Unlocking Networking Basics: IP Addresses, CIDR, Subnets, and Ports Made Easy

DevLogDevLog
9 min read

Have you ever wondered how information travels across the internet?

Imagine a vast network of roads bustling with data packets, zipping from one device to another. But unlike physical roads, these digital highways need a sophisticated traffic management system to ensure everything reaches its destination.

This blog post is your guide to understanding some key players in this system: IP addresses, CIDR, subnets, and ports! We'll break down these terms in a way that's easy to grasp, even for networking newbies.

What is Networking?

Networking is the practice of connecting computers and other devices so they can share information and resources. Imagine it as a network of roads and highways that allow vehicles (data) to travel from one place to another. Just as roads have signs and traffic lights to manage the flow of vehicles, networks have protocols and structures to manage data flow and ensure smooth communication.

Key Networking Concepts

🌐Finding Your Way on the Digital Highway: IP Addresses

Think of your home address as a unique identifier for your mailbox.

Similarly, an IP address acts as the digital address for every device connected to a network. It's a string of numbers (like 192.168.1.1) that identifies your device and allows it to communicate with others. Just like a package needs the right address to be delivered, data packets rely on IP addresses to reach the correct device.

What is an IP Address?

IP Address

An IP address (Internet Protocol address) is a unique identifier assigned to every device that connects to a network. Think of it as a mailing address for your computer, smartphone, or any other device connected to the internet or a local network. Just as a mailing address ensures that letters and packages reach the correct destination, an IP address ensures that data sent over a network reaches the correct device.

Types of IP Addresses

There are two primary versions of IP addresses:

  1. IPv4 (Internet Protocol version 4):
    IPv4 is the most widely used version of IP addresses. It uses a 32-bit address scheme, allowing for approximately 4.3 billion unique addresses. These addresses are written in a format called "dotted decimal notation," where each of the four octets (8-bit segments) is separated by a period.
  • Example: 192.168.1.1
    Breaking it down:

  • 192: The first octet

  • 168: The second octet

  • 1: The third octet

  • 1: The fourth octet
    Each octet ranges from 0 to 255, creating a unique address for your device within a network.

IP address diagram. 

  1. IPv6 (Internet Protocol version 6):
    IPv6 is the successor to IPv4, designed to address the limitations of IPv4. It uses a 128-bit address scheme, allowing for a virtually unlimited number of unique addresses. IPv6 addresses are written in hexadecimal format and are divided into eight groups of four hexadecimal digits, separated by colons.
  • Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
    Breaking it down:

  • 2001:0db8: First two groups

  • 85a3:0000: Next two groups

  • 0000:8a2e: Last two groups

  • 0370:7334: Final two groups

IPv6 addressing structure

Why IP Addresses are Important

IP addresses are crucial for several reasons:

  1. Identification: They uniquely identify each device on a network, ensuring that data sent from one device reaches the intended recipient. Without IP addresses, devices wouldn’t be able to communicate effectively.
  1. Location Addressing: IP addresses help route data across the internet. For instance, when you visit a website, your device sends a request to the web server’s IP address. The server then sends the website data back to your IP address.
  1. Network Management: Network administrators use IP addresses to manage and configure networks. For example, assigning static IP addresses to servers ensures that their addresses do not change, making them easier to locate and manage.

Real-World Examples

  1. Home Network: In a typical home network, your router might have an IP address like 192.168.1.1. This address helps manage traffic between your local devices and the internet. Each device connected to your home network, such as a laptop or smartphone, is assigned a unique IP address by the router, such as 192.168.1.2 for a laptop and 192.168.1.3 for a smartphone.
  1. Accessing Websites: When you type a website address into your browser, like www.example.com, your computer performs a DNS (Domain Name System) lookup to translate the domain name into an IP address. For example, www.example.com might resolve to 93.184.216.34. This IP address allows your browser to connect to the web server hosting the website and retrieve the requested content.
  1. Business Network: In a corporate environment, a company’s server might have an IP address like 10.0.0.1. This address is used to access internal applications, databases, or file servers within the company network. Employees’ devices will use different IP addresses in the same range, such as 10.0.0.2 to 10.0.0.50, allowing them to communicate with the server and other devices.

🔮 The Magic of CIDR: Efficient Addressing for Modern Networks

CIDR is a method for allocating IP addresses and routing IP packets more efficiently than the old class-based system. It provides a flexible and scalable approach to address management, essential in modern networks.

CIDR (Classless Inter-Domain Routing) is a fancy way of saying we have a more flexible system for assigning IP addresses.

It's like having a more efficient way to label all the apartments in the building complex. CIDR allows us to create subnets with varying sizes, which is much more efficient than the older, rigid system.

What is CIDR❓

CIDR replaces the traditional class-based IP addressing system with a more flexible approach. Instead of dividing IP addresses into fixed classes (Class A, B, C), CIDR uses variable-length subnet masks to allocate address blocks.

different IP addresses table

CIDR Notation

CIDR notation expresses IP addresses and their associated routing prefix. It consists of an IP address followed by a slash (/) and a number indicating the number of bits used for the network part of the address.

  • Example: 192.168.1.0/24

    • 192.168.1.0: The IP address block.

    • /24: The subnet mask, meaning the first 24 bits of the IP address are used for the network portion, and the remaining 8 bits are used for host addresses.

Detailed Example

Suppose you have a company that needs to allocate IP addresses for different departments. Using CIDR, you can divide your address space into smaller, manageable blocks:

  • Original Block: 10.0.0.0/16 (which includes IPs from 10.0.0.1 to 10.0.255.254)

    • This provides 65,536 addresses.

You can further subdivide this block into smaller subnets:

  • Subnet for HR Department: 10.0.1.0/24

    • This gives you 256 addresses (10.0.1.1 to 10.0.1.254).
  • Subnet for IT Department: 10.0.2.0/24

    • This also provides 256 addresses (10.0.2.1 to 10.0.2.254).

By using CIDR, you can efficiently allocate and manage IP addresses, reducing waste and improving network organization.

🏗️ Dividing the Neighbourhood: Subnetting

Subnetting is the practice of dividing a large network into smaller, more manageable segments or subnets. This helps improve network performance, security, and management.

What is a Subnet❓

subnetting example 2

A subnet, or subnetwork, is a logical subdivision of an IP network. Subnetting allows you to break a larger network into smaller networks to better manage and secure your IP address space.

Imagine a large apartment building with hundreds of residents. Managing deliveries for everyone can get overwhelming!

Subnetting works similarly. It's the process of dividing a large network into smaller, more manageable segments called subnets. These subnets are like smaller apartment complexes within the bigger building, making it easier to control and secure the flow of data within specific areas of the network.

🎭 Subnet Masks:

Diagram depicts a subnet mask architecture.

A subnet mask is used to determine the network and host portions of an IP address. It works in conjunction with the IP address to define the boundary of a subnet.

  • Subnet Mask Example: 255.255.255.0

    • In binary, this is 11111111.11111111.11111111.00000000.

    • It specifies that the first 24 bits are for the network portion, and the last 8 bits are for hosts within the network.

Detailed Example

Imagine you have the IP address 192.168.1.0 with a subnet mask of 255.255.255.0 (/24):

  • Network Address: 192.168.1.0

  • Usable IP Range: 192.168.1.1 to 192.168.1.254

    • The 192.168.1.0 address is reserved as the network identifier.

    • The 192.168.1.255 address is reserved as the broadcast address.

You could use subnetting to divide this /24 network into smaller subnets for different departments:

  • Subnet A: 192.168.1.0/26

    • Network Address: 192.168.1.0

    • Usable IP Range: 192.168.1.1 to 192.168.1.62

    • Broadcast Address: 192.168.1.63

  • Subnet B: 192.168.1.64/26

    • Network Address: 192.168.1.64

    • Usable IP Range: 192.168.1.65 to 192.168.1.126

    • Broadcast Address: 192.168.1.127

Subnetting helps in managing network traffic more efficiently and provides better security by isolating different parts of the network.

🖥️ Ports: Keeping Traffic Flowing Smoothly

What is a Network port? Network Ports are Explained in Detail

Ports are logical endpoints in network communication that allow different types of data to be directed to specific applications or services on a device.

Think of ports as designated doorways on your device. Each port allows different types of data to enter and exit. Imagine having separate doors for deliveries, visitors, and mail. Port numbers act like labels for these doorways, like "Port 80" for web traffic and "Port 443" for secure connections.

What are Ports❓

how ports work

Ports help differentiate between various types of network traffic received on the same IP address. Each port corresponds to a specific service or application.

  • Port Numbers: Port numbers range from 0 to 65535. They are categorized into:
  • Well-Known Ports (0-1023): Reserved for common protocols and services (e.g., HTTP on port 80, HTTPS on port 443).

  • Registered Ports (1024-49151): Used by software applications and services that are not as common as well-known services.

  • Dynamic or Private Ports (49152-65535): Used for ephemeral connections, such as temporary ports assigned by the operating system for a client application.

Detailed Example

When you access a website, your browser communicates with a web server using HTTP (port 80) or HTTPS (port 443). If you're running a web server on your local machine, it listens for incoming requests on port 80 by default. If you have a different application, like a game or a chat server, it might use different ports to handle its traffic.

How Ports Work Together

  1. Client-Side Communication: When you open a web browser and visit a website, your browser uses a specific port on your computer to communicate with the server. For example, it might use port 49152 for this temporary communication session.

  2. Server-Side Communication: The web server listens on port 80 or 443. It processes incoming requests on these ports and sends back the appropriate response to your browser’s port.

List of common network port numbers updated

Putting it all Together: How These Concepts Work in Harmony

These building blocks work together to ensure smooth communication within your network:

  • IP addresses uniquely identify devices on the network.

  • Subnetting organizes the network into manageable segments.

  • CIDR efficiently allocates IP addresses within those segments.

  • Ports direct different types of data traffic to the right applications on devices.

Networking can be complex, but understanding the basics of IP addresses, CIDR, subnets, and ports is essential for managing and troubleshooting networks. These concepts work together to ensure data is routed efficiently, networks are organized, and communication between devices is effective.

By mastering these fundamental concepts, you'll gain a clearer understanding of how networks operate and how to manage them effectively, whether you're a beginner or an experienced network administrator.

0
Subscribe to my newsletter

Read articles from DevLog directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

DevLog
DevLog

Rahul- DevOps Engineer @Microsoft B Sharanya - Content writer