Subnetting for Video Surveillance

By John Scanlan, Published on Apr 30, 2019

This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range, borrowing bits, and the role of the subnet mask.

free image

****** **** ****** ** provide *********** **:

  • *** ********* **** *****
  • *** **** ** *** subnet ****
  • ********* *** ** ****
  • ********* *** ** ****
  • ****** *** ** ********

Why ****** ** ***** ************

***** *** * *** reasons ************** *** **** to ****** ***** ******** network, ******** *****:

  • ******* *** ** *********
  • ******* ********
  • **** ** **************

Running *** ** *********, *** ******* **********

*** **** ****** ** address ****** ** ***.***.*.* (a ***** * *******) which ******** *** **** addresses. *******, ** **** mid-sized ************ *** ******** systems, **** ** * school, ****, ** ***** facility, ***** ********* *** be ******* ******** ** cameras *** ****. *******, adding ****** ******* *** consume ** ******* *** each **********. ******** ****** to ******* ****** ******* consume ********** *********. ********* viewing ******** **** **** require *********, ***.

** ****** ******** ****** mask ** *** *** (255.255.255.0 ** ***.***.***.*), *** network ***** ** ********** 255 ********* ***** *** be **** *** ********** devices. ***** *** **** this **** ******, ** using * **** ** 255.255.240 ***** ******* ****** 4,000 ******* ** *** subnet.

Network ********

** ***** ********* ******* for ********* ******* ******** (e.g., ************ **. ******* LAN **. *****), * device ** ****** ** prevented **** ********* * device ** *******. ** simply ****** **** *** route ** *** ***** host.

********** ** **** ***** deployed *********, ***** ** **** more *********** ** ****.

Ease ** **************

********* ********** ****** *** to ****** ** ** scheme **** * ********* and ********** ****** ** hosts. **** ******** * network ** ***** ********** ****** * ***** ******* it ** ******* ** scan * ******* *******, closer ** ****** ** actual **-*** *******, ****** than **** ********* ** unused *********; *.*.

******** ***.**.*.* - ***.**.***.*** with ****** ***.***.*.* = 65,534 *********

******** ***.**.*.* - ***.**.*.** with ****** ***.***.***.*** = 30 *********

*** ******* **** *** classfull ****** **** **** take ***** * ***** to **** **** * discovery ****, ************ ** *******, ***** *** ******* subnet **** **** **** just *******.

Subnetting ******

*** ****** **** ** a ********* ************* ** the ** *******, *** determines ***** ***** ** an ** ******* ******* the "*******" **. *** "host." ** ********, *** vast ******** ** ********, surveillance ********, *** ******* subnet *****, **** ****** classfull **********, *** *** IP ******* *****, **** commonly ***.***.***.*.

[****, *** **** ***** we *** **** ********* with ******* ********* ***** are ****** **** * classes *****.]

*********Addresses / ******* ** *********

********** ******* *** ****** mask **** ********* (***** A = ***.*.*.*, * = ***.***.*.*, * = 255.255.255.0) ** ********* ***** borrowed **** ** ****** those ******, *** ** doing ** ******* *** amount ** ***** *** networks. *** *** ****** to ****** ******** ***** and ******** ******** ** decrease ***** *** ******** networks. *** ******* ***** shows *** ****** ***** for **** ***** *** the ****** ** ***** and ******** ********** **** each.

Default Subnet Masks and Classes

*** ***** ***** ***** how **** **** ** the ****** ****. *** network **** *** *'*, and * **** ** 8 *'* (********) = 255. *** **** **** are *'*, ***** ******** = *. *** ******* below ***** *** ******* subnet **** *** **** class, *** ********** ****.

Subnet Masks Represented in Bits

Subnet **** ********** ******** *** *****

********* **** *** ********* subnet ***** ** **********, also ****** ********* **********. The *** **** **** is **** ** ** borrowing **** **** *** other **** ** **** by ******** * ** 0 ** * ** 1. ** **** ***** are ******* **** **** are ******** **** *** network *******, *** **** more ******** *** ******* bits *** ******** **** the **** *******.

Subnets ** ***** ***********

*** ****** ****** ******** which ******* **** *** device *********, ****** ***** are **** ***** **** to ****** *** ******* to ** ********** ****** or *******. **** ** done ** ******** *** last ***** ** *** mask. *** ***** *** that ** *******, ** additional *** **** ****** becomes *********.

** * ********* *******, changing ****** **** **** 255.255.255.0 ** ***.***.***.* ** * ***.***.*.* network ****** ***** ** expand **** *** ***.***.*.* network ******* ***** * router, * ***** ** 510 ***** ******* ** 255, *********** ******** ********* IP *********. ******** *** mask ** ***.***.***.* ******* this ******* ** *,*** IPs (***.***.*.*-***.***.*.***). **** ** illustrated *****.

Subnetting Examples

** *** *** ****** masks ****** ********* *********, users *** ***** ********** ********* ****** ***********.

Comments (26)

*** ***** ** *** skirts ** **, *** everyone ******** ** ******* up ******* ******** ****** be ******** **** *******.  This ******* *** ******* subnets *** ***** *** personal ***, *.*. ******* from *** ****** **** one ** ***** ********* will ** ******* ** the **** ******** ******* of ********* **/*********.  ***** subnets ******* **.*.*.*, ***.**.**.*-***.**.**.* and ***.***.*.*.

********** *** ** * tricky *****, ********** *** bit **** **** ******* unreachable *** ***** *** insane.  ** ***'** ***** this *** * ****** I ***** *** ***** books *** ***** **** networking ** ** ********* insightful (**** ** *** bit *****) **** ** you ***'* **** ** pursuing *** *************.

**** ***********!

 

******* *** * *** blocks *** ***** *** the ******* ***** :

**-*** *****: **.*.*.* ~ 10.255.255.255 : *-*** ****** (255.0.0.0)

**-*** *****: ***.**.*.* ~ 172.31.255.255: **-*** ****** (***.***.*.*)

**-*** *****: ***.***.*.* ~ 192.168.255.255: **-*** ****** (***.***.*.*)

 

 

******* ********** ***** ******** Version *, *** ******* IP **********.

*******

(****** ** ******* * better ****)

 

*** ******** - * meant *** ****

**** ** *** ****** me. * ***** * will **** **** ** interact **** * ******* containing **** **** *** devices. 

*** *** ***** * don't ***** ********** ** how *** ******** * router **** ** ******* of ***.***.*.* ** **** to ******** **** ********* with ** ******* ** of ***.***.*.***. ** **** 3rd ***** *****'* *****, wouldn't ** ** *********** by *** ******? ** does ** ****** ********* when *** ****** ***** is *******?

**** **** ** ****** a ****** ***** *** you *** **** *** one *** ****. **'* not **** *********.

 

*** ****** **** ********** which ***** ********* * device ** * ******** address *** *****. *** any *** ** *** subnet **** ***** ** a "*", *** ********* address **** ** ********* to **** ** *** device's ******** *******.

** *** **** * subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* **          ***.***.*.* to ***.***.*.***. [**'* *** since *** ** ******* reserved.] *** ***** ***** "octets" ***** *** *** all "*"*, ** * reachable ******'* ******* **** be ********* ** *** first ***** ****** ** the ****** ** ***.***.*.*, i.e., ***.***.*  .

** *** ******* *** subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* ** ***.***.*.* to ***.***.*.***.

*** *********** #*'* "****** mask ***** *********" ***** and ******* *******.****.***. (** *** *** really **********).

** **** ** ****** reachable **** *** ****** digit ** *******?

***, **** ** *** concept ** ****** ***** exactly.

**** *** ****** **** an ** ******* ***** to ******* ** ******* device **** ** ** address, *** ** *** first ****** ** ***** to ********* ** ** that ***** ****** ** on *** **** *** (meaning ** *** **** packets ** ** ********), or ** ** ** a ****** ******* (******* the ******* **** ** be **** ** * router, *** *** **** route **** ** *** appropriate ****** *******).

*** ****** **** *** local ** ******* *** used ** ******* ***** IPs *** ***** *** which *** ******.

** *** *** * subnet **** **** ***.***.***.***, then **** ******* ***** the *** ***** (*****) match ***'* *********** ** able ** **** ******* directly ** **** *****. (subnet ***** ***** *** 4th ***** *** ***-**** are **** ****** ** datacenters ***** *** ***** only ** ********* * IP ********* *** **** specific ***).

*** ******* ** *** same ****** *** ** the **** ********* ******  talk ******** *** *** not ** ******** **** EACH *****.  * *** network **** *** ***** issues ** *** ****** broadcast ******.  ****** ******* private ******* **** ** routed ** * ******.  So *** **** **** router **** ** ***** Mikrotik, ***. ******** ******** **** Hippa ******* ******* ********* via ******** ******** **.  subnets

*** *** ***** **** to **** **** ******** containing **** **** *** devices, *** ******* *** that *** **** ********* networks **** **** ***** to **** **** ****.  The **** ****** ********* would ** * ***** business **** *** ********* a ***** ***** ** public ** ********* ** order ** **** ********* on ***** *** ******* and ******* ****** ** the ********.  *** *** will ***** *** ******* amount ** ** ********* that ** *** *** away **** (**** ****** pretty ******* *** ****** IP *********) *** **** will *** ** ********** to ** ****.  ** most ***** * ******* will *** * ***** of * ****** ** addresses ***** ** * 255.255.255.240 ****** (** ***** only * *** ******** accessible, *** ***** ** the ***** ** *** "network" ***** *** *** the **** ** *** block ** *** "*********" address, ******* ** *** 0's ** *** *******, broadcast ** *** *'*)

** **** *** ****** complex, * ***** **** myself ******* *** *** chart -> *** - 64 - ** - 16 - * - - * - 1, *** * ***** it.

**** * ****'* ******* things *** **** ****.

 

**********: ***.***.***.*** ******** * block ** ** ** addresses, * ****** **** said ***.***.***.*** ******** * addresses, ** ***** * are ******.

*** *** *** *****://*******.***/** * **** ******'* tool ** **** *** many ******* *** *** reach ** ***** * static ** *** ********* angry.

*******:***.***.*.* ***:***.***.***.*

*******:***.***.*.* ***:***.***.***.*

****, ********..*** * ** bored, ****** ** ********* quotes.

**** * ****

***** *******! - ** you *** *** ** CCTV, ** ***** * book/course **** ******* *** recommend ** ******** ********** from ***** ***** ** a ****** ********?  

#*, ****** *** **** first *******, ***, *** our **** ** ********** **** *** *** ****** **** ** ********** Course (***** ****** **** *******).

**** * ***** ******** here. **** *** ******** your ******* ****, ** isn’t ****** **********, **’* called ************. *** ****** that *** *** ****** something *******. ***** ***** making ** ******. 

*** **** ** ** it!  * *** ***** to **** ***, **** if ***** ** **** the ******** *********** ** increasing *** ***** ** your *******, ** ** certain ** ***** *** critical/static ********* ** *** bottom ** *** ******* scope.  *** *******, *** x.x.x.1 *** **** ******* Default ******* (******** ********* like .* *** .* will ** *** ******** interfaces *** *********/******** *******) and ******* *** **** of *** ******-***** **** octet ******* *** ***** network-specific *******. **** ***, if *** **** **** to ******, *** ***'* have ********* *** **** devices, *** *** ******* gear *****'* *** ** the ****** ** **** address ****** (*'* ***** that ***).

*** * ******/***** **************, I ****** **** ** addressing ****** ***** ** the ***** ***-* ************, plus * * **** out ********* ********* ********.  Something **** **** -

*.*.*.* - ******* *******
*.*.*.* - ******* */*
*.*.*.* - *.*.*.** - network *******, ***, ****, etc.
*.*.*.** - *.*.*.** - servers, *******, ************ (*****)
*.*.*.** - *.*.*.** - encoders, ********, *****, */*, intercoms
*.*.*.** - *.*.*.** - reserved *** ***-*****-**** *** come
*.*.*.** - *.*.*.*** - cameras (******-**) *** ****** control (***-****)

*** * ****** **************, video *** ****** (*** intrusion?) ***** ** ** separate *****.

**** *** * ****** is ****** * *** of ******* *** ***** a ***** ** ***** a ***** ** * supernet. ***** ** **** add ***/***** **** ** IPv6 ** ******* ************** the ****** ***** ** noobs.

*** *** ** ***** tag ** ***** *** relation ** * ******** subnet **** *** * given ******* *****. *** networks *** ******* **** subnets. *** ********** ** whether **’* * ****** (super) ** ******* (***) subnet **** *** ******** subnet. 

*** **** ****** ********* tools **** *** ******* to **** **** ************? I **** **** ** lacked **** ******* ** their ********* **** * few ***** ****, **** only *** ******* *** A,B ** *.

**** ********** ** **** tools *** ************* ******** NIC's ** ******* ********.

 

** ***** ***** ** amaze **, *** **** of ***** "*********" **** fundamental ********** *********...

****...* *** ******** ** Scanner *** *** **** and ** **** *** all *** ****** **** on * ******* *** allows *** ** **** all ** **** ** a ****.  * **** useful ****.

** *** **** * similar ****** ** ****?  Address ***** ****** ** away **** ** *** a **** ************* ** the ************* ** **** important.

****** * ***** ****** masks ** *** ********* cameras?

*** *** ******* ********* devices **** **** * common ****** ****. 

*** *** ******* ********* devices **** **** * common ****** ****.

** ***, ***** *** for **** ********. **** goes ** *** *#*.

Read this IPVM report for free.

This article is part of IPVM's 6,592 reports, 889 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Network Cable Usage Statistics 2020 (Cat 5e vs Cat 6 vs Cat 6a) on Sep 02, 2020
Integrators are split between using Cat 5e, 6, and 6a but 2 of them have...
Ubiquiti Access Control Tested on Oct 21, 2020
Ubiquiti has become one of the most widely used wireless and switch providers...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Avigilon ACC Cloud Tested on Jul 08, 2020
Avigilon merged Blue and ACC, adding VSaaS features to its on-premise VMS,...
Dedicated Vs Converged IP Video Networks Statistics 2020 on Sep 10, 2020
Running one's video system on a converged network with other devices can save...
Risks Of Managing End User Passwords (Statistics) 2020 on Sep 11, 2020
Alarmingly, most integrators used spreadsheets to manage passwords, IPVM...
The Future of H.266 For Video Surveillance Examined on Aug 17, 2020
First H.264, now H.265, is H.266 next? H.266 was recently announced amid...
HID Releases VertX Replacement Aero on Aug 10, 2020
HID is replacing two established and broadly supported types of access...
Access Control and Video Integration Statistics 2020 on Oct 08, 2020
Video Surveillance and Access Control are two of the most common security...
US GSA Explains NDAA 889 Part B Blacklisting on Jul 31, 2020
With the 'Blacklist Clause' going into effect August 13 that bans the US...
Multilaser / Giga Security Brazil Company Profile on Oct 05, 2020
As part of our expanded Latin America coverage, IPVM is profiling regional...
Avigilon Aggressive Trade-In Program Takes Aim At Competitors on Oct 20, 2020
Avigilon has launched one of the most aggressive trade-in programs the video...
Uniview Deep Learning Camera Tested on Jul 14, 2020
Uniview's intrusion analytics have performed poorly in our shootouts. Now,...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...

Recent Reports

ISC Brasil Digital Experience 2020 Report on Oct 23, 2020
ISC Brasil 2020 rebranded itself to ISC Digital Experience and, like its...
Top Video Surveillance Service Call Problems 2020 on Oct 23, 2020
3 primary and 4 secondary issues stood out as causing the most problems when...
GDPR Impact On Temperature / Fever Screening Explained on Oct 22, 2020
What impact does GDPR have on temperature screening? Do you risk a GDPR fine...
Security And Safety Things (S&ST) Tested on Oct 22, 2020
S&ST, a Bosch spinout, is spending tens of millions of dollars aiming to...
Nokia Fever Screening Claims To "Advance Fight Against COVID-19" on Oct 22, 2020
First IBM, then briefly Clorox, and now Nokia becomes the latest Fortune 500...
Deceptive Meridian Temperature Tablets Endanger Public Safety on Oct 21, 2020
IPVM's testing of and investigation into Meridian Kiosk's temperature...
Honeywell 30 Series and Vivotek NVRs Tested on Oct 21, 2020
The NDAA ban has driven many users to look for low-cost NVRs not made by...
Ubiquiti Access Control Tested on Oct 21, 2020
Ubiquiti has become one of the most widely used wireless and switch providers...
Avigilon Aggressive Trade-In Program Takes Aim At Competitors on Oct 20, 2020
Avigilon has launched one of the most aggressive trade-in programs the video...
Mexico Video Surveillance Market Overview 2020 on Oct 20, 2020
Despite being neighbors, there are key differences between the U.S. and...
Dahua Revenue Grows But Profits Down, Cause Unclear on Oct 20, 2020
While Dahua's overall revenue was up more than 12% in Q3 2020, a significant...
Illegal Hikvision Fever Screening Touted In Australia, Government Investigating, Temperature References Deleted on Oct 20, 2020
The Australian government told IPVM that they are investigating a Hikvision...
Panasonic Presents i-PRO Cameras and Video Analytics on Oct 19, 2020
Panasonic i-PRO presented its X-Series cameras and AI video analytics at the...
Augmented Reality (AR) Cameras From Hikvision and Dahua Examined on Oct 19, 2020
Hikvision, Dahua, and other China companies are marketing augmented reality...
18 TB Video Surveillance Drives (WD and Seagate) on Oct 19, 2020
Both Seagate and Western Digital recently announced 18TB hard drives...