Welcome to Jeremy's IT Lab. This is a free, complete course for the CCNA. If you like these videos, please subscribe to follow along with the series. Also, please like, leave a comment, and share the video to help spread this free series of videos. Thanks for your help. In this video, we will be talking about subnetting. This is a very big topic for the CCNA, but not just for the test--it’s an essential skill for a network engineer. Many people have trouble understanding subnetting, but let me assure you, it is not difficult. Subnetting is very simple if you take it step by step. So, I’m going to split subnetting into two, or maybe even three, videos so we can take our time to really understand subnetting without getting lost. Now, because subnetting is such an important topic, and many people have trouble with it, there are already plenty of subnetting videos on YouTube. Of course, feel free to check out those videos too--there are some different tricks and techniques people teach that can speed up the subnetting process. I, however, will simply outline the basic steps involved in subnetting. I will avoid overcomplicating the topic. My end goal for these videos is that you understand and can do subnetting. So, let’s get started. So, what will we cover in this video? Just a couple of things. First is CIDR, pronounced “CIDR,” which stands for Classless Inter-Domain Routing. What exactly is that? Well, remember I introduced the IPv4 address classes, such as Class A, B, and C? Well, CIDR throws all that away and lets us be more flexible with our IPv4 networks. Then, of course, we’ll cover the process of subnetting, taking it step by step so you don’t get lost. Now, before I get into CIDR, let’s review these IPv4 address classes so we can then understand the need for classless IPv4 addressing. There are five classes of IPv4 addresses: A, B, C, D, and E. Class A addresses have a first octet beginning with zero, and the rest of the bits can either be zero or one. This leads to a decimal range for the first octet of 0 to 127. Remember, an IPv4 address is 32 bits, so there are 4 octets--4 groups of 8 bits--in an IPv4 address. This makes the Class A address range from 0.0.0.0 through 127.255.255.255. Now, remember, there are some special and reserved addresses in these ranges that can’t be used for normal IP addresses on a device, but for this video, we’ll just include all of them in Class A. Class B addresses have a first octet beginning with 10, and the other 6 bits can be either 0 or 1. This gives a range for the first octet of 128 through 191. The address range for Class B is 128.0.0.0 through 191.255.255.255. Class C addresses have the first three bits set to 110, and the others can be either zero or one. If you write that range in decimal, it is 192 through 223. The address range is therefore 192.0.0.0 through 223.255.255.255. Class D addresses begin with 1110 in binary, which gives a range of 224 through 239 for the first octet of the address. This means that the address range for Class D is 224.0.0.0 through 239.255.255.255. Finally, Class E addresses begin with 1111 in binary, so the first octet range is 240 through 255, and therefore the address range is 240.0.0.0 through 255.255.255.255. However, only the Class A, B, and C addresses can be assigned to a device as an IP address, as Classes D and E have special purposes, as I mentioned in the IPv4 addressing videos. Class A addresses have an 8-bit prefix length, meaning the first octet identifies the network and the other three octets are used for individual hosts within the network. Class B addresses have a 16-bit prefix length, so the first two octets identify the network, and the last two octets identify individual hosts within that network. Class C addresses have a prefix length of 24, so the first three octets are used to identify the network, and only the last octet is used to identify individual hosts within that network. The different prefix lengths give different characteristics to these classes. As you can see, there are few Class A networks available--only 128, actually less than that because some are reserved, like the 127.0.0.0 range, which you may remember is used for loopback addresses. Because only the first octet of a Class A address is used for the network ID, there are three whole octets available for addresses within each Class A network, so there are 16,777,216 addresses in each Class A network. That is 2 to the power of 24, because there are three octets (3 times 8 = 24 bits). Class B addresses are different. There are more Class B networks--16,384--but fewer addresses per network, 65,536, which is still many addresses, of course. Finally, there are very many Class C networks--2,097,152 networks--but only 256 addresses per network. So, how does a company get their own network address range to use? Well, IP addresses are assigned to companies or organizations by a nonprofit American corporation called the IANA, the Internet Assigned Numbers Authority. The IANA assigns IPv4 addresses and networks to companies based on their size. For example, a very large company might receive a Class A or Class B network. Remember, there are lots of available addresses to use for hosts in each Class A and Class B network. While a small company might receive a Class C network, because there are fewer addresses in each Class C network--only 256. However, this system led to many wasted IP addresses, so multiple methods of improving this system have been created. Let me give you an example of how this strict system of addresses can waste IP addresses. So, here are two routers. As you can see, R1 has three networks connected to it here. Remember that routers are used to connect different networks, so each of these links is a separate Layer 3 network, different IP networks. R2 also has three networks connected here. Perhaps each of these networks will have a few switches, with many end hosts such as PCs and servers connected to these switches. However, there is one more network here. That’s this network connecting these two routers. This is known as a point-to-point network, meaning that it’s a network connecting two points, in this case, R1 and R2. For example, this might be a connection between offices in different cities, let’s say San Francisco and New York. So, because this is a point-to-point network, we don’t need a large address block, so let’s use a Class C network, 203.0.113.4. Because this is a Class C network, there are 256 addresses in the network, minus one for the network address (203.0.113.0), minus one for the broadcast address (203.0.113.255), minus one for R1’s address, which I’ll assign as 203.0.113.1, and minus one for R2’s address, which I’ll assign as 203.0.113.2. That’s a total of four addresses used and 252 addresses wasted. Clearly, this is not an ideal system. Before introducing CIDR, here’s another quick example of address waste. A company, Company X, needs IP addressing for 5,000 end hosts. This is a problem, why? A Class C network does not provide enough addresses, so a Class B network must be assigned. Because a Class B network allows for about 65,000 addresses, this results in about 60,000 addresses being wasted. When the Internet was first created, the creators did not predict that the Internet would become as large as it is today. This resulted in wasted address space, like the examples I showed you, and there are many more examples that I could show you. The total IPv4 address space includes over 4 billion addresses, and that seemed like a huge number of addresses when IPv4 was created, but now address space exhaustion is a big problem. There's not enough addresses. One way to solve, or remedy, this problem is CIDR. The IETF (Internet Engineering Task Force) introduced CIDR in 1993 to replace the classful addressing system. With CIDR, the requirements of Class A addresses to use an 8-bit network mask, Class B to use 16, and Class C to use 24 were removed. This allowed larger networks to be split into smaller networks, allowing greater efficiency. These smaller networks are called subnetworks, or subnets. Let’s look at an example of splitting a larger network into a smaller network so you can see how it works. Here’s the same point-to-point network we looked at before. Previously, it was assigned the 203.0.113.0/24 network space, but that resulted in lots of wasted addresses. Let’s write this out in binary. Here’s the binary, with the dotted decimal underneath. Now, the prefix length is 24, so here’s the network mask, also known as the subnet mask: 255.255.255.0. Remember, all 1s in the subnet mask indicate that the same bit in the address is the network portion. In this case, I’ve made the network portion blue, and the host portion is red. Well, how many host bits are there? 8, because it’s one octet. So, how many potential hosts, or how many usable addresses, are there? Well, the formula is this: 2 to the power of 8 minus 2 equals 254 usable addresses. What is the 8? Well, it’s the number of host bits, which is 8 in this case. And why minus 2? Those are the network address and the broadcast address. We can’t assign them to a device, so we have to remove them from the number of usable addresses. So, we have 254 usable addresses, but we only need two--one for R1 and one for R2. However, CIDR allows us to use different prefix lengths, so it doesn’t have to be 24. Let’s get some practice calculating the number of hosts within different prefix lengths. 203.0.113.0/25, 203.0.113.0/26, 203.0.113.0/27, /28, /29, /30, /31, and finally /32. I’ve put /31 and /32 in red because they’re a little bit special, as you’ll see when you try to calculate it. So, pause the video here and try to calculate how many usable addresses are on each network. Okay, let’s check out the answers. So, here is 203.0.113.0/25, but this time with a /25 mask. Notice that the network portion of the address has extended into the first bit of the last octet, and the mask in dotted decimal is now written as 255.255.255.128. I changed the color of the extra bit to purple, but it is part of the network portion, which is the blue part. If you don’t remember how to convert from binary to dotted decimal, make sure you review that; it’s very important for subnetting. Now, there are 7 bits in the host portion of the address, so the number of usable addresses is 2 to the power of 7 minus 2, which equals 126. Once again, we only need two addresses-- one for R1 and one for R2--so we will be wasting 124 addresses. That’s better than wasting 252 addresses with a /24 prefix length, but it’s still wasteful. How about a /26 prefix length? Notice that it’s now written as 255.255.255.192 in dotted decimal, because two bits of the last octet are now part of the network portion. Since there are six host bits, there are now 62 usable addresses in this network. If we were to use a /26 network mask for the 203.0.113.0 network, we would be wasting 60 addresses. Getting better, but we can make this network even smaller. Now that you get the idea, let’s speed it up. For a /27 prefix length, the mask is written as 255.255.255.224 in dotted decimal. There are now five host bits, so that means there are 30 usable addresses. As you can see, the address space is getting smaller and smaller as we extend the network mask. For a /28 prefix length, the mask is written as 255.255.255.240 in dotted decimal. There are now only four host bits, so that means there are 14 usable addresses. After assigning addresses to R1 and R2, this would mean only 12 wasted addresses, but we can make this address space even smaller to make our addressing even more efficient. If we use a /29 prefix length, the mask is written as 255.255.255.248 in dotted decimal. Now we have only three host bits, so that means there are just six usable addresses. Again, after we give R1 and R2 addresses, there would be only four wasted addresses. If we use a /30 prefix length, the mask is written as 255.255.255.252 in dotted decimal. There are now only two host bits, so that means two usable addresses. So, this is perfect. There are four total addresses: the network address, the broadcast address, R1’s address, and R2’s address. That means zero wasted addresses. Before moving on to look at the /31 and /32 prefix lengths, let me clarify a little bit. So, instead of 203.0.113.0/24, we will use 203.0.113.0, which is a subnet of that larger Class C network. 203.0.113.0 includes the address range of 203.0.113.0 through 203.0.113.3. Let me show you that in binary. Here is 203.0.113.0 in binary, the host portion all zeroes. Here is 203.0.113.1, 203.0.113.2, and 203.0.113.3. These are the four addresses in the network, with these two being the two usable addresses, which are assigned to R1 and R2. So, we took up four addresses with this subnet. What about the other addresses in the 203.0.113.0/24 range? The remaining addresses in the address block, which are 203.0.113.4 through 203.0.113.255, are now available to be used in other subnets. That’s the magic of subnetting. Instead of using 203.0.113.0/24 and wasting 252 addresses, we can use /30 and waste no addresses. Or, perhaps there is another way to make this even more efficient. Let’s look into it. If we use a /31 prefix length, the mask is written as 255.255.255.254 in dotted decimal. There is now only one host bit, so that means zero usable addresses. Two to the power of one is two, minus two for the network and broadcast addresses, means zero addresses that we can assign to devices. So, you used to not be able to use /31 network prefixes because of this. However, for a point-to-point connection like this, it actually is possible to use a /31 mask. Let's check it out. So, here’s the 203.0.113.0/31 network. R1 is 203.0.113.0, and R2 is 203.0.113.1. The 203.0.113.0/31 network consists of addresses from 203.0.113.0 through 203.0.113.1, which is actually only two addresses. Here they are in binary. There’s 203.0.113.0, and there’s 203.0.113.1. Normally, this would be a problem because it leaves no usable addresses after subtracting the network and broadcast addresses, but for point-to-point networks like this, a dedicated connection like this between two routers, there is actually no need for a network address or a broadcast address. So, we can break the rules in this case and assign the only two addresses in this network to our routers. Note that if you try this configuration on a Cisco router, you’ll get a warning like this, reminding you to make sure that this is a point-to-point link, but it is a totally valid configuration. So, once again, the remaining addresses in the 203.0.113.0/24 address block, which are 203.0.113.2 through 203.0.113.255, are now available to be used in other networks. But this time, we've saved even more addresses, using only two addresses instead of four for this point-to-point connection. People still do use 30 for point-to-point connections at times, but 31 masks are totally valid and more efficient than 30, so I recommend this method. But, we still haven't looked at the 32 mask. A 32 mask is written as 255.255.255.255 in dotted decimal, making the entire address the network portion. There are no host bits. If you calculate this using our formula, you will get one usable address. Clearly, the formula doesn't work in this case. You won't be able to use a 32 mask in this case, and you will probably never use a 32 mask to configure an actual interface. However, there are some uses for a 32 mask. For example, when you want to create a static route not to a network, but to just one specific host, you can use a 32 mask to specify that exact host. Anyway, I'll talk about that later in the course. Just know that 32 masks are used at some points, but you don't have to worry about them for now. Here's a simple chart showing the dotted decimal subnet masks and their equivalent in CIDR notation. That's right, the way of writing a prefix with a slash followed by the prefix length, like 25, 26, etc., is called CIDR notation because it was introduced with the CIDR system. Previously, only the dotted decimal method was used. Note that I've shown you only how to subnet a class C network so far, but we will look at class B and class A networks as well, with prefix lengths like 17, 11, 9, etc. I spent a lot of time on just that one example, but I hope you can see the use of subnetting--dividing a larger network into smaller networks called subnets. Instead of using the whole 203.0.113.0/24 network for the point-to-point connection, we can use a 30 subnet and use only four addresses, or even better, use a 31 subnet and use only two addresses. I'll give one more example of subnetting before finishing up this video. In the next video, I'll give you some practice problems and walk you through them so you can get some hands-on practice with subnetting. So, here's a scenario: There are four networks connected to R1, with many hosts connected to each switch. There are 45 hosts per network. R1 needs an IP address in each network, so its address is included in that 45-host number. You have received the 192.168.0.14 network, and you must divide the network into four subnets that can accommodate the number of hosts required. First off, are there enough addresses in the 192.168.0.14 network in the first place? We need 45 hosts per network, including R1, but also remember that each network has a network and broadcast address, so that's plus two. So, we need 47 addresses per subnet. 47 times 4 equals 188, so there's no problem in terms of the number of hosts. 192.168.0.0/24 is a class C network, so there are 256 addresses. Therefore, we will be able to assign four subnets to accommodate all hosts, no problem. Okay, let's see how we can calculate the subnets we need to make. We need four equal-sized subnets with enough room for at least 45 hosts. Here, I've written out 192.168.0.10 with a 30 mask, 255.255.255.252. I skipped 32 and 31 since these aren't point-to-point links. We can't use 31 and definitely can't use 32. Since there are two host bits, the formula to determine the number of usable addresses is 2^2 - 2. 2^2 is 2 times 2, which is 4, so that means there are two usable addresses in a 30 network. Clearly, not enough room to accommodate the 45 hosts we have. How about if we use a 29 mask to make these subnets? Can we fit the 45 hosts we need? There are three host bits, so the formula is 2^3 - 2. 2^3 is 2 times 2 times 2, which is 8. Therefore, there are six usable addresses, not enough for 45 hosts. How about if we use 28? There are four host bits, so the formula is 2^4 - 2. 2^4 is 2 times 2 times 2 times 2, which is 16. So, that means there are 14 usable addresses--once again, not enough for 45 hosts. How about 27? There are five host bits, so the formula is 2^5 - 2. And 2^5 is 2 times 2 times 2 times 2 times 2, which equals 32. So that means 30 usable addresses. Again, not enough for 45 hosts. How about a 26 subnet mask? There are now six host bits, so the formula is 2^6 - 2. 2^6 is 2 times 2 times 2 times 2 times 2 times 2, which equals 64. That means there are 62 usable addresses. So, it looks like we've found our number. 27 doesn't provide enough address space, but 26 provides more than we need, so we have to go with 26. Unfortunately, you can't always make subnets have exactly the number of addresses you want. There might be some unused address space. That's actually fine, since it's good to have some room for growth anyway. So, I think this video has gone on long enough. Instead of finishing this task in this video, I'll make it this week's quiz. The first subnet, subnet one, is 192.168.0.16. What are the remaining subnets? To help you out, here's a hint: Find the broadcast address of subnet one. The next address after that is the network address of subnet two. And then just repeat the process for subnets three and four. Post your answers in the comment section, and I'll also go over the answer in the next video. So, what did we cover in this video? We covered CIDR (Classless Inter-Domain Routing), which removes the rules of class A, B, and C networks and lets us be more flexible with network addressing, according to the size of the network. We also covered the process of subnetting, but mostly just the basics. Hopefully, you understand the purpose of subnetting and know a little bit about how to do it. I will clarify and expand upon many things in the next video, but also feel free to ask any questions you have in the comments section. For today's video, there won't be a practice lab; that will be after I've finished explaining everything about subnetting. There will be flashcards, however, to help you review some of the things learned in this video. You can download them from the link in the description. I've also recently enabled the membership feature for my channel. If you want to leave a monthly tip to support me, this is another great way to do so. Click "Join" here under the video to check it out. For those who become a JCNP (Jeremy Certified Network Professional) level supporter, I'll give you a shoutout at the end of my videos. So, first of all, thank you so much to Vance Simmons. I just enabled the membership feature and haven't said anything about it yet, and he became my first JCNP level supporter. Thank you so much for supporting the channel. I hope the videos are helping you out. And for my JCNA level supporters, thanks to you too. Thank you for watching. Please subscribe to the channel, like the video, leave a comment, and share the video with anyone else studying for the CCNA. If you want to leave a tip, check the links in the description. I'm also a Brave verified publisher and accept BAT or (Basic Attention Token) tips via the Brave browser. That's all for now.