# Protocols, Lesson 7: Subnet masks and their effect

## Understand the different effects a subnet mask can have.

There are a few different ways to approach subnetting, and it can get confusing because of the complexity of some...

subnets and the flexibility they offer. For this reason I created this little paragraph to let you know how we are going to approach and learn subnetting.

We are going to analyze the common subnet masks for each class, giving detailed examples for most of them and allowing you to "see" how everything is calculated and understand the different effects a subnet mask can have as you change it. Once you have mastered this, you can then go on and create your custom subnet masks using any type of class.

### Default subnet masks of each class

By now you should have some idea what the subnet mask does and how it's used to partition a network. What you need to keep in mind is that each class has its DEFAULT subnet mask, which we can change to suit our needs. I have already mentioned this in the previous page, but we need to look into it in a bit more detail.

The picture below shows our three network classes with their respective default subnet masks:

In the IP classes page we analyzed and showed how an IP address consists of two parts, 1) The network ID and 2) The host ID. This rule applies for all IP addresses that use the default subnet mask, so we call them classful IP addresses.

We can see this once again in the picture below, where the IP address is analyzed in binary, because this is the way you should work when dealing with subnet masks:

We are looking at an IP address with its subnet mask for the first time. What we have done is take the decimal subnet mask and converted it to binary, along with the IP address. It is essential to work in binary because it makes things clearer and we can avoid making silly mistakes. The ones (1) in the subnet mask "lock" or, if you like, define the network ID portion. If we change any bit within the network ID of the IP address, then we immediately move to a different network. So in this example, we have a 24 bit subnet mask.

NOTE:

All class C classful IP addresses have a 24 bit subnet mask (255.255.255.0).

All class B classful IP addresses have a 16 bit subnet mask (255.255.0.0).

All class A classful IP addresses have an 8 bit subnet mask (255.0.0.0).

On the other hand, the use of an IP address with a subnet mask other than the default results in the standard host bits (the Bits used to identify the HOST ID) being divided in to two parts: a subnet ID and Host ID. These types of IP addresses are called classless IP addresses.

In order to understand what a "classless IP address" is without getting confused, we are going to take the same IP address as above, and make it a classless IP address by changing the default subnet mask:

Looking at the picture above you will now notice that we have a subnet ID, something that didn't exist before. As the picture explains, we have borrowed three bits from the host ID and used them to create a subnet ID. Effectively we partitioned our class C network into smaller networks.

If you're wondering how many smaller networks, you'll find the answer on the next page. I prefer that you understanding everything here rather than blasting you with more subnet ID's, bits and all the rest :)

### Summary

In this page we saw the default subnet mask of each class and also introduced the classful and classless IP addresses, which are a result of using various subnet masks.

When we use IP addresses with their default subnet masks, e.g. 192.168.0.10 is a class C IP address so the default subnet mask would be 255.255.255.0, then these are "classful IP addresses."

On the other hand, classless IP addresses have their subnet mask modified in a way so that there is a "subnet ID". This subnet ID is created by borrowing bits from the host ID portion.

The picture below shows us both examples:

I hope that you have understood the new concepts and material on this page. Next we are going to talk about subnet bits, learn how to calculate how many bits certain subnet masks are and see the different and most used subnet masks available.

If you think you might have not understood a few sections throughout this page, I would suggest you read it once more :)

Click over to Firewall.cx for more articles like this one. You don't have to register or jump through any hoops. All you do is get the networking information you want. Copyright 2004 Firewall.cx.

This was last published in October 2004

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### Virtual wire network transport mission could increase SDN usage

SDN's use as virtual wire to provide network transport could get the technology out of the data center to underlay SD-WAN better ...

• ### Viptela names former Cisco exec Akkiraju CEO amid SD-WAN market shift

Viptela, a startup in the SD-WAN market, taps former Cisco exec Praveen Akkiraju as its new CEO. Akkiraju's immediate goal for ...

• ### I2RS, Interface to the Routing System, remains viable SDN hybrid

One SDN blogger discusses I2RS, a hybrid model of SDN in the works, while another expert categorizes NFV and SDN vendors. Also, ...

## SearchEnterpriseWAN

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

• ### Cloud-managed networking makes VPN a snap

Provisioning and deploying a WAN and VPN is an everyday function for engineers. But can you do that for an office 4,000 miles ...

• ### Three new takes on WAN optimization

Once considered new technology, WAN optimization is now widespread, and enterprises are including it in their networks from the ...

## SearchUnifiedCommunications

• ### Avaya bankruptcy filing targets restructuring for cloud, software

Avaya has filed for Chapter 11 bankruptcy protection as it focuses on restructuring its \$6 billion debt. Analysts anticipate a ...

• ### A hybrid deployment gives organizations UC flexibility

Two factors are driving the hybrid deployment of unified communications: infrastructure needs and business value. But enterprises...

• ### Zoom meetings jettison complex video infrastructure

With cloud-based video meetings from Zoom Video Conferencing, businesses can host collaborative online meetings in the office and...

## SearchMobileComputing

• ### Citizen developers pull the rug out from under IT with RMAD tools

End users want mobile apps to help with basic job functions, but the cost and time it takes IT and developers to deliver those ...

• ### Advanced Citrix XenMobile MDM comes to Intune, but who's buying?

Citrix XenMobile mobile device management policies, features and mobile apps will soon be available to Microsoft shops as an ...

• ### Look to the future of the wearable technology trend

The enterprise potential for wearable technology is high, with accurate health trackers and 3D graphics becoming more common. ...

## SearchDataCenter

• ### HPE-SimpliVity deal raises support, price and development questions

With HPE's buy of No. 2 SimpliVity -- the first big deal in the HCI space -- IT pros see a more robust offering, but also higher ...

• ### Converged infrastructure drop-off doesn't mean data center death

Traditional converged infrastructure has been supplanted by hyper-converged infrastructure and cloud computing, but it remains a ...

• ### New options to evolve your data backup and recovery plan

The server backup market first evolved to protect VMs, but now it's undergoing another transformation. Find out how it's evolved ...

## SearchITChannel

• ### Shipments of 25/100 GbE switches surpassing 10/40 GbE

Research finds shipments of 25 GbE and 100 GbE switches are outpacing 10/40 GbE hardware, as companies find more value in the ...

• ### CTOs offer up enterprise storage predictions for 2017

CTOs share enterprise storage predictions for 2017. Cloud, server-based storage, HCI, and growing use of containers and analytics...

• ### Avaya files for chapter 11 bankruptcy

Networking supplier has filed voluntary petitions under chapter 11 of the US bankruptcy code.

Close