Subnetting for Video Surveillance

By: John Scanlan, Published on Apr 30, 2019

This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range, borrowing bits, and the role of the subnet mask.

free image

****** **** ****** ** provide *********** **:

  • *** ********* **** *****
  • *** **** ** *** subnet ****
  • ********* *** ** ****
  • ********* *** ** ****
  • ****** *** ** ********

Why ****** ** ***** ************

***** *** * *** reasons ************** *** **** to ****** ***** ******** network, ******** *****:

  • ******* *** ** *********
  • ******* ********
  • **** ** **************

Running *** ** *********, *** ******* **********

*** **** ****** ** address ****** ** ***.***.*.* (a ***** * *******) which ******** *** **** addresses. *******, ** **** mid-sized ************ *** ******** systems, **** ** * school, ****, ** ***** facility, ***** ********* *** be ******* ******** ** cameras *** ****. *******, adding ****** ******* *** consume ** ******* *** each **********. ******** ****** to ******* ****** ******* consume ********** *********. ********* viewing ******** **** **** require *********, ***.

** ****** ******** ****** mask ** *** *** (255.255.255.0 ** ***.***.***.*), *** network ***** ** ********** 255 ********* ***** *** be **** *** ********** devices. ***** *** **** this **** ******, ** using * **** ** 255.255.240 ***** ******* ****** 4,000 ******* ** *** subnet.

Network ********

** ***** ********* ******* for ********* ******* ******** (e.g., ************ **. ******* LAN **. *****), * device ** ****** ** prevented **** ********* * device ** *******. ** simply ****** **** *** route ** *** ***** host.

********** ** **** ***** deployed *********, ***** ** **** more *********** ** ****.

Ease ** **************

********* ********** ****** *** to ****** ** ** scheme **** * ********* and ********** ****** ** hosts. **** ******** * network ** ***** ********** ****** * ***** ******* it ** ******* ** scan * ******* *******, closer ** ****** ** actual **-*** *******, ****** than **** ********* ** unused *********; *.*.

******** ***.**.*.* - ***.**.***.*** with ****** ***.***.*.* = 65,534 *********

******** ***.**.*.* - ***.**.*.** with ****** ***.***.***.*** = 30 *********

*** ******* **** *** classfull ****** **** **** take ***** * ***** to **** **** * discovery ****, ************ ** *******, ***** *** ******* subnet **** **** **** just *******.

Subnetting ******

*** ****** **** ** a ********* ************* ** the ** *******, *** determines ***** ***** ** an ** ******* ******* the "*******" **. *** "host." ** ********, *** vast ******** ** ********, surveillance ********, *** ******* subnet *****, **** ****** classfull **********, *** *** IP ******* *****, **** commonly ***.***.***.*.

[****, *** **** ***** we *** **** ********* with ******* ********* ***** are ****** **** * classes *****.]

*********Addresses / ******* ** *********

********** ******* *** ****** mask **** ********* (***** A = ***.*.*.*, * = ***.***.*.*, * = 255.255.255.0) ** ********* ***** borrowed **** ** ****** those ******, *** ** doing ** ******* *** amount ** ***** *** networks. *** *** ****** to ****** ******** ***** and ******** ******** ** decrease ***** *** ******** networks. *** ******* ***** shows *** ****** ***** for **** ***** *** the ****** ** ***** and ******** ********** **** each.

Default Subnet Masks and Classes

*** ***** ***** ***** how **** **** ** the ****** ****. *** network **** *** *'*, and * **** ** 8 *'* (********) = 255. *** **** **** are *'*, ***** ******** = *. *** ******* below ***** *** ******* subnet **** *** **** class, *** ********** ****.

Subnet Masks Represented in Bits

Subnet **** ********** ******** *** *****

********* **** *** ********* subnet ***** ** **********, also ****** ********* **********. The *** **** **** is **** ** ** borrowing **** **** *** other **** ** **** by ******** * ** 0 ** * ** 1. ** **** ***** are ******* **** **** are ******** **** *** network *******, *** **** more ******** *** ******* bits *** ******** **** the **** *******.

Subnets ** ***** ***********

*** ****** ****** ******** which ******* **** *** device *********, ****** ***** are **** ***** **** to ****** *** ******* to ** ********** ****** or *******. **** ** done ** ******** *** last ***** ** *** mask. *** ***** *** that ** *******, ** additional *** **** ****** becomes *********.

** * ********* *******, changing ****** **** **** 255.255.255.0 ** ***.***.***.* ** * ***.***.*.* network ****** ***** ** expand **** *** ***.***.*.* network ******* ***** * router, * ***** ** 510 ***** ******* ** 255, *********** ******** ********* IP *********. ******** *** mask ** ***.***.***.* ******* this ******* ** *,*** IPs (***.***.*.*-***.***.*.***). **** ** illustrated *****.

Subnetting Examples

** *** *** ****** masks ****** ********* *********, users *** ***** ********** ********* ****** ***********.

Comments (26)

*** ***** ** *** skirts ** **, *** everyone ******** ** ******* up ******* ******** ****** be ******** **** *******.  This ******* *** ******* subnets *** ***** *** personal ***, *.*. ******* from *** ****** **** one ** ***** ********* will ** ******* ** the **** ******** ******* of ********* **/*********.  ***** subnets ******* **.*.*.*, ***.**.**.*-***.**.**.* and ***.***.*.*.

********** *** ** * tricky *****, ********** *** bit **** **** ******* unreachable *** ***** *** insane.  ** ***'** ***** this *** * ****** I ***** *** ***** books *** ***** **** networking ** ** ********* insightful (**** ** *** bit *****) **** ** you ***'* **** ** pursuing *** *************.

**** ***********!

 

******* *** * *** blocks *** ***** *** the ******* ***** :

**-*** *****: **.*.*.* ~ 10.255.255.255 : *-*** ****** (255.0.0.0)

**-*** *****: ***.**.*.* ~ 172.31.255.255: **-*** ****** (***.***.*.*)

**-*** *****: ***.***.*.* ~ 192.168.255.255: **-*** ****** (***.***.*.*)

 

 

******* ********** ***** ******** Version *, *** ******* IP **********.

*******

(****** ** ******* * better ****)

 

*** ******** - * meant *** ****

**** ** *** ****** me. * ***** * will **** **** ** interact **** * ******* containing **** **** *** devices. 

*** *** ***** * don't ***** ********** ** how *** ******** * router **** ** ******* of ***.***.*.* ** **** to ******** **** ********* with ** ******* ** of ***.***.*.***. ** **** 3rd ***** *****'* *****, wouldn't ** ** *********** by *** ******? ** does ** ****** ********* when *** ****** ***** is *******?

**** **** ** ****** a ****** ***** *** you *** **** *** one *** ****. **'* not **** *********.

 

*** ****** **** ********** which ***** ********* * device ** * ******** address *** *****. *** any *** ** *** subnet **** ***** ** a "*", *** ********* address **** ** ********* to **** ** *** device's ******** *******.

** *** **** * subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* **          ***.***.*.* to ***.***.*.***. [**'* *** since *** ** ******* reserved.] *** ***** ***** "octets" ***** *** *** all "*"*, ** * reachable ******'* ******* **** be ********* ** *** first ***** ****** ** the ****** ** ***.***.*.*, i.e., ***.***.*  .

** *** ******* *** subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* ** ***.***.*.* to ***.***.*.***.

*** *********** #*'* "****** mask ***** *********" ***** and ******* *******.****.***. (** *** *** really **********).

** **** ** ****** reachable **** *** ****** digit ** *******?

***, **** ** *** concept ** ****** ***** exactly.

**** *** ****** **** an ** ******* ***** to ******* ** ******* device **** ** ** address, *** ** *** first ****** ** ***** to ********* ** ** that ***** ****** ** on *** **** *** (meaning ** *** **** packets ** ** ********), or ** ** ** a ****** ******* (******* the ******* **** ** be **** ** * router, *** *** **** route **** ** *** appropriate ****** *******).

*** ****** **** *** local ** ******* *** used ** ******* ***** IPs *** ***** *** which *** ******.

** *** *** * subnet **** **** ***.***.***.***, then **** ******* ***** the *** ***** (*****) match ***'* *********** ** able ** **** ******* directly ** **** *****. (subnet ***** ***** *** 4th ***** *** ***-**** are **** ****** ** datacenters ***** *** ***** only ** ********* * IP ********* *** **** specific ***).

*** ******* ** *** same ****** *** ** the **** ********* ******  talk ******** *** *** not ** ******** **** EACH *****.  * *** network **** *** ***** issues ** *** ****** broadcast ******.  ****** ******* private ******* **** ** routed ** * ******.  So *** **** **** router **** ** ***** Mikrotik, ***. ******** ******** **** Hippa ******* ******* ********* via ******** ******** **.  subnets

*** *** ***** **** to **** **** ******** containing **** **** *** devices, *** ******* *** that *** **** ********* networks **** **** ***** to **** **** ****.  The **** ****** ********* would ** * ***** business **** *** ********* a ***** ***** ** public ** ********* ** order ** **** ********* on ***** *** ******* and ******* ****** ** the ********.  *** *** will ***** *** ******* amount ** ** ********* that ** *** *** away **** (**** ****** pretty ******* *** ****** IP *********) *** **** will *** ** ********** to ** ****.  ** most ***** * ******* will *** * ***** of * ****** ** addresses ***** ** * 255.255.255.240 ****** (** ***** only * *** ******** accessible, *** ***** ** the ***** ** *** "network" ***** *** *** the **** ** *** block ** *** "*********" address, ******* ** *** 0's ** *** *******, broadcast ** *** *'*)

** **** *** ****** complex, * ***** **** myself ******* *** *** chart -> *** - 64 - ** - 16 - * - - * - 1, *** * ***** it.

**** * ****'* ******* things *** **** ****.

 

**********: ***.***.***.*** ******** * block ** ** ** addresses, * ****** **** said ***.***.***.*** ******** * addresses, ** ***** * are ******.

*** *** *** *****://*******.***/** * **** ******'* tool ** **** *** many ******* *** *** reach ** ***** * static ** *** ********* angry.

*******:***.***.*.* ***:***.***.***.*

*******:***.***.*.* ***:***.***.***.*

****, ********..*** * ** bored, ****** ** ********* quotes.

**** * ****

***** *******! - ** you *** *** ** CCTV, ** ***** * book/course **** ******* *** recommend ** ******** ********** from ***** ***** ** a ****** ********?  

#*, ****** *** **** first *******, ***, *** our **** ** ********** **** *** *** ****** **** ** ********** Course (***** ****** **** *******).

**** * ***** ******** here. **** *** ******** your ******* ****, ** isn’t ****** **********, **’* called ************. *** ****** that *** *** ****** something *******. ***** ***** making ** ******. 

*** **** ** ** it!  * *** ***** to **** ***, **** if ***** ** **** the ******** *********** ** increasing *** ***** ** your *******, ** ** certain ** ***** *** critical/static ********* ** *** bottom ** *** ******* scope.  *** *******, *** x.x.x.1 *** **** ******* Default ******* (******** ********* like .* *** .* will ** *** ******** interfaces *** *********/******** *******) and ******* *** **** of *** ******-***** **** octet ******* *** ***** network-specific *******. **** ***, if *** **** **** to ******, *** ***'* have ********* *** **** devices, *** *** ******* gear *****'* *** ** the ****** ** **** address ****** (*'* ***** that ***).

*** * ******/***** **************, I ****** **** ** addressing ****** ***** ** the ***** ***-* ************, plus * * **** out ********* ********* ********.  Something **** **** -

*.*.*.* - ******* *******
*.*.*.* - ******* */*
*.*.*.* - *.*.*.** - network *******, ***, ****, etc.
*.*.*.** - *.*.*.** - servers, *******, ************ (*****)
*.*.*.** - *.*.*.** - encoders, ********, *****, */*, intercoms
*.*.*.** - *.*.*.** - reserved *** ***-*****-**** *** come
*.*.*.** - *.*.*.*** - cameras (******-**) *** ****** control (***-****)

*** * ****** **************, video *** ****** (*** intrusion?) ***** ** ** separate *****.

**** *** * ****** is ****** * *** of ******* *** ***** a ***** ** ***** a ***** ** * supernet. ***** ** **** add ***/***** **** ** IPv6 ** ******* ************** the ****** ***** ** noobs.

*** *** ** ***** tag ** ***** *** relation ** * ******** subnet **** *** * given ******* *****. *** networks *** ******* **** subnets. *** ********** ** whether **’* * ****** (super) ** ******* (***) subnet **** *** ******** subnet. 

*** **** ****** ********* tools **** *** ******* to **** **** ************? I **** **** ** lacked **** ******* ** their ********* **** * few ***** ****, **** only *** ******* *** A,B ** *.

**** ********** ** **** tools *** ************* ******** NIC's ** ******* ********.

 

** ***** ***** ** amaze **, *** **** of ***** "*********" **** fundamental ********** *********...

****...* *** ******** ** Scanner *** *** **** and ** **** *** all *** ****** **** on * ******* *** allows *** ** **** all ** **** ** a ****.  * **** useful ****.

** *** **** * similar ****** ** ****?  Address ***** ****** ** away **** ** *** a **** ************* ** the ************* ** **** important.

****** * ***** ****** masks ** *** ********* cameras?

*** *** ******* ********* devices **** **** * common ****** ****. 

*** *** ******* ********* devices **** **** * common ****** ****.

** ***, ***** *** for **** ********. **** goes ** *** *#*.

Read this IPVM report for free.

This article is part of IPVM's 6,367 reports, 855 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

BICSI For IP Video Surveillance Guide on Feb 11, 2020
Spend enough time around networks and eventually someone will mention BICSI, the oft-referenced but only vaguely known standards body prevalent in...
Siklu $400 Compact 60GHz Radio on Jul 24, 2019
Siklu first entered the video surveillance market with a $6,000 per link solution, is now aiming down market with their newest 60GHz wireless...
Vivotek Trend Micro Cyber Security Camera App Tested on Jul 22, 2019
Vivotek and Trend Micro are claiming five million blocked attacks on IP cameras, with their jointly developed app for Vivotek cameras. This new...
Access Control Lock Guide on Sep 26, 2018
In this guide, we examine locks; critical elements of any security system and fundamental parts of every access control system. Two fundamental...
IP Network Hardware for Surveillance Guide on May 02, 2018
Video surveillance systems depend on IP networking equipment. In this guide, we explain the key pieces of equipment and features, explaining where...
Network Addressing for Video Surveillance Guide on Mar 14, 2018
The goal of this guide is to explain addressing devices on IP networks, focusing on how IP cameras and recorders are used in those networks. For...
Smart Codec Guide on Feb 01, 2018
"Smart Codec" was once seemingly a marketing buzzword, but in 2020, nearly all new camera models include this tehcnology. These marketing names...
Top 2017 Trends - Cyber and Analytics on Nov 09, 2017
The 2 clear top 2017 trends, according to IPVM integrator statistics are: Cyber Security Video Analytics This is a change from 2016...
Genetec Launches Cloud Access Control (Synergis SaaS) on Sep 21, 2017
Genetec's cloud everything expansion continues, with their announcement of Synergis SaaS edition, joining their cloud video offering Stratocast,...
Hikvision Backdoor Exploit on Sep 03, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...

Most Recent Industry Reports

Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI Face Recognition on Jul 02, 2020
Vintra presented its FulcrumAI face recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...
Uniview Wrist Temperature Reader Tested on Jul 02, 2020
Uniview is promoting measuring wrist temperatures whereas most others are just offering forehead or inner canthus measurements. But how well does...
Dahua USA Admits Thermal Solutions "Qualify As Medical Devices" on Jul 02, 2020
Dahua USA has issued a press release admitting a controversial point in the industry but an obvious one to the US FDA, that the thermal temperature...
Access Control Online Show - July 2020 - With 40+ Manufacturers - Register Now on Jul 01, 2020
IPVM is excited to announce our July 2020 Access Control Show. With 40+ companies presenting across 4 days, this is a unique opportunity to hear...
Hanwha Face Mask Detection Tested on Jul 01, 2020
Face mask detection or, more specifically lack-of-face-mask detection, is an expanding offering in the midst of coronavirus. Hanwha in partnership...
UK Government Says Fever Cameras "Unsuitable" on Jul 01, 2020
The UK government's medical device regulator, MHRA, told IPVM that fever-seeking thermal cameras are "unsuitable for this purpose" and recommends...
Camera Course Summer 2020 on Jun 30, 2020
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training...
Worst Over But Integrators Still Dealing With Coronavirus Problems (June Statistics) on Jun 30, 2020
While numbers of integrators very impacted by Coronavirus continue to drop, most are still moderately dealing with the pandemic's problems, June...