Professional Documents
Culture Documents
CALCULATION
PREFACE
Welcome to the world of IP subnetting, a fundamental skill that lies at the heart of modern
networking. As networks continue to grow in complexity and scale, efficient IP address
allocation, network segmentation, and management have become essential for building robust
and adaptable infrastructures. This book is your comprehensive guide to understanding,
mastering, and applying the art of IP subnetting across various network environments.
Subnetting is not just a technical exercise—it's a strategic approach to designing and managing
networks. It allows you to allocate IP addresses intelligently, avoid IP address conflicts, and
enable efficient routing. Subnetting is the cornerstone of network architecture, making it possible
to support diverse applications, ensure data privacy, and adapt to evolving technological trends.
This book is your comprehensive resource for mastering IP subnetting. It covers a wide
spectrum of topics, from the fundamentals of IP addressing and subnet masks to advanced
techniques like Variable Length Subnetting (VLSM). You'll gain a deep understanding of
subnetting concepts, binary conversion, CIDR notation, and more. Each chapter presents
real-world scenarios, hands-on exercises, and detailed explanations to reinforce your learning.
As you embark on this subnetting journey, remember that subnetting is not merely about
calculations—it's about understanding the principles, mastering the techniques, and applying
them to real-world scenarios. By the time you reach the end of this book, you'll possess the
knowledge and confidence to subnet networks of varying sizes, troubleshoot subnetting issues,
and design networks that are optimized for efficiency, security, and scalability.
Get ready to explore the intricacies of IP subnetting, unlock the potential of efficient network
management, and elevate your networking prowess to new heights. Your journey to mastering
IP subnetting starts now.
Table of Contents:
1. Introduction to IP Subnetting
1.1 What is Subnetting?
1.2 Why Subnetting is Important
1.3 Benefits of IP Subnetting
3. Classful IP Addressing
3.1 Overview of Classful Addressing
3.2 Class A Address Range and Characteristics
3.3 Class B Address Range and Characteristics
3.4 Class C Address Range and Characteristics
14. Conclusion
14.1 Summary of Key Takeaways
14.2 Empowering Your Subnetting Skills
Appendices:
A. IP Subnetting Reference Chart
B. Binary Conversion Quick Guide
C. Subnetting Tools and Resources
Glossary
This e-book will guide readers through the intricacies of IP subnetting with a focus on
Class A, Class B, and Class C networks. With comprehensive explanations, detailed
examples, and practical exercises, readers will gain a solid understanding of subnetting
principles and develop the skills needed to confidently design and manage IP networks.
Whether you're a networking professional or a student, this e-book will help you master
the art of IP subnetting and pave the way for efficient network management.
Chapter 1
Introduction to IP Subnetting
1.1 What is Subnetting?
Subnetting is a crucial skill for network administrators, engineers, and anyone involved
in the design, implementation, and maintenance of IP networks. It enables you to:
- **Plan for Scalability:** Subnetting facilitates future network growth by enabling you to
allocate address space more effectively as your network expands.
- **Improved Network Security:** By segmenting different parts of your network, you can
implement access controls and security measures more effectively, reducing the attack
surface.
- **Granular Traffic Control:** Subnets enable you to control and prioritize network traffic
based on specific needs, enhancing the overall quality of service.
As you delve into the subsequent chapters, you'll gain a deep understanding of the
mechanics of IP subnetting, how it applies to different IP address classes, and how to
perform subnetting calculations with practical examples. With this knowledge, you'll be
well-equipped to create robust and optimized IP networks that meet the demands of
modern networking environments.
Chapter 2
Understanding IP Addresses and Subnet
Masks
2.1 IPv4 Addressing Basics
IPv4 (Internet Protocol version 4) addresses are numerical labels assigned to devices
on a network, allowing them to communicate with each other over the Internet or private
networks. An IPv4 address consists of four octets, each represented by a decimal
number ranging from 0 to 255. For example, an IP address might look like:
192.168.1.10.
IP addresses are divided into classes based on their initial bits, which dictate the range
of addresses available for each class. The main classes are Class A, Class B, and
Class C, each with varying ranges and address allocation characteristics.
A subnet mask is a 32-bit binary value that accompanies an IP address and defines the
network and host portions of the address. It is used to determine which part of an IP
address represents the network identifier and which part represents the host identifier.
Subnet masks are usually expressed in the dotted decimal notation, just like IP
addresses.
The subnet mask consists of two parts: network bits and host bits. Network bits identify
the network portion of the IP address, while host bits identify the specific device within
that network. Subnet masks are used in conjunction with IP addresses to determine
whether two devices are on the same local network or whether communication requires
routing through intermediate networks.
In the early days of networking, IP addresses were divided into classes to facilitate
address allocation. These classes, denoted by the first few bits of an IP address, helped
determine the address range available for each class. Classful addressing comprises
four main classes: A, B, C, and D (with a fifth, E, reserved for experimental purposes).
Each class has a specific range of addresses and a default subnet mask. The class
determines the number of network and host bits in the address, which in turn influences
the number of available networks and hosts within each network. While classful
addressing is no longer the primary method for address allocation, understanding it is
crucial for comprehending the historical context of IP subnetting.
Class A addresses are designed for large networks. The first bit of a Class A address is
always 0, and the range spans from 0.0.0.0 to 127.255.255.255. Class A addresses use
the first octet to represent the network, and the remaining three octets for host
addresses. This results in a whopping 16 million possible hosts per network.
The default subnet mask for Class A addresses is 255.0.0.0, providing a single, large
network. Due to the vast address space, Class A addresses were typically allocated to
universities, corporations, and large organizations.
Class B addresses cater to medium-sized networks. The first two bits of a Class B
address are always 10, and the range spans from 128.0.0.0 to 191.255.255.255. In
Class B addresses, the first two octets denote the network, and the last two octets
represent the hosts.
The default subnet mask for Class B addresses is 255.255.0.0. This allows for around
65,000 possible hosts per network, making it suitable for organizations that require a
moderate number of hosts.
3.4 Class C Address Range and Characteristics
Class C addresses are intended for smaller networks. The first three bits of a Class C
address are always 110, and the range spans from 192.0.0.0 to 223.255.255.255. In
Class C addresses, the first three octets indicate the network, and the final octet is used
for hosts.
The default subnet mask for Class C addresses is 255.255.255.0. This configuration
offers approximately 254 hosts per network, making it suitable for small businesses and
home networks.
Subnetting is the process of dividing a larger IP network into smaller, more manageable
subnetworks or subnets. This enables efficient utilization of IP addresses and enhances
network performance, security, and management. Subnetting involves borrowing bits
from the host portion of the IP address to create subnets, each with its own network and
host range.
The concept of subnetting applies to all IP address classes (A, B, and C) but is
particularly relevant for Class A, B, and C networks. By subnetting these classes, you
can create subnets tailored to the size and requirements of your organization.
Class A, B, and C addresses have varying address spaces, with different combinations
of network and host bits. Subnetting these classes involves redistributing these bits to
create subnets of different sizes, each accommodating a specific number of hosts.
In Class A:
- The first octet represents the network.
- The remaining three octets are for hosts.
In Class B:
- The first two octets represent the network.
- The last two octets are for hosts.
In Class C:
- The first three octets denote the network.
- The final octet is for hosts.
4.3 CIDR Notation and Its Importance
CIDR notation is crucial for efficient address allocation and routing. It enables network
administrators to allocate address space precisely based on the size of the network,
eliminating wastage of IP addresses. Additionally, CIDR notation is used for route
summarization, which simplifies routing tables and enhances network scalability.
As you progress through this e-book, you'll delve deeper into the art of subnetting Class
A, B, and C networks. You'll learn subnetting techniques, calculation methods, and
strategies for creating subnets that align with your organization's requirements. Practical
examples and exercises will solidify your understanding, empowering you to optimize IP
address usage and design networks that are efficient, secure, and scalable.
Chapter 5
Subnetting Class A Networks
5.1 Subnetting Concepts for Class A
Subnetting a Class A network involves breaking down the extensive address space of
the class into smaller, more manageable subnets. Class A addresses have a default
subnet mask of 255.0.0.0, which designates the first octet for the network identifier and
the remaining three octets for hosts. However, subnetting allows you to customize the
subnet mask, borrowing bits from the host portion to create subnets.
1. **Define Subnetting Requirements:** Determine how many subnets you need and the
number of hosts per subnet. Consider factors like network growth and efficient address
allocation.
2. **Calculate Subnet Bits:** Identify the number of bits required to represent the
desired number of subnets. The formula 2^x (where x is the number of subnet bits)
gives you the number of subnets.
3. **Determine Host Bits:** Calculate the number of host bits left after allocating subnet
bits. This will help determine the number of hosts available per subnet.
4. **Create Subnet Mask:** Calculate the custom subnet mask by extending the default
network portion with the subnet bits.
5. **Calculate Subnet Ranges:** Determine the range of valid IP addresses for each
subnet based on the subnet mask and subnet bits.
As you delve into the provided subnetting examples and exercises, you'll develop the
skills needed to confidently subnet Class A networks. This proficiency will empower you
to architect networks that are scalable, well-organized, and tailored to your
organization's requirements.
Chapter 6
Subnetting Class B Networks
6.1 Subnetting Concepts for Class B
Subnetting Class B networks involves partitioning the address space of the class into
smaller subnets, each with its own network and host range. Class B addresses have a
default subnet mask of 255.255.0.0, where the first two octets represent the network
identifier, and the last two octets are for hosts. Subnetting allows you to customize the
subnet mask by borrowing bits from the host portion to create subnets that suit your
network's needs.
2. **Calculate Subnet Bits:** Determine the number of bits required for the subnet
portion based on the desired number of subnets.
3. **Identify Host Bits:** Calculate the remaining host bits after allocating subnet bits to
determine the number of hosts per subnet.
4. **Create Custom Subnet Mask:** Combine the default network bits with the additional
subnet bits to create a custom subnet mask.
5. **Calculate Subnet Ranges:** Determine the valid IP address range for each subnet
based on the subnet mask and subnet bits.
Imagine you have a Class B network with IP address 172.16.0.0 and you need 16
subnets, each accommodating 500 hosts.
Subnetting Class C networks involves dividing the address space of the class into
smaller subnets, each with its own network and host range. Class C addresses have a
default subnet mask of 255.255.255.0, where the first three octets represent the
network identifier, and the final octet is for hosts. Subnetting allows you to customize the
subnet mask by borrowing bits from the host portion, creating subnets that suit your
network's requirements.
Subnetting Class C networks follows a similar process to subnetting Class A and Class
B networks. The steps include:
2. **Calculate Subnet Bits:** Identify the number of bits needed for the subnet portion
based on the desired number of subnets.
3. **Calculate Host Bits:** Calculate the remaining host bits after allocating subnet bits
to determine the number of hosts per subnet.
4. **Create Custom Subnet Mask:** Combine the default network bits with the additional
subnet bits to form a custom subnet mask.
5. **Calculate Subnet Ranges:** Determine the valid IP address range for each subnet
based on the subnet mask and subnet bits.
Suppose you have a Class C network with IP address 192.168.1.0 and you need 8
subnets, each accommodating 30 hosts.
Through this example, you'll gain practical experience in subnetting Class C networks.
This knowledge will equip you to design and manage networks effectively, even in
scenarios where smaller subnets are required. Subnetting Class C networks is a
valuable skill for creating efficient, focused network segments that cater to the specific
needs of your organization.
Chapter 8
Variable Length Subnetting
8.1 Introduction to Variable Length Subnet Masks (VLSM)
VLSM can be applied to all IP address classes (A, B, and C) to optimize address
allocation. The key steps in applying VLSM include:
2. **Sort Subnets by Size:** Arrange subnets in descending order based on the number
of hosts required. This allows for efficient allocation of address space.
3. **Allocate Subnet Mask Lengths:** Assign appropriate subnet mask lengths to each
subnet. Larger subnets receive shorter masks, while smaller subnets get longer masks.
4. **Calculate Subnet Ranges:** Determine the range of valid IP addresses for each
subnet based on the subnet mask length.
VLSM excels in complex network environments where subnets have diverse size
requirements. It allows you to allocate IP addresses efficiently while minimizing
wastage. Some advanced scenarios where VLSM shines include:
- **Private and Public Address Allocation:** Separating private and public IP address
spaces within an organization.
By mastering VLSM, you gain the ability to design intricate networks that effectively
utilize IP address space and accommodate a wide range of network sizes. This
advanced technique empowers you to create network architectures that are both
efficient and flexible, supporting your organization's growth and connectivity needs. As
you delve into VLSM in this chapter, you'll expand your subnetting toolkit and enhance
your network design capabilities.
Chapter 9
Address Allocation and Design Best
Practices
9.1 Optimizing IP Address Usage
Efficient IP address allocation is crucial to ensure that address space is used effectively.
Consider the following best practices:
- **Plan for Future Growth:** Allocate addresses with future expansion in mind. Avoid
overly conservative allocation that may lead to address exhaustion.
- **Minimize Wastage:** Avoid allocating large subnets for small numbers of hosts.
Utilize smaller subnets and longer subnet masks when appropriate.
Designing networks that can scale as your organization grows is essential. Consider the
following practices:
- **Reserve Address Blocks:** Set aside address blocks for future network expansion,
preventing address depletion and the need for address renumbering.
- **Use of Access Control Lists (ACLs):** Implement ACLs to control traffic between
subnets and enforce security policies.
Proper monitoring and management are essential for maintaining a healthy network:
- **Redundant Subnet Design:** Create redundant subnets and allocate addresses for
failover scenarios to maintain network availability.
Subnetting, while a powerful tool, can sometimes lead to errors that impact network
functionality. Recognizing and addressing these mistakes is crucial for maintaining a
well-functioning network:
- **Incorrect Subnet Mask:** Using the wrong subnet mask can result in misallocated
addresses and connectivity issues. Always double-check subnet masks.
- **Overlapping Subnets:** Overlapping subnets can cause routing conflicts and lead to
communication breakdowns. Carefully design subnets to avoid overlaps.
- **Check Subnetting Configuration:** Verify that the subnet masks and IP addresses of
devices are correctly configured according to your subnetting plan.
- **Ping and Trace Routes:** Use ping and traceroute commands to diagnose
connectivity issues and identify potential points of failure.
- **Examine Routing Tables:** Investigate routing tables to ensure routes are correctly
configured and packets are being directed to the appropriate subnets.
When subnetting issues arise, it's important to identify the root cause and take
corrective action:
- **Review Subnetting Design:** Assess your subnetting plan to identify any mistakes or
inconsistencies in subnet mask lengths, IP address assignments, and subnet allocation.
- **Subnetting Calculator Tools:** Leverage subnetting calculator tools to quickly verify
subnet mask calculations and IP address ranges.
Utilizing network monitoring and troubleshooting tools can simplify the process of
identifying and resolving subnetting-related issues:
- **Network Analyzers:** Network analyzers can capture and analyze network traffic,
helping you diagnose connectivity problems and pinpoint their causes.
- **Packet Capture Tools:** Packet capture tools allow you to inspect individual packets,
aiding in the detection of misconfigured addresses or routing issues.
Hands-on practice is essential to solidify your subnetting skills. This chapter presents a
series of practical subnetting exercises that cover a range of scenarios and
complexities. Each exercise is designed to challenge your understanding of subnetting
concepts and calculation techniques.
For each exercise, detailed solutions and explanations are provided. These
walkthroughs guide you step-by-step through the process of subnetting, including
determining subnet mask lengths, calculating subnet ranges, and allocating IP
addresses. Clear explanations help you understand the reasoning behind each
calculation, enhancing your mastery of subnetting principles.
As you work through the exercises and review the solutions, you'll gain confidence in
your subnetting abilities. These practical scenarios simulate real-world subnetting
challenges, preparing you to tackle a wide range of scenarios in your own networking
endeavors.
Remember that subnetting is a skill that improves with practice. The more you engage
with subnetting exercises and hone your calculations, the more proficient you'll become
at efficiently designing, managing, and troubleshooting IP networks. By mastering
subnetting through hands-on practice, you'll be well-prepared to take on the
complexities of network architecture and effectively optimize IP address utilization.
Chapter 12
Subnetting in Real-World Scenarios
12.1 Subnetting in Enterprise Networks
Enterprise networks vary in size and complexity, and subnetting plays a vital role in
optimizing their functionality:
- **Guest Networks:** Creating separate subnets for guest access ensures that guest
traffic is isolated from the main network, reducing security risks.
- **VoIP and Video Conferencing:** Designing subnets specifically for voice and video
traffic prioritizes quality of service and ensures seamless communication.
Data centers host critical infrastructure, and subnetting contributes to their efficiency
and reliability:
- **Server Farms:** Subnetting server farms ensures that different types of servers (web
servers, database servers, etc.) are isolated, enhancing security and resource
allocation.
- **Load Balancing:** Subnetting helps distribute traffic across redundant systems and
load balancers, minimizing downtime.
- **Public and Private Subnets:** Cloud environments often use public and private
subnets to control access to resources and provide security layers.
The transition to IPv6 addresses the limitations of IPv4, which include address
exhaustion and the need for complex subnetting. IPv6 offers an enormous address
space, reducing the need for frequent subnetting. With a 128-bit address format, IPv6
provides trillions of addresses, accommodating the growing number of devices and
Internet of Things (IoT) devices.
- **Software-Defined Networking (SDN):** SDN allows for more flexible and on-the-fly
subnetting adjustments to cater to changing network demands.
13.5 Network Segmentation and Security
As networks become more complex, subnetting remains crucial for security and
performance:
- **Zero Trust Architecture:** Zero Trust relies on subnetting to enforce strict access
controls and verify the identity of every device on the network.
- **Edge Computing Subnets:** Edge devices require localized subnetting for efficient
data processing and reduced latency.
- **IPv6 in 5G:** IPv6 is a natural fit for 5G networks due to its address space and
efficiency, supporting the massive number of devices and connections.
- **IPv6 for IoT:** IPv6's vast address space is crucial for accommodating the countless
IoT devices that will be connected.
- **Subnetting IoT Networks:** Subnetting will play a role in segregating and managing
different types of IoT devices.
- Understanding the differences between IP address classes and their subnet masks.
- Grasping binary representation for IP addresses and subnet masks.
- Calculating subnet ranges and designing subnets tailored to specific requirements.
- Employing Variable Length Subnetting (VLSM) for precise IP address allocation.
- Applying subnetting in various real-world scenarios, from enterprise networks to cloud
environments.
- Embracing the future of IP addressing, including IPv6 adoption, virtualization, and IoT
integration.
Armed with the knowledge and skills gained from this e-book, you're well-equipped to
embark on a subnetting journey that will shape your career as a network professional.
Whether you're designing networks for enterprises, data centers, or cloud environments,
subnetting will be your tool for creating efficient, secure, and scalable network
architectures.
Thank you for accompanying us on this subnetting adventure. Best of luck on your
networking endeavors!
Appendices
IP Subnetting Reference Chart
Appendix A: IP Address Classes and Default Subnet Masks
In this section, you'll find a handy subnetting cheat sheet that summarizes key
subnetting concepts, calculation formulas, and steps for subnetting Class A, B, and C
networks. This reference will help you perform subnetting calculations more efficiently.
While this e-book primarily focuses on IPv4 subnetting, IPv6 is also a significant
consideration for modern networking. This appendix briefly introduces IPv6 subnetting
concepts and provides an overview of IPv6 subnetting practices.
For readers seeking additional practice beyond the practical subnetting exercises
covered in the main chapters, this appendix provides supplementary subnetting
exercises along with detailed solutions and explanations. This extra practice will help
you reinforce your subnetting proficiency.
Subnetting calculator tools are invaluable for simplifying subnetting calculations. In this
section, we provide a list of useful online subnetting calculators that can assist you in
performing subnetting calculations quickly and accurately.
Converting binary numbers to decimal form is a key skill for subnetting calculations.
This appendix offers a step-by-step guide to converting binary numbers to their decimal
equivalents, ensuring accuracy in your subnetting calculations.
While this e-book focuses primarily on IPv4 subnetting, IPv6 is also a significant
consideration in modern networking. This appendix briefly introduces IPv6 binary
notation, outlining how IPv6 addresses are represented in binary form.
For readers looking to delve deeper into binary notation, subnetting, and related
networking concepts, this appendix provides a list of recommended resources. These
resources offer additional explanations, exercises, and tools to enhance your binary
conversion skills.
Binary conversion calculators and tools can expedite your subnetting calculations. In
this part, you'll find a list of online tools that allow you to convert between binary and
decimal representations quickly and accurately.
This appendix features a curated list of online subnetting calculators that simplify the
subnetting process. These calculators assist you in determining subnet masks, IP
address ranges, and other subnetting-related calculations accurately and efficiently.
IP Address Management (IPAM) tools play a crucial role in tracking and managing IP
addresses and subnets. This section provides information about popular IPAM tools that
help streamline IP address allocation, monitoring, and maintenance in large-scale
networks.
Effective network monitoring and troubleshooting are essential for maintaining a healthy
network environment. This part presents a selection of network monitoring and
troubleshooting tools that aid in diagnosing subnetting-related issues and ensuring
network performance.
For readers seeking in-depth knowledge on subnetting and networking, this appendix
offers a compilation of recommended books, reference materials, and publications.
These resources delve into subnetting concepts, IP addressing, and network design,
enhancing your understanding of the subject.
Continuous learning is crucial for keeping up with evolving networking practices. This
section lists online courses and tutorials that cover subnetting, IP addressing, and
related networking topics. These resources provide structured learning experiences to
enhance your subnetting skills.
Appendix F: Networking Forums and Communities
Engaging with networking communities and forums can provide valuable insights,
advice, and solutions. In this part, you'll find a collection of online forums and
communities where you can connect with fellow network professionals to discuss
subnetting challenges and share experiences.
Networking certifications validate your expertise and skills in subnetting and other
networking domains. This appendix outlines reputable certification programs, such as
CompTIA Network+, Cisco CCNA, and more, that can bolster your subnetting
knowledge and career prospects.
This section offers a diverse range of supplementary resources, including blogs, video
tutorials, podcasts, and online tools, that can further expand your subnetting toolkit and
keep you updated with the latest networking trends and practices.
- Default Gateway: A device or router on a network that serves as an entry and exit
point for data traffic to and from other networks.
- IPv4 (Internet Protocol version 4): The fourth iteration of the Internet Protocol, which
uses 32-bit addresses to identify devices on a network.
- IPv6 (Internet Protocol version 6): The sixth iteration of the Internet Protocol, which
uses 128-bit addresses to provide a larger address space and accommodate the
growing number of devices on the Internet.
- Subnet Mask: A numerical value used to divide an IP address into a network portion
and a host portion. It defines the size of the subnet and distinguishes network and host
addresses.
- Variable Length Subnetting (VLSM): A subnetting technique that enables the allocation
of different subnet mask lengths to different subnets within the same network class,
allowing for efficient address space utilization.
- Virtual LAN (VLAN): A network segmentation technique that groups devices into
logical network segments, regardless of their physical location, to improve network
performance, security, and management.
- Zero Trust Architecture: A security concept that assumes no entity, whether inside or
outside the network, can be trusted by default, and security measures are implemented
at all levels of network access.
This glossary provides concise definitions of key terms used throughout the book.
Familiarizing yourself with these terms will enhance your understanding of subnetting
concepts and networking practices.
IP Subnetting
Calculation Practice
Example
Exercise 1: Subnetting a Class C Network (Small Number of Hosts)
**Scenario:**
You have been assigned the IP address 192.168.1.0/24 to create subnets for three
departments. Department A requires 20 hosts, Department B requires 12 hosts, and
Department C requires 8 hosts.
**Solution:**
1. **Calculate Subnet Bits:**
To accommodate 20 hosts, you need at least 5 host bits (2^5 = 32 > 20). The subnet
mask will be 255.255.255.224, with 3 subnet bits.
2. **Allocate Subnets:**
- Department A: 192.168.1.0/27 (Subnet Range: 192.168.1.0 - 192.168.1.31)
- Department B: 192.168.1.32/28 (Subnet Range: 192.168.1.32 - 192.168.1.47)
- Department C: 192.168.1.48/29 (Subnet Range: 192.168.1.48 - 192.168.1.55)
**Scenario:**
You have a Class B network with the IP address 172.16.0.0/16. You need to create
subnets for five departments with the following host requirements: A - 60 hosts, B - 30
hosts, C - 20 hosts, D - 15 hosts, E - 10 hosts.
**Solution:**
1. **Calculate Subnet Bits:**
To accommodate 60 hosts, you need at least 6 host bits (2^6 = 64 > 60). The subnet
mask will be 255.255.255.192, with 2 subnet bits.
2. **Allocate Subnets:**
- Department A: 172.16.0.0/26 (Subnet Range: 172.16.0.0 - 172.16.0.63)
- Department B: 172.16.0.64/27 (Subnet Range: 172.16.0.64 - 172.16.0.95)
- Department C: 172.16.0.96/28 (Subnet Range: 172.16.0.96 - 172.16.0.111)
- Department D: 172.16.0.112/28 (Subnet Range: 172.16.0.112 - 172.16.0.127)
- Department E: 172.16.0.128/28 (Subnet Range: 172.16.0.128 - 172.16.0.143)
Exercise 3: Subnetting a Class C Network (Medium Number of Hosts)
**Scenario:**
You have the IP address 192.168.2.0/24 for a Class C network. You need to create
subnets for three departments with the following host requirements: A - 25 hosts, B - 15
hosts, C - 10 hosts.
**Solution:**
1. **Calculate Subnet Bits:**
To accommodate 25 hosts, you need at least 5 host bits (2^5 = 32 > 25). The subnet
mask will be 255.255.255.224, with 3 subnet bits.
2. **Allocate Subnets:**
- Department A: 192.168.2.0/27 (Subnet Range: 192.168.2.0 - 192.168.2.31)
- Department B: 192.168.2.32/28 (Subnet Range: 192.168.2.32 - 192.168.2.47)
- Department C: 192.168.2.48/28 (Subnet Range: 192.168.2.48 - 192.168.2.63)
**Scenario:**
You have a Class B network with the IP address 10.0.0.0/16. You need to create
subnets for four departments with the following host requirements: A - 200 hosts, B -
100 hosts, C - 80 hosts, D - 50 hosts.
**Solution:**
1. **Calculate Subnet Bits:**
To accommodate 200 hosts, you need at least 8 host bits (2^8 = 256 > 200). The
subnet mask will be 255.255.255.0, with 0 subnet bits.
2. **Allocate Subnets:**
- Department A: 10.0.0.0/24 (Subnet Range: 10.0.0.0 - 10.0.0.255)
- Department B: 10.0.1.0/24 (Subnet Range: 10.0.1.0 - 10.0.1.255)
- Department C: 10.0.2.0/24 (Subnet Range: 10.0.2.0 - 10.0.2.255)
- Department D: 10.0.3.0/24 (Subnet Range: 10.0.3.0 - 10.0.3.255)
Exercise 5: Variable Length Subnetting in Class A Network (Large Number of
Hosts)
**Scenario:**
You have a Class A network with the IP address 8.0.0.0/8. You need to create subnets
for five departments with varying host requirements: A - 1000 hosts, B - 500 hosts, C -
300 hosts, D - 200 hosts, E - 100 hosts.
**Solution:**
1. **Calculate Subnet Bits:**
For the largest subnet requiring 1000 hosts, you need at least 10 host bits (2^10 =
1024 > 1000). The subnet mask will be 255.255.252.0, with 10 subnet bits.
2. **Allocate Subnets:**
- Department A: 8.0.0.0/22 (Subnet Range: 8.0.0.0 - 8.0.3.255)
- Department B: 8.0.4.0/23 (Subnet Range: 8.0.4.0 - 8.0.5.255)
- Department C: 8.0.6.0/24 (Subnet Range: 8.0.6.0 - 8.0.6.255)
- Department D: 8.0.7.0/24 (Subnet Range: 8.0.7.0 - 8.0.7.255)
- Department E: 8.0.8.0/25 (Subnet Range: 8.0.8.0 - 8.0.8.127)
These exercises provide a range of subnetting scenarios for Class A, Class B, and
Class C networks, catering to different host requirements. The detailed solutions and
explanations illustrate the step-by-step process of calculating subnet masks, allocating
subnets, and determining IP address ranges.
VLSM IP Subnetting for an example:
You have been assigned the IP address 192.168.0.0/24 to create subnets for a network
infrastructure that includes four departments and a guest network. The departments
have varying host requirements: Department A - 50 hosts, Department B - 25 hosts,
Department C - 15 hosts, Department D - 10 hosts. The guest network requires 5 hosts.
**Solution:**
2. **Allocate Subnets:**
- Department A: Subnet Mask 255.255.255.192 (/26)
- Subnet Range: 192.168.0.0 - 192.168.0.63
- Usable IP Range: 192.168.0.1 - 192.168.0.62
4. **Allocate Subnets:**
- Department B: Subnet Mask 255.255.255.224 (/27)
- Subnet Range: 192.168.0.64 - 192.168.0.95
- Usable IP Range: 192.168.0.65 - 192.168.0.94
6. **Allocate Subnets:**
- Department C: Subnet Mask 255.255.255.240 (/28)
- Subnet Range: 192.168.0.96 - 192.168.0.111
- Usable IP Range: 192.168.0.97 - 192.168.0.110
By applying VLSM, we've efficiently allocated subnets that cater to the specific host
requirements of each department and the guest network, optimizing IP address
utilization.