Problem solve Get help with specific problems with your technologies, process and projects.

# Tips on working with VLSM

## Variable Length Subnet Masks (VLSM) can require some serious number crunching but there are many ways to help make the process simpler.

Variable Length Subnet Masks (VLSM) can require some serious number crunching to figure out when they start getting...

complicated and there are many ways to help make the process simpler.

In my experience of teaching the CCNA course, I have found that every person essentially will find their own way of figuring the fastest method to calculate them as long as they work on it hard enough.

 Have networking questions? Then visit Firewall.cx, one of the few websites recommended by the Cisco Academy program.

What I can do, hoping to help you, is show you the method I use, so you can then take it and see how well it suites you!

Before we dive into the deep waters, let me show you how I calculate network ranges from given subnet masks:

Assume network 192.168.0.0 and subnet mask 255.255.255.240

I first calculate each subnet's range: 256-240=16 IP's per subnet

This means we have the following subnets:

```0
16
32
48
64
..
...
....
```

As we said, for each subnet, we have 16 IP's this includes network and broadcast addresses. Looking at the above table, I already have the network address for each subnet, so let's reveal the broadcast address:

```0  -  15
16 -  31
32 -  47
48 -  63
64
...
....
```

The logic behind this is quite simple: take the next network and subtracted one from it to get the broadcast address

Now that we have the network and broadcast address, it's easy to calculate the range of VALID IP addresses:

```0   (1 to 14)  15
16  (17 to 30) 31
32  (33 to 46) 47
48  (49 to 62) 63
```

You can clearly see that everything between the network and broadcast address of each subnet is a VALID IP address.

This method is perhaps the best and fastest way to calculate networks and IP ranges from different subnet masks.

One step up is VLSM, where we are given any possible subnet mask and we need to calculate the subnets and IP ranges.

For this, I have created a nice table which is available on my site, under the 'supernetting/CIDR' topic (www.firewall.cx/supernetting-chart.php). The chart shows all possible subnet mask combinations and the corresponding number of networks and hosts calculated for each one.

A closer look at the table will reveal a nice pattern that is repeated:

```Subnet Bits       Subnet mask
/16               255.255.0.0
/17               255.255.128.0
/18               255.255.192.0
/19               255.255.224.0
/20               255.255.240.0
/21               255.255.248.0
/22               255.255.252.0
/23               255.255.254.0
/24               255.255.255.0
/25               255.255.255.128
/26               255.255.255.192
/27               255.255.255.224
```

Notice the subnet mask for /17 and /25, /18 and /26. Both /17 and /25 have the 128 decimal number in their subnet mask, while /18 and /26 have decimal 192. The only part that changes in the pattern is the location of the last 'non-zero' decimal number.

Considering that /8, /16 and /24 have only 255 and 0 decimals, so whenever I see a number between these ranges, I use the closest of the three as a reference point.

For example, /19 is a standard 16 bit subnet mask, with an additional 3 bits. If you memorize the following, then it becomes an easy task translating VLSM numbers to real decimal subnet masks:

```For
1 = 128
2 = 192
3 = 224
4 = 240
5 = 248
6 = 252
7 = 254
```

So, /21 is (2x8)+ 5, that is 255.255.248.0 !

To figure out the subnet masks here, simply do the following calculations:
256-248=8 That's 8 IP's per subnet. We need to reserve 2 IP's (network and broadcast addresses), leaving us with 6 valid IP's per subnet.

From all the above calculations, the hardest part is memorizing the last table, which is only 7 entries. From there on, it's a matter of using the quick method I just showed, to calculate your subnets and their ranges!

This was last published in April 2004

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### NFV disaggregates firewall appliance to increase scalability

A traditional firewall appliance can incorporate many services, but NFV can virtualize firewalls to offer individual services ...

• ### Cisco, Hyundai to add software-defined platform to vehicles

Cisco and Hyundai will release jointly developed software-defined vehicles in 2019. These connected cars will boast a Cisco-built...

• ### Zayo SD-WAN available as a managed or on-premises product

Zayo Group has launched an SD-WAN product. The Zayo SD-WAN is available as an on-premises or managed product. Zayo is a bandwidth...

## SearchEnterpriseWAN

• ### How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• ### How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

## SearchUnifiedCommunications

• ### Emerging technologies to fuel collaboration industry growth

Business communications is getting more contextual and intelligent, thanks to emerging technologies, such as AI and APIs. UCC ...

• ### How to navigate the enterprise collaboration market

When evaluating enterprise collaboration services, first look inward at your company needs. Some key collaboration criteria ...

• ### Businesses slow to embrace products like Samsung Flip board

Samsung hopes to heat up the tepid digital whiteboard market, but the new Samsung Flip board will face tough competition from ...

## SearchMobileComputing

• ### A roundup of the leading EMM providers in today's market

Just as identifying the need for EMM is important, so is selecting the right vendor. Here's a rundown of leading EMM vendors and ...

• ### Compare the main mobile app development languages

Developing an app is all about visualizing what the users need and what they'll see in the UI. Get visual with this infographic ...

• ### A handy mobile app testing checklist for developers

Application testing is a necessity in the era of enterprise mobility. Define the right testing criteria and adopt the proper ...

## SearchDataCenter

• ### Three requirements for a hybrid cloud computing deployment

As the hybrid cloud computing approach gains steam, organizations will need to pay close attention to cross-cloud connectivity ...

• ### Five debunked myths about SSD issues

Solid-state drives are mature now, and the technology has eclipsed hard disk drives with superior performance, manageability and ...

• ### Future data center trends hinge on the edge, cloud and staffing

Edge computing, colocation, cloud and IT staffing issues lead the way as industry analysts make their predictions for the future ...

## SearchITChannel

• ### Riverbed Rise channel program reinvents partner requirements

The Riverbed Rise program will focus on partner performance, which Riverbed will measure by customer acquisitions, account ...

• ### Primary and secondary storage combos attract channel partners

Nontraditional storage vendors, such as ClearSky Data and Reduxio, are attracting resellers and managed service providers with ...

• ### Demand for cloud-enabling infrastructure soared in 2017, says IDC

IDC's latest cloud IT infrastructure market tracker shows the demand for public and private cloud-enabling servers, storage and ...

Close