Classless Addressing (Part 2)

Neso Academy
1 Jul 202210:17

Summary

TLDRThis lecture introduces the concept of classless addressing, also known as CIDR, which overcomes the limitations of classful addressing by allowing for more flexible and efficient IP address allocation. The session explains the drawbacks of classful addressing and demonstrates how classless addressing enables the creation of custom subnet masks, optimizing IP address usage. The importance of subnetting in achieving classless addressing is highlighted, and an activity is conducted to differentiate between valid and invalid subnet masks, emphasizing the need for consecutive ones followed by zeros in subnet masks. The lecture concludes with a homework question to reinforce the understanding of subnet masks.

Takeaways

  • πŸ˜€ The session is focused on understanding the need for classless addressing and identifying valid and invalid subnet masks.
  • πŸ“š Classful addressing has been replaced by classless addressing due to its drawbacks, such as lack of address flexibility, inefficient use of address space, and proliferation of router table entries.
  • πŸ” Classless addressing, formally known as Classless Inter-Domain Routing (CIDR), allows for more efficient allocation of IPv4 addresses by breaking the constraints of class-based addressing.
  • πŸ’‘ Subnetting is a crucial concept in computer networking that enables the creation of classless addressing and allows for the customization of network sizes based on device requirements.
  • 🌐 In classless addressing, subnet masks can be customized to fit the needs of the network, rather than being limited to class A, B, or C subnet masks.
  • πŸ”‘ A valid subnet mask consists of consecutive binary '1's followed by consecutive '0's, with no mixture of ones and zeros in between.
  • πŸ“ˆ Subnet masks can be represented in decimal format, binary format, or using the slash notation, which indicates the number of consecutive '1's at the start of the mask.
  • πŸ“ The script provides an activity to practice identifying valid and invalid subnet masks by converting decimal subnet masks to binary and analyzing their structure.
  • 🚫 Invalid subnet masks have a mixture of ones and zeros that are not consecutive, which breaks the rule of continuous '1's followed by continuous '0's.
  • πŸŽ“ The lecture concludes with a homework question that challenges learners to apply their understanding of subnet masks to identify invalid options from a given list.
  • πŸ‘‹ The presenter encourages engagement by asking viewers to solve the homework problem and share their answers in the comment section.

Q & A

  • What are the five classes of IPv4 addresses?

    -There are five classes of IPv4 addresses: Class A, B, C, D, and E. Class D is used for multicast purposes, and Class E is reserved for experimental and research purposes.

  • Why is there a shift from classful to classless addressing?

    -The shift from classful to classless addressing is due to the drawbacks of classful addressing, which include lack of internal address flexibility, inefficient use of address space, and the proliferation of router table entries.

  • What is the formal name of classless addressing?

    -The formal name of classless addressing is Classless Interdomain Routing, pronounced as CIDR.

  • How does classless addressing help in the allocation of IPv4 addresses?

    -Classless addressing allows service providers to allocate IPv4 addresses on any address bit boundary, known as the prefix length, rather than being restricted to Class A, B, or C boundaries.

  • What is the significance of subnetting in classless addressing?

    -Subnetting is significant in classless addressing as it enables the creation of classless addressing and facilitates the creation of networks with a specific number of devices, allowing for the efficient use of IP addresses.

  • What are the possible values for a subnet mask octet?

    -A subnet mask octet can take values such as 255, 254, 252, 248, 240, 224, 192, 128, or 0.

  • What is the rule for the arrangement of bits in a valid subnet mask?

    -In a valid subnet mask, there must be a consecutive sequence of ones followed by a consecutive sequence of zeros, with no mixture of ones and zeros in between.

  • How can a subnet mask be represented?

    -A subnet mask can be represented in decimal format, binary format, or using slash notation.

  • What does a slash notation of 24 in a subnet mask signify?

    -A slash notation of 24 signifies that there are 24 consecutive ones in the subnet mask, followed by 8 zeros, which corresponds to a class C subnet mask.

  • What is the purpose of the activity involving the conversion of subnet masks from decimal to binary?

    -The purpose of the activity is to help learners understand how to identify valid and invalid subnet masks by analyzing the binary representation for the correct sequence of ones and zeros.

  • What is the homework question asked at the end of the session?

    -The homework question is to identify the invalid subnet mask from the following options: 255.240.0.0, 248.0.0.0, 255.255.128.0, 255.255.255.252, and 255.255.242.0.

Outlines

00:00

πŸ˜€ Classless Addressing Overview and Objectives

This paragraph introduces the second part of a class on classless addressing, setting the stage for the session's learning outcomes. The learner is expected to understand the necessity of classless addressing and to discern valid from invalid subnet masks through an activity. The paragraph explains the transition from classful to classless addressing due to the drawbacks of classful addressing, such as lack of address flexibility and inefficient use of address space. It also introduces the concept of Classless Interdomain Routing (CIDR) and its advantages in allocating IPv4 addresses more efficiently, avoiding waste and enabling the creation of custom subnet masks tailored to network requirements.

05:01

😎 Understanding Subnet Masks and CIDR Notation

The second paragraph delves into the specifics of subnet masks in the context of classless addressing. It explains the valid values a subnet mask can take and the importance of consecutive ones followed by zeros in the mask. The paragraph also discusses the representation of subnet masks in decimal, binary, and CIDR notation, providing examples to illustrate the concept. An activity is introduced to help learners identify valid and invalid subnet masks, with examples demonstrating the conversion of decimal subnet masks to binary and their corresponding CIDR notations. The paragraph concludes with a homework question that challenges learners to apply their understanding of subnet masks to identify invalid options.

10:01

πŸŽ‰ Conclusion and Homework Assignment

The final paragraph wraps up the lecture with a summary of the key points covered, including the need for classless addressing and the identification of valid and invalid subnet masks. It encourages learners to complete the homework problem and share their answers in the comment section. The paragraph ends with a note of thanks and appreciation for the audience's engagement, signaling the end of the session with applause and music, creating a sense of closure and celebration of the learning experience.

Mindmap

Keywords

πŸ’‘Classless Addressing

Classless Addressing, also known as Classless Interdomain Routing (CIDR), is a method that allows for a more flexible and efficient allocation of IPv4 addresses. It moves away from the traditional classful addressing system, which divided IP addresses into classes A, B, and C, each with a fixed number of addressable hosts. In the video, classless addressing is discussed as a solution to the drawbacks of classful addressing, such as the inefficient use of address space and lack of address flexibility. It enables the creation of custom subnet masks to better suit the needs of a network, thus conserving IP addresses.

πŸ’‘Subnet Mask

A subnet mask is a 32-bit number that divides the IP address into network and host portions, defining the boundary of a network. In the context of the video, subnet masks are crucial for implementing classless addressing as they determine the size of the network and the number of available host addresses. The script explains that a valid subnet mask contains consecutive bits set to '1' followed by consecutive bits set to '0', and provides examples of valid and invalid subnet masks.

πŸ’‘IPv4

IPv4, or Internet Protocol version 4, is the fourth version of the Internet Protocol and is the most widely used networking protocol for the Internet. It provides the means for devices to communicate over the network by assigning each device a unique IP address. The video discusses the limitations of IPv4, particularly in the context of classful addressing, and the transition to classless addressing to better manage the finite number of IPv4 addresses available.

πŸ’‘Classful Addressing

Classful addressing is the traditional system of IP address allocation where addresses are divided into classes (A, B, C, D, and E) based on the first octet of the IP address. This system has limitations, as discussed in the video, such as the fixed number of host addresses in each class, leading to inefficiencies in address allocation. The video script contrasts classful addressing with classless addressing, highlighting the need for the latter due to the drawbacks of the former.

πŸ’‘CIDR Notation

CIDR notation is a way of representing subnet masks using a forward slash ('/') followed by a number that indicates the number of bits set to '1' in the subnet mask. This notation simplifies the representation of subnet masks and is used in the video to illustrate different subnet sizes. For example, a 'slash 24' in CIDR notation corresponds to a subnet mask of 255.255.255.0, indicating that the first 24 bits of the IP address are used for the network portion.

πŸ’‘Subnetting

Subnetting is the process of dividing a network into smaller networks, known as subnets. This is done to improve the management and efficiency of IP addresses within a network. In the video, subnetting is mentioned as a key technique that facilitates the implementation of classless addressing, allowing for the creation of custom subnet masks to suit specific network requirements.

πŸ’‘IP Address

An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. In the video, IP addresses are discussed in the context of classful and classless addressing, emphasizing the importance of understanding how these addresses are allocated and managed within a network.

πŸ’‘Binary Representation

Binary representation is the way of writing numbers using only two symbols, 0 and 1. In the context of the video, binary representation is used to illustrate the structure of subnet masks and to determine their validity. The script explains that a valid subnet mask in binary form will have consecutive '1's followed by consecutive '0's, with no mixture of the two in between.

πŸ’‘Network Layer

The network layer is a layer in the OSI model that is responsible for the transmission of data between devices on different networks. In the video, the network layer is mentioned in relation to subnetting and classless addressing, which are techniques used at this layer to manage and route data efficiently across a network.

πŸ’‘Slash Notation

Slash notation, as discussed in the video, is a shorthand way of writing subnet masks using CIDR notation. It is a quick way to denote the number of continuous '1's in the subnet mask. For example, a 'slash 19' subnet mask means that there are 19 consecutive '1's in the mask, followed by '0's, making it a more concise way to express subnet masks than the traditional dotted decimal notation.

πŸ’‘Homework Problem

The homework problem presented in the video script is an exercise for the learners to apply their understanding of valid and invalid subnet masks. It provides a list of subnet masks and asks learners to identify which ones are invalid, reinforcing the concepts taught in the lecture about the structure and rules for subnet masks.

Highlights

Introduction to classless addressing and its benefits over classful addressing.

Classful addressing limitations: lack of address flexibility, inefficient address space use, and router table proliferation.

Classless addressing, formally known as Classless Interdomain Routing (CIDR), allows for more efficient IP address allocation.

Class A, B, and C IP addresses are the primary classes used, with D and E reserved for multicast and experimental purposes.

The necessity of moving from classful to classless addressing due to IP address wastage.

Subnetting as a key concept in enabling classless addressing and efficient network design.

Explanation of how subnet masks function in a network to identify devices and neighbors.

Subnet masks can take eight specific values and must have consecutive bits set to 1 followed by zeros.

Binary representation of subnet masks and the importance of consecutive ones and zeros.

Different ways to represent subnet masks: decimal, binary, and slash notation.

Understanding slash notation and its relation to subnet mask values.

Class A, B, and C subnet masks and their corresponding slash notations.

Activity to identify valid and invalid subnet masks using decimal and binary conversions.

Analysis of provided subnet masks to determine their validity based on the rules of consecutive bits.

Homework problem presented to engage learners in identifying invalid subnet masks.

Summary of the lecture's key points and the importance of understanding classless addressing.

Conclusion and call to action for viewers to participate in the homework problem and comment their answers.

Transcripts

play00:06

we are now in part two of classless

play00:08

addressing let's start the session with

play00:10

the outcomes

play00:12

upon the completion of this session the

play00:14

learner will be able to outcome number

play00:16

one we will understand the need for

play00:18

classless addressing and outcome number

play00:21

two we will identify the valid and

play00:23

invalid subnet mask with the help of an

play00:25

activity let's start the session with

play00:28

the classful addressing we know

play00:30

basically there are five classes in ipv4

play00:32

addresses class a b c d and e class d

play00:37

for multicast purpose and class e is for

play00:39

experimental and research purpose so we

play00:42

are left with only class a b and c for

play00:45

our usage and we have already seen in

play00:47

the previous lecture that classful

play00:49

addressing based ip addresses and that's

play00:51

why we are migrating from class full

play00:53

addressing to classless addressing we

play00:55

have some drawbacks with classful

play00:57

addressing the drawbacks include the

play00:59

lack of internal address flexibility the

play01:01

inefficient use of address space and the

play01:04

proliferation of router table entries we

play01:06

have elaborately discussed about this in

play01:08

the previous lecture that is in part one

play01:10

of classless addressing if you are not

play01:12

clear with the drawbacks i request you

play01:14

to watch my previous lecture titled

play01:16

classless addressing part one we are

play01:18

clear that classful addressing vast ip

play01:20

addresses and that's why we are focusing

play01:23

on classless addressing

play01:25

the formal name of classless addressing

play01:27

is classless interdomain routing it is

play01:30

cider cidr it is pronounced as cider

play01:34

why do we need decider or classless

play01:36

addressing it created a new set of

play01:39

standards that allowed service providers

play01:41

to allocate ipv4 addresses on any

play01:44

address bit boundary that is the prefix

play01:46

length instead of only by a class a b or

play01:50

c we know basically the class a b and c

play01:53

are used for our purpose but when we go

play01:56

with class a b or c there are chances

play01:58

for the ip addresses getting wasted and

play02:00

that's why we are moving towards

play02:02

classless in classless addressing we can

play02:05

create our own set of standards that is

play02:07

we can create a new subnet mask where

play02:09

this new subnet mask can help us to

play02:12

determine how many devices are needed

play02:14

for our network so that it enable us to

play02:16

sparingly use the ip addresses rather

play02:19

wasting a huge set of ip addresses so

play02:22

this classless addressing is possible

play02:24

with the help of subnetting there is an

play02:27

important topic in computer networks the

play02:29

two in network layer which is the

play02:31

subnetting so subnetting helps us to

play02:34

create classless addressing and it also

play02:36

facilitates us to create our own network

play02:39

with the number of devices we need we

play02:41

will talk about the subnetting

play02:43

elaborately in the upcoming lectures but

play02:45

before going into the subnetting topic

play02:47

we need to know the subnet mask ip

play02:50

address says who are you in the network

play02:52

and subnet mask says who are your

play02:54

neighbors in your network let's see the

play02:56

valid subnet mask so a subnet mask will

play02:59

take only these eight possible values

play03:02

there are basically four octets in an ip

play03:04

address likewise there are four octets

play03:06

in a subnet mask as well say if it is a

play03:08

class a subnet mask it will be

play03:10

255.0.0.0.

play03:12

if it is class b it is 255.255.0.0

play03:16

if it is class c it is 255.255.255.0

play03:20

but we are going to create our own

play03:23

subnet mask based on our need and

play03:25

requirement isn't it so these are the

play03:27

values that is possible in a subnet mask

play03:29

an octet value can be 255 or 254 252 248

play03:34

240 224 192 128 or even zero so how can

play03:38

we know this in a subnet mask there will

play03:41

be a consecutive ones followed by

play03:44

consecutive zeros so there will not be a

play03:46

mixture of zeros and ones always

play03:48

remember this point in a subnet mask

play03:51

there will be consecutive ones followed

play03:53

by consecutive zeros say we have already

play03:56

witnessed this in a classful addressing

play03:58

also say if it is a class b subnet mask

play04:00

what will be the subnet value it will be

play04:02

255.255.0.0

play04:05

when it is two five five two five five

play04:07

zero zero when we write it in binary we

play04:10

will get a continuous 16 once followed

play04:12

by continuous 16 zeros right so that's a

play04:15

valid subnet mask let's see more about

play04:18

this in the upcoming slide we already

play04:20

know a subnet mask can be represented

play04:22

either in the decimal format or in the

play04:24

binary format or even it can be

play04:26

represented using a slash notation so

play04:28

this is the slash notation when it is

play04:31

slash one what does it mean it means

play04:32

only one one is there followed by

play04:35

continuous zeros i will explain this

play04:37

when it is slash one there is only one

play04:40

one in the binary notation so this is a

play04:42

valid subnet mask um what is the decimal

play04:44

equivalent for this 1 means it's 128 so

play04:47

the first octet is 128 and there are no

play04:50

ones in the other places obviously this

play04:53

is 128.0.0.0.

play04:56

and what about the second example that

play04:58

is slash two slash two means there are

play05:00

two ones followed by six zeros in the

play05:03

first octet and obviously there will be

play05:05

remaining zeros in the other octet as i

play05:07

mentioned once followed by continuous

play05:10

zeros and there will not be mixture of

play05:12

zeros and ones in any octane so if it is

play05:15

a one it will be continued and then a

play05:17

zero is started it will be continued

play05:19

till the last so this is an example

play05:22

slash two notation a slash 2 means what

play05:24

is the equivalent decimal notation slash

play05:27

2 means it's 128 plus 64 the bit

play05:29

position values it is 128 plus 64. it is

play05:33

192. so this is

play05:36

192.0.0.0. so 192.0.0.0

play05:39

let's take slash three slash three means

play05:42

it's three ones followed by 29 zeros

play05:46

three ones means it's 128 plus 64 plus

play05:49

32 which is 224 and the remaining three

play05:52

octets are zero how many bit values are

play05:54

there in subnet mask in ipv4 we know

play05:57

there are 32 bits so the subnet mask is

play05:59

also of 32 bit so it can be from slash 1

play06:02

to slash 32 slash 1

play06:05

slash three slash four up two slash

play06:07

thirty two is possible and we know slash

play06:10

eight means it's class full of

play06:12

addressing it is class a subnet mask

play06:14

slash sixteen means it's class b subnet

play06:17

mask and slash twenty four means it's

play06:19

class c subnet mask and that's why it's

play06:22

mentioned in a different color let's

play06:24

take another example it is slash 19.

play06:27

slash 19 means 19 ones followed by zeros

play06:31

so how many zero values so out of 32

play06:34

there are 19 ones so this is eight right

play06:37

first octet is of eight bits so we are

play06:39

putting eight ones another eight ones in

play06:41

the second octet so eight plus eight is

play06:43

sixteen so sixteen plus three is

play06:46

nineteen so we are putting three ones in

play06:48

the third octave so we have 19 ones and

play06:51

followed by 13 zeros so we are clear

play06:54

that there are consecutive ones followed

play06:56

by consecutive zeros so slash 30 means

play06:59

30 ones and two zeros let's see an

play07:03

activity it will be more clear for you

play07:05

to understand the valid and invalid

play07:07

subnet mask

play07:10

so the subnet mask in decimal is given

play07:12

and we are required to find whether they

play07:14

are valid or invalid let's take the

play07:16

first example which is 255.255.255.240.

play07:20

let's convert this into binary so we

play07:22

have the binary representation of the

play07:24

decimal subnet mask mentioned here so

play07:26

when we convert this into binary we can

play07:28

see its continuous once followed by

play07:31

zeros so there is no mixture of zeros

play07:33

and ones in between so obviously this is

play07:35

a valid subnet mask so we can say this

play07:38

is a valid subnet mask and what is the

play07:40

slash notation eight ones eight ones

play07:42

eight ones and here four ones

play07:44

so eight plus eight plus eight is twenty

play07:47

four twenty five twenty six twenty seven

play07:49

twenty eight so this is slash twenty

play07:51

eight perfect let's take the second one

play07:53

which is two five five or two thirty or

play07:55

two fifty five dot zero when we convert

play07:57

this into binary we are ending up with

play07:59

this binary value so obviously this is

play08:01

not a valid subnet mask because we know

play08:03

a continuous once when a 0 is started it

play08:06

should continue till the last if we

play08:08

notice here a 0 has started and then

play08:11

still we have wants and zeros

play08:13

combinations it's obviously an invalid

play08:15

subnet mask and we can't give a slash

play08:17

notation for this let's convert the

play08:19

binary equivalent for all the subnet

play08:21

mask we have the binary representation

play08:23

of all the subnet masks now let's

play08:25

analyze whether it is valid it's

play08:27

obviously valid because continuous ones

play08:29

if a zero is started continuous zeros

play08:31

are there and no one is interrupting

play08:33

after that so obviously this is valid

play08:35

and it's slash 16 it's a class b subnet

play08:38

mask why there are 16 ones then

play08:42

240.0.0.0

play08:44

yes it is also valid four ones followed

play08:46

by remaining zeros it is valid subnet

play08:48

mask it's a slash four subnet mask right

play08:51

then coming to the next one it's 223.0

play08:55

when we convert this into binary we are

play08:57

ending up with continuous ones followed

play08:59

by a zero and then it should be all

play09:01

zeros right if it is valid but here we

play09:03

are finding one so it is obviously

play09:05

invalid and coming to the last one it's

play09:09

255.0.255.0 so we are ending up with

play09:12

once

play09:13

again zeros and then one is interrupting

play09:15

right so it should not be the case if it

play09:17

is a valid subnet mask so the last

play09:19

subnet mask mentioned here is also

play09:22

invalid

play09:23

let's see the homework question

play09:25

identify the invalid subnet mask from

play09:27

the following option yay 255.240.0.0

play09:32

option b 248.0.0.0

play09:35

option c 255.255.128.0

play09:38

option d 255.255.255.252

play09:42

and option e 255.255.242.0

play09:47

solve this question and post your answer

play09:49

in the comment section

play09:51

and that's it guys i hope now you

play09:53

understood the need for classless

play09:55

addressing and we also identified valid

play09:57

and invalid subnet mask with the help of

play09:59

an activity don't forget about the

play10:01

homework problem i hope you guys enjoyed

play10:03

the lecture and thank you for watching

play10:06

[Applause]

play10:08

[Music]

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Classless AddressingIPv4SubnettingSubnet MasksCIDRNetworkingIP AddressingBinary ConversionComputer NetworksEducationalTechnical Tutorial