SlideShare una empresa de Scribd logo
1 de 23
VLSM and CIDR

Routing Protocols and
Concepts – Chapter 6

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives


Compare and contrast classful and classless IP
addressing.



Review VLSM and explain the benefits of classless IP
addressing.



Describe the role of the Classless Inter-Domain
Routing (CIDR) standard in making efficient use of
scarce IPv4 addresses

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Introduction
 Prior to 1981, IP addresses used only the first 8 bits to
specify the network portion of the address
 In 1981, RFC 791 modified the IPv4 32-bit address to
allow for three different classes
 IP address space was depleting rapidly
the Internet Engineering Task Force (IETF)
introduced Classless Inter-Domain Routing (CIDR)
–CIDR uses Variable Length Subnet Masking
(VLSM) to help conserve address space.
-VLSM is simply subnetting a
subnet

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
Classful and Classless IP Addressing
 Classful IP addressing
 As of January 2007, there are over 433 million hosts on
internet
 Initiatives to conserve IPv4 address space include:
-VLSM & CIDR notation (1993, RFC 1519)
-Network Address Translation (1994, RFC 1631)
-Private Addressing (1996, RFC 1918)

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
Classful and Classless IP Addressing
 The High Order Bits
These are the leftmost bits in a 32 bit address

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Classful and Classless IP Addressing

 Classes of IP addresses are identified by the decimal number of
the 1st octet
Class A address begin with a 0 bit
Range of class A addresses = 0.0.0.0 to 127.255.255.255
Class B address begin with a 1 bit and a 0 bit
Range of class B addresses = 128.0.0.0 to 191.255.255.255
Class C addresses begin with two 1 bits & a 0 bit
Range of class C addresses = 192.0.0.0 to 223.255.255.255.

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Classful and Classless IP Addressing
 The IPv4 Classful Addressing Structure (RFC 790)
An IP address has 2 parts:
-The network portion
Found on the left side of an IP address
-The host portion
Found on the right side of an IP address

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Classful and Classless IP Addressing

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Classful and Classless IP Addressing
 Purpose of a subnet mask
It is used to determine the network portion of an IP
address

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

9
Classful and Classless IP Addressing
 Classful Routing Updates
-Recall that classful routing protocols (i.e. RIPv1)
do not send subnet masks in their routing updates
The reason is that the Subnet mask is
directly related to the network address

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
Classful and Classless IP Addressing
 Classless Inter-domain Routing (CIDR – RFC 1517)
Advantage of CIDR :
-More efficient use of IPv4 address
space
-Route summarization
Requires subnet mask to be included in routing update
because address class is meaningless
Recall purpose of a subnet mask:
-To determine the network and host portion
of an IP address

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
Classful and Classless IP Addressing
 Classless IP Addressing
 CIDR & Route Summarization
-Variable Length Subnet Masking (VLSM)
-Allows a subnet to be further sub-netted
according to individual needs
-Prefix Aggregation a.k.a. Route Summarization
-CIDR allows for routes to be summarized as a
single route

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Classful and Classless IP Addressing
 Classless Routing Protocol
 Characteristics of classless routing protocols:
-Routing updates include the subnet mask
-Supports VLSM
Supports Route Summarization

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Classful and Classless IP Addressing
 Classless Routing Protocol

Routing
Protocol

Routing
updates
Include
subnet
Mask

Supports Ability to send
VLSM Supernet routes

Classful

No

No

No

Classless

Yes

Yes

Yes

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
VLSM
 Classful routing
-only allows for one
subnet mask for all
networks
 VLSM & classless routing
-This is the process
of subnetting a subnet
-More than one
subnet mask can be used

-More efficient use of IP

addresses as compared
to classful IP
addressing
ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
VLSM
 VLSM – the process of
sub-netting a subnet to fit
your needs
-Example:
Subnet 10.1.0.0/16, 8
more bits are borrowed
again, to create 256
subnets with a /24 mask.
-Mask allows for 254 host
addresses per subnet
-Subnets range from:
10.1.0.0 / 24 to
10.1.255.0 / 24
ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
Classless Inter-Domain Routing (CIDR)
 Route summarization done by CIDR
-Routes are summarized with masks that are less
than that of the default classful mask
-Example:
172.16.0.0 / 13 is the summarized
route for the 172.16.0.0 / 16 to
172.23.0.0 / 16 classful networks

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

17
Classless Inter-Domain Routing (CIDR)
 Steps to calculate a route
summary
-List networks in binary
format
-Count number of left
most matching bits to
determine summary route’s
mask
-Copy the matching
bits and add zero bits to
determine the summarized
network address
ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

18
Summary
 Classful IP addressing
IPv4 addresses have 2 parts:
-Network portion found on left side of an IP
address
-Host portion found on right side of an IP
address
Class A, B, & C addresses were designed to provide IP
addresses for different sized organizations
The class of an IP address is determined by the decimal
value found in the 1st octet
IP addresses are running out so the use of Classless Inter
Domain Routing (CIDR) and Variable Length Subnet Mask
(VLSM) are used to try and conserve address space
ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

19
Summary
 Classful Routing Updates
–Subnet masks are not sent in routing updates
 Classless IP addressing
–Benefit of classless IP addressing
Can create additional network
addresses using a subnet mask
that fits your needs
–Uses Classless Interdomain Routing (CIDR)

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

20
Summary
 CIDR
 Uses IP addresses more efficiently through
use of VLSM
-VLSM is the process of
subnetting a subnet
 Allows for route summarization
-Route summarization is
representing multiple
contiguous
routes with a
single route

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

21
Summary
 Classless Routing Updates
Subnet masks are included in updates

ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

22
ITE PC v4.0
Chapter 1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

23

Más contenido relacionado

La actualidad más candente

CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11Irsandi Hasan
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4Irsandi Hasan
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3Joshua Torres
 
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8Irsandi Hasan
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9Irsandi Hasan
 
Exploration Routing Chapter 7
Exploration Routing Chapter 7Exploration Routing Chapter 7
Exploration Routing Chapter 7jayhawkins
 
Exploration routing chapter_8
Exploration routing chapter_8Exploration routing chapter_8
Exploration routing chapter_8Joshua Torres
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10Irsandi Hasan
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4Sachii Dosti
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2Joshua Torres
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingVuz Dở Hơi
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3Chaing Ravuth
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9Chaing Ravuth
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5Chaing Ravuth
 

La actualidad más candente (20)

CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3
 
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
Exploration Routing Chapter 7
Exploration Routing Chapter 7Exploration Routing Chapter 7
Exploration Routing Chapter 7
 
Exploration routing chapter_8
Exploration routing chapter_8Exploration routing chapter_8
Exploration routing chapter_8
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
1
11
1
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
 

Destacado (16)

20140222_iodd_in_takizawa
20140222_iodd_in_takizawa20140222_iodd_in_takizawa
20140222_iodd_in_takizawa
 
Unidad 3
Unidad 3Unidad 3
Unidad 3
 
Methods of sharing
Methods of sharingMethods of sharing
Methods of sharing
 
Tarea 7
Tarea 7Tarea 7
Tarea 7
 
M6.2
M6.2M6.2
M6.2
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1
 
Resume pritam
Resume  pritamResume  pritam
Resume pritam
 
Next 11 countries
Next 11 countriesNext 11 countries
Next 11 countries
 
LI-FI
LI-FILI-FI
LI-FI
 
Ajil mergejil
Ajil mergejilAjil mergejil
Ajil mergejil
 
MX Fund 01 - Hackers/Founders Co-op Mexico Pitch Deck
MX Fund 01 - Hackers/Founders Co-op Mexico Pitch DeckMX Fund 01 - Hackers/Founders Co-op Mexico Pitch Deck
MX Fund 01 - Hackers/Founders Co-op Mexico Pitch Deck
 
Dave Goshorn - Resume
Dave Goshorn - ResumeDave Goshorn - Resume
Dave Goshorn - Resume
 
Change Management Brochure
Change Management BrochureChange Management Brochure
Change Management Brochure
 
S Wilson 2016 Resume
S Wilson 2016 ResumeS Wilson 2016 Resume
S Wilson 2016 Resume
 
протокол6
протокол6протокол6
протокол6
 
Week11 1st draft
Week11 1st draftWeek11 1st draft
Week11 1st draft
 

Similar a VLSM and CIDR Explained

Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4Irsandi Hasan
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP AddressingYaser Rahmati
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressingteknetir
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
Week5 f2017(1)
Week5 f2017(1)Week5 f2017(1)
Week5 f2017(1)trayyoo
 
Chapter 9 : Subnetting IP networks
Chapter 9 : Subnetting IP networksChapter 9 : Subnetting IP networks
Chapter 9 : Subnetting IP networksteknetir
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksVuz Dở Hơi
 
Chapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP NetworksChapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP NetworksYaser Rahmati
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptxSelfUse
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6cyberjoex
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Hamza Malik
 

Similar a VLSM and CIDR Explained (20)

Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressing
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
Subnetting
SubnettingSubnetting
Subnetting
 
Week5 f2017(1)
Week5 f2017(1)Week5 f2017(1)
Week5 f2017(1)
 
Chapter 9 : Subnetting IP networks
Chapter 9 : Subnetting IP networksChapter 9 : Subnetting IP networks
Chapter 9 : Subnetting IP networks
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 
Chapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP NetworksChapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP Networks
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptx
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
 
Ip seminar
Ip seminarIp seminar
Ip seminar
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

VLSM and CIDR Explained

  • 1. VLSM and CIDR Routing Protocols and Concepts – Chapter 6 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Compare and contrast classful and classless IP addressing.  Review VLSM and explain the benefits of classless IP addressing.  Describe the role of the Classless Inter-Domain Routing (CIDR) standard in making efficient use of scarce IPv4 addresses ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Introduction  Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address  In 1981, RFC 791 modified the IPv4 32-bit address to allow for three different classes  IP address space was depleting rapidly the Internet Engineering Task Force (IETF) introduced Classless Inter-Domain Routing (CIDR) –CIDR uses Variable Length Subnet Masking (VLSM) to help conserve address space. -VLSM is simply subnetting a subnet ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Classful and Classless IP Addressing  Classful IP addressing  As of January 2007, there are over 433 million hosts on internet  Initiatives to conserve IPv4 address space include: -VLSM & CIDR notation (1993, RFC 1519) -Network Address Translation (1994, RFC 1631) -Private Addressing (1996, RFC 1918) ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Classful and Classless IP Addressing  The High Order Bits These are the leftmost bits in a 32 bit address ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Classful and Classless IP Addressing  Classes of IP addresses are identified by the decimal number of the 1st octet Class A address begin with a 0 bit Range of class A addresses = 0.0.0.0 to 127.255.255.255 Class B address begin with a 1 bit and a 0 bit Range of class B addresses = 128.0.0.0 to 191.255.255.255 Class C addresses begin with two 1 bits & a 0 bit Range of class C addresses = 192.0.0.0 to 223.255.255.255. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Classful and Classless IP Addressing  The IPv4 Classful Addressing Structure (RFC 790) An IP address has 2 parts: -The network portion Found on the left side of an IP address -The host portion Found on the right side of an IP address ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Classful and Classless IP Addressing ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Classful and Classless IP Addressing  Purpose of a subnet mask It is used to determine the network portion of an IP address ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Classful and Classless IP Addressing  Classful Routing Updates -Recall that classful routing protocols (i.e. RIPv1) do not send subnet masks in their routing updates The reason is that the Subnet mask is directly related to the network address ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Classful and Classless IP Addressing  Classless Inter-domain Routing (CIDR – RFC 1517) Advantage of CIDR : -More efficient use of IPv4 address space -Route summarization Requires subnet mask to be included in routing update because address class is meaningless Recall purpose of a subnet mask: -To determine the network and host portion of an IP address ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Classful and Classless IP Addressing  Classless IP Addressing  CIDR & Route Summarization -Variable Length Subnet Masking (VLSM) -Allows a subnet to be further sub-netted according to individual needs -Prefix Aggregation a.k.a. Route Summarization -CIDR allows for routes to be summarized as a single route ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Classful and Classless IP Addressing  Classless Routing Protocol  Characteristics of classless routing protocols: -Routing updates include the subnet mask -Supports VLSM Supports Route Summarization ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Classful and Classless IP Addressing  Classless Routing Protocol Routing Protocol Routing updates Include subnet Mask Supports Ability to send VLSM Supernet routes Classful No No No Classless Yes Yes Yes ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. VLSM  Classful routing -only allows for one subnet mask for all networks  VLSM & classless routing -This is the process of subnetting a subnet -More than one subnet mask can be used -More efficient use of IP addresses as compared to classful IP addressing ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. VLSM  VLSM – the process of sub-netting a subnet to fit your needs -Example: Subnet 10.1.0.0/16, 8 more bits are borrowed again, to create 256 subnets with a /24 mask. -Mask allows for 254 host addresses per subnet -Subnets range from: 10.1.0.0 / 24 to 10.1.255.0 / 24 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Classless Inter-Domain Routing (CIDR)  Route summarization done by CIDR -Routes are summarized with masks that are less than that of the default classful mask -Example: 172.16.0.0 / 13 is the summarized route for the 172.16.0.0 / 16 to 172.23.0.0 / 16 classful networks ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Classless Inter-Domain Routing (CIDR)  Steps to calculate a route summary -List networks in binary format -Count number of left most matching bits to determine summary route’s mask -Copy the matching bits and add zero bits to determine the summarized network address ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Summary  Classful IP addressing IPv4 addresses have 2 parts: -Network portion found on left side of an IP address -Host portion found on right side of an IP address Class A, B, & C addresses were designed to provide IP addresses for different sized organizations The class of an IP address is determined by the decimal value found in the 1st octet IP addresses are running out so the use of Classless Inter Domain Routing (CIDR) and Variable Length Subnet Mask (VLSM) are used to try and conserve address space ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Summary  Classful Routing Updates –Subnet masks are not sent in routing updates  Classless IP addressing –Benefit of classless IP addressing Can create additional network addresses using a subnet mask that fits your needs –Uses Classless Interdomain Routing (CIDR) ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Summary  CIDR  Uses IP addresses more efficiently through use of VLSM -VLSM is the process of subnetting a subnet  Allows for route summarization -Route summarization is representing multiple contiguous routes with a single route ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Summary  Classless Routing Updates Subnet masks are included in updates ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23