{"id":6148,"date":"2013-01-28T08:00:49","date_gmt":"2013-01-28T12:00:49","guid":{"rendered":"http:\/\/www.engineeringradio.us\/blog\/?p=6148"},"modified":"2023-04-08T20:14:45","modified_gmt":"2023-04-09T00:14:45","slug":"subnetting-101","status":"publish","type":"post","link":"https:\/\/www.engineeringradio.us\/blog\/2013\/01\/subnetting-101\/","title":{"rendered":"Subnetting 101"},"content":{"rendered":"\n<p>More information on IP networking:<\/p>\n\n\n\n<p>Most radio station networks that I have seen are divided along several different lines based on functions.&nbsp; These functions are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Office network; E-mail, document storage and retrieval, printing, applications like traffic and billing, promotions, music scheduling, and so on<\/li>\n\n\n\n<li>Automation network; automation servers, workstations, and audio editing machines used in production<\/li>\n\n\n\n<li>Audio over IP (AOIP) network; any AOIP consoles, devices, or STL equipment<\/li>\n\n\n\n<li>Voice over IP (VOIP); telephone system<\/li>\n\n\n\n<li>Wireless LAN; WLAN or WIFI<\/li>\n<\/ul>\n\n\n\n<p>It is helpful, then, to segment the network into different broadcast domains to reduce the congestion on any one network.\u00a0 That is where a good subnetting scheme can be beneficial.\u00a0 Subnets segment the network into smaller parts, reducing the amount of broadcast traffic and increasing network speeds by reducing MAC table sizes, and thus switching and lookup times.\u00a0 They also can secure certain areas of the network from the outside or other subnets, adding a level of security.\u00a0 For example, it may not be a good idea for automation computers or AOIP consoles to have access to the internet.\u00a0 Certain functions in routers and switches can be enabled for that added security.<\/p>\n\n\n\n<p>It is also important to efficiently use IP addresses in a large organization where WANs are used.&nbsp; The better the subnetting scheme, the easier it is to understand and the better it performs.&nbsp;&nbsp; Avoiding or reducing discontiguous networks is key to efficient and speedy routing. &nbsp; That is an important consideration where applications like AOIP and VOIP are concerned<\/p>\n\n\n\n<p>To really understand subnetting, it must be broken down into fundamental parts.\u00a0 This pertains to IPv4, which will likely remain in use for quite some time.\u00a0 The big chart, class B networks:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>3<sup>nd<\/sup>&nbsp; octet<\/td><td>4<sup>th<\/sup> octet<\/td><td>CIDR<\/td><td>Decimal<\/td><td>Wild card<\/td><td>Hosts<\/td><td>3<sup>rd<\/sup> Up by<\/td><td>Subnets<\/td><\/tr><tr><td>00000000<\/td><td>00000000<\/td><td>\/16<\/td><td>255.255.0.0<\/td><td>0.0.255.255<\/td><td>65,534<\/td><td>255<\/td><td>0<\/td><\/tr><tr><td>10000000<\/td><td>00000000<\/td><td>\/17<\/td><td>255.255.128.0<\/td><td>0.0.127.255<\/td><td>32,766<\/td><td>128<\/td><td>2<\/td><\/tr><tr><td>11000000<\/td><td>00000000<\/td><td>\/18<\/td><td>255.255.192.0<\/td><td>0.0.63.255<\/td><td>16,382<\/td><td>64<\/td><td>4<\/td><\/tr><tr><td>11100000<\/td><td>00000000<\/td><td>\/19<\/td><td>255.255.224.0<\/td><td>0.0.31.255<\/td><td>8,190<\/td><td>32<\/td><td>8<\/td><\/tr><tr><td>11110000<\/td><td>00000000<\/td><td>\/20<\/td><td>255.255.240.0<\/td><td>0.0.15.255<\/td><td>4,094<\/td><td>16<\/td><td>16<\/td><\/tr><tr><td>11111000<\/td><td>00000000<\/td><td>\/21<\/td><td>255.255.248.0<\/td><td>0.0.7.255<\/td><td>2,046<\/td><td>8<\/td><td>32<\/td><\/tr><tr><td>11111100<\/td><td>00000000<\/td><td>\/22<\/td><td>255.255.252.0<\/td><td>0.0.3.255<\/td><td>1,022<\/td><td>4<\/td><td>64<\/td><\/tr><tr><td>11111110<\/td><td>00000000<\/td><td>\/23<\/td><td>255.255.254.0<\/td><td>0.0.1.255<\/td><td>510<\/td><td>2<\/td><td>128<\/td><\/tr><tr><td>11111111<\/td><td>00000000<\/td><td>\/24<\/td><td>255.255.255.0<\/td><td>0.0.0.255<\/td><td>254<\/td><td>1<\/td><td>256<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Class C networks<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>3<sup>rd<\/sup> octet<\/td><td>4<sup>th<\/sup> octet<\/td><td>CIDR<\/td><td>Decimal<\/td><td>Wild card<\/td><td>Hosts<\/td><td>4<sup>th<\/sup> Up by<\/td><td>SubnetsB<\/td><td>SubnetsC<\/td><\/tr><tr><td>11111111<\/td><td>00000000<\/td><td>\/24<\/td><td>255.255.255.0<\/td><td>0.0.0.255<\/td><td>254<\/td><td>255<\/td><td>256<\/td><td>0<\/td><\/tr><tr><td>11111111<\/td><td>10000000<\/td><td>\/25<\/td><td>255.255.255.128<\/td><td>0.0.0.127<\/td><td>126<\/td><td>128<\/td><td>512<\/td><td>2<\/td><\/tr><tr><td>11111111<\/td><td>11000000<\/td><td>\/26<\/td><td>255.255.255.192<\/td><td>0.0.0.63<\/td><td>62<\/td><td>64<\/td><td>1024<\/td><td>4<\/td><\/tr><tr><td>11111111<\/td><td>11100000<\/td><td>\/27<\/td><td>255.255.255.224<\/td><td>0.0.0.31<\/td><td>30<\/td><td>32<\/td><td>2048<\/td><td>8<\/td><\/tr><tr><td>11111111<\/td><td>11110000<\/td><td>\/28<\/td><td>255.255.255.240<\/td><td>0.0.0.15<\/td><td>14<\/td><td>16<\/td><td>4096<\/td><td>16<\/td><\/tr><tr><td>11111111<\/td><td>11111000<\/td><td>\/29<\/td><td>255.255.255.248<\/td><td>0.0.0.7<\/td><td>6<\/td><td>8<\/td><td>8192<\/td><td>32<\/td><\/tr><tr><td>11111111<\/td><td>11111100<\/td><td>\/30<\/td><td>255.255.255.252<\/td><td>0.0.0.3<\/td><td>2<\/td><td>4<\/td><td>16384<\/td><td>64<\/td><\/tr><tr><td>11111111<\/td><td>11111110<\/td><td>\/31<\/td><td>255.255.255.254<\/td><td>0.0.0.1<\/td><td>0<\/td><td>2<\/td><td>N\/A<\/td><td>&nbsp;<\/td><\/tr><tr><td>11111111<\/td><td>11111111<\/td><td>\/32<\/td><td>255.255.255.255<\/td><td>0.0.0.0<\/td><td>0<\/td><td>1<\/td><td>N\/A<\/td><td>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The terms &#8220;Class B&#8221; and &#8220;Class C&#8221; networks are outdated.&nbsp; Basically, I broke the chart up along a classful boundary to make it easier to read.<\/p>\n\n\n\n<p>An IP v4 address consists of four octets of binary data. A common example is 192.168.1.154, which in binary numbers looks like this: 11000000.10101000.00000001.11111110. It is converted to base ten numbers (dotted decimal) so that we humans can deal with it. A typical subnet mask seen in many office networks is 255.255.255.0, which in binary looks like this: 11111111.11111111.11111111.00000000.&nbsp; When a router receives a packet, it does something called an &#8220;ANDing process.&#8221;&nbsp; When a router ANDs, it overlays the subnet mask on the network address and uses the following function: 1+1 = 1, 1+0 = 0 and 0+0 = 0.&nbsp; Thus, in the above example, a router AND would look like this:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Dotted Decimal<\/td><td>Binary Octets<\/td><\/tr><tr><td>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"1\">\n<tbody>\n<tr>\n<td width=\"76\" valign=\"top\">192<\/td>\n<td width=\"76\" valign=\"top\">168<\/td>\n<td width=\"76\" valign=\"top\">1<\/td>\n<td width=\"76\" valign=\"top\">254<\/td>\n<\/tr>\n<tr>\n<td width=\"76\" valign=\"top\">255<\/td>\n<td width=\"76\" valign=\"top\">255<\/td>\n<td width=\"76\" valign=\"top\">255<\/td>\n<td width=\"76\" valign=\"top\">0<\/td>\n<\/tr>\n<tr>\n<td width=\"76\" valign=\"top\">192<\/td>\n<td width=\"76\" valign=\"top\">168<\/td>\n<td width=\"76\" valign=\"top\">1<\/td>\n<td width=\"76\" valign=\"top\">0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td><td>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"1\">\n<tbody>\n<tr>\n<td width=\"76\" valign=\"top\">11000000<\/td>\n<td width=\"76\" valign=\"top\">10101000<\/td>\n<td width=\"76\" valign=\"top\">00000001<\/td>\n<td width=\"76\" valign=\"top\">11111110<\/td>\n<\/tr>\n<tr>\n<td width=\"76\" valign=\"top\">11111111<\/td>\n<td width=\"76\" valign=\"top\">11111111<\/td>\n<td width=\"76\" valign=\"top\">11111111<\/td>\n<td width=\"76\" valign=\"top\">00000000<\/td>\n<\/tr>\n<tr>\n<td width=\"76\" valign=\"top\">11000000<\/td>\n<td width=\"76\" valign=\"top\">10101000<\/td>\n<td width=\"76\" valign=\"top\">00000001<\/td>\n<td width=\"76\" valign=\"top\">00000000<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The subnet mask is telling the router to ignore the last octet, thus saving a bit of time and processing power.&nbsp; It may seem very small and insignificant.&nbsp; When considering that routers make sometimes hundreds or thousands of routing decisions in a second, even a small bit of work reduction adds up quickly.&nbsp; Subnet masks allow routers to look at only the layer three network address, ignoring the host portion.&nbsp; This takes advantage of IPs inherent hierarchical addressing system and speeds the process of routing to the proper destination.<\/p>\n\n\n\n<p>Another way to look at it:<\/p>\n\n\n\n<figure class=\"wp-block-image alignnone\"><a href=\"https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/Subnet_Chart.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"600\" src=\"https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/Subnet_Chart-479x600.jpg\" alt=\"IPv4 subnet chart\" class=\"wp-image-6180\" srcset=\"https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/Subnet_Chart-479x600.jpg 479w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/Subnet_Chart-119x150.jpg 119w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/Subnet_Chart-239x300.jpg 239w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/Subnet_Chart-400x500.jpg 400w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/Subnet_Chart.jpg 1200w\" sizes=\"auto, (max-width: 479px) 100vw, 479px\" \/><\/a><figcaption class=\"wp-element-caption\">IPv4 subnet chart, click for .pdf version<\/figcaption><\/figure>\n\n\n\n<p>There are three IPv4 address ranges set aside for private (internal) use:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>192.168.0.0 to 192.168.255.255 \/16<\/li>\n\n\n\n<li>172.16.0.0 to 172.31.255.255 \/12<\/li>\n\n\n\n<li>10.0.0.0 to 10.255.255.255 \/8<\/li>\n<\/ul>\n\n\n\n<p>Thus, very large networks can use an internal IP address scheme in the 10.0.0.0 range and have up to 16,777,216 hosts, or 2<sup>24<\/sup> addresses minus two, one for the network line address and one for the broadcast address.&nbsp; That would be one giant network clogged with ARP requests, ICMP packets and other miscellaneous multicast messages. A notation of \/16 means that 16 bits are used for the network address, the remaining address bits are host bits.&nbsp; A \/24 network has 24 network bits and 8 host bits making the available hosts 254.<\/p>\n\n\n\n<p>An example of an efficient network would be a medium market operation with six radio station under one roof.\u00a0 This facility has ten studios and a newsroom using AOIP consoles, a VOIP phone system, an automation system, an office network with an internal file server and exchange server.\u00a0 The number of required hosts on each subnetwork is<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Office network, servers and wireless hosts: 78<\/li>\n\n\n\n<li>VOIP phone system: 70<\/li>\n\n\n\n<li>AOIP consoles and nodes: 30<\/li>\n\n\n\n<li>Broadcast automation system: 22<\/li>\n<\/ul>\n\n\n\n<p>Given IP address: 172.19.0.0 \/22<\/p>\n\n\n\n<p>In most instances, office networks are usually installed on one class C segment, that is to say, the network mask is 255.255.255.0.&nbsp; However, in the example above, 254 hosts are not needed on the office network, thus it can be divided in half using the subnet mask of 255.255.255.128, leaving the other half for the VOIP phone system.&nbsp; This subnetting scheme would leave 126 hosts on the office network and 126 hosts on the VOIP network.&nbsp; The AOIP console and broadcast automation system can be placed on another class C segment, using the subnet mask of 255.255.255.192, which would give each subnet 62 hosts.&nbsp; All subnets would have room to expand.&nbsp; Each subnet is isolated from the others by a router.&nbsp; The office subnet contains the gateway to the internet, usually .1 or .126 (first or last) IP address.<\/p>\n\n\n\n<p>That would look something like this:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Office network<\/td><\/tr><tr><td>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"1\">\n<tbody>\n<tr>\n<td width=\"125\" valign=\"top\">Line address<\/td>\n<td width=\"125\" valign=\"top\">First available<\/td>\n<td width=\"125\" valign=\"top\">Last available<\/td>\n<td width=\"125\" valign=\"top\">Broadcast<\/td>\n<td width=\"125\" valign=\"top\">Subnet mask<\/td>\n<\/tr>\n<tr>\n<td width=\"125\" valign=\"top\">172.19.0.0<\/td>\n<td width=\"125\" valign=\"top\">172.19.0.1<\/td>\n<td width=\"125\" valign=\"top\">172.19.0.126<\/td>\n<td width=\"125\" valign=\"top\">172.19.0.127<\/td>\n<td width=\"125\" valign=\"top\">255.255.255.128<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td><\/tr><tr><td>VOIP phone system<\/td><\/tr><tr><td>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"1\">\n<tbody>\n<tr>\n<td width=\"125\" valign=\"top\">Line address<\/td>\n<td width=\"125\" valign=\"top\">First available<\/td>\n<td width=\"125\" valign=\"top\">Last available<\/td>\n<td width=\"125\" valign=\"top\">Broadcast<\/td>\n<td width=\"125\" valign=\"top\">Subnet mask<\/td>\n<\/tr>\n<tr>\n<td width=\"125\" valign=\"top\">172.19.0.128<\/td>\n<td width=\"125\" valign=\"top\">172.19.0.129<\/td>\n<td width=\"125\" valign=\"top\">172.19.0.254<\/td>\n<td width=\"125\" valign=\"top\">172.19.0.255<\/td>\n<td width=\"125\" valign=\"top\">255.255.255.128<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td><\/tr><tr><td>AOIP consoles and nodes<\/td><\/tr><tr><td>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"1\">\n<tbody>\n<tr>\n<td width=\"125\" valign=\"top\">Line address<\/td>\n<td width=\"125\" valign=\"top\">First available<\/td>\n<td width=\"125\" valign=\"top\">Last available<\/td>\n<td width=\"125\" valign=\"top\">Broadcast<\/td>\n<td width=\"125\" valign=\"top\">Subnet mask<\/td>\n<\/tr>\n<tr>\n<td width=\"125\" valign=\"top\">172.19.1.0<\/td>\n<td width=\"125\" valign=\"top\">172.19.1.1<\/td>\n<td width=\"125\" valign=\"top\">172.19.1.62<\/td>\n<td width=\"125\" valign=\"top\">172.19.1.63<\/td>\n<td width=\"125\" valign=\"top\">255.255.255.192<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td><\/tr><tr><td>Broadcast Automation system<\/td><\/tr><tr><td>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"1\">\n<tbody>\n<tr>\n<td width=\"125\" valign=\"top\">Line address<\/td>\n<td width=\"125\" valign=\"top\">First available<\/td>\n<td width=\"125\" valign=\"top\">Last available<\/td>\n<td width=\"125\" valign=\"top\">Broadcast<\/td>\n<td width=\"125\" valign=\"top\">Subnet mask<\/td>\n<\/tr>\n<tr>\n<td width=\"125\" valign=\"top\">172.19.1.64<\/td>\n<td width=\"125\" valign=\"top\">172.19.1.65<\/td>\n<td width=\"125\" valign=\"top\">172.19.1.126<\/td>\n<td width=\"125\" valign=\"top\">172.19.1.127<\/td>\n<td width=\"125\" valign=\"top\">255.255.255.192<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>That keeps the network segments small but has room to grow.&nbsp; This is a diagram of a converged network:<\/p>\n\n\n\n<figure class=\"wp-block-image alignnone size-large wp-image-6206\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"438\" src=\"https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/broadcast-facility-converge-650x438.jpg\" alt=\"Radio Broadcast Facility converged network\" class=\"wp-image-6206\" srcset=\"https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/broadcast-facility-converge-650x438.jpg 650w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/broadcast-facility-converge-150x101.jpg 150w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/broadcast-facility-converge-300x202.jpg 300w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/broadcast-facility-converge-400x270.jpg 400w, https:\/\/www.engineeringradio.us\/blog\/wp-content\/uploads\/2013\/01\/broadcast-facility-converge.jpg 1200w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><figcaption class=\"wp-element-caption\">Radio Broadcast Facility converged network<\/figcaption><\/figure>\n\n\n\n<p>With a setup like this, reliability is the key to a happy life. The router should be a good Cisco product with four or more Fast Ethernet ports. A second way to do this would be to have four routers plugged into a distribution switch and use OSPF to route between subnetworks. The switches should also be a good Cisco product, which can take advantage of port security options and QoS on the VOIP and AOIP segments.&nbsp; VOIP systems usually require Power over Ethernet (POE) ports, thus that switch can be specialized for that purpose.<\/p>\n\n\n\n<p>Many AOIP systems want to see Gigabit switches or at least Fast Ethernet switches with Gigabit or better backplanes.\u00a0 Any AOIP STL system can be connected to the AOIP network along with other things like AOIP remote broadcast and studio telephone solutions.<\/p>\n\n\n\n<p>Many WLAN access points can be configured as a network router and DHCP server for wireless hosts.<\/p>\n\n\n\n<p>The largest users of the public (i.e. internet) network would be the VOIP phone system and office network.&nbsp; The broadcast automation network may also be a if voice tracking or other program delivery over WAN is used.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More information on IP networking: Most radio station networks that I have seen are divided along several different lines based on functions.&nbsp; These functions are: It is helpful, then, to segment the network into different broadcast domains to reduce the congestion on any one network.\u00a0 That is where a good subnetting scheme can be beneficial.\u00a0 &hellip; <a href=\"https:\/\/www.engineeringradio.us\/blog\/2013\/01\/subnetting-101\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Subnetting 101<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[260,4],"tags":[158,247,187,265],"class_list":["post-6148","post","type-post","status-publish","format-standard","hentry","category-it","category-tech-stuff","tag-aoip","tag-ip","tag-network","tag-voip"],"_links":{"self":[{"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/posts\/6148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/comments?post=6148"}],"version-history":[{"count":28,"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/posts\/6148\/revisions"}],"predecessor-version":[{"id":11458,"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/posts\/6148\/revisions\/11458"}],"wp:attachment":[{"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/media?parent=6148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/categories?post=6148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineeringradio.us\/blog\/wp-json\/wp\/v2\/tags?post=6148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}