B-2 User’s Reference Guide

IP addresses indicate both the identity of the network and the identity of the individual host on the network. The number of bits used for the network number and the number of bits used for the host number can vary, as long as certain rules are followed. The local network manager assigns IP host numbers to individual machines.

IP addresses are maintained and assigned by the InterNIC, a quasi-governmental organization now increasingly under the auspices of private industry.

Note: It’s very common for an organization to obtain an IP address from a third party, usually an Internet service provider (ISP). ISPs usually issue an IP address when they are contracted to provide Internet access services.

The InterNIC (the NIC stands for Network Information Center) divides IP addresses into several classes. Classes A, B, and C are assigned to organizations that request addresses. In Class A networks, the first byte of an IP address is reserved for the network portion of the address. Class B networks reserve the first two bytes of an IP address for the network address. Class C networks reserve the first three bytes of an IP address for the network address. In all cases, a network manager can decide to use subnetting to assign even more bits to the network portion of the IP address, but never less than the class requires. The following section gives more information on subnetting.

Class A networks have a small number of possible network numbers, but a large number of possible host numbers. Conversely, Class C networks have a small number of possible host numbers, but a large number of possible network numbers. Thus, the InterNIC assigns Class A addresses to large organizations that have very large numbers of IP hosts, while smaller organizations, with fewer hosts, get Class B or Class C addresses. You can tell the various classes apart by the value of the first (or high-order) byte. Class A networks use values from 1 to 127, Class B networks use values from 128 to 191, and Class C networks use values from 192 to 223. The following table summarizes some of the differences between Class A, B, and C networks.

 

 

Number of

Number of

 

 

Class

First byte

networks

hosts

Format of address

Example

possible per

possible per

(without subnetting)

 

 

 

 

 

class

network

 

 

 

 

 

 

 

 

 

 

 

 

 

 

A

1–127

127

16,777,214

net.host.host.host

97.3.14.250

 

 

 

 

 

 

B

128–191

16,384

65,534

net.net.host.host

140.100.10.11

 

 

 

 

 

 

C

192–223

2,097,152

254

net.net.net.host

197.204.13.7

 

 

 

 

 

 

Subnets and subnet masks

Often an entire organization is assigned only one IP network number. If the organization has several IP networks connected together with IP routers, the network manager can use subnetting to distinguish between these networks, even though they all use the same network number. Each physical network becomes a subnet with a unique subnet number.

Subnet numbers appear within IP addresses, along with network numbers and host numbers. Since an IP address is always 32 bits long, using subnet numbers means either the network number or the host numbers must use fewer bits in order to leave room for the subnet numbers. Since the InterNIC assigns the network number proper, it should not change, so the subnet numbers must be created out of bits that would otherwise be part of the host numbers.

Page 196
Image 196
Farallon Communications R9100 manual Subnets and subnet masks

R9100 specifications

Farallon Communications R9100 is a high-performance network device designed to meet the demanding needs of modern telecommunications. This robust system specializes in delivering reliable, efficient, and scalable solutions for various networking environments. Its architectural design integrates cutting-edge technologies that enhance performance while ensuring compatibility with existing infrastructure.

One of the standout features of the R9100 is its advanced routing capabilities. Equipped with powerful processors, it supports multiple routing protocols, including OSPF, BGP, and EIGRP. This flexibility allows network administrators to optimize data flow and maintain seamless connectivity across diverse network topologies. The R9100 also includes sophisticated Quality of Service (QoS) mechanisms, enabling prioritization of critical traffic, which is essential for latency-sensitive applications.

Another significant aspect of the R9100 is its support for various interfaces. Whether organizations require Ethernet, fiber, or wireless connections, the R9100 accommodates a broad range of interface options. This versatility ensures that it can be deployed in various environments, from large enterprise networks to smaller branch offices.

Security is a crucial consideration in today’s networking landscape, and the R9100 addresses this with built-in security features. These include stateful firewall capabilities, Intrusion Detection System (IDS), and comprehensive Virtual Private Network (VPN) support. Such features allow organizations to safeguard sensitive data and maintain compliance with industry regulations.

The R9100 also prioritizes ease of management. With a user-friendly interface and robust monitoring tools, network administrators can easily configure and manage the device. This capability facilitates rapid troubleshooting and performance tuning, ensuring minimal downtime and optimal user experience.

Energy efficiency is an additional characteristic that sets the R9100 apart from its competitors. Designed with eco-friendly technologies, it minimizes power consumption while maximizing output, making it an ideal choice for organizations looking to reduce their carbon footprint.

In conclusion, Farallon Communications R9100 stands out as a versatile and powerful network device that meets the complexities of modern telecommunications. With its advanced routing features, robust security measures, varied interface options, and energy-efficient design, the R9100 is a formidable player in the networking landscape. Organizations can rely on this solution to enhance their network performance and evolve alongside their growing technological needs.