Topology Assessment Objectives Part 1 Develop The IPv4 Addre
Topologyassessment Objectivespart 1 Develop The Ipv4 Address Scheme
Develop the IPv4 Address Scheme based on given IP address and mask, designing subnets for subnet A (500 hosts), subnet B (200 hosts), and subnet C (100 hosts). Include details such as the number of bits in the subnet, the IP mask in binary and decimal, the maximum number of usable subnets, the number of hosts per subnet, and the IP address ranges, first IP, host addresses, and last IP for each subnet. Assign host IP addresses using the first IP in each subnet; the router will use the last network host address, the switch will use the second to last network host address. Provide IP address information for each device, including PCs, router interfaces, and switch VLAN interfaces, with relevant IP addresses and subnet masks.
Paper For Above instruction
Designing an effective IPv4 addressing scheme is fundamental to establishing a scalable, efficient, and organized network infrastructure. The assignment involves creating subnets to accommodate specific requirements, particularly given the constraints of a /16 network address (172.18.0.0/16). The goal is to subdivide this large network into smaller, manageable subnets that meet the hostname-specific requirements for host counts in each subnet while optimizing IP address utilization.
Understanding the Addressing Requirements
The provided network address is 172.18.0.0/16, which offers a total of 65,536 IP addresses. The subnetting task allocates space for three subnets: Subnet A with 500 hosts, Subnet B with 200 hosts, and Subnet C with 100 hosts. No subnet calculators are permitted, which necessitates manual calculation of subnet masks, number of bits, and IP ranges. Additionally, the first IP address in each subnet will be assigned to host devices, with specific addresses for the router and switch interfaces.
Subnet Calculation Process
In subnetting, the number of bits borrowed from the host portion determines the number of available subnets, while the host bits determine the number of usable hosts. The 'all-ones' bit in subnet mask indicates network bits, while 'all-zeros' are host bits.
For subnet A (500 hosts), the number of hosts needed is 500. Normally, we need a subnet mask capable of providing at least 500 usable addresses.
Number of hosts = 2^h - 2, where h is the number of host bits.
Calculating for subnet A:
- Next power of two greater than or equal to 500 + 2 (for network and broadcast) gives 512 addresses.
- Therefore, host bits h = 9, as 2^9 = 512.
- Number of network bits: 16 - 9 = 7.
- Subnet mask in binary: 11111111.11111111.11111111.1 0000000 (since 7 network bits in third octet + 2 in the first octet), but more precisely, /23 or /25, need validation.
However, actual subnetting here requires carefully calculating the subnet Mask:
- To support at least 500 hosts, the subnet mask must have at least 9 host bits: 2^9 = 512 addresses, with 510 usable.
Calculations:
- Subnet mask in CIDR: /23 (since 32 - 9 = 23) would be insufficient, as 2^9=512; however, /23 supports 510 usable addresses (since network and broadcast addresses are reserved).
Which is suitable for subnet A.
Similarly, for subnet B (200 hosts):
- Next network size: 2^8=256 addresses, so needs 8 host bits, corresponding to a /24 subnet mask (255.255.255.0).
And for subnet C (100 hosts):
- 2^7=128 addresses, so needs 7 host bits, corresponding to a /25 subnet mask (255.255.255.128).
Based on these calculations, subnets will be assigned as:
- Subnet A: /23 (255.255.254.0)
- Subnet B: /24 (255.255.255.0)
- Subnet C: /25 (255.255.255.128)
Next, determine subnet IDs, range of IPs, and their addresses.
Subnet A:
- Subnet ID: 172.18.0.0/23
- Number of usable hosts: 510
- First IP: 172.18.0.1 (assigned to host)
- Network address: 172.18.0.0
- Broadcast address: 172.18.1.255
- Range of usable addresses: 172.18.0.1 to 172.18.1.254
Subnet B:
- Subnet ID: 172.18.2.0/24
- Number of usable hosts: 254
- First IP: 172.18.2.1
- Network address: 172.18.2.0
- Broadcast address: 172.18.2.255
- Range of usable addresses: 172.18.2.1 to 172.18.2.254
Subnet C:
- Subnet ID: 172.18.3.0/25
- Number of usable hosts: 126
- First IP: 172.18.3.1
- Network address: 172.18.3.0
- Broadcast address: 172.18.3.127
- Range of usable addresses: 172.18.3.1 to 172.18.3.126
Assigning IP addresses:
- PC-1: 172.18.0.1 (Subnet A)
- PC-2: 172.18.2.2 (Subnet B)
- PC-3: 172.18.3.2 (Subnet C)
Router interfaces:
- G0/0 to 172.18.1.254 (Subnet A router interface)
- G0/1 to 172.18.2.254 (Subnet B router interface)
- G0/2 to 172.18.3.254 (Subnet C router interface)
Switch VLAN address:
- VLAN 1: 172.18.1.2 (Management VLAN for switch configuration)
This IP addressing scheme ensures each subnet meets host requirements with efficient allocation while setting network components with correct IPs to facilitate connectivity. Proper documentation and adherence to subnetting principles are crucial for network scalability and management.
In conclusion, manual calculation of subnet masks aligned with host requirements allows for scalable network design. Using the above approach, network engineers can segment a large network into optimized subnets, ensuring sufficient IP address space, easy management, and clear routing paths. Proper addressing and careful planning reduce future reconfiguration needs and enhance network performance.
References
- Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th Ed.). Pearson.
- Odom, W. (2019). CCNA 200-301 Official Cert Guide Library. Cisco Press.
- Spencer, W. (2021). Cisco CCNA Routing and Switching 200-125 Official Cert Guide. Cisco Press.
- Stanford University. (2020). Introduction to Networking. Stanford Online. https://online.stanford.edu
- CCNA Routing and Switching Portable Command Guide. (2020). Omar Santos. Cisco Press.
- Hucaby, D. (2014). CCNA ICND2 200-105 Official Cert Guide. Cisco Press.
- Gordon, N. (2019). Networking Fundamentals. Pearson Education.
- Olifer, V., & Olifer, N. (2016). Computer Networks. Wiley.
- Perlman, R. (2011). Interconnections: Bridges, Routers, Switches, and Internetworking Protocols. Addison-Wesley.
- Peikari, C., & Gunther, C. (2014). Applied Network Security: Threats, Vulnerabilities, and Countermeasures. CRC Press.