Solved

IP Address syntax questions

Posted on 2013-12-02
5
311 Views
Last Modified: 2013-12-03
I need help understanding the following:

191.162.27.0/24
10.101.38.x/24

I've installed PC's and worked with IP but I've never seen the syntax of a slash.

This is from a router diagram.
0
Comment
Question by:brothertruffle880
5 Comments
 
LVL 7

Expert Comment

by:GillesT
ID: 39690815
The syntax with a slash is the CIDR syntax that represent the range of IP address
Here is some URL that convert range of IP to CIDR or reverse

http://www.ipaddressguide.com/cidr
http://bonomo.info/coyote/ip-calculator.php
0
 
LVL 26

Expert Comment

by:pony10us
ID: 39690828
the /24 says that you have 256 addresses available or that you are using the netmask of 255.255.255.0

Some samples:

/20     255.255.240.0     4096

/21     255.255.248.0     2048

/22     255.255.252.0     1024

/23     255.255.254.0     512

/24     255.255.255.0     256

/25     255.255.255.128 128

/26     255.255.255.192 64

/27     255.255.255.224 32

/28     255.255.255.240 16

/29     255.255.255.248 8

/30     255.255.255.252 4
0
 

Author Comment

by:brothertruffle880
ID: 39690902
Jeepers.  I've worked on IP addresses for a while and neverheard of CIDR.
How does one arrive at 256 addresses if you have a "/24"?  I'm trying to understand the math.
0
 
LVL 28

Accepted Solution

by:
Jan Springer earned 250 total points
ID: 39690910
and to be more specific:  the number after the / indicates the number of bits in the mask:

/24    255.255.255.0  11111111.11111111.11111111.00000000

so, the first three octets much match exactly and the last octet can be anything from 0 to 255.

and the bits in the mask identify the network start (also called a boundary) and the network end (also called the broadcast).
0
 
LVL 27

Assisted Solution

by:tliotta
tliotta earned 250 total points
ID: 39692261
Earlier IP addressing used a "class" system to distinguish and separate 'network' addresses from 'host' addresses. The boundaries used for the separation were generally at octet boundaries. E.g., class A generally used the first octet as the 'network' address, leaving the last three octets available for 'host' addresses; that means that a class A network could have up to 16,777, 214 hosts. Class B generally used the first two octets, and class C used the first three octets. Those last two classes have successively fewer possible hosts per network because the network portion takes up more bits, each reduced by a factor of approximately 256.

Using the CIDR (Classless Inter-Domain Routing, established in 1993) notation, a class A network would be /8, class B would be /16, and class C would be /24. That's only part of it, though, because those classes also have requirements such as for bit patterns in the left-most octet. For class A, the left-most bit in the left-most octet must be '0'. For class B, the left-most two bits must be '10'. And for class C, the first three bits must be '110'.

In any case, the CIDR notation effectively eliminates the "classes". Instead, the 'network' address is specified by giving the number of bits in that portion, and the number does not have to fall on an octet boundary.

There is quite a lot that can be learned about what CIDR makes available. A Google (or other search engine) query for [ what is cidr ] will bring up a number of good pages for study.

Tom
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
parental control on huwei HG658b 1 26
Connect two buildings 6 47
Router Question 12 54
Syslog-ng works. Now what? How to filter and manage? 8 59
If you are thinking of adopting cloud services, or just curious as to what ‘the cloud’ can offer then the leader according to Gartner for Infrastructure as a Service (IaaS) is Amazon Web Services (AWS).  When I started using AWS I was completely new…
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question