Solved

Naming convention for assigning IP's in an internal network

Posted on 2001-08-03
2
274 Views
Last Modified: 2012-06-21
I'm in charge of reconfiguring a small business network and I'm not sure of the naming convention for assigning IP numbers in my internal network.  What ranges should I use for servers, switches, routers and client computers?  if you could just give me a URL that'd be great.

Thank you
0
Comment
Question by:toddmilburn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Accepted Solution

by:
geoffryn earned 50 total points
ID: 6349426
I don't think there really is a "standard", but the convention that is commonly used in a lot of environments looks like this.

.1=Gateway
.2-.10= other routers
.11-20=other LAN hardware (switches, VOIP etc)
.21-40=Servers
.41-50=Network printers
.51-254=DHCP scope

Of course the is a lot of variability, but putting the static hardware low and the DHCP scope high is most common.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6351056
> .1=Gateway
that's the M$ terminology for a router, this term is pointing to the wrong direction, somehow:

Usually, in network terminology, it's the "default router", which might be, in fact, a gateway too ;-)
Sorry for being pedantic.

BTW,
for building a LAN, it's recommended to use private IP's (somtimes also called: RFC-IP's, see http://www.rfc.net/rfc1918.html):
  10.0.0.0        -   10.255.255.255  (10/8 prefix)
  172.16.0.0      -   172.31.255.255  (172.16/12 prefix)
  192.168.0.0     -   192.168.255.255 (192.168/16 prefix)
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question