This topic calculate IPv4 subnets for a /24 prefix. Start learning CCNA 200-301 for free right now!!
Note: Welcome: This topic is part of Chapter 11 of the Cisco CCNA 1 course, for a better follow up of the course you can go to the CCNA 1 section to guide you through an order.
Table of Contents
Subnet on an Octet Boundary
In the previous topic you learned several good reasons for segmenting a network. You also learned that segmenting a network is called subnetting. Subnetting is a critical skill to have when administering an IPv4 network. It is a bit daunting at first, but it gets much easier with practice.
IPv4 subnets are created by using one or more of the host bits as network bits. This is done by extending the subnet mask to borrow some of the bits from the host portion of the address to create additional network bits. The more host bits that are borrowed, the more subnets that can be defined. The more bits that are borrowed to increase the number of subnets reduces the number of hosts per subnet.
Networks are most easily subnetted at the octet boundary of /8, /16, and /24. The table identifies these prefix lengths. Notice that using longer prefix lengths decreases the number of hosts per subnet.
To understand how subnetting on the octet boundary can be useful, consider the following example. Assume an enterprise has chosen the private address 10.0.0.0/8 as its internal network address. That network address can connect 16,777,214 hosts in one broadcast domain. Obviously, having more than 16 million hosts on a single subnet is not ideal.
The enterprise could further subnet the 10.0.0.0/8 address at the octet boundary of /16 as shown in the table. This would provide the enterprise the ability to define up to 256 subnets (i.e., 10.0.0.0/16 – 10.255.0.0/16) with each subnet capable of connecting 65,534 hosts. Notice how the first two octets identify the network portion of the address whereas the last two octets are for host IP addresses.
Subnetting Network 10.0.0.0/8 using a /16
(256 Possible Subnets)
(65,534 possible hosts per subnet)
10.0.0.1 – 10.0.255.254
10.1.0.1 – 10.1.255.254
10.2.0.1 – 10.2.255.254
10.3.0.1 – 10.3.255.254
10.4.0.1 – 10.4.255.254
10.5.0.1 – 10.5.255.254
10.6.0.1 – 10.6.255.254
10.7.0.1 – 10.7.255.254
10.255.0.1 – 10.255.255.254
Alternatively, the enterprise could choose to subnet the 10.0.0.0/8 network at the /24 octet boundary, as shown in the table. This would enable the enterprise to define 65,536 subnets each capable of connecting 254 hosts. The /24 boundary is very popular in subnetting because it accommodates a reasonable number of hosts and conveniently subnets at the octet boundary.
Subnetting Network 10.0.0.0/8 using a /24 Prefix
(65,536 Possible Subnets)
(254 possible hosts per subnet)
10.0.0.1 – 10.0.0.254
10.0.1.1 – 10.0.1.254
10.0.2.1 – 10.0.2.254
10.0.255.1 – 10.0.255.254
10.1.0.1 – 10.1.0.254
10.1.1.1 – 10.1.1.254
10.1.2.1 – 10.1.2.254
10.100.0.1 – 10.100.0.254
10.255.255.1 – 10.2255.255.254
Subnet within an Octet Boundary
The examples shown thus far borrowed host bits from the common /8, /16, and /24 network prefixes. However, subnets can borrow bits from any host bit position to create other masks.
For instance, a /24 network address is commonly subnetted using longer prefix lengths by borrowing bits from the fourth octet. This provides the administrator with additional flexibility when assigning network addresses to a smaller number of end devices.
Refer to the table to see six ways to subnet a /24 network.
Click Play to view an explanation of the subnet mask.
Video – Subnet with the Magic Number
Click Play to view an explanation of the magic number.
Packet Tracer – Subnet an IPv4 Network
In this activity, starting from a single network address and network mask, you will subnet the Customer network into multiple subnets. The subnet scheme should be based on the number of host computers required in each subnet, as well as other network considerations, like future network host expansion.
After you have created a subnetting scheme and completed the table by filling in the missing host and interface IP addresses, you will configure the host PCs, switches and router interfaces.
After the network devices and host PCs have been configured, you will use the ping command to test for network connectivity.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.