Solved

IP Address syntax questions

Posted on 2013-12-02
5
314 Views
Last Modified: 2013-12-03
I need help understanding the following:

191.162.27.0/24
10.101.38.x/24

I've installed PC's and worked with IP but I've never seen the syntax of a slash.

This is from a router diagram.
0
Comment
Question by:brothertruffle880
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 7

Expert Comment

by:GillesT
ID: 39690815
The syntax with a slash is the CIDR syntax that represent the range of IP address
Here is some URL that convert range of IP to CIDR or reverse

http://www.ipaddressguide.com/cidr
http://bonomo.info/coyote/ip-calculator.php
0
 
LVL 26

Expert Comment

by:pony10us
ID: 39690828
the /24 says that you have 256 addresses available or that you are using the netmask of 255.255.255.0

Some samples:

/20     255.255.240.0     4096

/21     255.255.248.0     2048

/22     255.255.252.0     1024

/23     255.255.254.0     512

/24     255.255.255.0     256

/25     255.255.255.128 128

/26     255.255.255.192 64

/27     255.255.255.224 32

/28     255.255.255.240 16

/29     255.255.255.248 8

/30     255.255.255.252 4
0
 

Author Comment

by:brothertruffle880
ID: 39690902
Jeepers.  I've worked on IP addresses for a while and neverheard of CIDR.
How does one arrive at 256 addresses if you have a "/24"?  I'm trying to understand the math.
0
 
LVL 28

Accepted Solution

by:
Jan Springer earned 250 total points
ID: 39690910
and to be more specific:  the number after the / indicates the number of bits in the mask:

/24    255.255.255.0  11111111.11111111.11111111.00000000

so, the first three octets much match exactly and the last octet can be anything from 0 to 255.

and the bits in the mask identify the network start (also called a boundary) and the network end (also called the broadcast).
0
 
LVL 27

Assisted Solution

by:tliotta
tliotta earned 250 total points
ID: 39692261
Earlier IP addressing used a "class" system to distinguish and separate 'network' addresses from 'host' addresses. The boundaries used for the separation were generally at octet boundaries. E.g., class A generally used the first octet as the 'network' address, leaving the last three octets available for 'host' addresses; that means that a class A network could have up to 16,777, 214 hosts. Class B generally used the first two octets, and class C used the first three octets. Those last two classes have successively fewer possible hosts per network because the network portion takes up more bits, each reduced by a factor of approximately 256.

Using the CIDR (Classless Inter-Domain Routing, established in 1993) notation, a class A network would be /8, class B would be /16, and class C would be /24. That's only part of it, though, because those classes also have requirements such as for bit patterns in the left-most octet. For class A, the left-most bit in the left-most octet must be '0'. For class B, the left-most two bits must be '10'. And for class C, the first three bits must be '110'.

In any case, the CIDR notation effectively eliminates the "classes". Instead, the 'network' address is specified by giving the number of bits in that portion, and the number does not have to fall on an octet boundary.

There is quite a lot that can be learned about what CIDR makes available. A Google (or other search engine) query for [ what is cidr ] will bring up a number of good pages for study.

Tom
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question