Table of Contents

Table of Contents
 

Module 2 - Design the Network Structure

Section 4 - Design a Network-Layer Addressing and Naming Model

Section Objectives

Upon completion of this section, you will be able to:

Time Required to Complete This Section

Approximately 3 hours

Completing This Section

Follow these steps to complete this section:

Resources Required to Complete This Section

To complete this section, you will need:

Reading Assignment 1

Steps for Designing Network-Layer Addressing and Naming

Designing network-layer addressing and naming is one of the most important tasks in internetwork design. It is closely linked with selecting a routing protocol, which we will discuss in the next section, "Select Routing and Bridging Protocols."

To design network-layer addressing and naming, follow these steps:

     1. Design a hierarchy for addressing autonomous systems, areas, networks, subnetworks, and end stations.

     2. Design route summarization (aggregation).

     3. Design a plan for distributing administrative authority for addressing and naming at the lower levels of
         the hierarchy.

     4. Design a method for mapping geographical locations to network numbers.

     5. Develop a plan for identifying special stations such as routers and servers with specific node IDs.

     6. Develop a plan for configuring user-station addresses (dynamic if possible). Use the Bootstrap Protocol
         (BOOTP) or the
         newer DHCP.

     7. If necessary, develop a plan for using gateways to map private addresses to external addresses.

     8. Design a scheme for naming servers, routers, and user stations.

Designing IP Addressing to Facilitate Route Summarization

When designing IP addressing, it is important to design route summarization, also referred to as route aggregation and supernetting.

Route summarization reduces the number of routes in the routing table, the routing update traffic, and overall router overhead. Reducing routing update traffic can be very important on low-speed lines. If the Internet had not adapted route summarization by standardizing on classless interdomain routing (CIDR), it would not have survived.

The telephone architecture has handled prefix routing for many years. A telephone switch in Michigan need not to know how to reach a specific line in Oregon. It just needs to recognize that the call is not local. A long-distance carrier needs to recognize that 541 is for Oregon but does not need to know the details of how to reach the specific line in Oregon.

Prefix routing is not new in the IP environment either. A router needs to know only how to reach the next hop. It need not to know the details of how to reach an end node that is not local.

Much as in the telephone example, IP routers make hierarchical decisions. An IP address comprises prefix part and a host part. Routers use the prefix to determine the path for a destination address that is not local. The host part is used to reach local hosts.

A prefix identifies a block of host numbers and is used for routing to that block. According to RFC 1518, a prefix is "an IP address and some indication of the leftmost contiguous significant bits within that address." The indication of the leftmost contiguous bits has traditionally been done with an indication of the address class and a subnet mask. More recently, a length indication has followed a network number and slash, for example, 192.10.168.0/21.

Traditional classfull routing does not transmit any information about the prefix length. Hosts and routers calculate the prefix length by looking at the first few bits of an address to determine whether it is one of the following:
 
Class A first bit = 1 prefix is 8 bits
Class B first 2 bits = 10 prefix is 16 bits
Class C first 3 bits = 110  prefix is 24 bits
 

VLSM relies on providing prefix length information explicitly with each use of an address. The length of the prefix is evaluated independently at each place it is used.

The ability to have a different prefix length at different points supports more efficient use of the IP address space and reduces routing traffic. Big subnets and small subnets are allowed. If the small subnets are grouped, routing information can be summarized (aggregated) into a small number of routing table entries.

For summarization to work correctly, the following requirements must be met:

As an example, let us say that a router has the following networks behind it: This router can advertise just one route: 192.108.168.0/21.

By advertising this one route, the router is saying, "Route packets to me if the destination has the first 21 bits set to 192.108.168."

In binary, the 21 bits are as follows (x is a wildcard - it does not matter how those bits are set):

If you convert the network numbers listed in dotted-decimal notation to binary, you will notice that they all start with the same 21 bits-1100 0000 0110 1100 1010 1xxx xxxx xxxx.
 
IPX Addressing

IP Addressing

IP addresses used by organizations are likely to undergo changes for a variety of reasons, including the following: Howard Berkowitz, an engineer with a Cisco Training Partner, and Paul Ferguson, a Cisco consulting engineer, have written a draft RFC on IP renumbering titled Network Renumbering Overview: Why would I want it and what is it anyway? rfc2071.txt.

Howard Berkowitz has also written a very helpful draft RFC that outlines the steps for router renumbering titled Router Renumbering Guide rfc2072.txt.


Case Studies

In this section, you will implement an addressing scheme for each case study.

Read each case study and complete the questions that follow. Keep in mind that there are potentially several correct answers to each question.

When you complete each question, you can refer to the solutions provided by our internetworking experts. The case studies and solutions will help prepare you for the Sylvan exam following the course.

In this section, you will review the following case studies:


Case Study: Virtual University

Read the following short case study and answer the questions.

Virtual University has decided to eliminate AppleTalk and use only IP. The university will use the IP network number 172.16.0.0. The university has a North Campus, Central Campus, and South Campus. Each campus has 40 networks and each network has 150 nodes. The network administrators expect to expand to 60 networks and 200 nodes per network within the next five years.

Because of its AppleTalk heritage, Virtual University needs a simple addressing solution with very little end-node configuration. Despite its AppleTalk heritage, Virtual University has some knowledgeable IP gurus who have specified that the addressing scheme must be conducive to route summarization (aggregation).
 
     1. Design a model for dividing up Virtual University's IP address space that will meet the university's current
         needs and needs for the next five years. Describe your model here.


     2. Explain to the IP gurus at Virtual University how the addressing model that you designed in the previous
         step will support route summarization. For example, what network number and prefix could a border
         router at one of the campuses advertise to the other areas or backbone?


     3. What is special about IP address 172.16.0.0? What will Virtual University require to connect its
         network to the Internet?


     4. Propose a plan for naming servers, routers, and end nodes. Describe both the names themselves and
         the method you will use to configure the names.


 
Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: CareTaker Publications

Remember CareTaker Publications? If not, click here to review the case study.

You might find it useful to refer to your topology diagram for CareTaker Publications in Section 3.

The parent corporation told CareTaker that CareTaker will be protected from Internet "hackers" with the firewall at the corporate facilities. Because of the limited number of IP addresses available, the parent corporation has informed CareTaker that it will receive one Class C address and is to implement "Big Internet" addressing within the confines of CareTaker.

     1. Design a model for CareTaker's IP address space that will meet the current needs and needs for the next
         five years. Describe your model here.


     2. Propose a plan for naming servers, routers, and end nodes. Describe both the names themselves and the
         method that will be used to configure the names.


     3. Update your topology diagram to reflect your addressing scheme.

Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: PH Network Services Corporation

Remember PH Network Services Corporation? If not, click here to review the case study.

You might find it useful to refer to your topology diagram created for PH Network Services Corporation in Section 3.
 
     1. The hospital system has an existing IP network with its own IP addresses. The hospital will be able to
         assign two Class C addresses to the PH Network: one for the WAN (202.12.27.0) and one for PH’s
         internal use (202.12.28.0). Describe your IP addressing plans for the implementation of PH’s network.
         You will use a Class C mask of 255.255.255.0 for the PH LAN. What mask will you use for the WAN?


     2. Update your topology diagram to reflect the new addressing scheme.

Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: Pretty Paper Ltd.

Remember Pretty Paper? If not, click here to review the case study.

You might find it useful to refer to your topology diagram created for Pretty Paper in Section 3.
 
     1. The network administrator has been using the Class B IP address of 199.151.000.000. He does not
         know where he got it but he is sure that Pretty Paper does not own it. What are your recommendations
         for an IP address allocation/assignment procedure?


     2. Propose a plan for naming servers, routers, and end nodes. Describe both the names themselves and
         the method you will use to configure the names.


     3. Update your topology diagram to reflect the new IP addressing scheme.
 
     4. Recommend an addressing scheme for the IPX network.


     5. Recommend an addressing scheme for the AppleTalk network.



     
Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: Jones, Jones, & Jones

Remember Mr. Jones? If not, click here to review the case study.

You might find it useful to refer to your topology diagram created for Mr. Jones in Section 3.
 
     1. Describe your IP addressing plans for implementation of your proposed system design.


     2. Propose a plan for naming servers, routers, and end nodes. Describe both the names themselves and
         the method that will be used to configure the names.


     3. The managing partner called. She wanted to emphasize that unauthorized workstations should not be
         allowed access to the Internet. How will you plan for this request in your design?


     4. Update your topology diagram to reflect the new addressing scheme.

Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


If you have completed this section, click here to advance to Module 2, Section 5.


Copyright Cisco Systems, Inc. -- Version 2.0 7/98