Cables, satellites, data centres, servers, and even your business network. Complex networks around the world enable seamless communication across the globe. But have you ever wondered about some of the technology behind all this complex transfer of data?
Central to the interconnectedness between networks and devices are IP and MAC addresses, the unique identifiers that facilitate the delivery and flow of data between devices on the internet and local networks, respectively. But many people will just see these as strings of numbers and letters, not thinking much more past this.
In this educational article, we want to dive deeper into IP and MAC addresses, their classifications, the intricacies of their components, the historical evolution, the differences between public and private addresses, and their future as these technologies continue to grow and evolve as we continue to expand our digital reach.
The History
IP addresses emerged from the early development of the internet, and are an essential element of network communication, directing data packets to their precise destinations across the internet and within local networks. For more than 40 years we have been using IPv4 (first introduced in 1982), capable of enabling over 4 billion unique public combinations. However, globally, we have pushed this capacity to its limit and only a limited amount of new IPv4 addresses can be allocated, and in some instances re-allocated from networks that return addresses which are no longer needed.
So, does that mean that soon we will not be able to connect new devices to the internet?
No, not only can we re-allocate these older addresses and reserved addresses, but it was also recognised in the early 90s that we would need to develop a successor to IPv4, which came in the form of the first Public Protocol for IPv6 being published in 1995. Despite this, it took nearly 20 years from inception to first use in 2012 and is expected to only reach 50% of global public usage by the end of 2024.
But what are IPv4 and IPv6 addresses?
Well, you have probably seen at least an IPv4 address, if not in your business environment, then at least in your home technology environment as you connect new devices to your home router.
IPv4 Example: Consider the IPv4 address 192.168.0.1, you may see addresses like this when thinking about connecting to your home network. The structure, divided into four octets, reflects a methodical design enabling over 4 billion unique combinations.
IPv6 Example: The address 2001:0db8:85a3:0000:0000:8a2e:0370:7334 has been built to fill the pit-hole of IPv4’s address limitations. Using a hexadecimal format accommodates significantly larger address space, which is essential as connected devices continue to be a part of our daily routines. Where IPv4 can enable over 4 billion combinations of public addresses, IPv4 enables more than 340 undecillions (yes, that is really a number).
But it is important to consider when thinking about IP addresses that these are split into a couple of key areas and that particular ranges are reserved for Public (the internet) and Private (your home/business) networks, and that an address reserved for one cannot be used on the other.
Public vs Private IP Addresses
Public IP Addresses are assigned to devices for direct internet access, ensuring global uniqueness of locations and devices. These addresses are crucial for hosting servers and providing services over the internet. Even your business website will have an IP address behind it to allow traffic to route to it.
Private IP Addresses by comparison, operate within closed networks such as your home or business, allowing for internal communication and data routing without occupying public address space. Private IP Address ranges such as 192.168.x.x and 10.x.x.x are reserved from the public space for such use, preventing external network conflicts. Because these only exist in a private network space, it means that a Private IP Address such as 192.168.10.11 can exist on a device connected on a single network, as well as other devices with this same address connected to millions of other private networks without it causing a conflict.
While public IP addresses enable devices to participate in the vast network of the internet, private IP facilitates and safeguards internal communications, optimising the limited public address space, and simplifying internal network communication
The Structure of Private IPv4 Addresses
Private IP addresses, those reserved for use within internal (such as home and business) networks, play a pivotal role in managing communication between devices without utilising the public internet space.
A typical IPv4 address, such as 192.168.0.1, is composed of four “octets”, each ranging from 0 to 255. This structure allows for a broad range of addresses within the designated private ranges, which include 10.x.x.x, 172.16.x.x to 172.31.x.x, and 192.168.x.x (the most used in home and business networking equipment).
First Octet (Network Portion): This portion identifies the broader network segment or range and is crucial for routing traffic within larger networks. In private IP addresses, the first octet indicates the specific private range to which the address belongs (10, 172, or 192, referencing the different private ranges).
Second and Third Octets (Subnetwork and Extended Network Portions): These segments are often used to identify subnetworks within a larger private network. They offer flexibility in organizing internal IP schemes, aiding in traffic management, and allowing for hierarchical network designs.
Fourth Octet (Host Portion): The final segment uniquely identifies the individual device within the subnet or the immediate local network. This specificity is essential for delivering data packets directly to the intended device.
The Significance of Subnets
Subnetting, the practice of dividing a network into smaller, manageable sub-networks (or “subnets”), is an essential part of network architecture and management, especially within business environments.
Subnets allow for the efficient allocation of IP addresses for devices on a private network, reducing broadcast traffic and enhancing network performance.
By segmenting a network into subnets, businesses can create groups of devices that communicate more efficiently with each other, such as business devices, servers, IoT (Internet of Things) devices, printers, servers and more, even allocating subnets for only specific uses and limiting traffic between them for enhanced security. Such as adding guest devices to a subnet range that cannot communicate with business-critical devices such as servers.
Subnetting in Action: Practical Examples
Let's consider a large enterprise business that operates with the private IP address range 192.168.0.0/16, offering up to 65,536 IP addresses (from 192.168.0.0 to 192.168.255.255). For business network management and security, the company decides to implement subnetting.
Example 1: Departmental Segregation
The business decides to set up multiple subnets for each of the departments within their organisation. Such as;
The HR Department is assigned the 192.168.10.0/24 range, which includes IP addresses from 192.168.10.0 to 192.168.10.255, allowing for up to 254 devices.
The Sales then uses the subnet 192.168.20.0/24, encompassing IP addresses from 192.168.20.0 to 192.168.20.255.
And the IT Department then uses the subnet 192.168.100.0/24, encompassing IP addresses from 192.168.100.0 to 192.168.100.255.
This structure not only segments network traffic by department but also adds a layer of security by isolating departments on different subnets. This means that the HR department cannot access devices in the sales department, however, the IT Department has set rules so that they can access all departments.
Example 2: Performance Optimisation for High-Traffic Areas
A business’s own internal server or communications room is allocated a dedicated subnet away from all department subnets on 192.168.200.0/24, limiting broadcast traffic to within this subnet and optimising the performance of critical servers and equipment, but allowing rules for specific department subnets to access specific devices (such as the server).
Example 3: Geographic Segmentation
Subnets also allow for management across multiple locations which are all connected to a central business network. For example, if a business has multiple offices in London, Manchester & Glasgow, each location can be assigned its own subnet to streamline traffic management within their own environments:
London: Is assigned the subnet 192.168.40.0/24.
Manchester: Is assigned the subnet 192.168.50.0/24.
Glasgow: Is assigned the subnet 192.168.60.0/24.
Whilst these networks exist as their own subnets for streamlined communication, rules can also be placed to allow for communication across the global business network for shared resources such as a shared server or network storage.
Why does this matter?
Businesses often employ multiple subnets for a variety of reasons:
By employing subnetting such as those listed in the above examples, businesses can craft a network infrastructure that aligns with their specific operational needs, enhances security, optimises performance, and ensures a flexible infrastructure for business growth.
Essentially, splitting your business network into subnets offers you the flexibility to design your network in a way that aligns with your operational needs and security policies, promoting efficient communication while safeguarding against potential network vulnerabilities.
But what about the other side of the coin? MAC Addresses.
MAC Addresses provide a hardware-based identity to network interfaces. Think of it this way:
Your network assigns your device the IP Address 192.16.10.159, but how does it know that your device is the one that needs that address? MAC Addresses are hardware-based addresses that allow networks to tie these two addresses together, they are hard-coded into your device network adapter and are unique so that no two addresses are the same. Otherwise, two addresses on the same network could distribute data that is not intended for them.
MAC Address Structure:
A MAC address like 00:1A:2B:3C:4D:5E comprises two main parts: the Unique Identifier (OUI) (00:1A:2B), signalling the manufacturer, and a device-specific sequence (3C:4D:5E), ensuring distinct identification.
The Future of IP Addresses
As we get closer to the end of IPv4’s life cycle, the transition to IPv6 will become increasingly essential to accommodate the surge in internet-connected devices. This technological evolution, with considerations toward privacy and security, reflects a growing emphasis on safeguarding personal data and preventing unauthorised tracking.
However, it is important to consider that the development of networking technology and education around IPv6 will be essential to working towards an interconnected future.
How can TwentyFour IT Services help your business with the transition to IPv6?
The good news is that we are already working towards this interconnected future, with some of the UK’s largest ISPs (Internet Service Providers) already rolling this out to customers with compatible hardware. At TwentyFour we are working with businesses to ensure that they are prepared for the IPv6 rollout when their ISP (Internet Service Provider) begins this process, supporting those who have already switched, whilst also ensuring that our engineers are well-versed around IPv6, its management, and benefits.
If you would like to speak to us about effectively managing your business infrastructure, fill out the form below for more information.
    Help Desk