7/28/2019 Subnet Masks%281%29
1/15
h Class C11111111 . 11111111 . 11111111 . 1 1 0 0 0 0 0 0
128 + 64 + 0 + 0 + 0 + 0 + 0 + 0
S.N.M. 255 . 255 . 255 .
128 64 32 16 8 4 2 1
0 1 0 0 0 0 0 0
0 1 0 0 0 0 0 1
0 1 1 1 1 1 1 0
0 1 1 1 1 1 1 1
1 0 0 0 0 0 0 0
1 0 0 0 0 0 0 1
Range of Subnets
ubnet Usable Subnet xxx.xxx.xxx.128
Start
Usable Subnet
xxx.xxx.xxx.129
1
2
xxx.xxx.xxx.64
xxx.xxx.xxx.128
xxx.xxx.xxx.65
26 bits not borrowed (2x2x2x2x2x2)
Usable Subnet
Host Address
Start
xxx.xxx.xxx.127
xxx.xxx.xxx.129
Net - ID Host - ID
1stSubnet xxx.xxx.xxx. 64
xxx.xxx.xxx. 65
xxx.xxx.xxx.126
xxx.xxx.xxx.127
Hosts
Broadcast Address
End
# of Usable SubnetsUse the formula 2b - 2 where b is equal to the # of bits borrowed.
22 bits borrowed
- 2
Broadcast Address
(2x2x2x2x2x2) - 2
64
1st
usable subnet range
and increment value
2
# of Usable Hosts62
xxx.xxx.xxx.191
Starting Address
2 Bits Borrowed
# of Usable Subnets
Use the formula 2n
- 2 where n is equal to the # of bits not borrowed. # of Usable Hosts
192
(2x2) - 2
Use the formula 2n
where n is equal to the # of bits not borrowed.The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.
26 bits not borrowed
- 2
7/28/2019 Subnet Masks%281%29
2/15
u
1 0 1 1 1 1 1 0
1 0 1 1 1 1 1 1xxx.xxx.xxx.1912nd
S End
Broadcast Address
xxx.xxx.xxx.190
7/28/2019 Subnet Masks%281%29
3/15
Class C11111111 . 11111111 . 11111111 . 1 1 1 0 0 0 0 0
128 + 64 + 32 + 0 + 0 + 0 + 0 + 0
S.N.M. 255 . 255 . 255 .
3 xxx.xxx.xxx.96 xxx.xxx.xxx.96 xxx.xxx.xxx.127
xxx.xxx.xxx.65 xxx.xxx.xxx.95
4
5
xxx.xxx.xxx.128
xxx.xxx.xxx.160
xxx.xxx.xxx.127
xxx.xxx.xxx.158
xxx.xxx.xxx.159
xxx.xxx.xxx.191
3 Bits Borrowed
# of Usable Subnets
Use the formula 2n
- 2 where n is equal to the # of bits not borrowed. # of Usable Hosts
224
(2x2x2) - 2
25 bits not borrowed
- 2 (2x2x2x2x2) - 2
32
1st
usable subnet range
and increment value
6
25 bits not borrowed (2x2x2x2x2)
# of Usable Hosts
30
1
2
xxx.xxx.xxx.32
xxx.xxx.xxx.64
# of Usable SubnetsUse the formula 2
b- 2 where b is equal to the # of bits borrowed.
23 bits borrowed
- 2
Host AddressUsable Subnet
Range of Subnets
Use the formula 2n
where n is equal to the # of bits not borrowed.The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.
Starting Address Broadcast Address
6 xxx.xxx.xxx.192 xxx.xxx.xxx.189 xxx.xxx.xxx.223
xxx.xxx.xxx.34 xxx.xxx.xxx.63
7/28/2019 Subnet Masks%281%29
4/15
Class C11111111 . 11111111 . 11111111 . 1 1 1 1 0 0 0 0
128 + 64 + 32 + 16 + 0 + 0 + 0 + 0
S.N.M. 255 . 255 . 255 .
xxx.xxx.xxx.209
xxx.xxx.xxx.127
xxx.xxx.xxx.143
xxx.xxx.xxx.159
xxx.xxx.xxx.175
xxx.xxx.xxx.191
xxx.xxx.xxx.207
xxx.xxx.xxx.223
xxx.xxx.xxx.145
xxx.xxx.xxx.161
xxx.xxx.xxx.177
xxx.xxx.xxx.193
13 xxx.xxx.xxx.208
9
10
xxx.xxx.xxx.112
xxx.xxx.xxx.128
xxx.xxx.xxx.144
xxx.xxx.xxx.160
xxx.xxx.xxx.176
xxx.xxx.xxx.192
11
12
xxx.xxx.xxx.31
6 xxx.xxx.xxx.96 xxx.xxx.xxx.97
xxx.xxx.xxx.17
xxx.xxx.xxx.111
xxx.xxx.xxx.65
xxx.xxx.xxx.81
xxx.xxx.xxx.79
xxx.xxx.xxx.95
7
8
xxx.xxx.xxx.113
xxx.xxx.xxx.129
4
5
xxx.xxx.xxx.64
xxx.xxx.xxx.80
xxx.xxx.xxx.47
Usable Subnet
1
2
xxx.xxx.xxx.16
xxx.xxx.xxx.32
Starting Address Broadcast Address
# of Usable SubnetsUse the formula 2b - 2 where b is equal to the # of bits borrowed.
24 bits borrowed
- 2
16
1
st
usable subnet rangeand increment value
14
24 bits not borrowed (2x2x2x2)
# of Usable Hosts14
4 Bits Borrowed
# of Usable Subnets
Use the formula 2n
- 2 where n is equal to the # of bits not borrowed. # of Usable Hosts
240
(2x2x2x2) - 2
3 xxx.xxx.xxx.48 xxx.xxx.xxx.49 xxx.xxx.xxx.63
24 bits not borrowed
- 2 (2x2x2x2) - 2
Host Address
Use the formula 2n
where n is equal to the # of bits not borrowed.The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.Range of Subnets
xxx.xxx.xxx.33
7/28/2019 Subnet Masks%281%29
5/15
xxx.xxx.xxx.225 xxx.xxx.xxx.23914 xxx.xxx.xxx.224
7/28/2019 Subnet Masks%281%29
6/15
Class C11111111 . 11111111 . 11111111 . 1 1 1 1 1 0 0 0
128 + 64 + 32 + 16 + 8 + 0 + 0 + 0
S.N.M. 255 . 255 . 255 .
xxx.xxx.xxx.231
xxx.xxx.xxx.239
xxx.xxx.xxx.247
xxx.xxx.xxx.215
xxx.xxx.xxx.223
xxx.xxx.xxx.241
xxx.xxx.xxx.209
xxx.xxx.xxx.217
xxx.xxx.xxx.225
xxx.xxx.xxx.233
xxx.xxx.xxx.224
xxx.xxx.xxx.232
xxx.xxx.xxx.208
xxx.xxx.xxx.216
xxx.xxx.xxx.240
27
28
29
30
26
# of Usable Hosts6
Use the formula 2n
where n is equal to the # of bits not borrowed.
The result identifies the first "usable" subnet range will be and also identify theincrements of the ranges.
3 xxx.xxx.xxx.24 xxx.xxx.xxx.25 xxx.xxx.xxx.31
23 bits not borrowed
- 2 (2x2x2) - 2
Host Address
xxx.xxx.xxx.41
xxx.xxx.xxx.39
xxx.xxx.xxx.47
xxx.xxx.xxx.9 xxx.xxx.xxx.15
4
5
xxx.xxx.xxx.32
xxx.xxx.xxx.40
5 Bits Borrowed
# of Usable Subnets
Use the formula 2n
- 2 where n is equal to the # of bits not borrowed. # of Usable Hosts
248
(2x2x2x2x2) - 2
# of Usable SubnetsUse the formula 2
b
- 2 where b is equal to the # of bits borrowed.
25 bits borrowed
- 2
8
1st
usable subnet range
and increment value
30
23 bits not borrowed (2x2x2)
xxx.xxx.xxx.33
Range of Subnets
xxx.xxx.xxx.17 xxx.xxx.xxx.23
Usable Subnet
1
2
xxx.xxx.xxx.8
xxx.xxx.xxx.16
Starting Address Broadcast Address
7/28/2019 Subnet Masks%281%29
7/15
Class C11111111 . 11111111 . 11111111 . 1 1 1 1 1 1 0 0
128 + 64 + 32 + 16 + 8 + 4 + 0 + 0
S.N.M. 255 . 255 . 255 .
Range of Subnets
xxx.xxx.xxx.9 xxx.xxx.xxx.11
Usable Subnet
1
2
xxx.xxx.xxx.4
xxx.xxx.xxx.8
Starting Address Broadcast Address
# of Usable SubnetsUse the formula 2
b
- 2 where b is equal to the # of bits borrowed.
26 bits borrowed
- 2
4
1st
usable subnet range
and increment value
62
22 bits not borrowed (2x2)
xxx.xxx.xxx.17
6 Bits Borrowed
# of Usable Subnets
Use the formula 2n
- 2 where n is equal to the # of bits not borrowed. # of Usable Hosts
252
(2x2x2x2x2x2) - 2
4
5
xxx.xxx.xxx.16
xxx.xxx.xxx.20
(2x2) - 2
Host Address
xxx.xxx.xxx.21
xxx.xxx.xxx.19
xxx.xxx.xxx.23
xxx.xxx.xxx.5 xxx.xxx.xxx.7
# of Usable Hosts2
Use the formula 2n
where n is equal to the # of bits not borrowed.
The result identifies the first "usable" subnet range will be and also identify theincrements of the ranges.
3 xxx.xxx.xxx.12 xxx.xxx.xxx.13 xxx.xxx.xxx.15
22 bits not borrowed
- 2
58
59
60
61
62
xxx.xxx.xxx.232
xxx.xxx.xxx.236
xxx.xxx.xxx.240
xxx.xxx.xxx.244
xxx.xxx.xxx.248
xxx.xxx.xxx.233
xxx.xxx.xxx.237
xxx.xxx.xxx.241
xxx.xxx.xxx.245
xxx.xxx.xxx.249
xxx.xxx.xxx.235
xxx.xxx.xxx.239
xxx.xxx.xxx.243
xxx.xxx.xxx.247
xxx.xxx.xxx.251
7/28/2019 Subnet Masks%281%29
8/15
Class C# of Usable
Subnets# of Usable
HostsSubnet Ranges
Multiply the bits
borrowed - 2
2b
- 2
Multiply the bits not
borrowed - 2
2n
- 2
Multiply the bits not borrowed
2n
2 .1100 0000 255.255.255.192 2 62xxx.xxx.xxx.64
xxx.xxx.xxx.128
3 .1110 0000 255.255.255.224 6 30
xxx.xxx.xxx.32
xxx.xxx.xxx.64xxx.xxx.xxx.96
xxx.xxx.xxx.128
xxx.xxx.xxx.160
xxx.xxx.xxx.192
4 .1111 0000 255.255.255.240 14 14
xxx.xxx.xxx.16
xxx.xxx.xxx.32
5 .1111 1000 255.255.255.248 30 6
xxx.xxx.xxx.8
xxx.xxx.xxx.16
6 .1111 1100 255.255.255.252 62 2
xxx.xxx.xxx.4
xxx.xxx.xxx.8
Subnet Mask
Add the binary value of the bits borrowed
(128 + 64 + 32 + . . . )
7/28/2019 Subnet Masks%281%29
9/15
# of Usable
Subnets
# of Usable
Hosts
Subnet
Ranges
Multiply the bits
borrowed - 2
2b
- 2
Multiply the bits not
borrowed - 2
2n
- 2
Multiply the bits not
borrowed
2n
2 .1100 0000
3 .1110 0000
4 .1111 0000
5 .1111 1000
6 .1111 1100
Subnet Mask
Add the binary value of the bits borrowed
(128 + 64 + 32 + . . . )
7/28/2019 Subnet Masks%281%29
10/15
Class B# of Usable
Subnets# of Usable
HostsSubnet Ranges
Multiply the bits
borrowed - 2
2b
- 2
Multiply the bits not
borrowed - 2
2n
- 2
Multiply the bits not borrowed
2n
2 .1100 0000.0000 0000 255.255.192.0 2 16,382xxx.xxx.64.0
xxx.xxx.128.0
3 .1110 0000.0000 0000 255.255.224.0 6 8,190
xxx.xxx.32.0
xxx.xxx.64.0
xxx.xxx.96.0
xxx.xxx.128.0
xxx.xxx.160.0
xxx.xxx.192.0
4 .1111 0000.0000 0000 255.255.240.0 14 4,094
xxx.xxx.16.0
xxx.xxx.32.0
5 .1111 1000.0000 0000 255.255.248.0 30 2,046xxx.xxx.8.0xxx.xxx.16.0
6 .1111 1100.0000 0000 255.255.252.0 62 1,022
xxx.xxx.4.0
xxx.xxx.8.0
Subnet Mask
Add the binary value of the bits borrowed
(128 + 64 + 32 + . . . )
7/28/2019 Subnet Masks%281%29
11/15
7 .1111 1110.0000 0000 255.255.254.0 126 510
xxx.xxx.2.0
xxx.xxx.4.0
8 .1111 1111.0000 0000 255.255.255.0 254 254
xxx.xxx.1.0
xxx.xxx.2.0
9 .1111 1111.1000 0000 255.255.255.128 510 126
xxx.xxx.0.128
xxx.xxx.1.0
xxx.xxx.1.128
10 .1111 1111.1100 0000 255.255.255.192 1,022 62
xxx.xxx.0.64
xxx.xxx.0.128
xxx.xxx.0.192
xxx.xxx.1.0
xxx.xxx.1.64
11 .1111 1111.1110 0000 255.255.255.224 2,046 30
xxx.xxx.0.32
xxx.xxx.0.64
...
xxx.xxx.0.224
xxx.xxx.1.0
xxx.xxx.1.32
7/28/2019 Subnet Masks%281%29
12/15
12 .1111 1111.1111 0000 255.255.255.240 4,094 14
xxx.xxx.0.16
xxx.xxx.0.32...
xxx.xxx.0.240
xxx.xxx.1.0
xxx.xxx.1.16
13 .1111 1111.1111 1000 255.255.255.248 8,190 6
xxx.xxx.0.8
xxx.xxx.0.16
...
xxx.xxx.0.248
xxx.xxx.1.0
xxx.xxx.1.8
14 .1111 1111.1111 1100 255.255.255.252 16,382 2
xxx.xxx.0.4
xxx.xxx.0.8
...xxx.xxx.0.252
xxx.xxx.1.0
xxx.xxx.1.4
7/28/2019 Subnet Masks%281%29
13/15
# of Usable
Subnets
# of Usable
Hosts
Subnet
RangesMultiply the bits
borrowed - 2
2b - 2
Multiply the bits not
borrowed - 2
2n - 2
Multiply the bits not
borrowed
2n
2 1100 0000.0000 0000
3 1110 0000.0000 0000
4 1111 0000.0000 0000
5 1111 1000.0000 0000
6 1111 1100.0000 0000
7 1111 1110.0000 0000
8 1111 1111.0000 0000
9 1111 1111.1000 0000
10 1111 1111.1100 0000
11 1111 1111.1110 0000
Subnet Mask
Add the binary value of the bits borrowed
(128 + 64 + 32 + . . . )
7/28/2019 Subnet Masks%281%29
14/15
12 1111 1111.1111 0000
13 1111 1111.1111 1000
14 1111 1111.1111 1100
7/28/2019 Subnet Masks%281%29
15/15
Class C# of Usable
Subnets# of Usable
HostsSubnet Ranges
Multiply the bits
borrowed - 2
2b
- 2
Multiply the bits not
borrowed - 2
2n
- 2
Multiply the bits not borrowed
2n
2 .1100 0000 /26 255.255.255.192 2 62xxx.xxx.xxx.64
xxx.xxx.xxx.128
3 .1110 0000 /27 255.255.255.224 6 30
xxx.xxx.xxx.32
xxx.xxx.xxx.64xxx.xxx.xxx.96
xxx.xxx.xxx.128
xxx.xxx.xxx.160
xxx.xxx.xxx.192
4 .1111 0000 /28 255.255.255.240 14 14
xxx.xxx.xxx.16
xxx.xxx.xxx.32
5 .1111 1000 /29 255.255.255.248 30 6
xxx.xxx.xxx.8
xxx.xxx.xxx.16
6 .1111 1100 /30 255.255.255.252 62 2
xxx.xxx.xxx.4
xxx.xxx.xxx.8
Subnet Mask
Add the binary value of the bits borrowed
(128 + 64 + 32 + . . . )