6 VLSM and CIDR

6.0 Chapter Introduction

6.0.1 Chapter Introduction

Page 1:
Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address, limiting the Internet - then known as ARPANET - to 256 networks. Early on, it became obvious that this was not going to be enough address space.

In 1981, RFC 791 modified the IPv4 32-bit address to allow for three different classes or sizes of the networks: class A, class B, and class C. Class A addresses used 8 bits for the network portion of the address, class B used 16 bits, and class C used 24 bits. This format became known as classful IP addressing.

The initial development of classful addressing solved the 256 network limit problem - for a time. A decade later, it became clear that the IP address space was depleting rapidly. In response, the Internet Engineering Task Force (IETF) introduced Classless Inter-Domain Routing (CIDR), which used Variable Length Subnet Masking (VLSM) to help conserve address space.

With the introduction of CIDR and VLSM, ISPs could now assign one part of a classful network to one customer and different part to another customer. This discontiguous address assignment by ISPs was paralleled by the development of classless routing protocols. To compare: classful routing protocols always summarize on the classful boundary and do not include the subnet mask in routing updates. Classless routing protocols do include the subnet mask in routing updates and are not required to perform summarization. The classless routing protocols discussed in this course are RIPv2, EIGRP and OSPF.

With the introduction of VLSM and CIDR, network administrators had to use additional subnetting skills. VLSM is simply subnetting a subnet. Subnets can be further subnetted in multiple levels, as you will learn in this chapter. In addition to subnetting, it became possible to summarize a large collection of classful networks into an aggregate route, or supernet. In this chapter, you will also review route summarization skills.


6.0.1 - Chapter Introduction
The diagram depicts the chapter objectives. In this chapter, you will learn to:
- Compare and contrast classful and classless IP addressing.
- Review VLSM and explain the benefits of classless IP addressing.
- Describe the role of the Classless Inter-Domain Routing (CIDR) standard in making efficient use of scarce IPv4 addresses.


6.1 Classful and Classless Addressing

6.1.1 Classful IP Addressing

Page 1:
When the ARPANET was commissioned in 1969, no one anticipated that the Internet would explode out of the humble beginnings of this research project. By 1989, ARPANET had been transformed into what we now call the Internet. Over the next decade, the number of hosts on the Internet grew exponentially, from 159,000 in October 1989, to over 72 million by the end of the millennium. As of January 2007, there were over 433 million hosts on the Internet.

Without the introduction of VLSM and CIDR notation in 1993 (RFC 1519), Network Address Translator (NAT) in 1994 (RFC 1631), and private addressing in 1996 (RFC 1918), the IPv4 32-bit address space would now be exhausted.

Links:

"ISC Domain Survey: Number of Internet Hosts," https://www.isc.org/solutions/survey/history


6.1.1 - Classful IP Addressing
The diagram depicts a graph illustrating the exponential growth of hosts on the Internet from 1992 through 2006.


Page 2:
The High Order Bits

IPv4 addresses were initially allocated based on class. In the original specification of IPv4 (RFC 791) released in 1981, the authors established the classes to provide three different sizes of networks for large, medium and small organizations. As a result, class A, B and C addresses were defined with a specific format for the high order bits. High order bits are the left-most bits in a 32-bit address.

As shown in the figure:
  • Class A addresses begin with a 0 bit. Therefore, all addresses from 0.0.0.0 to 127.255.255.255 belong to class A. The 0.0.0.0 address is reserved for default routing and the 127.0.0.0 address is reserved for loopback testing.
  • Class B addresses begin with a 1 bit and a 0 bit. Therefore, all addresses from 128.0.0.0 to 191.255.255.255 belong to class B.
  • Class C addresses begin with two 1 bits and a 0 bit. Class C addresses range from 192.0.0.0 to 223.255.255.255.
The remaining addresses were reserved for multicasting and future uses. Multicast addresses begin with three 1s and a 0 bit. Multicast addresses are used to identify a group of hosts that are part of a multicast group. This helps reduce the amount of packet processing that is done by hosts, particularly on broadcast media. In this course, you will see that the routing protocols RIPv2, EIGRP, and OSPF use designated multicast addresses.

IP addresses that begin with four 1 bits were reserved for future use.

Links:

"Internet Protocol," http://www.ietf.org/rfc/rfc791.txt

"Internet Multicast Addresses," http://www.iana.org/assignments/multicast-addresses


6.1.1 - Classful IP Addressing
The diagram depicts classful IP address ranges with classes A, B, C, multicast, and experimental. The high-order binary bits are shown for each class along with the address range.
Class: Class A
High Order Bits: 0
Start: 0.0.0.0
End: 127.255.255.255

Class: Class B
High Order Bits: 10
Start: 128.0.0.0
End: 191.255.255.255

Class: Class C
High Order Bits: 110
Start: 192.0.0.0
End: 223.255.255.255

Class: Multicast
High Order Bits: 1110
Start: 224.0.0.0
End: 239.255.255.255

Class: Experimental
High Order Bits: 1111
Start: 240.0.0.0
End: 255.255.255.255


Page 3:
The IPv4 Classful Addressing Structure

The designations of network bits and host bits were established in RFC 790 (released with RFC 791). As shown in the figure, class A networks used the first octet for network assignment, which translated to a 255.0.0.0 classful subnet mask. Because only 7 bits were left in the first octet (remember, the first bit is always 0), this made 2 to the 7th power or 128 networks.

With 24 bits in the host portion, each class A address had the potential for over 16 million individual host addresses. Before CIDR and VLSM, organizations were assigned an entire classful network address. What was one organization going to do with 16 million addresses? Now you can understand the tremendous waste of address space that occurred in the beginning days of the Internet, when companies received class A addresses. Some companies and governmental organizations still have class A addresses. For example, General Electric owns 3.0.0.0/8, Apple Computer owns 17.0.0.0/8, and the U.S. Postal Service owns 56.0.0.0/8. (See the link "Internet Protocol v4 Address Space" below for a listing of all the IANA assignments.)

Class B was not much better. RFC 790 specified the first two octets as network. With the first two bits already established as 1 and 0, 14 bits remained in the first two octets for assigning networks, which resulted in 16,384 class B network addresses. Because each class B network address contained 16 bits in the host portion, it controlled 65,534 addresses. (Remember, 2 addresses were reserved for the network and broadcast addresses.) Only the largest organizations and governments could ever hope to use all 65,000 addresses. Like class A, class B address space was wasted.

To make things worse, class C addresses were often too small! RFC 790 specified the first three octets as network. With the first three bits established as 1 and 1 and 0, 21 bits remained for assigning networks for over 2 million class C networks. But, each class C network only had 8 bits in the host portion, or 254 possible host addresses.

Links:

"A Brief History of the Internet," http://www.isoc.org/internet/history/brief.shtml

"Internet Protocol v4 Address Space," http://www.iana.org/assignments/ipv4-address-space


6.1.1 - Classful IP Addressing
The diagram depicts the default subnet mask based on class A, B, or C. Also shown is a table listing address class, first octet decimal range, number of possible networks, and number of hosts per network.

Class A: The first octet is the network portion of the address. The second, third and fourth octets are the host portion. The subnet default mask is 255.0.0.0 or /8.

Class B: The first and second octets are the network portion of the address. The third and fourth octets are the host portion. The default subnet mask is 255.255.0.0 or /16.

Class C: The first, second and third octets are the network portion of the address. The fourth octet is the host portion. The default subnet mask is 255.255.255.0 or /24.

Address class: Class A
First Octet Range: 0 to 127
Number of Possible Networks: 128 (2 are reserved)
Number of Host per Network: 16,777,214

Address class: Class B
First Octet Range: 128 to 191
Number of Possible Networks: 16,384
Number of Host per Network: 65,534

Address class: Class C
First Octet Range: 192 to 223
Number of Possible Networks: 2,097,152
Number of Host per Network: 254


6.1.2 Classful Routing Protocol

Page 1:
Example of Classful Routing Updates

Using classful IP addresses meant that the subnet mask of a network address could be determined by the value of the first octet, or more accurately, the first three bits of the address. Routing protocols, such as RIPv1 only needed to propagate the network address of known routes and did not need to include the subnet mask in the routing update. This is because the router receiving the routing update could determine the subnet mask simply by examining the value of the first octet in the network address, or by applying its ingress interface mask for subnetted routes. The subnet mask was directly related to the network address.

Click R1 Update to R2 in the figure.

In the example, R1 knows that subnet 172.16.1.0 belongs to the same major classful network as the outgoing interface. Therefore, it sends a RIP update to R2 containing subnet 172.16.1.0. When R2 receives the update, it applies the receiving interface subnet mask (/24) to the update and adds 172.16.1.0 to the routing table.

Click R2 Update to R3 in the figure.

When sending updates to R3, R2 summarizes subnets 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24 into the major classful network 172.16.0.0. Because R3 does not have any subnets that belong to 172.16.0.0, it will apply the classful mask for a class B network, /16.


6.1.2 - Classful Routing Protocol
The diagram depicts classful routing updates. Router R1 sends an update for the 172.16.1.0/24 network to R2. R2 summarizes subnets 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24 into the major classful network 172.16.0.0 and sends an update to R3. R3 applies the classful /16 mask to the 172.16.0.0 routing update from R2. The diagram is based on the following network topology.

Network Topology:
There are three routers, R1, R2, and R3, and three LAN switches, S1, S2, and S3. Switch S1 is connected to router R1 interface FA0/0. Router R1 interface S0/0/0 is connected to router R2 interface S0/0/0 via a WAN link. Switch S2 is connected to router R2 interface FA0/0. Router R2 interface S0/0/1 is connected to router R3 via a WAN link. Switch S3 is connected to R3 interface FA0/0.

Device Addresses:
Router R1 interface FA0/0 IP address: 172.16.1.1
Router R1 interface S0/0/0 IP address: 172.16.2.1
Router R2 interface FA0/0 IP address: 172.16.3.1
Router R2 interface S0/0/0 IP address: 172.16.2.2
Router R2 interface S0/0/1 IP address: 192.168.1.2
Router R3 interface FA0/0 IP address: 10.1.0.1
Router R3 interface S0/0/1 IP address: 192.168.1.1


6.1.3 Classless IP Addressing

Page 1:
The Move Towards Classless Addressing

By 1992, members of the IETF (Internet Engineering Task Force) had serious concerns about the exponential growth of the Internet and the limited scalability of Internet routing tables. They were also concerned with the eventual exhaustion of 32-bit IPv4 address space. The depletion of the class B address space was occurring so fast that within two years there would be no more class B addresses available (RFC 1519). This depletion was occurring because every organization that requested and obtained approval for IP address space received an entire classful network address - either a class B with 65,534 host addresses or a class C with 254 host addresses. One fundamental cause of this problem was the lack of flexibility. No class existed to serve a mid-sized organization that needed thousands of IP addresses but not 65,000.

In 1993, IETF introduced Classless Inter-Domain Routing, or CIDR (RFC 1517). CIDR allowed for:
  • More efficient use of IPv4 address space
  • Prefix aggregation, which reduced the size of routing tables
To CIDR-compliant routers, address class is meaningless. The network portion of the address is determined by the network subnet mask, also known as the network prefix, or prefix length (/8, /19, etc.). The network address is no longer determined by the class of the address.

ISPs could now more efficiently allocate address space using any prefix length, starting with /8 and larger (/8, /9, /10, etc.). ISPs were no longer limited to a /8, /16, or /24 subnet mask. Blocks of IP addresses could be assigned to a network based on the requirements of the customer, ranging from a few hosts to hundreds or thousands of hosts.


6.1.3 - Classless IP Addressing
The diagram depicts information on Classless Inter-Domain Routing or CIDR. CIDR (RFC 1519) provided:
- More efficient use of IPv4 address space
- Prefix aggregation, which reduced the size of routing tables


Page 2:
CIDR and Route Summarization

CIDR uses Variable Length Subnet Masks (VLSM) to allocate IP addresses to subnets according to individual need rather than by class. This type of allocation allows the network/host boundary to occur at any bit in the address. Networks can be further divided or subnetted into smaller and smaller subnets.

Just as the Internet was growing at an exponential rate in the early 1990s, so were the size of routing tables that were maintained by Internet routers under classful IP addressing. CIDR allowed for prefix aggregation, which you already know as route summarization. Recall from Chapter 2, "Static Routing" that you can create one static route for multiple networks. Internet routing tables were now able to benefit from the same type of aggregation of routes. The ability for routes to be summarized as a single route helps reduce the size of Internet routing tables.

In the figure, notice that ISP1 has four customers, each with a variable amount of IP address space. However, all of the customer address space can be summarized into one advertisement to ISP2. The 192.168.0.0/20 summarized or aggregated route includes all the networks belonging to Customers A, B, C, and D. This type of route is known as a supernet route. A supernet summarizes multiple network addresses with a mask less than the classful mask.

Propagating VLSM and supernet routes requires a classless routing protocol, because the subnet mask can no longer be determined by the value of the first octet. The subnet mask now needs to be included with the network address. Classless routing protocols include the subnet mask with the network address in the routing update.

Links:

"Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy," http://www.ietf.org/rfc/rfc1519.txt

"Internet Protocol v4 Address Space," http://www.iana.org/assignments/ipv4-address-space


6.1.3 - Classless IP Addressing
The diagram depicts CIDR and route summarization of the following network topology.

Network Topology:
There are six routers. Four of the routers, Customer A, Customer B, Customer C, and Customer D, are connected to router ISP1 via WAN links. Router ISP1 is connected to router ISP2 via a WAN link. ISP1 advertises a summary route for all four customers to ISP2.

Customer A network address: 192.168.0.0/23
Customer B network address: 192.168.2.0/23
Customer C network address: 192.168.4.0/22
Customer D network address: 192.168.8.0/21
Summary route advertised by ISP1: 192.168.0.0/20


6.1.4 Classless Routing Protocol

Page 1:
Classless routing protocols include RIPv2, EIGRP, OSPF, IS-IS, and BGP. These routing protocols include the subnet mask with the network address in their routing updates. Classless routing protocols are necessary when the mask cannot be assumed or determined by the value of the first octet.

For example, the networks 172.16.0.0/16, 172.17.0.0/16, 172.18.0.0/16 and 172.19.0.0/16 can be summarized as 172.16.0.0/14.

If R2 sends the 172.16.0.0 summary route without the /14 mask, R3 only knows to apply the default classful mask of /16. In a classful routing protocol scenario, R3 is unaware of the 172.17.0.0/16, 172.18.0.0/16 and 172.19.0.0/16 networks.

Note: Using a classful routing protocol, R2 can send these individual networks without summarization, but the benefits of summarization are lost.

Classful routing protocols cannot send supernet routes because the receiving router will apply the default classful to the network address in the routing update. If our topology contained a classful routing protocol, then R3 would only install 172.16.0.0/16 in the routing table.

Note: When a supernet route is in a routing table, for example, as a static route, a classful routing protocol will not include that route in its updates.

With a classless routing protocol, R2 will advertise the 172.16.0.0 network along with the /14 mask to R3. R3 will then be able to install the supernet route 172.16.0.0/14 in its routing table giving it reachability to the 172.16.0.0/16, 172.17.0.0/16, 172.18.0.0/16 and 172.19.0.0/16 networks.


6.1.4 - Classless Routing Protocol
The diagram depicts classless routing. Networks 172.16.0.0/16, 172.17.0.0/16, 172.18.0.0/16, and 172.19.0.0/16 can be summarized as 172.16.0.0/14 on R2 and sent to R3. With classless routing, R3 does not apply the default /16 classful mask, but uses the supernet route sent by R2. The image is based on the following network topology.

Network Topology:
There are three routers, R1, R2, and R3, and four LAN switches, S1, S2, S3, and S4. Switch S1 is connected to router R1 interface FA0/0. Switch S2 is connected to router R1 interface FA0/1. Router R1 interface S0/0/0 (DCE) is connected to router R2 interface S0/0/0 via a WAN link. Switch S3 is connected to router R2 interface FA0/0. Router R2 interface S0/0/1 (DCE) is connected to router R3 via a WAN link. Switch S4 is connected to R3 interface FA0/0.

Network Addresses:
Router R1 FA0/0 LAN network address: 172.18.0.0/16
Router R1 FA0/1 LAN network address: 172.19.0.0/16
Router R1 S0/0/0 WAN network address: 172.17.0.0/16
Router R2 FA0/0 LAN network address: 172.16.0.0/16
Router R2 S0/0/0 WAN network address: 172.17.0.0/16
Router R2 S0/0/1 WAN network address: 192.168.1.0/24
Router R3 FA0/0 LAN network address: 10.1.0.0/16
Router R3 S0/0/1 WAN network address: 192.168.1.0/24


6.2 VLSM

6.2.1 VLSM in Action

Page 1:
In a previous course, you learned how Variable Length Subnet Masking (VLSM) allows the use of different masks for each subnet. After a network address is subnetted, those subnets can be further subnetted. As you most likely recall, VLSM is simply subnetting a subnet. VLSM can be thought of as sub-subnetting.

Click Play to view the animation.

The figure shows the network 10.0.0.0/8 that has been subnetted using the subnet mask of /16, which makes 256 subnets.

10.0.0.0/16
10.1.0.0/16
10.2.0.0/16
.
.
.
10.255.0.0/16


Any of these /16 subnets can be subnetted further. For example, in the figure, the 10.1.0.0/16 subnet is subnetted again using the /24 mask, and results in the following additional subnets.

10.1.1.0/24
10.1.2.0/24
10.1.3.0/24
.
.
.
10.1.255.0/24


The 10.2.0.0/16 subnet is also subnetted again with a /24 mask. The 10.3.0.0/16 subnet is subnetted again with the /28 mask, and the 10.4.0.0/16 subnet is subnetted again with the /20 mask.

Individual host addresses are assigned from the addresses of "sub-subnets". For example, the figure shows the 10.1.0.0/16 subnet divided into /24 subnets. The 10.1.4.10 address would now be a member of the more specific subnet 10.1.4.0/24.


6.2.1 - VLSM in Action
The animation depicts VLSM subnets starting with 10.0.0.0/8 and subnetting it to four /16 subnetworks, 10.1.0.0/16, 10.2.0.0/16, 10.3.0.0/16, and 10.4.0.0/16. Any of the /16 subnets can be subnetted further.

In the animation, 10.1.0.0/16 and 10.2.0.0/16 have been subnetted using the /24 mask. Subnetworks 10.1.1.0/24, 10.1.2.0/24, 10.1.3.0/24, and 10.1.4.0/24 are created. The remaining four 10.0.0.0/16 networks are then subnetted similarly to 10.1.0.0/16, thus creating a very large network with many routers. In the animation, 10.2.0.0/16 is subnetted using the /24 mask, 10.3.0.0/16 is subnetted using the /28 mask, and 10.4.0.0/16 is subnetted using a /20 mask. Individual host addresses are assigned from the sub-subnets.


6.2.2 VLSM and IP Addresses

Page 1:
Another way to view the VLSM subnets is to list each subnet and its sub-subnets. In the figure, the 10.0.0.0/8 network is the starting address space. It is subnetted with a /16 mask on the first round of subnetting. You already know that borrowing 8 bits (going from /8 to /16) creates 256 subnets. With classful routing, that is as far as you can go. You can only choose one mask for all your networks. With VLSM and classless routing, you have more flexibility to create additional network addresses and use a mask that fits your needs.

Click 10.1.0.0/16 in the figure.

For subnet 10.1.0.0/16, 8 more bits are borrowed again, to create 256 subnets with a /24 mask. This mask will allow 254 host addresses per subnet. The subnets ranging 10.1.0.0/24 to 10.1.255.0/24 are subnets of the subnet 10.1.0.0/16.

Click 10.2.0.0/16 in the figure.

Subnet 10.2.0.0/16 is also further subnetted with a /24 mask. The subnets ranging from 10.2.0.0/24 to 10.2.255.0/24 are subnets of the subnet 10.2.0.0/16.

Click 10.3.0.0/16 in the figure.

Subnet 10.3.0.0/16 is further subnetted with a /28 mask. This mask will allow 14 host addresses per subnet. Twelve bits are borrowed, creating 4,096 subnets ranging from 10.3.0.0/28 to 10.3.255.240/28.

Click 10.4.0.0/16 in the figure.

Subnet 10.4.0.0/16 is further subnetted with a /20 mask. This mask will allow 4094 host addresses per subnet. Four bits are borrowed, creating 16 subnets ranging from 10.4.0.0/20 to 10.4.240.0/20. These /20 subnets are big enough to subnet even further, allowing more networks.


6.2.2 - VLSM and IP Addresses
The diagram depicts subnets of a subnet. The starting address space is network 10.0.0.0/8. The first round of subnets results in 10.1.0.0/16, 10.2.0.0/16, and 10.3.0.0/16 through 10.255.0.0/16 creating 256 subnets.

The 10.1.0.0/16 subnet is further subdivided into /24 subnets of a subnet: 10.1.0.0/24 through 10.1.255.0/24 or 256 subnets.

The 10.2.0.0/16 subnet is further subdivided into /24 subnets of a subnet:
10.2.0.0/24 through 10.2.255.0/24 or 256 subnets.

The 10.3.0.0/16 subnet is further subdivided into /28 subnets of a subnet:
10.3.0.0/28 through 10.3.255.240/28 or 4,096 subnets.

The 10.4.0.0/16 subnet is further subdivided into /20 subnets of a subnet:
10.4.0.0/20 through 10.4.255.240/20 or 16 subnets.


6.3 CIDR

6.3.1 Route Summarization

Page 1:
As you previously learned, route summarization also known as route aggregation, is the process of advertising a contiguous set of addresses as a single address with a less-specific, shorter subnet mask. Remember that CIDR is a form of route summarization and is synonymous with the term supernetting.

You should already be familiar with route summarization that is done by classful routing protocols like RIPv1. RIPv1 summarizes subnets to a single major network classful address when sending the RIPv1 update out an interface that belongs to another major network. For example, RIPv1 will summarize 10.0.0.0/24 subnets (10.0.0.0/24 through 10.255.255.0/24) as 10.0.0.0/8.

CIDR ignores the limitation of classful boundaries, and allows summarization with masks that are less than that of the default classful mask. This type of summarization helps reduce the number of entries in routing updates and lowers the number of entries in local routing tables. It also helps reduce bandwidth utilization for routing updates and results in faster routing table lookups.

The figure shows a single static route with the address 172.16.0.0 and the mask 255.248.0.0 summarizing all of the 172.16.0.0/16 to 172.23.0.0/16 classful networks. Although 172.22.0.0/16 and 172.23.0.0/16 are not shown in the graphic, these are also included in the summary route. Notice that the /13 mask (255.248.0.0) is less than the default classful mask /16 (255.255.0.0).

Note: You may recall that a supernet is always a route summary, but a route summary is not always a supernet.
It is possible that a router could have both a specific route entry and a summary route entry covering the same network. Let us assume that router X has a specific route for 172.22.0.0/16 using Serial 0/0/1 and a summary route of 172.16.0.0/13 using Serial0/0/0. Packets with the IP address of 172.22.n.n match both route entries. These packets destined for 172.22.0.0 would be sent out the Serial0/0/1 interface because there is a more specific match of 16 bits, than with the 13 bits of the 172.16.0.0/13 summary route.



6.3.1 - Route Summarization
The diagram depicts a single static route with the address 172.16.0.0 and mask 255.248.0.0 summarizing all of the 172.16.0.0/16 to 172.23.0.0/16 classful networks. Although 172.22.0.0/16 and 172.23.0.0/16 are not shown in the graphic, these are also included in the summary route. Note that the /13 mask (255.248.0.0) is less than the default classful mask /16 (255.255.0.0). The diagram is based on the following network topology.

Network Topology:
There are five routers. Three of the routers, R1, R2, and R3, are connected to router R4 via WAN links. Each of these three routers also has a LAN attached. Router R4 is connected to router R5 via a WAN link. Router R5 has a static route to a summary route for all four customers.

Router R1 WAN address: 172.16.0.0/16
Router R2 WAN address: 172.17.0.0/16
Router R3 WAN address: 172.18.0.0/16
Router R1 LAN address: 172.19.0.0/16
Router R1 LAN address: 172.20.0.0/16
Router R1 LAN address: 172.21.0.0/16

Static route command on R5:
i p route 172.16.0.0 255.248.0.0 S0/0/0


6.3.2 Calculating Route Summarization

Page 1:
Calculating route summaries and supernets is identical to the process that you already learned in Chapter 2, "Static Routing." Therefore, the following example is presented as a quick review.

Summarizing networks into a single address and mask can be done in three steps. Let's look at the following four networks:
  • 172.20.0.0/16
  • 172.21.0.0/16
  • 172.22.0.0/16
  • 172.23.0.0/16
Click Step 1 in the figure.

The first step is to list the networks in binary format. The figure shows all four networks in binary.

Click Step 2 in the figure.

The second step is to count the number of left-most matching bits to determine the mask for the summary route. You can see in the figure that the first 14 left-most matching bits match. This is the prefix, or subnet mask, for the summarized route: /14 or 255.252.0.0.

Click Step 3 in the figure.

The third step is to copy the matching bits and then add zero bits to determine the summarized network address. The figure shows that the matching bits with zeros at the end results in the network address 172.20.0.0. The four networks - 172.20.0.0/16, 172.21.0.0/16, 172.22.0.0/16, and 172.23.0.0/16 - can be summarized into the single network address and prefix 172.20.0.0/14.

The activities in the next section offer you an opportunity to practice designing and troubleshooting VLSM addressing schemes. You will also practice creating and troubleshooting route summarizations.


6.3.2 - Calculating Route Summarization
The diagram depicts the steps to calculating a route summary.

Step 1. List the networks in binary format. The diagram shows all four networks in binary.

Step 2. Count the number of leftmost matching bits to determine the mask for the summary route. In the diagram, the first 14 leftmost matching bits are identical. This is the prefix, or subnet mask, for the summarized route: /14 or 255.252.0.0.

Step 3. Copy the matching bits and then add zero bits to determine the summarized network address. The diagram shows that the matching bits with zeros at the end result in the network address 172.20.0.0. The four networks, 172.20.0.0/16, 172.21.0.0/16, 172.22.0.0/16, and 172.23.0.0/16, can be summarized into the single network address and prefix 172.20.0.0/14.


6.4 VLSM and Route Summarization Activity

6.4.1 Basic VLSM Calculation and Addressing Design Activity

Page 1:
In this activity, you will use the network address 192.168.1.0/24 to subnet and provide the IP addressing for a given topology. VLSM will be used so that the addressing requirements can be met using the 192.168.1.0/24 network.

Click the lab icon for more details.


6.4.1 - Basic VLSM Calculation and Addressing Design Activity
Link to Hands-on Lab: Basic VLSM Calculation and Addressing Design Activity

In this activity, you use the network address 192.168.1.0/24 to subnet and provide the IP addressing for a given topology. VLSM is used so that the addressing requirements can be met using the 192.168.1.0/24 network.


Page 2:
You can use Packet Tracer Activity 6.4.1 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.

Click the Packet Tracer icon for more details.


6.4.1 - Basic VLSM Calculation and Addressing Design Activity
Link to Packet Tracer Exploration: Basic VLSM Calculation and Addressing Design Activity

You can use Packet Tracer Activity 6.4.1 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.


6.4.2 Challenge VLSM Calculation and Addressing Design Activity

Page 1:
In this activity, you will use the network address 172.16.0.0/16 to subnet and provide the IP addressing for a given topology. VLSM will be used so that the addressing requirements can be met using the 172.16.0.0/16 network.

Click the lab icon for more details.


6.4.2 - Challenge VLSM Calculation and Addressing Design Activity
Link to Hands-on Lab: Challenge VLSM Calculation and Addressing Design Activity

In this activity, you use the network address 172.16.0.0/16 to subnet and provide the IP addressing for a given topology. VLSM is used so that the addressing requirements can be met using the 172.16.0.0/16 network.


Page 2:
You can use Packet Tracer Activity 6.4.2 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.

Click the Packet Tracer icon for more details.


6.4.2 - Challenge VLSM Calculation and Addressing Design Activity
Link to Packet Tracer Exploration: Troubleshooting a VLSM Addressing Design

You can use Packet Tracer Activity 6.4.2 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.


6.4.3 Troubleshooting a VLSM Addressing Design Activity

Page 1:
In this activity, the network address 172.16.128.0/17 was used to provide the IP addressing for a network. VLSM has been used to subnet the address space incorrectly. You will need to troubleshoot the addressing that was assigned to each subnet to determine where errors are present and determine the correct addressing assignments where needed.

Click the lab icon for more details.


6.4.3 - Troubleshooting a VLSM Addressing Design Activity
Link to Hands-on Lab: Troubleshooting a VLSM Addressing Design

In this activity, the network address 172.16.128.0/17 was used to provide the IP addressing for a network. VLSM has been used to subnet the address space incorrectly. You need to troubleshoot the addressing that was assigned to each subnet to determine where errors are present and determine the correct addressing assignments where needed.


Page 2:
You can use Packet Tracer Activity 6.4.3 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.

Click the Packet Tracer icon for more details.


6.4.3 - Troubleshooting a VLSM Addressing Design Activity
Link to Packet Tracer Exploration: Troubleshooting a VLSM Addressing Design

You can use Packet Tracer Activity 6.4.3 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.


6.4.4 Basic Route Summarization Activity

Page 1:
In this activity, you are given a network with subnetting and address assignments already completed. Your task is to determine summarized routes that can be used to reduce the number of entries in routing tables.

Click the lab icon for more details.


6.4.4 - Basic Route Summarization Activity
Link to Hands-on Lab: Basic Route Summarization

In this activity, you are given a network with subnetting and address assignments already completed. Your task is to determine summarized routes that can be used to reduce the number of entries in the routing tables.


Page 2:
You can use Packet Tracer Activity 6.4.4 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.

Click the Packet Tracer icon for more details.


6.4.4 - Basic Route Summarization Activity
Link to Packet Tracer Exploration: Basic Route Summarization

You can use Packet Tracer Activity 6.4.4 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.


6.4.5 Challenge Route Summarization Activity

Page 1:
In this activity, you are given a network with subnetting and address assignments already completed. Your task is to determine summarized routes that can be used to reduce the number of entries in routing tables.

Click the lab icon for more details.


6.4.5 - Challenge Route Summarization Activity
Link to Hands-on Lab: Challenge Route Summarization

In this activity, you are given a network with subnetting and address assignments already completed. Your task is to determine summarized routes that can be used to reduce the number of entries in the routing tables.


Page 2:
You can use Packet Tracer Activity 6.4.5 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.

Click the Packet Tracer icon for more details.


6.4.5 - Challenge Route Summarization Activity
Link to Packet Tracer Exploration: Challenge Route Summarization

You can use Packet Tracer Activity 6.4.5 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.


6.4.6 Troubleshooting Route Summarization Activity

Page 1:
In this activity, the LAN IP addressing is already completed for the network. VLSM was used to subnet the address space. The summary routes are incorrect. You will need to troubleshoot the summary routes that have been assigned to determine where errors are present and determine the correct summary routes.

Click the lab icon for more details.


6.4.6 - Troubleshooting Route Summarization Activity
Link to Hands-on Lab: Troubleshooting Route Summarization

In this activity, the LAN IP addressing is already completed for the network. VLSM was used to subnet the address space. The summary routes are incorrect. You need to troubleshoot the summary routes that have been assigned to determine where errors are present and determine the correct summary routes.


Page 2:
You can use Packet Tracer Activity 6.4.6 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.

Click the Packet Tracer icon for more details.


6.4.6 - Troubleshooting Route Summarization Activity
Link to Packet Tracer Exploration: Troubleshooting Route Summarization

You can use Packet Tracer Activity 6.4.6 to complete this activity. A summary of the instructions is provided within the activity, but you should use the Activity PDF on the previous page for more details.


6.5 Summary

6.5.1 Summary and Review

Page 1:
Summary

CIDR (Classless Inter-Domain Routing) was introduced in 1993 replacing the previous generation of IP address syntax, classful networks. CIDR allowed for more efficient use of IPv4 address space and prefix aggregation, known as route summarization or supernetting.

With CIDR, address classes (class A, class B, class C) became meaningless. The network address was no longer determined by the value of the first octet, but assigned prefix length (subnet mask). Address space, the number of hosts on a network, could now be assigned a specific prefix depending upon the number of hosts needed for that network.

CIDR allows for supernetting. A supernet is a group of major network addresses summarized as a single network address with a mask less than that of the default classful mask.

CIDR uses VLSM (Variable Length Subnet Masks) to allocate IP addresses to subnetworks according to need rather than by class. VLSM allows for subnets to be further divided or subnetted into even smaller subnets. Simply put, VLSM is just subnetting a subnet.

Propagating CIDR supernets or VLSM subnets require a classless routing protocol. A classless routing protocol includes the subnet mask along with the network address in the routing update.

Determining the summary route and subnet mask for a group of networks can be done in three easy steps. The first step is to list the networks in binary format. The second step is to count the number of left-most matching bits. This will give you the prefix length or subnet mask for the summarized route. The third step is to copy the matching bits and then add zero bits to the rest of the address to determine the summarized network address. The summarized network address and subnet mask can now be used as the summary route for this group of networks. Summary routes can be used by both static routes and classless routing protocols. Classful routing protocols can only summarize routes to the default classful mask.

Classless routing protocols and their ability to support CIDR supernet, VLSM, and discontiguous networks is described in the following chapters.


6.5.1 - Summary and Review
In this chapter, you learned to:
- Compare and contrast classful and classless IP addressing.
- Review VLSM and explain the benefits of classless IP addressing.
- Describe the role of the Classless Inter-Domain Routing (CIDR) standard in making efficient use of scarce IPv4 addresses.


Page 2:


6.5.1 - Summary and Review
This is a review and is not a quiz. Questions and answers are provided.
Question 1. What is the range of addresses for Class A, Class B, and Class C addresses?
Answer:
Class A: 0.0.0.0 to 127.255.255.255
Class B: 128.0.0.0 to 191.255.255.255
Class C: 192.0.0.0 to 223.255.255.255

Question 2. What distinguishes a classless routing protocol from a classful routing protocol?
Answer: A classless routing protocol includes the subnet mask in the routing update.

Question 3. What are the advantages of using a classless routing protocol?
Answer: Allows the use of VLSM and CIDR within the routing domain.

Question 4. How does a classful routing protocol determine the subnet mask of a routing update?
Answer: If the network address in the routing update is on the same major classful network as the receiving interface, the classful routing protocol uses the same mask as the interface. Otherwise, it uses the default classful mask.

Question 5. Why did the IETF introduce classless IP addressing and CIDR?
Answer: The routing tables on Internet routers were experiencing very high growth. A way to summarize the routes in the routing table was needed. Because classful addressing only provided for /8, /16, or /24 masks, the IPv4 address space was becoming depleted.

Question 6. Besides CIDR, what else helped the problem with IPv4 address depletion and also slowed down the need to go to IPv6.
Answer: NAT (Network Address Translation)

Question 7. What term is used to define the process of subnetting a subnet?
Answer: VLSM (Variable Length Subnet Masking)

Question 8. The 172.16.0.0/16 network is subnetted using a /24 subnet mask. What can be done if you need to divide the 172.16.10.0/24 subnet into three equally sized subnets with the maximum number of hosts per subnet?
Answer:
172.16.10.0/24 can be subnetted using the /26 subnet mask.

The first two bits of the fourth octet are borrowed from the host, leaving six bits for hosts. This creates four subnets of 32 host addresses (30 usable) each.
Network 172.16.10. 0 0 | Host 0 0 0 0 0 0 = 172.16.10.0/26
Network 172.16.10. 0 1 | Host 0 0 0 0 0 0 = 172.16.10.64/26
Network 172.16.10. 1 0 | Host 0 0 0 0 0 0 = 172.16.10.128/26
Network 172.16.10. 1 1 | Host 0 0 0 0 0 0 = 172.16.10.192/26

This gives four subnets with the maximum number of hosts. You cannot do three subnets, so the next lower number of subnets is two.

Question 9. 172.16.10.0/24 network is using the following /28 subnets for LAN's:
172.16.10.16/28
172.16.10.32/28
172.16.10.48/28
172.16.10.64/28
172.16.10.80/28
172.16.10.96/28
172.16.10.112/28
172.16.10.128/28
172.16.10.144/28
172.16.10.160/28
172.16.10.176/28
172.16.10.192/28
172.16.10.240/28

The network administrator wants to allocate a /28 subnet and subnet it further with a /30 mask for all point-to-point serial links in the network. Which /28 subnets are available?

Answer:
172.16.10.0/28
172.16.10.208/28
172.16.10.224/28

Question 10. What is supernetting? What is required to propagate a supernet route?
Answer: Supernetting refers to the ability to summarize networks less than the classful default mask. Classless routing protocols are required to propagate a supernet route because the subnet mask must be included with the summarized network address.

Question 11. Summarize the following networks
192.168.68.0/24
192.168.96.0/24
192.168.80.0/24
Answer:
192.168.64.0/18

192.168. 0 1 0 0 0 1 0 0
192.168. 0 1 1 0 0 0 0 0
192.168. 0 1 0 1 0 0 0 0
192.168. 0 1 0 0 0 0 0 0 /18

There are 18 leftmost matching bits: the first two octets (16 bits) and two bits from the third octet.


Page 3:
The Packet Tracer Skills Integration Challenge Activity for this chapter is a moderately complex VLSM design scenario. You will create an addressing scheme based on requirements specified in the instructions, then you will build the network and configure the routers. Because you have not yet learned classful routing protocols, you will be shown two commands that will make your RIP network converge in a classless manner. Finally, you configure a summary route.

Packet Tracer Skills Integration Instructions (PDF)

Click the Packet Tracer icon for more details.


6.5.1 - Summary and Review
Link to Packet Tracer Exploration: Chapter 6 - Packet Tracer Skills Integration Challenge

The Packet Tracer Skills Integration Challenge Activity for this chapter is a moderately complex VLSM design scenario. You create an addressing scheme based on requirements specified in the instructions, and then you build the network and configure the routers. Because you have not yet learned classful routing protocols, you are shown two commands that make your RIP network converge in a classless manner. Finally, you configure a summary route.


Page 4:
To Learn More

RFC 1519 Classless Inter-Domain Routing (CIDR)

RFCs (Request for Comments) are a series of documents submitted to the IETF (Internet Engineering Task Force) to propose an Internet standard or convey new concepts, information or even occasionally even humor. RFC 1519 is the RFC for Classless Inter-Domain Routing (CIDR).

RFCs can be accessed from several web sites including www.ietf.org. Read all or parts of RFC 1519 to learn more about the introduction of CIDR to the Internet community.

Internet Core Routers

In the To Learn More section of Chapter 3 (Introduction to Dynamic Routing Protocols), you accessed route servers to display BGP routes on the Internet. One such site is www.traceroute.org.

Access one of the route servers and using the show ip route command, view the actual routing table of an Internet router. Notice how many routes there are on an Internet core router. As of March 2007, there were over 200,000 routes. Many of these are summarized routes and supernets. Use the command show ip route 207.62.187.0 to view one such supernet.

CAIDA

An interesting web site is CAIDA, the Cooperative Assocation for Internet Data Analysis, www.caida.org. CAIDA "provides tools and analyses promoting the engineering and maintenance of a robust, scalable global Internet infrastructure." There are several sponsors for CAIDA including Cisco Systems. Although much of this information may seem beyond your understanding, you will begin to recognize many of these terms and concepts.


6.5.1 - Summary and Review
The diagram depicts a collage of people using computers and networks.


6.6 Chapter Quiz

6.6.1 Chapter Quiz

Page 1:


6.6.1 - Chapter Quiz
1. Match the items to the targets determining support for VLSM.
Items:
RIP v1
EIGRP
IGRP
I S-I S
OSPF
RIP v2

Targets:
Protocols that support VLSM
Protocols that do not support VLSM

2. Match the description to the appropriate term. (Not all options are used.)
Descriptions:
Ability to divide one IP address into different subnets.
Combining several IP network addresses in one IP address.
Ability to specify a different subnet mask for the same network number and different subnets.
Also known as supernetting.
Conserves address space.
Used to reduce the number of entries in a routing table.

Terms:
VLSM
Route summarization

3. What two methods were used to allow the continued use of IPv4 addressing when the available hosts were exhausted? (Choose two.)
A. Variable length subnetting.
B. The IPv4 address range was expanded.
C. Private addresses were used with address translation.
D. Classful routing was implemented.
E. IPv4 was abandoned in favor of IPv6 for all hosts.
F. Supernetting was implemented.

4. The following subnet masks have been chosen for use with the 192.168.16.0 network:
255.255.255.252
255.255.255.240
255.255.255.192
Which three approaches identify the most efficient use for each of these masks? (Choose three.)
A. Use the /30 mask for point-to-point links, such as WAN connections.
B. Use the /30 mask for subnetworks of four or more hosts.
C. Use the /28 mask for small subnetworks with up to 14 hosts.
D. Use the /26 mask for larger subnetworks with up to 62 hosts.
E. Use the /25 mask for subnetworks with up to 30 hosts.
F. Use the /24 mask for point-to-point links, such as WAN connections.

5. When using a classful class A IP address scheme, how many octets are used to designate the network portion of the address?
A. 1
B. 2
C. 3
D. 4

6. Select the VLSM subnets of the 172.16.0.0 network that will simultaneously provide the total number of required hosts on each subnet? Match the subnet with the number of required hosts. Not all options are used.
Options:
172.16.64.0/18
172.16.16.64/30
172.16.128.0/19
172.16.144.0/25
172.16.18.0/24
172.16.5.128/26
172.16.10.128/28

Number of required hosts:
2 hosts
60 hosts
250 hosts
8000 hosts
16,000 hosts

7. Refer to the two groups of subnets listed below. A network engineer is summarizing the two groups of router R1 shown. Which summarization works for all the subnets?
Group A
192.168.0.0/30
192.168.0.4/30
192.168.0.8/30
192.168.0.16/29

Group B
192.168.4.0/30
192.168.5.0/30
192.168.6.0/30
192.168.7.0/29

A. 192.168.0.0/23
B. 192.168.0.0/22
C. 192.168.0.0/21
D. 192.168.0.0/20

8. How many bits are used in the IPv4 address space?
A. 8
B. 12
C. 16
D. 30
E. 32
F. 64

9. Match each address to the appropriate address class. Not all items are used.
Addresses:
192.14.0.0
191.254.45.0
123.90.78.45
128.44.0.23
129.68.11.45
126.0.0.0
198.162.11.0
125.33.23.56

Address Class:
Class A addresses
Class B addresses

10. Refer to the following topology description to answer the question.

There are five routers, Router1, Router2, Router3, Router4, and Router5.
Router3 has LAN 172.16.0.0/16 attached to its FA0/0 interface.
Router4 has LAN 172.17.0.0/16 attached to its FA0/0 interface.
Router5 has LAN 172.18.0.0/16 attached to its FA0/0 interface.
Router3, Router4, and Router5 are connected to Router2 using a WAN link.
Router2 is connected to Router1 using a WAN link.

The network administrator wants to minimize the number of entries in Router1's routing table. What should the administrator implement on the network?
A. VLSM
B. CIDR
C. private IP addresses
D. classful routing

0 comments:

Post a Comment