Subnetting for Video Surveillance

By: John Scanlan, Published on Apr 30, 2019

This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range, borrowing bits, and the role of the subnet mask.

free image

****** **** ****** ** provide *********** **:

  • *** ********* **** *****
  • *** **** ** *** subnet ****
  • ********* *** ** ****
  • ********* *** ** ****
  • ****** *** ** ********

Why ****** ** ***** ************

***** *** * *** reasons ************** *** **** to ****** ***** ******** network, ******** *****:

  • ******* *** ** *********
  • ******* ********
  • **** ** **************

Running *** ** *********, *** ******* **********

*** **** ****** ** address ****** ** ***.***.*.* (a ***** * *******) which ******** *** **** addresses. *******, ** **** mid-sized ************ *** ******** systems, **** ** * school, ****, ** ***** facility, ***** ********* *** be ******* ******** ** cameras *** ****. *******, adding ****** ******* *** consume ** ******* *** each **********. ******** ****** to ******* ****** ******* consume ********** *********. ********* viewing ******** **** **** require *********, ***.

** ****** ******** ****** mask ** *** *** (255.255.255.0 ** ***.***.***.*), *** network ***** ** ********** 255 ********* ***** *** be **** *** ********** devices. ***** *** **** this **** ******, ** using * **** ** 255.255.240 ***** ******* ****** 4,000 ******* ** *** subnet.

Network ********

** ***** ********* ******* for ********* ******* ******** (e.g., ************ **. ******* LAN **. *****), * device ** ****** ** prevented **** ********* * device ** *******. ** simply ****** **** *** route ** *** ***** host.

********** ** **** ***** deployed *********, ***** ** **** more *********** ** ****.

Ease ** **************

********* ********** ****** *** to ****** ** ** scheme **** * ********* and ********** ****** ** hosts. **** ******** * network ** ***** ********** ****** * ***** ******* it ** ******* ** scan * ******* *******, closer ** ****** ** actual **-*** *******, ****** than **** ********* ** unused *********; *.*.

******** ***.**.*.* - ***.**.***.*** with ****** ***.***.*.* = 65,534 *********

******** ***.**.*.* - ***.**.*.** with ****** ***.***.***.*** = 30 *********

*** ******* **** *** classfull ****** **** **** take ***** * ***** to **** **** * discovery ****, ************ ** *******, ***** *** ******* subnet **** **** **** just *******.

Subnetting ******

*** ****** **** ** a ********* ************* ** the ** *******, *** determines ***** ***** ** an ** ******* ******* the "*******" **. *** "host." ** ********, *** vast ******** ** ********, surveillance ********, *** ******* subnet *****, **** ****** classfull **********, *** *** IP ******* *****, **** commonly ***.***.***.*.

[****, *** **** ***** we *** **** ********* with ******* ********* ***** are ****** **** * classes *****.]

*********Addresses / ******* ** *********

********** ******* *** ****** mask **** ********* (***** A = ***.*.*.*, * = ***.***.*.*, * = 255.255.255.0) ** ********* ***** borrowed **** ** ****** those ******, *** ** doing ** ******* *** amount ** ***** *** networks. *** *** ****** to ****** ******** ***** and ******** ******** ** decrease ***** *** ******** networks. *** ******* ***** shows *** ****** ***** for **** ***** *** the ****** ** ***** and ******** ********** **** each.

Default Subnet Masks and Classes

*** ***** ***** ***** how **** **** ** the ****** ****. *** network **** *** *'*, and * **** ** 8 *'* (********) = 255. *** **** **** are *'*, ***** ******** = *. *** ******* below ***** *** ******* subnet **** *** **** class, *** ********** ****.

Subnet Masks Represented in Bits

Subnet **** ********** ******** *** *****

********* **** *** ********* subnet ***** ** **********, also ****** ********* **********. The *** **** **** is **** ** ** borrowing **** **** *** other **** ** **** by ******** * ** 0 ** * ** 1. ** **** ***** are ******* **** **** are ******** **** *** network *******, *** **** more ******** *** ******* bits *** ******** **** the **** *******.

Subnets ** ***** ***********

*** ****** ****** ******** which ******* **** *** device *********, ****** ***** are **** ***** **** to ****** *** ******* to ** ********** ****** or *******. **** ** done ** ******** *** last ***** ** *** mask. *** ***** *** that ** *******, ** additional *** **** ****** becomes *********.

** * ********* *******, changing ****** **** **** 255.255.255.0 ** ***.***.***.* ** * ***.***.*.* network ****** ***** ** expand **** *** ***.***.*.* network ******* ***** * router, * ***** ** 510 ***** ******* ** 255, *********** ******** ********* IP *********. ******** *** mask ** ***.***.***.* ******* this ******* ** *,*** IPs (***.***.*.*-***.***.*.***). **** ** illustrated *****.

Subnetting Examples

** *** *** ****** masks ****** ********* *********, users *** ***** ********** ********* ****** ***********.

Comments (26)

*** ***** ** *** skirts ** **, *** everyone ******** ** ******* up ******* ******** ****** be ******** **** *******.  This ******* *** ******* subnets *** ***** *** personal ***, *.*. ******* from *** ****** **** one ** ***** ********* will ** ******* ** the **** ******** ******* of ********* **/*********.  ***** subnets ******* **.*.*.*, ***.**.**.*-***.**.**.* and ***.***.*.*.

********** *** ** * tricky *****, ********** *** bit **** **** ******* unreachable *** ***** *** insane.  ** ***'** ***** this *** * ****** I ***** *** ***** books *** ***** **** networking ** ** ********* insightful (**** ** *** bit *****) **** ** you ***'* **** ** pursuing *** *************.

**** ***********!

 

******* *** * *** blocks *** ***** *** the ******* ***** :

**-*** *****: **.*.*.* ~ 10.255.255.255 : *-*** ****** (255.0.0.0)

**-*** *****: ***.**.*.* ~ 172.31.255.255: **-*** ****** (***.***.*.*)

**-*** *****: ***.***.*.* ~ 192.168.255.255: **-*** ****** (***.***.*.*)

 

 

******* ********** ***** ******** Version *, *** ******* IP **********.

*******

(****** ** ******* * better ****)

 

*** ******** - * meant *** ****

**** ** *** ****** me. * ***** * will **** **** ** interact **** * ******* containing **** **** *** devices. 

*** *** ***** * don't ***** ********** ** how *** ******** * router **** ** ******* of ***.***.*.* ** **** to ******** **** ********* with ** ******* ** of ***.***.*.***. ** **** 3rd ***** *****'* *****, wouldn't ** ** *********** by *** ******? ** does ** ****** ********* when *** ****** ***** is *******?

**** **** ** ****** a ****** ***** *** you *** **** *** one *** ****. **'* not **** *********.

 

*** ****** **** ********** which ***** ********* * device ** * ******** address *** *****. *** any *** ** *** subnet **** ***** ** a "*", *** ********* address **** ** ********* to **** ** *** device's ******** *******.

** *** **** * subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* **          ***.***.*.* to ***.***.*.***. [**'* *** since *** ** ******* reserved.] *** ***** ***** "octets" ***** *** *** all "*"*, ** * reachable ******'* ******* **** be ********* ** *** first ***** ****** ** the ****** ** ***.***.*.*, i.e., ***.***.*  .

** *** ******* *** subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* ** ***.***.*.* to ***.***.*.***.

*** *********** #*'* "****** mask ***** *********" ***** and ******* *******.****.***. (** *** *** really **********).

** **** ** ****** reachable **** *** ****** digit ** *******?

***, **** ** *** concept ** ****** ***** exactly.

**** *** ****** **** an ** ******* ***** to ******* ** ******* device **** ** ** address, *** ** *** first ****** ** ***** to ********* ** ** that ***** ****** ** on *** **** *** (meaning ** *** **** packets ** ** ********), or ** ** ** a ****** ******* (******* the ******* **** ** be **** ** * router, *** *** **** route **** ** *** appropriate ****** *******).

*** ****** **** *** local ** ******* *** used ** ******* ***** IPs *** ***** *** which *** ******.

** *** *** * subnet **** **** ***.***.***.***, then **** ******* ***** the *** ***** (*****) match ***'* *********** ** able ** **** ******* directly ** **** *****. (subnet ***** ***** *** 4th ***** *** ***-**** are **** ****** ** datacenters ***** *** ***** only ** ********* * IP ********* *** **** specific ***).

*** ******* ** *** same ****** *** ** the **** ********* ******  talk ******** *** *** not ** ******** **** EACH *****.  * *** network **** *** ***** issues ** *** ****** broadcast ******.  ****** ******* private ******* **** ** routed ** * ******.  So *** **** **** router **** ** ***** Mikrotik, ***. ******** ******** **** Hippa ******* ******* ********* via ******** ******** **.  subnets

*** *** ***** **** to **** **** ******** containing **** **** *** devices, *** ******* *** that *** **** ********* networks **** **** ***** to **** **** ****.  The **** ****** ********* would ** * ***** business **** *** ********* a ***** ***** ** public ** ********* ** order ** **** ********* on ***** *** ******* and ******* ****** ** the ********.  *** *** will ***** *** ******* amount ** ** ********* that ** *** *** away **** (**** ****** pretty ******* *** ****** IP *********) *** **** will *** ** ********** to ** ****.  ** most ***** * ******* will *** * ***** of * ****** ** addresses ***** ** * 255.255.255.240 ****** (** ***** only * *** ******** accessible, *** ***** ** the ***** ** *** "network" ***** *** *** the **** ** *** block ** *** "*********" address, ******* ** *** 0's ** *** *******, broadcast ** *** *'*)

** **** *** ****** complex, * ***** **** myself ******* *** *** chart -> *** - 64 - ** - 16 - * - - * - 1, *** * ***** it.

**** * ****'* ******* things *** **** ****.

 

**********: ***.***.***.*** ******** * block ** ** ** addresses, * ****** **** said ***.***.***.*** ******** * addresses, ** ***** * are ******.

*** *** *** *****://*******.***/** * **** ******'* tool ** **** *** many ******* *** *** reach ** ***** * static ** *** ********* angry.

*******:***.***.*.* ***:***.***.***.*

*******:***.***.*.* ***:***.***.***.*

****, ********..*** * ** bored, ****** ** ********* quotes.

**** * ****

***** *******! - ** you *** *** ** CCTV, ** ***** * book/course **** ******* *** recommend ** ******** ********** from ***** ***** ** a ****** ********?  

#*, ****** *** **** first *******, ***, *** our **** ** ********** **** *** *** ****** **** ** ********** Course (***** ****** **** *******).

**** * ***** ******** here. **** *** ******** your ******* ****, ** isn’t ****** **********, **’* called ************. *** ****** that *** *** ****** something *******. ***** ***** making ** ******. 

*** **** ** ** it!  * *** ***** to **** ***, **** if ***** ** **** the ******** *********** ** increasing *** ***** ** your *******, ** ** certain ** ***** *** critical/static ********* ** *** bottom ** *** ******* scope.  *** *******, *** x.x.x.1 *** **** ******* Default ******* (******** ********* like .* *** .* will ** *** ******** interfaces *** *********/******** *******) and ******* *** **** of *** ******-***** **** octet ******* *** ***** network-specific *******. **** ***, if *** **** **** to ******, *** ***'* have ********* *** **** devices, *** *** ******* gear *****'* *** ** the ****** ** **** address ****** (*'* ***** that ***).

*** * ******/***** **************, I ****** **** ** addressing ****** ***** ** the ***** ***-* ************, plus * * **** out ********* ********* ********.  Something **** **** -

*.*.*.* - ******* *******
*.*.*.* - ******* */*
*.*.*.* - *.*.*.** - network *******, ***, ****, etc.
*.*.*.** - *.*.*.** - servers, *******, ************ (*****)
*.*.*.** - *.*.*.** - encoders, ********, *****, */*, intercoms
*.*.*.** - *.*.*.** - reserved *** ***-*****-**** *** come
*.*.*.** - *.*.*.*** - cameras (******-**) *** ****** control (***-****)

*** * ****** **************, video *** ****** (*** intrusion?) ***** ** ** separate *****.

**** *** * ****** is ****** * *** of ******* *** ***** a ***** ** ***** a ***** ** * supernet. ***** ** **** add ***/***** **** ** IPv6 ** ******* ************** the ****** ***** ** noobs.

*** *** ** ***** tag ** ***** *** relation ** * ******** subnet **** *** * given ******* *****. *** networks *** ******* **** subnets. *** ********** ** whether **’* * ****** (super) ** ******* (***) subnet **** *** ******** subnet. 

*** **** ****** ********* tools **** *** ******* to **** **** ************? I **** **** ** lacked **** ******* ** their ********* **** * few ***** ****, **** only *** ******* *** A,B ** *.

**** ********** ** **** tools *** ************* ******** NIC's ** ******* ********.

 

** ***** ***** ** amaze **, *** **** of ***** "*********" **** fundamental ********** *********...

****...* *** ******** ** Scanner *** *** **** and ** **** *** all *** ****** **** on * ******* *** allows *** ** **** all ** **** ** a ****.  * **** useful ****.

** *** **** * similar ****** ** ****?  Address ***** ****** ** away **** ** *** a **** ************* ** the ************* ** **** important.

****** * ***** ****** masks ** *** ********* cameras?

*** *** ******* ********* devices **** **** * common ****** ****. 

*** *** ******* ********* devices **** **** * common ****** ****.

** ***, ***** *** for **** ********. **** goes ** *** *#*.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
IPVM Camera Calculator User Manual / Guide on Oct 16, 2019
Learn how to use the IPVM Camera Calculator. The guide below includes instructions, images, gifs, and videos demonstrating and explaining the...
Camera Focusing Tutorial on Oct 14, 2019
Camera focus is fundamental to quality imaging. Mistakes can significantly reduce details, making cameras less effective. In this guide, we...
Last Chance - Register Now - October 2019 IP Networking Course on Oct 10, 2019
Last Chance - Register Now - Fall 2019 IP Networking Course. The course starts next week. This is the only networking course designed...
Camera Cable Whip Guide on Oct 02, 2019
Cable whips are one of integrator's least favorite camera features but seem to be unavoidable, now commonplace on dome, turret, and bullet cameras...
Wide Dynamic Range (WDR) Guide on Oct 01, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Access Control Mantraps Guide on Sep 26, 2019
One of access's primary goals is keeping people out of places they should not be, but slipping through open doors (ie: Tailgating) is often...
Access Control Time & Attendance Guide on Sep 24, 2019
Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees...

Most Recent Industry Reports

Hikvision Global News Reports Directory on Oct 17, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Camera Calculator V3.1 Release Improves User Experience on Oct 17, 2019
IPVM has released a new version of our Camera Calculator, V3.1, with significant user experience improvements, a new development plan, and an...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns on Oct 16, 2019
A senior DoD official said the US is "concerned" with the cybersecurity of Hikvision, Dahua, and Huawei due to "CCP" (China Communist Party)...
Pelco Sarix Pro3 Camera Tested on Oct 16, 2019
Pelco has released their Sarix Professional Series 3 cameras, claiming "more security detail in challenging scenes with excellent low light and...
IPVM Camera Calculator User Manual / Guide on Oct 16, 2019
Learn how to use the IPVM Camera Calculator. The guide below includes instructions, images, gifs, and videos demonstrating and explaining the...
Altronix Claims Tango 'Eliminates Electricians' on Oct 15, 2019
Power supply provider Altronix claims its new Tango power supply 'eliminates the need for an electrician, dedicated conduit and wire runs'. In...
Pelco CEO Out, New CEO Found on Oct 15, 2019
Just 2 months after Pelco was sold, Pelco's CEO is out, with Pelco bringing in an outside President and searching for a new CEO from the industry,...