a unique IP address.
The IP address uniquely identifies the device in a network while communicating. This IP address can be configured manually (in case of a static IP) or automatically by a DHCP server. A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways, and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients.
The IP address consists of 4 bytes of data. A single byte consists of 8 bits, hence there is a total of 32 bits in the IP address. As you can express up to 256 different numbers using a byte, each of these 4 chunks can vary from 0 to 255. While writing the IP address, each of these bytes is represented as a numeric value, and usually, a dot separates each byte.
Consider the IP address 192.168.0.132 which is written in the usual dot-decimal notation. Each of the bytes is separated by a dot. The same IP address can be written in binary notation. For example, 11000000.10101000.00000000.10000100 is the equivalent of the earlier, but it is simply more cumbersome.
Subnetting is a slightly advanced topic and needs some familiarity with how IP addresses are used to identify a device (often called a node in a network). In short, it is the process of breaking a bigger network into smaller ones. Technically, it is the process of logical subdivision of a network (logical because you are not ‘physically’ dividing the network). There are several important reasons for doing so – decreased broadcast traffic and easier troubleshooting are two of them.
A subnet mask is, in general, a 4-byte number (just like IP address) that is paired with the IP. An IP address and subnet mask pair uniquely identify the network address and host address. The subnet mask tells whether the host is on the local subnet or a remote network. The subnet mask divides the IP address into 2 parts – the network address and the host address.
The biggest issue of the current approach is that you cannot determine what part of the IP is the network address and what part of it is the host address. Given the IP address and the corresponding subnet mask, one can easily determine the network address of a host.
Subnets give a method of securing and managing the network to decrease network blockage. When there is a lot of movement going between critical parts of the network, it can support those parts in a separate segment, so the traffic doesn’t have to move over the complete network to get from point to point. Leaving out unimportant segments of the network into subnets enables traffic to move more swiftly and to evade using redundant routes, uniting traffic where it isn’t required.
In addition, subnetting benefits in effectively allotting IP addresses and blocks numerous IP addresses from getting untouched. Subnets are normally configured dynamically for special departments, or for special groups within a company to enable their network traffic to stay within the area.
IP addresses can be distributed with one other machine or show to the public. Furthermore, IP addresses can be dynamic or static. A static IP address indicates a special machine has an IP address allotted to it, which doesn’t alter. A dynamic IP address indicates when a machine enters a network it’s assigned an open IP address, which could vary each time the machine connects.
As mentioned earlier, the idea of IP addressing and subnetting are obtained from a huge network to build limited networks for connection of different network machines. They are located far distant from each other and selecting the single IP address and subnet mask for them to interact with each other.
The IP Subnet Calculator gives subnet calculations for the assigned network address block, subnet mask. One of the most efficient techniques to resolve the network blockage issue is to split the TCP/IP network into short, more flexible sections. The method of distributing the network is called subnetting.
A subnet calculator is a helpful tool for determining the number of potential subnets for any assigned network address block. You can select the sequence of subnets and the hosts per subnet that befits the network Splitting a big network and allotting IP address ranges to various units is a job that can be determined intellectually, but it’s safer to have an alternative to check the subnet before calculating them in the router.
Well, it should be clear by now that you need some additional information in the form of a subnet mask. For example, say we have an IP address 192.168.0.132 and a subnet mask 255.255.255.0. Writing them in the binary form we get the following:
11000000 . 10101000 . 00000000 . 10000100 <– IP address
11111111 . 11111111 . 11111111 . 00000000 <– Subnet mask
——————————————————————————————–
11000000 . 10101000 . 00000000 . 00000000 <– Network address
Performing bitwise AND operation on these 2, 4-byte numbers we get the network address. Similarly, if we consider the negation of the subnet mask (i.e. the result we get after performing the bitwise NOT operation on the subnet mask) what we end up with is the host address.
11000000 . 10101000 . 00000000 . 10000100 <– IP address
00000000 . 00000000 . 00000000 . 11111111 <– The negation of the Subnet mask
——————————————————————————————————————
00000000 . 00000000 . 00000000 . 10000100 <– Host address
So we end up with the deciphered network address 192.168.0.0 and the host address 0.0.0.132. So, essentially when a packet has 192.168.0.132 as the destination address it goes to the subnetwork designated the network address 192.168.0.0 and then searches for the host address 0.0.0.132.
All the IP addresses are allocated by the Network Information Center (NIC or InterNIC), an organization founded in 1972 that is in charge of administering the internet. From its birth in 1972 until October 1, 1991, it was run by the Stanford Research Institute, now known as SRI International, and led by Jake Feinler. The IP addresses can be broadly categorized into many classes depending on their value.
The addresses are divided into 5 classes – A, B, C, D, and E. Among these classes, A, B, and C are the most popular and widely used. Class D and E are not officially released for public use yet. Each of these classes has different default subnet masks.
You can identify the class of your IP address by checking out the value of the first octet. In other words, the value before the first dot dictates what would be the class of the IP. Following are the rules for determining the class:
In many cases, organizations decide to divide the IP addresses. The default subnet mask is unable to deal with such needs. In many situations, it becomes necessary: say the very physical topology is not of much utility for the organization, or the number of hosts or networks may not fit within the bracket that the subnet mask provides.
In any case, a network administrator might decide to further logically divide (or technically, ‘subnet’) the network.
In the following section, we have compiled several tables with important IP address ranges.
Addresses | Hosts | Netmask | Amount of a Class C | |
/30 | 4 | 2 | 255.255.255.252 | 1/64 |
/29 | 8 | 6 | 255.255.255.248 | 1/32 |
/28 | 16 | 14 | 255.255.255.240 | 1/16 |
/27 | 32 | 30 | 255.255.255.224 | 1/8 |
/26 | 64 | 62 | 255.255.255.192 | 1/4 |
/25 | 128 | 126 | 255.255.255.128 | 1/2 |
/24 | 256 | 254 | 255.255.255.0 | 1 |
/23 | 512 | 510 | 255.255.254.0 | 2 |
/22 | 1024 | 1022 | 255.255.252.0 | 4 |
/21 | 2048 | 2046 | 255.255.248.0 | 8 |
/20 | 4096 | 4094 | 255.255.240.0 | 16 |
/19 | 8192 | 8190 | 255.255.224.0 | 32 |
/18 | 16384 | 16382 | 255.255.192.0 | 64 |
/17 | 32768 | 32766 | 255.255.128.0 | 128 |
/16 | 65536 | 65534 | 255.255.0.0 | 256 |
Network number | IP Range | Broadcast |
.0 | .1 – .2 | .3 |
.4 | .5 – .6 | .7 |
.8 | .9 – .10 | .11 |
.12 | .13 – .14 | .15 |
.16 | .17 – .18 | .19 |
.20 | .21 – .22 | .23 |
.24 | .25 – .26 | .27 |
.28 | .29 – .30 | .31 |
.32 | .33 – .34 | .35 |
.36 | .37 – .38 | .39 |
.40 | .41 – .42 | .43 |
.44 | .45 – .46 | .47 |
.48 | .49 – .50 | .51 |
.52 | .53 – .54 | .55 |
.56 | .57 – .58 | .59 |
.60 | .61 – .62 | .63 |
.64 | .65 – .66 | .67 |
.68 | .69 – .70 | .71 |
.72 | .73 – .74 | .75 |
.76 | .77 – .78 | .79 |
.80 | .81 – .82 | .83 |
.84 | .85 – .86 | .87 |
.88 | .89 – .90 | .91 |
.92 | .93 – .94 | .95 |
.96 | .97 – .98 | .99 |
.100 | .101 – .102 | .103 |
.104 | .105 – .106 | .107 |
.108 | .109 – .110 | .111 |
.112 | .113 – .114 | .115 |
.116 | .117 – .118 | .119 |
.120 | .121 – .122 | .123 |
.124 | .125 – .126 | .127 |
.128 | .129 – .130 | .131 |
.132 | .133 – .134 | .135 |
.136 | .137 – .138 | .139 |
.140 | .141 – .142 | .143 |
.144 | .145 – .146 | .147 |
.148 | .149 – .150 | .151 |
.152 | .153 – .154 | .155 |
.156 | .157 – .158 | .159 |
.160 | .161 – .162 | .163 |
.164 | .165 – .166 | .167 |
.168 | .169 – .170 | .171 |
.172 | .173 – .174 | .175 |
.176 | .177 – .178 | .179 |
.180 | .181 – .182 | .183 |
.184 | .185 – .186 | .187 |
.188 | .189 – .190 | .191 |
.192 | .193 – .194 | .195 |
.196 | .197 – .198 | .199 |
.200 | .201 – .202 | .203 |
.204 | .205 – .206 | .207 |
.208 | .209 – .210 | .211 |
.212 | .213 – .214 | .215 |
.216 | .217 – .218 | .219 |
.220 | .221 – .222 | .223 |
.224 | .225 – .226 | .227 |
.228 | .229 – .230 | .231 |
.232 | .233 – .234 | .235 |
.236 | .237 – .238 | .239 |
.240 | .241 – .242 | .243 |
.244 | .245 – .246 | .247 |
.248 | .249 – .250 | .251 |
.252 | .253 – .254 | .255 |
Network number | IP Range | Broadcast |
.0 | .1 – .126 | .127 |
.128 | .129 – .254 | .255 |
Network number | IP Range | Broadcast |
.0 | .1 – .62 | .63 |
.64 | .65 – .126 | .127 |
.128 | .129 – .190 | .191 |
.192 | .193 – .254 | .255 |
Network number | IP Range | Broadcast |
.0 | .1 – .6 | .7 |
.8 | .9 – .14 | .15 |
.16 | .17 – .22 | .23 |
.24 | .25 – .30 | .31 |
.32 | .33 – .38 | .39 |
.40 | .41 – .46 | .47 |
.48 | .49 – .54 | .55 |
.56 | .57 – .62 | .63 |
.64 | .65 – .70 | .71 |
.72 | .73 – .78 | .79 |
.80 | .81 – .86 | .87 |
.88 | .89 – .94 | .95 |
.96 | .97 – .102 | .103 |
.104 | .105 – .110 | .111 |
.112 | .113 – .118 | .119 |
.120 | .121 – .126 | .127 |
.128 | .129 – .134 | .135 |
.136 | .137 – .142 | .143 |
.144 | .145 – .150 | .151 |
.152 | .153 – .158 | .159 |
.160 | .161 – .166 | .167 |
.168 | .169 – .174 | .175 |
.176 | .177 – .182 | .183 |
.184 | .185 – .190 | .191 |
.192 | .193 – .198 | .199 |
.200 | .201 – .206 | .207 |
.208 | .209 – .214 | .215 |
.216 | .217 – .222 | .223 |
.224 | .225 – .230 | .231 |
.232 | .233 – .238 | .239 |
.240 | .241 – .246 | .247 |
.248 | .249 – .254 | .255 |
Routers are usually allocated the number 1 within a specified subnet. There is no technical need for all of this; it is merely a procedure. The router will nearly always be delegated 192.168.1.1 on the 192.168.1.x subnet. Likewise, on the 192.168.200.x subnet, the modem is most commonly 192.168.200.1. This configuration, even so, makes it simpler for malware to find the router, so if your modem is not the top machine, you are somewhat perfectly safe. In fact, it is recommended to bypass allocating the number 1 to anything.
A subnet is the range of permitted LAN-side Ips (as in sub-network, as in, only use these few numbers of all the billions of possible numbers). The counts that start with 192.168.1 and only vary in the 4th number are a really widely accepted subnet (scope of numbers). This is commonly written as 192.168.1.x, where the x stands in for all possible values in the 4th spot (0 to 255).
A LAN-side IP address is allocated to appliances attached to the network in one of three major routes.
Broadcast traffic causes massive network deficiency. This traffic includes information packets moving across the network toward each node. Subnetting decreases the number of nodes in which broadcast traffic meshes perfectly and tends to make data packet routing more specific and convenient by splitting subnets.
If you run a successful local area network with several network devices and a large density of network activity, running different subnets instead of one larger network has a lot of security benefits. Most particularly, if an attack jeopardizes a subnet, only that network segment is directly impacted. Utilizing subnets, intruders would only be allowed to catch devices within the same subnet, instead of all devices on a network.
The IP service is a part of daily life. Hence, the fundamental knowledge of IP address, subnet mask, and address is necessary to secure TCP/IP configuration. While it’s essential to learn how TCP/IP networks are marked and broken into subnetworks, getting some knowledge of IP address and subnet mask could be useful.