This action might not be possible to undo. Are you sure you want to continue?

Welcome to Scribd! Start your free trial and access books, documents and more.Find out more

There are three types of subnetting examples I will show in this document: 1) Subnetting when given a required number of networks 2) Subnetting when given a required number of clients 3) Given an IP address & Subnet Mask, finding original network range (reverse engineering a subnet problem)

Subnetting Examples document created by Jeremy D. Cioara. Please do not change this document without first contacting me! Thank you! If you have any questions, please email me at Jeremy@CBTNuggets.com

1111(1)000 – bit with the parenthesis is your increment bit.255.255. Style 1 .15 209. If you convert this bit to a decimal number.8 – 209.50.16 …etc You can now fill in your end ranges.11111111.1.7 209.1.255.Subnetting.0.00000000 We must “convert” 5 of the client bits (0) to network bits (1) in order to satisfy the requirements: New Mask = 11111111.50.248 Our increment bit is the last possible network bit.16 – 209.1.50.255.23 …etc You can then assign these ranges to your networks! Remember the first and last address from each range (network / broadcast IP) are unusable .0 – 209.1. converted back to a binary number: New Mask = 11111111.1.1.50.50. Step 2) Reserve required bits in subnet mask and find incremental value The binary value of 20 subnets tells us that we need at least 5 network bits to satisfy this requirement (since you cannot get the number 20 with any less than 5 bits – 10100) Our original subnet mask is 255.0 209. we now have the subnet mask that will be used on all the new networks – 255.11111111.0 = 11111111.255.11111111.11111111. Step 1) Determine the number of subnets and convert to binary In this example. the binary representation of 20 = 00010100.Subnetting when given a required number of networks Example 1: A service provider has given you the Class C network range 209.0 (Class C subnet) The full binary representation of the subnet mask is as follows: 255.8 209.11111000 If we convert the mask back to decimal.11111111.11111111.50.50.50.255.1. which is the last possible IP address before you start the next range 209.1.50. Your company must break the network into 20 separate subnets. it becomes the number „8‟ Step 3) Use increment to find network ranges Start with your given network address and add your increment to the subnetted octet: 209.50.1.1.

we now have the subnet mask that will be used on all the new networks – 255.0.255.0 – 172.16.7.0 172.11111111.00000000 If we convert the mask back to decimal. the binary representation of 60 = 00111100 Step 2) Reserve required bits in subnet mask and find incremental value The binary value of 60 subnets tells us that we need at least 6 network bits to satisfy this requirement (since you cannot get the number 60 with any less than 6 bits – 111100) Our original subnet mask is 255.0 172.255 …etc You can then assign these ranges to your networks! Remember the first and last address from each range (network / broadcast IP) are unusable .3.16.0 – 172.255.0 …etc You can now fill in your end ranges.255 172.252.0 Our increment bit is the last possible network bit.8.0.0.Example 2: Your company would like to break the Class B private IP address range 172.16.0 into 60 different subnets Step 1) Determine the number of subnets and convert to binary In this example. If you convert this bit to a decimal number.00000000 We must “convert” 6 of the client bits (0) to network bits (1) in order to satisfy the requirements: New Mask = 11111111. which is the last possible IP address before you start the next range 172.16.00000000 – bit with the parenthesis is your increment bit.8.16.0.00000000.0.11111(1)00.16.11111111.4.0 (Class B subnet) The full binary representation of the subnet mask is as follows: 255.255 172.16. it becomes the number „4‟ Step 3) Use increment to find network ranges Start with your given network address and add your increment to the subnetted octet: 172.16.11.11111111. converted back to a binary number: New Mask = 11111111.4.16.11111100.255.16.0 – 172.0 = 11111111.

we now have the subnet mask that will be used on all the new networks – 255.191 209.63 209. it becomes the number „64‟ Step 3) Use increment to find network ranges Start with your given network address and add your increment to the subnetted octet: 209.11111111.1.1.11111111.1.192 You can now fill in your end ranges. Style 2 .0 = 11111111.1.1.50.Subnetting.11111111.50.1.50.50.128 – 209.0 209.1(1)000000 – bit with the parenthesis is your increment bit.11111111.64 209. the binary representation of 50 = 00110010 Step 2) Reserve required bits in subnet mask and find incremental value The binary value of 50 clients tells us that we need at least 6 client bits to satisfy this requirement (since you cannot get the number 50 with any less than 6 bits – 110010) Our original subnet mask is 255.255.255.1.11 000000 note the 6 client bits that we have saved If we convert the mask back to decimal.1.255.1.50.0 – 209.128 209.255.50.1.50.255.00000000 We must ensure 6 of the client bits (0) remain client bits (save the clients!) in order to satisfy the requirements.50.192 – 209.50.127 209.192 Our increment bit is the last possible network bit. Your company must break the network into as many subnets as possible as long as there are at least 50 clients per network.50.255 You can then assign these ranges to your networks! Remember the first and last address from each range (network / broadcast IP) are unusable .0.64 – 209.1. If you convert this bit to a decimal number.Subnetting when given a required number of clients Example 1: A service provider has given you the Class C network range 209.11111111.1. which is the last possible IP address before you start the next range 209.255.1.11111111. All other bits can become network bits: New Mask = 11111111.50.0 (Class C subnet) The full binary representation of the subnet mask is as follows: 255.50. converted back to a binary number: New Mask = 11111111.50. Step 1) Determine the number of clients and convert to binary In this example.

0 Our increment bit is the last possible network bit.0 – 172.5.0.0. it becomes the number „2‟ Step 3) Use increment to find network ranges Start with your given network address and add your increment to the subnetted octet: 172.2.16.255.1111111 0.16. but that does not mean we cannot cross octet boundaries when working with Class A or B examples! In this example.0.16.254.3.4.0.16. converted back to a binary number: New Mask = 11111111.0 – 172. which is the last possible IP address before you start the next range 172.00000000.255 172.0 into as many subnets as possible.Example 2: Your company would like to break the Class B private IP address range 172.0 172.11111111.16. provided that they can get at least 300 clients per subnet Step 1) Determine the number of clients and convert to binary Remember.1.16. the binary representation of 300 = 100101100 Step 2) Reserve required bits in subnet mask and find incremental value The binary value of 300 clients tells us that we need at least 9 client bits to satisfy this requirement (since you cannot get the number 300 with any less than 9 bits – 100101100) Our original subnet mask is 255.16.11111111.0 – 172.11111111. the binary representations of 8 bits (a single octet of an IP address) can only reach 255. All other bits can become network bits: New Mask = 11111111.0 172.2.4.0 = 11111111.0 (Class B subnet) The full binary representation of the subnet mask is as follows: 255.16.255 172.255.255. If you convert this bit to a decimal number.00000000 note the 9 client bits that we have saved If we convert the mask back to decimal.0000000 – bit with the parenthesis is your increment bit.16.255 etc… You can then assign these ranges to your networks! Remember the first and last address from each range (network / broadcast IP) are unusable .0 etc… You can now fill in your end ranges. we now have the subnet mask that will be used on all the new networks – 255.00000000 We must ensure 9 of the client bits (0) remain client bits (save the clients!) in order to satisfy the requirements.111111(1)0.0.16.

1.1.1.Subnetting.168. fill in the end ranges to find the answer to the scenario: 192.1.32 – 192.11110000 As before.1.1.168. the last possible network bit is your increment.Given an IP address & Subnet Mask.168. the increment is 16 Use this increment to find the network ranges until you pass the given IP address: 192.168.16 192.168. all you need to do is break the subnet mask back into binary and find the increment that was used 255.168.168. find original network range (reverse engineering a subnet problem) You are given the following IP address and subnet mask: 192.63 (IP address 192.32 192.48 – 192.168.47 192.1.1.1. In this case.168.168.1.168.16 – 192.255.1.11111111.168.255.1.58) Now.15 192.168.0 – 192.58 belongs to this range) .1. Style 3 .1.64 (passed given IP address 192.168.255.168.0 192.48 192.240 Identify the original range of addresses (the subnet) that this IP address belongs to When reverse engineering a problem.11111111.31 192.168.1.58 255.1.240 = 11111111.255.

128. 63. For example. 2. you would assume it would take 5 bits since 31 in binary is: 0 0 0 1 1 1 1 1 However. 16. 127.The Great Exception This subnetting process works by finding the number of bits that are required to meet a given requirement. . 8. There is a similar rule for finding the number of bits to reserve for hosts. 64. The same thing happens with every “full” binary number: 3. figure it out for 64…and so on. For example. If you work out the subnetting problem by reserving only three bits. ADD 1 to the number Follow these rules and you‟ll always be safe. but we can still come up one short in certain cases. SUBTRACT 1 from the number When subnetting based on the number of hosts per network. I know that I‟ll need to save 5 bits as host bits to satisfy the requirement. So how do you avoid this issue? You can always subtract 1 from the number of networks required. figure it out for 29. For example. 4. 7). if you‟re asked to break a range into 25 hosts per subnet. For example. I realize this exception gets somewhat technical… so to summarize: When subnetting based on the number of networks. So how do you avoid this issue? You can always add 1 to the number of hosts required. 1. 5. 4. The fact that binary counting starts from zero helps us with one of those IP addresses. because binary numbering counts from zero. This rule works fine. If you‟re asked to break a range into 16 subnets. 32. 31. The same thing happens when breaking into networks for every “precise” binary number: 2. 6. 15. I know that I‟ll need to convert 5 bits to network bits to satisfy the requirement. 3. For example. figure it out for 15…and so on. there are exceptions to this rule. if I wanted to break a range into 25 hosts per network. you will get exactly eight subnets. but does not account for the two hosts that are unusable from every range: the network IP address and the broadcast IP address. when you work out the problem you‟ll find that you only get 30 hosts per subnet (1 IP address short). if I wanted to break a range into 25 networks. If you‟re asked to break a range into 63 subnets. 7. if we were asked to break a network into subnets that can hold up to 31 hosts. you can achieve this requirement with only three bits since 0-7 is really 8 numbers (0. you would assume it would take four bits since 8 in binary is: 0 0 0 0 1 0 0 0 However. For example. if I were asked to break a network into 8 subnets. figure it out for 26. if you‟re asked to break a range into 30 subnets. However.

- 11848_Ip Addressing Exercise
- Section 3
- Subnetting Tip Sheet
- NT Address Space Management
- Subnetting-2
- ESwitching Basic Switching
- Integer Representation
- 7.1.2.8 Lab - Using the Windows Calculator With Network Addresses
- MikroTik AP Setup
- IP fundamentails
- Twos Complement Primer
- TCP IP InterNetworking II
- Literature
- subnetting
- l2.pdf
- Untitled
- Ing Conocimiento.rtf
- Ica
- A Lecture 1-6Sep07 Compatibility Mode
- PBR Check Point
- Network Lab Manual(a & B)
- Binary Conversion
- Redundancy,repair
- LAB 8.”Binary Multiplier” in FPGA
- CT101_DataCommunication
- Side Channel MAC Keccak
- COMPUTER SYSTEM ARCHITECTURE1
- MANUAL DE AP C150BRS4 v3.0
- DHCP Relay Agent - Concept
- M.tech Final Project

Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

We've moved you to where you read on your other device.

Get the full title to continue

Get the full title to continue reading from where you left off, or restart the preview.

scribd