Network Addresses Design

155 views 3 pages ~ 564 words Print

Every device on a network is often assigned a unique address known as an IP address, which allows it to be distinguished from other devices on the same network. An IP address is made up of 32 binary bits that are divided into four octets, each of which is equivalent to 8 bits. A network with many devices is difficult to diagnose, hence sub-networks are required.

It is the process of dividing a big network into manageable subnets. A subnet is a logical subset of a bigger network that is formed by borrowing host bits to form a new network (Bigger, 2014). Our current scenario requires us to use the network address of the format 199.1.2.0/24 to develop various subnets. This address lies in Class C network mask. A class C address has its first octet decimal range falling between 192 and 223 and has a network mask of the form 255.255.255.0. The figure below explains each class, its subnet mask and octet decimal range.

Class

Octet Decimal Range

Subnet Mask

Format

A

1 - 126

255.0.0.0

Network.Host.Host.Host

B

128 - 191

255.255.0.0

Network.Network.Host.Host

C

192 - 223

255.255.255.0

Network.Network.Network.Host

Subnet mask slash notation

A subnet mask can also be denoted using a slash symbol based on the mask octet hence the term Classless Inter Domain Routing (CIDR) (Lammle, 2016). A subnet mask of class A implies that its first octet has all on bits and hence denoted as /8. A subnet mask of class B implies that it has its first two octets all on bits and hence denoted as /16. Similarly, a subnet mask in class C implies its first 3 octets are all on bits and thus denoted as /24. A class C network can host a maximum of 254 hosts.

UMMCS Scenario

The proposed building will have three floors hosting a total of four computer labs, a library, separate offices, admission, and finance office, and a student’s study room. First floor will host the admissions and finance office, Lab#1 and Lab#2. Second floor will host Lab#3, Lab#4, the Library, and departmental offices. Third floor will have a departmental offices, IT office, an open student study room, and the institution’s server room.

Each computer lab will have 27 computers where 25 will be student computers, 1 server placed in the closet, and 1 computer for lecturer’s use. The library will have 30 computers where 25 will be for use by the public and 5 for use by the library staffs. Other than the admissions and Finance office that will contain seven computers, the rest will each have one computer for use by the staff in that office.

Methodology

Based on above scenario we shall employ the 199.1.2.0/24 network infrastructure and develop 8 subnets with a maximum 27 hosts on each network as below

Subnet Description

Required Hosts

Lab 1 Computer Lab

27 Computers

Lab 2 Computer Lab

27 Computers

Lab 3 Computer Lab

27 Computers

Lab 4 Computer Lab

27 Computers

Block Library

30 Computers

Server Room Equipment

xx devices (servers access points)

Staff Offices

xx Computers

Admissions and finance Network

7 computers

(Using the How to Subnet a Network Video provided in CMIT 265 LEO - Content - UMUC Network Design Proposal, complete the following chart.)

Subnet

Network Address

Host Address Range

Broadcast Address

Subnet Mask: 255.255.255.0

Lab 1

199.1.2.0.0

199.1.2.0.1 - 199.1.2.0.30

199.1.2.0.31

Lab 2

199.1.2.0.32

199.1.2.0.33 - 199.1.2.0.62

199.1.2.0.63

Lab 3

199.1.2.0.64

199.1.2.0.65 - 199.1.2.0.94

199.1.2.0.95

Lab 4

199.1.2.0.96

199.1.2.0.97 – 199.1.2.0.126

199.1.2.0.127

Block Library

199.1.2.0.128

199.1.2.0.129 – 199.1.2.0.158

199.1.2.0.159

Server Room Equipment

199.1.2.0.160

199.1.2.0.161- 199.1.2.0.190

199.1.2.0.192

Staff Offices

199.1.2.0.193

199.1.2.0.194 - 199.1.2.0.223

199.1.2.0.224

Admissions and Finance Office

199.1.2.0.225

199.1.2.0.226 - 199.1.2.0.254

199.1.2.0.255

References

Bigger, D. (2014). CompTIA Network+ 2014: IPv4 Subnetting.

Lammle, T. (2016). CCNA Routing and Switching Complete Study Guide: Exam 100-105, Exam 200-105, Exam 200-125. Newark: Wiley.

June 06, 2023
Subcategory:

Communication

Number of pages

3

Number of words

564

Downloads:

52

Writer #

Rate:

4.7

Verified writer

Richard is the best writer for Data Science tasks, even if you have something really complex. I needed to do tasks on security matters and already had a draft. Sharing my ideas with Richard ended up in a perfect paper!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro