Professional Documents
Culture Documents
Subnetting
Subnetting is the process of borrowing bits from the HOST bits, in order to divide the
larger network into small subnets.
Host bits must are reassigned (or “borrowed”) as network bits.
The starting point is always the leftmost host bit.
Subnetting does NOT give you more hosts, but actually costs you hosts.
You lose two host IP Addresses for each subnet, and perhaps one for the subnet IP
address and one for the subnet broadcast IP address.
In older networks, you would have lost the first subnet, as the subnet IP address is the
same as the network IP address, and last subnet and all of its hosts’ IP addresses as the
broadcast for that subnet is the same as the broadcast for the network. (This subnet can
be used in most networks.)
Analogy
2
Page
Page
3
To create a subnet follow these steps:
1. Determine the number of required network IDs:
One for each subnet
One for each wide area network connection
2. Determine the number of required host IDs per subnet:
One for each TCP/IP host
One for each router interface
3. Based on the above requirements, create the following:
One subnet mask for your entire network
A unique subnet ID for each physical segment
A range of host IDs for each subnet
Detailed procedures or steps
1. Determine the required number of subnets.
2. Convert the number into binary.
3. Count the number of bits.
4. Verify:
• 2n ≥ no. of subnets required ( n = # of bits to borrow)
• 2m -2 ≥ max. no. of hosts (m = # of bits in the Host portion)
5. Determine the New Subnet Mask (NSM).
6. Determine the incrementing value (Δ).
7. Determine the Addresses.
Establishing the Subnet Mask Address
• Determines which part of an IP address is the network field and which part is the host
field.
• Follow these steps to determine the subnet mask:
1. Express the subnetwork IP address in binary form.
2. Replace the network and subnet portion of the address with all 1s.
3. Replace the host portion of the address with all 0s.
4. Convert the binary expression back to dotted-decimal notation.
• To determine the number of bits to be used, the network designer needs to calculate
how many hosts the largest subnetwork requires and the number of subnetworks
needed.
• The “slash format” is a shorter way of representing the subnet mask:
/25 represents the 25 one bits in the subnet mask 255.255.255.128
4
Page
Classless Inter-Domain Routing (CIDR)
It’s basically the method that ISPs (Internet service providers) use to allocate a number
of addresses to a company, a home—a customer.
When you receive a block of addresses from an ISP, what you get will look something
like this: 192.168.10.32/28. This is telling you what your subnet mask is. The slash
notation (/) means how many bits are turned on (1s).
The /8 through /15 can only be used with Class A network addresses. /16 through /23 can be
5
used by Class A and B network addresses. /24 through /30 can be used by Class A, B, and C
Page
network addresses.
Example:
IP Address: 192.168.50.0/24
No. of Subnets = 10 and Maximum no. of hosts = 8
Solution:
1. Determine the required number of subnets.
• 10 subnets
2. Convert the number into binary.
• 1010 = 10102
3. Count the number of bits.
• n=4
4. Verify:
• 2n ≥ no. of subnets required (n = 4)
24 = 16 ≥ 10 subnets
• 2m -2 ≥ max. no. of hosts (m = 8 – 4 = 4)
24 - 2 = 14 ≥ 8 hosts
2. Determine the New Subnet Mask (NSM).
• 11111111●11111111●11111111●11110000 note: 1 – network and 0 – host
• 255.255.255.240 – NSM
3. Determine the incrementing value (Δ).
• Δ = 16 (128 64 32 16 8 4 2 1)
4. Determine the Addresses.
• 0 – 192.168.50.0 /28 4 – 192.168.50.64 /28 8 – 192.168.50.128 /28
• 1 – 192.168.50.16 /28 5 – 192.168.50.80 /28
• 2 – 192.168.50.32 /28 6 – 192.168.50.96 /28
• 3 – 192.168.50.48 /28 7 – 192.168.50.112 /28 15 – 192.168.50.240 /28
Solution:
The borrowed bits become part of my subnet mask/prefix (we borrowed 1 bit)
Before subnetting /24 (255.255.255.0)
After subnetting /25 (255.255.255.128)
- 25 bit is NW portion & 7 bits is Host portion
How many hosts can I have per subnet?
- 2m – 2
- m = # of bits in the Host portion
So for our example:
- 2m – 2
- m=7
- Therefore we can have 126 hosts (128 – 2)
- (We needed 125)
Subnetting
Our previous network was 192.168.1.0 /24
How does our new networks look like?
- 192.168.1.00000000 /25 or 192.168.1.0 /25
- 192.168.1.10000000 /25 or 192.168.1.128 /25
And there special addresses?
- Network/subnet 192.168.1.0 /25
- Broadcast 192.168.1.01111111 or 192.168.1.127
- Host range 192.168.1.00000001 – 01111110 or .1 - .126
So how about the other subnet – you calculate:
- Network/subnet 192.168.1.128 /25
- Broadcast 192.168.1.11111111 or 192.168.1.255
- Host range 192.168.1.10000001 – 11111110 or .129 - .254
8
Page
Another Subnetting exercise
You have 192.168.1.0 /24 and want 6 subnets
Calculate
- 6 subnets with prefix
- Broadcast address for each subnet
- Host range for each subnet
Example 1:
192.168.10.0/27 192.168.10.32/27
25 hosts 20 hosts
Network A Network B
192.168.10.92/30
192.168.10.88/30
192.168.10.100/30
192.168.10.96/30
6 hosts 12 hosts
Network D Network C
192.168.10.80/29 192.168.10.64/28
G 2 4 /30 252
2 4 /30 252
Page
H
Example 2:
Example 3:
Example 4:
Which Network Prefix will work with the IP addressing Scheme shown? 11
Page
Example 5:
Which IPv4 Subnetted addresses represent host addresses?
192.168.4.127/26
192.168.4.155/26
192.168.4.193/26
192.168.4.95/27
192.168.4.159/27
192.168.4.207/27
Example 6:
The Big Five Questions
1. How many Subnets ?
2n = number of subnets , n = no. of bits borrow
2. How many Hosts per Subnets?
2m -2 , m = no. of bits in the host portion
3. What are the valid subnets ?
256 – subnet mask = Block size or increment number
4. What is the broadcast address of each subnet ?
The number right before the next subnet
5. What are the valid hosts ?
Valid hosts are the numbers between the subnets , omitting all0’s and all 1’s
Example 7:
Calculate & Assign Addresses
12
Page
Example 8:
Calculate Addresses for Host Requirements.
Example 9:
Using the following options, select the necessary IP addresses that would accurately complete
the network depicted in the exhibit. (Choose three)
Example 10:
You are designing an IP addresses scheme for your brand-new remote office. The vice president
of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies
you with a single subnetwork with 62 hosts. You need to have at least two subsets with 14 host
in each subnet. What custom subnet mask should use?
13
Page
Example 11:
Given the subnet 10.5.12.0/22, which of the following IP addresses residing within the network?
(Choose three)
Example 12:
Example 13:
Example 14:
14
Page
Example 15:
Identify three valid addresses in any subnet of the 201.168.27.0 network, assuming a fixed
subnet mask of 255.255.255.240. (Choose three)
Example 16:
TooCow University has acquired the 150.60.130.0/24 public address from the local ISP to use
in its campus network. Each building has a specific number of devices that are required to be
publicly accessible, as shown in the exhibit.
Which of the following subnets would accommodate the network shown? (choose 4)
Example 17:
You have been allocated the address space 174.82.10.0/24 for the network shown in the exhibit.
All devices in this network are required to use the same subnet mask, and all subnets are
considered usable.
What is the most appropriate subnet mask for the network that is shown?
15
Page
Example 18:
You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with
a /30 mask for connections between your routers. Your boss asks you how many usable
subnetworks and usable host addresses per subnet this will provide.
What should you tell her, assuming your router can use all possible subnets?
Example 19:
After the routers shown in the exhibit have been configured, it is discovered that the hosts in the
branch office network cannot access the internet. Further testing reveals connectivity issues.
What is the most likely solution to this problem?
16
Page