IP Subnetting - The Basic Concepts

Introduction

Introduction ? We already did that in the previous page :)

Let's get stuck right into this cool topic !

What is Subnetting ?

When we Subnet a network, we basically split it into smaller networks. For example, when a set of IP Addresses is given to a company, e.g 254 they might want to "break" (the correct term is "partition") that one network into smaller ones, one for each department. This way, their Technical department and Management department can each have a small network of their own. By subnetting the network we can partition it to as many smaller networks as we need and this also helps reduce traffic and hides the complexity of the network.

By default, all type of Classes (A, B and C) have a subnet mask, we call it the "Default Subnet mask". You need to have one because:

1) All computers need the subnet mask field filled when configuring IP

2) You need to set some logical boundaries in your network

3) You should at least enter the default subnet mask for the Class you're using

In the previous pages I spoke about IP Classes, Network IDs and Host IDs, the fact is that the Subnet mask is what determines the Network ID and Host ID portion of an IP Address.

The table below shows clearly the subnetmask that applies for each network Class.

When dealing with subnet masks in the real world, we are free in most cases to use any type of subnet mask in order to meet our needs. If for example we require one network which can contain up to 254 computers, then a Class C network with its default subnet mask will do fine, but if we need more, then we might consider a Class B network with its default subnet mask.

Note that the default subnet masks have been set by the IEEE committee, the same guys that set and approve the different standards and protocols.

We will have a closer look at this later on and see how we can achieve a Class C network with more than 254 hosts.

Understanding the concept

Let's stop here for one moment and have a look at what I mean by partitioning one network into smaller ones by using different subnet masks.

The picture below shows our example network (192.168.0.0). All computers here have been configured with the default Class C subnet mask (255.255.255.0):

Because of the subnet mask we used, all these computers are part of the one network marked in blue. This also means that any one of these hosts (computers, router and server) can communicate with each other.

If we now wanted to partition this network into smaller segments, then we would need to change the subnet mask appropriately so we can get the desired result. Let's say we needed to change the subnet mask from 255.255.255.0 to 255.255.255.224 on each configured host.

The picture below shows us how the computers will see the network once the subnet mask has changed:

In reality, we have just created 8 networks from the one large (blue) network we had, but I am keeping things simple for now and showing only 2 of these smaller networks because I want you to understand the concept of subnetting and see how important the subnet mask is.

In the next pages which are to follow I will analyse in great depth the way subnetting works and how to calculate it. It is very important that you understand the concepts introduced in this section, so make sure you do, before continuing !

 

 

Back

Top

Next - Subnet masks and Their Effect

 

 
  Networking Menu  
    Firewall    
    Networking    
    Cabling    
    Protocols    
    Routing     
    Routers    
    Ethernet      
    Fast Ethernet    
 
   Introduction   
   Introduction   
   Introduction   
   Firewall Topologies   
   Firewall Topologies   
   Firewall Topologies   
   The DMZ Zone   
   The DMZ Zone   
   The DMZ Zone   
   DoS & DDoS Attacts   
   DoS & DDoS Attacts   
   DoS & DDoS Attacts   
   Locking Win9x
   Locking Win9x
   Locking Win9x
   Network Add Translation   
   Network Add Translation   
   Network Add Translation   
 
   Introduction   
   Introduction   
   Introduction   
   The NAT Concept   
   The NAT Concept   
   The NAT Concept   
   The NAT Table   
   The NAT Table   
   The NAT Table   
   Static NAT (Part 1)
   Static NAT (Part 1)
   Static NAT (Part 1)
   Static NAT (Part 2)
   Static NAT (Part 2)
   Static NAT (Part 2)
   Dynamic NAT (Part1)
   Dynamic NAT (Part1)
   Dynamic NAT (Part1)
   Dynamic NAT (Part2)
   Dynamic NAT (Part2)
   Dynamic NAT (Part2)
   Overload NAT/PAT (part1)
   Overload NAT/PAT (part1)
   Overload NAT/PAT (part1)
   Overload NAT/PAT (part2)   
   Overload NAT/PAT (part2)   
   Overload NAT/PAT (part2)   
 
   General   
   General   
   General   
   Data Transmission   
   Data Transmission   
   Data Transmission   
   IP Subnetting   
   IP Subnetting   
   IP Subnetting   
   Supernetting   
   Supernetting   
   Supernetting   
 
   Introduction   
   Introduction   
   Introduction   
   Topologies   
   Topologies   
   Topologies   
 
   Introduction   
   Introduction   
   Introduction   
   Mac Addresses   
   Mac Addresses   
   Mac Addresses   
   Broadcast B   
   Broadcast B   
   Broadcast B   
   Multicast   
   Multicast   
   Multicast   
   Multicast IP List  
   Multicast IP List  
   Multicast IP List  
   Unicast V   
   Unicast V   
   Unicast V   
   Controlling Multicast & Broadcast   
   Controlling Multicast & Broadcast   
   Controlling Multicast & Broadcast   
 
   Introduction   
   Introduction   
   Introduction   
   Basic Concept   
   Basic Concept   
   Basic Concept   
   Subnet Mask Effect   
   Subnet Mask Effect   
   Subnet Mask Effect   
   Subnet Mask Bit   
   Subnet Mask Bit   
   Subnet Mask Bit   
   Subnet Routing & Communications   
   Subnet Routing & Communications   
   Subnet Routing & Communications   
   Subnetting Guidlines   
   Subnetting Guidlines   
   Subnetting Guidlines   
 
   Introduction   
   Introduction   
   Introduction   
   In Depth Analysis   
   In Depth Analysis   
   In Depth Analysis   
   Supernetting Chart   
   Supernetting Chart   
   Supernetting Chart   
   Securing Your Home Network   
   Securing Your Home Network   
   Securing Your Home Network   
 
   Introduction   
   Introduction   
   Introduction   
   UTP CAT 1/2/3/4/5/6 Cable   
   UTP CAT 1/2/3/4/5/6 Cable   
   UTP CAT 1/2/3/4/5/6 Cable   
   UTP Straight Through Cable   
   UTP Straight Through Cable   
   UTP Straight Through Cable   
   UTP X-over Cable   
   UTP X-over Cable   
   UTP X-over Cable   
   Fiber Optic Cable   
   Fiber Optic Cable   
   Fiber Optic Cable   
   10Base T/2/F/5/35   
   10Base T/2/F/5/35   
   10Base T/2/F/5/35   
   100Base T/TX/T4/FX   
   100Base T/TX/T4/FX   
   100Base T/TX/T4/FX   
   Direct Cable Connection (DCC)   
   Direct Cable Connection (DCC)   
   Direct Cable Connection (DCC)   
 
   Introduction   
   Introduction   
   Introduction   
   Serial DCC    
   Serial DCC    
   Serial DCC    
   Parallel DCC   
   Parallel DCC   
   Parallel DCC   
   USB DCC   
   USB DCC   
   USB DCC   
   Important Notes For DCC    
   Important Notes For DCC    
   Important Notes For DCC    
 
   Introduction   
   Introduction   
   Introduction   
   TCP   
   TCP   
   TCP   
   In Depth TCP Analysis   
   In Depth TCP Analysis   
   In Depth TCP Analysis   
   DNS   
   DNS   
   DNS   
   DNS Server Setup (Unix-BIND)   
   DNS Server Setup (Unix-BIND)   
   DNS Server Setup (Unix-BIND)   
   ICMP   
   ICMP   
   ICMP   
   Internet Protocol (IP)   
   Internet Protocol (IP)   
   Internet Protocol (IP)   
   The OSI Model   
   The OSI Model   
   The OSI Model   
 
   Introduction    
   Introduction    
   Introduction    
   A Transport Protocol   
   A Transport Protocol   
   A Transport Protocol   
   Quick Overview    
   Quick Overview    
   Quick Overview    
   TCP Header / Segment   
   TCP Header / Segment   
   TCP Header / Segment   
 
   Introduction    
   Introduction    
   Introduction    
   Source & Destination Port    
   Source & Destination Port    
   Source & Destination Port    
   Sequence & Ack. Numbers   
   Sequence & Ack. Numbers   
   Sequence & Ack. Numbers   
   Header Length    
   Header Length    
   Header Length    
   TCP Flag Options   
   TCP Flag Options   
   TCP Flag Options   
   Window, Checksum, Urgent Flags   
   Window, Checksum, Urgent Flags   
   Window, Checksum, Urgent Flags   
   TCP Options   
   TCP Options   
   TCP Options   
   Data    
   Data    
   Data    
   UDP    
   UDP    
   UDP    
   FTP   
   FTP   
   FTP   
   TFTP   
   TFTP   
   TFTP   
 
   Introduction   
   Introduction   
   Introduction   
   The DNS Protocol   
   The DNS Protocol   
   The DNS Protocol   
   The DNS Resolution Process   
   The DNS Resolution Process   
   The DNS Resolution Process   
   DNS Query Messages   
   DNS Query Messages   
   DNS Query Messages   
   DNS Response Messages   
   DNS Response Messages   
   DNS Response Messages   
 
   Introduction   
   Introduction   
   Introduction   
   The db.domain file   
   The db.domain file   
   The db.domain file   
   The db.addr file   
   The db.addr file   
   The db.addr file   
   Other Common Files   
   Other Common Files   
   Other Common Files   
   Slave DNS Server   
   Slave DNS Server   
   Slave DNS Server   
   DNS Caching   
   DNS Caching   
   DNS Caching   
 
   Introduction    
   Introduction    
   Introduction    
   ICMP Echo/Echo Reply (ping)    
   ICMP Echo/Echo Reply (ping)    
   ICMP Echo/Echo Reply (ping)    
   ICMP Destination Unreachable    
   ICMP Destination Unreachable    
   ICMP Destination Unreachable    
   ICMP Source Quench    
   ICMP Source Quench    
   ICMP Source Quench    
   ICMP Redirect   
   ICMP Redirect   
   ICMP Redirect   
   ICMP Time Exceeded   
   ICMP Time Exceeded   
   ICMP Time Exceeded   
 
   Introduction   
   Introduction   
   Introduction   
   Binary & IP   
   Binary & IP   
   Binary & IP   
   The IP Header   
   The IP Header   
   The IP Header   
   IP Classes   
   IP Classes   
   IP Classes   
 
   Introduction   
   Introduction   
   Introduction   
   Layer 1   
   Layer 1   
   Layer 1   
   Layer 2   
   Layer 2   
   Layer 2   
   Layer 3   
   Layer 3   
   Layer 3   
   Layer 4   
   Layer 4   
   Layer 4   
   Layer 5   
   Layer 5   
   Layer 5   
   Layer 6   
   Layer 6   
   Layer 6   
   Layer 7   
   Layer 7   
   Layer 7   
   Layer Encapsulation & Decapsulation    
   Layer Encapsulation & Decapsulation    
   Layer Encapsulation & Decapsulation    
 
   Introduction   
   Introduction   
   Introduction   
   Routed Protocols   
   Routed Protocols   
   Routed Protocols   
   IP Routing   
   IP Routing   
   IP Routing   
   Routing Protocols   
   Routing Protocols   
   Routing Protocols   
 
   Introduction   
   Introduction   
   Introduction   
   Distance Vector Routing Protocols   
   Distance Vector Routing Protocols   
   Distance Vector Routing Protocols   
   Link State Routing Protocols   
   Link State Routing Protocols   
   Link State Routing Protocols   
   Hybrid Routing Protocols   
   Hybrid Routing Protocols   
   Hybrid Routing Protocols   
   OSPF Routing Protocol   
   OSPF Routing Protocol   
   OSPF Routing Protocol   
   RIP Routing Protocol   
   RIP Routing Protocol   
   RIP Routing Protocol   
   IGRP Routing Protocol   
   IGRP Routing Protocol   
   IGRP Routing Protocol   
   EIGRP Routing Protocol   
   EIGRP Routing Protocol   
   EIGRP Routing Protocol   
   Connectivity Devices   
   Connectivity Devices   
   Connectivity Devices   
 
   Hubs & Repeaters   
   Hubs & Repeaters   
   Hubs & Repeaters   
   Switches & Bridges   
   Switches & Bridges   
   Switches & Bridges   
 
   Introduction   
   Introduction   
   Introduction   
   Cisco Basics   
   Cisco Basics   
   Cisco Basics   
   Cisco Modes   
   Cisco Modes   
   Cisco Modes   
 
   Introduction   
   Introduction   
   Introduction   
   User Exec Mode    
   User Exec Mode    
   User Exec Mode    
   User Privileged Mode   
   User Privileged Mode   
   User Privileged Mode   
 
   Introduction   
   Introduction   
   Introduction   
   Frame Formats   
   Frame Formats   
   Frame Formats   
   Collisions   
   Collisions   
   Collisions   
 
   Introduction   
   Introduction   
   Introduction   
   Ethernet 802.3    
   Ethernet 802.3    
   Ethernet 802.3    
   Ethernet II   
   Ethernet II   
   Ethernet II   
   Ethernet 802.3 SNAP   
   Ethernet 802.3 SNAP   
   Ethernet 802.3 SNAP   
   Ethernet 802.3 Raw (Novell)   
   Ethernet 802.3 Raw (Novell)   
   Ethernet 802.3 Raw (Novell)   
   Media Access   
   Media Access   
   Media Access   
 
   Introduction    
   Introduction    
   Introduction    
   Early Collisions    
   Early Collisions    
   Early Collisions    
   Late Collisions    
   Late Collisions    
   Late Collisions    
   Propagation Delay    
   Propagation Delay    
   Propagation Delay    
   Frame Corruption   
   Frame Corruption   
   Frame Corruption   
   Interframe Gap    
   Interframe Gap    
   Interframe Gap    
   Signal Encoding    
   Signal Encoding    
   Signal Encoding    
 
   Introduction    
   Introduction    
   Introduction    
   10/100 Mbits   
   10/100 Mbits   
   10/100 Mbits   
   Integration   
   Integration   
   Integration   
   Migration   
   Migration   
   Migration   
   The Fast Ethernet Model   
   The Fast Ethernet Model   
   The Fast Ethernet Model   
   Troubleshooting    
   Troubleshooting    
   Troubleshooting