Problem solve Get help with specific problems with your technologies, process and projects.

# Protocols, Lesson 7: Subnet masks and their effect

## Understand the different effects a subnet mask can have.

There are a few different ways to approach subnetting, and it can get confusing because of the complexity of some...

subnets and the flexibility they offer. For this reason I created this little paragraph to let you know how we are going to approach and learn subnetting.

We are going to analyze the common subnet masks for each class, giving detailed examples for most of them and allowing you to "see" how everything is calculated and understand the different effects a subnet mask can have as you change it. Once you have mastered this, you can then go on and create your custom subnet masks using any type of class.

### Default subnet masks of each class

By now you should have some idea what the subnet mask does and how it's used to partition a network. What you need to keep in mind is that each class has its DEFAULT subnet mask, which we can change to suit our needs. I have already mentioned this in the previous page, but we need to look into it in a bit more detail.

The picture below shows our three network classes with their respective default subnet masks:

In the IP classes page we analyzed and showed how an IP address consists of two parts, 1) The network ID and 2) The host ID. This rule applies for all IP addresses that use the default subnet mask, so we call them classful IP addresses.

We can see this once again in the picture below, where the IP address is analyzed in binary, because this is the way you should work when dealing with subnet masks:

We are looking at an IP address with its subnet mask for the first time. What we have done is take the decimal subnet mask and converted it to binary, along with the IP address. It is essential to work in binary because it makes things clearer and we can avoid making silly mistakes. The ones (1) in the subnet mask "lock" or, if you like, define the network ID portion. If we change any bit within the network ID of the IP address, then we immediately move to a different network. So in this example, we have a 24 bit subnet mask.

NOTE:

All class C classful IP addresses have a 24 bit subnet mask (255.255.255.0).

All class B classful IP addresses have a 16 bit subnet mask (255.255.0.0).

All class A classful IP addresses have an 8 bit subnet mask (255.0.0.0).

On the other hand, the use of an IP address with a subnet mask other than the default results in the standard host bits (the Bits used to identify the HOST ID) being divided in to two parts: a subnet ID and Host ID. These types of IP addresses are called classless IP addresses.

In order to understand what a "classless IP address" is without getting confused, we are going to take the same IP address as above, and make it a classless IP address by changing the default subnet mask:

Looking at the picture above you will now notice that we have a subnet ID, something that didn't exist before. As the picture explains, we have borrowed three bits from the host ID and used them to create a subnet ID. Effectively we partitioned our class C network into smaller networks.

If you're wondering how many smaller networks, you'll find the answer on the next page. I prefer that you understanding everything here rather than blasting you with more subnet ID's, bits and all the rest :)

### Summary

In this page we saw the default subnet mask of each class and also introduced the classful and classless IP addresses, which are a result of using various subnet masks.

When we use IP addresses with their default subnet masks, e.g. 192.168.0.10 is a class C IP address so the default subnet mask would be 255.255.255.0, then these are "classful IP addresses."

On the other hand, classless IP addresses have their subnet mask modified in a way so that there is a "subnet ID". This subnet ID is created by borrowing bits from the host ID portion.

The picture below shows us both examples:

I hope that you have understood the new concepts and material on this page. Next we are going to talk about subnet bits, learn how to calculate how many bits certain subnet masks are and see the different and most used subnet masks available.

If you think you might have not understood a few sections throughout this page, I would suggest you read it once more :)

Click over to Firewall.cx for more articles like this one. You don't have to register or jump through any hoops. All you do is get the networking information you want. Copyright 2004 Firewall.cx.

This was last published in October 2004

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### NFV disaggregates firewall appliance to increase scalability

A traditional firewall appliance can incorporate many services, but NFV can virtualize firewalls to offer individual services ...

• ### Cisco, Hyundai to add software-defined platform to vehicles

Cisco and Hyundai will release jointly developed software-defined vehicles in 2019. These connected cars will boast a Cisco-built...

• ### Zayo SD-WAN available as a managed or on-premises product

Zayo Group has launched an SD-WAN product. The Zayo SD-WAN is available as an on-premises or managed product. Zayo is a bandwidth...

## SearchEnterpriseWAN

• ### How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• ### How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

## SearchUnifiedCommunications

• ### Emerging technologies to fuel collaboration industry growth

Business communications is getting more contextual and intelligent, thanks to emerging technologies, such as AI and APIs. UCC ...

• ### How to navigate the enterprise collaboration market

When evaluating enterprise collaboration services, first look inward at your company needs. Some key collaboration criteria ...

• ### Businesses slow to embrace products like Samsung Flip board

Samsung hopes to heat up the tepid digital whiteboard market, but the new Samsung Flip board will face tough competition from ...

## SearchMobileComputing

• ### A roundup of the leading EMM providers in today's market

Just as identifying the need for EMM is important, so is selecting the right vendor. Here's a rundown of leading EMM vendors and ...

• ### Compare the main mobile app development languages

Developing an app is all about visualizing what the users need and what they'll see in the UI. Get visual with this infographic ...

• ### A handy mobile app testing checklist for developers

Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper ...

## SearchDataCenter

• ### Three requirements for a hybrid cloud computing deployment

As the hybrid cloud computing approach gains steam, organizations will need to pay close attention to cross-cloud connectivity ...

• ### Five debunked myths about SSD issues

Solid-state drives are mature now, and the technology has eclipsed hard disk drives with superior performance, manageability and ...

• ### Future data center trends hinge on the edge, cloud and staffing

Edge computing, colocation, cloud and IT staffing issues lead the way as industry analysts make their predictions for the future ...

## SearchITChannel

• ### Riverbed Rise channel program reinvents partner requirements

The Riverbed Rise program will focus on partner performance, which Riverbed will measure by customer acquisitions, account ...

• ### Primary and secondary storage combos attract channel partners

Nontraditional storage vendors, such as ClearSky Data and Reduxio, are attracting resellers and managed service providers with ...

• ### Demand for cloud-enabling infrastructure soared in 2017, says IDC

IDC's latest cloud IT infrastructure market tracker shows the demand for public and private cloud-enabling servers, storage and ...

Close