< Return to Video

Free CCNA | Subnetting (Part 1) | Day 13 | CCNA 200-301 Complete Course

  • 0:01 - 0:07
    Welcome to Jeremy's IT Lab. This is a free, complete course for the CCNA. If you like
  • 0:07 - 0:13
    these videos, please subscribe to follow along with the series. Also, please like, leave
  • 0:13 - 0:16
    a comment, and share the video to help spread this free series of videos.
  • 0:16 - 0:18
    Thanks for your help.
  • 0:19 - 0:25
    In this video, we will be talking about subnetting. This is a very big topic for the CCNA, but
  • 0:25 - 0:30
    not just for the test--it’s an essential skill for a network engineer. Many people
  • 0:30 - 0:36
    have trouble understanding subnetting, but let me assure you, it is not difficult. Subnetting
  • 0:36 - 0:42
    is very simple if you take it step by step. So, I’m going to split subnetting into two,
  • 0:42 - 0:47
    or maybe even three, videos so we can take our time to really understand subnetting without
  • 0:47 - 0:53
    getting lost. Now, because subnetting is such an important topic, and many people have trouble
  • 0:53 - 0:58
    with it, there are already plenty of subnetting videos on YouTube. Of course, feel free to
  • 0:58 - 1:03
    check out those videos too--there are some different tricks and techniques people teach
  • 1:03 - 1:08
    that can speed up the subnetting process. I, however, will simply outline the basic
  • 1:08 - 1:14
    steps involved in subnetting. I will avoid overcomplicating the topic. My end
  • 1:14 - 1:20
    goal for these videos is that you understand and can do subnetting. So, let’s get started.
  • 1:20 - 1:28
    So, what will we cover in this video? Just a couple of things. First is CIDR, pronounced
  • 1:28 - 1:35
    “CIDR,” which stands for Classless Inter-Domain Routing. What exactly is that? Well, remember
  • 1:35 - 1:43
    I introduced the IPv4 address classes, such as Class A, B, and C? Well, CIDR throws all
  • 1:43 - 1:49
    that away and lets us be more flexible with our IPv4 networks. Then, of course, we’ll
  • 1:49 - 1:54
    cover the process of subnetting, taking it step by step so you don’t get lost.
  • 1:54 - 2:00
    Now, before I get into CIDR, let’s review these IPv4 address classes so we can then
  • 2:00 - 2:07
    understand the need for classless IPv4 addressing. There are five classes of IPv4 addresses:
  • 2:07 - 2:15
    A, B, C, D, and E. Class A addresses have a first octet beginning with zero, and the rest
  • 2:15 - 2:20
    of the bits can either be zero or one. This leads to a decimal range for the first octet of
  • 2:20 - 2:29
    0 to 127. Remember, an IPv4 address is 32 bits, so there are 4 octets--4 groups of 8
  • 2:29 - 2:42
    bits--in an IPv4 address. This makes the Class A address range from 0.0.0.0 through 127.255.255.255.
  • 2:42 - 2:47
    Now, remember, there are some special and reserved addresses in these ranges that can’t be
  • 2:47 - 2:52
    used for normal IP addresses on a device, but for this video, we’ll just include all
  • 2:52 - 3:00
    of them in Class A. Class B addresses have a first octet beginning with 10, and the
  • 3:00 - 3:07
    other 6 bits can be either 0 or 1. This gives a range for the first octet of 128 through
  • 3:07 - 3:19
    191. The address range for Class B is 128.0.0.0 through 191.255.255.255. Class C addresses
  • 3:19 - 3:25
    have the first three bits set to 110, and the others can be either zero or one. If you write
  • 3:25 - 3:34
    that range in decimal, it is 192 through 223. The address range is therefore 192.0.0.0
  • 3:34 - 3:43
    through 223.255.255.255. Class D addresses begin with 1110 in binary, which gives
  • 3:43 - 3:50
    a range of 224 through 239 for the first octet of the address. This means that the address range
  • 3:50 - 4:02
    for Class D is 224.0.0.0 through 239.255.255.255. Finally, Class E addresses begin with 1111
  • 4:02 - 4:11
    in binary, so the first octet range is 240 through 255, and therefore the address range is 240.0.0.0
  • 4:11 - 4:14
    through 255.255.255.255.
  • 4:14 - 4:22
    However, only the Class A, B, and C addresses can be assigned to a device as an IP address,
  • 4:22 - 4:29
    as Classes D and E have special purposes, as I mentioned in the IPv4 addressing videos. Class
  • 4:29 - 4:35
    A addresses have an 8-bit prefix length, meaning the first octet identifies the network and
  • 4:35 - 4:40
    the other three octets are used for individual hosts within the network. Class B addresses
  • 4:40 - 4:46
    have a 16-bit prefix length, so the first two octets identify the network, and the last
  • 4:46 - 4:52
    two octets identify individual hosts within that network. Class C addresses have a prefix
  • 4:52 - 4:58
    length of 24, so the first three octets are used to identify the network, and only the
  • 4:58 - 5:03
    last octet is used to identify individual hosts within that network.
  • 5:03 - 5:08
    The different prefix lengths give different characteristics to these classes. As you can
  • 5:08 - 5:14
    see, there are few Class A networks available--only 128, actually less than that because
  • 5:14 - 5:21
    some are reserved, like the 127.0.0.0 range, which you may remember is used for loopback
  • 5:21 - 5:27
    addresses. Because only the first octet of a Class A address is used for the network ID,
  • 5:27 - 5:32
    there are three whole octets available for addresses within each Class A network,
  • 5:32 - 5:40
    so there are 16,777,216 addresses in each Class A network. That is
  • 5:40 - 5:48
    2 to the power of 24, because there are three octets (3 times 8 = 24 bits). Class B
  • 5:48 - 5:55
    addresses are different. There are more Class B networks--16,384--but fewer addresses per
  • 5:55 - 6:03
    network, 65,536, which is still many addresses, of course. Finally, there are very
  • 6:03 - 6:13
    many Class C networks--2,097,152 networks--but only 256 addresses per network.
  • 6:13 - 6:20
    So, how does a company get their own network address range to use? Well, IP addresses are assigned to
  • 6:20 - 6:26
    companies or organizations by a nonprofit American corporation called the IANA, the
  • 6:26 - 6:33
    Internet Assigned Numbers Authority. The IANA assigns IPv4 addresses and networks to companies
  • 6:33 - 6:39
    based on their size. For example, a very large company might receive a Class A or Class B
  • 6:39 - 6:44
    network. Remember, there are lots of available addresses to use for hosts in each Class A
  • 6:44 - 6:50
    and Class B network. While a small company might receive a Class C network, because there
  • 6:50 - 6:57
    are fewer addresses in each Class C network--only 256. However, this system led to many
  • 6:57 - 7:03
    wasted IP addresses, so multiple methods of improving this system have been created. Let
  • 7:03 - 7:09
    me give you an example of how this strict system of addresses can waste IP addresses.
  • 7:09 - 7:16
    So, here are two routers. As you can see, R1 has three networks connected to it here.
  • 7:16 - 7:21
    Remember that routers are used to connect different networks, so each of these links is a separate
  • 7:21 - 7:28
    Layer 3 network, different IP networks. R2 also has three networks connected here. Perhaps
  • 7:28 - 7:33
    each of these networks will have a few switches, with many end hosts such as PCs and servers
  • 7:33 - 7:40
    connected to these switches. However, there is one more network here. That’s this network
  • 7:40 - 7:45
    connecting these two routers. This is known as a point-to-point network, meaning
  • 7:45 - 7:52
    that it’s a network connecting two points, in this case, R1 and R2. For example, this
  • 7:52 - 7:58
    might be a connection between offices in different cities, let’s say San Francisco and New York.
  • 7:59 - 8:05
    So, because this is a point-to-point network, we don’t need a large address block, so
  • 8:05 - 8:14
    let’s use a Class C network, 203.0.113.4. Because this is a Class C network, there are
  • 8:14 - 8:23
    256 addresses in the network, minus one for the network address (203.0.113.0), minus one
  • 8:23 - 8:31
    for the broadcast address (203.0.113.255), minus one for R1’s address, which I’ll
  • 8:31 - 8:40
    assign as 203.0.113.1, and minus one for R2’s address, which I’ll assign as 203.0.113.2.
  • 8:40 - 8:45
    That’s a total of four addresses used and 252 addresses wasted.
  • 8:45 - 8:49
    Clearly, this is not an ideal system.
  • 8:51 - 8:57
    Before introducing CIDR, here’s another quick example of address waste. A company,
  • 8:57 - 9:05
    Company X, needs IP addressing for 5,000 end hosts. This is a problem, why? A Class C network
  • 9:05 - 9:11
    does not provide enough addresses, so a Class B network must be assigned. Because a Class
  • 9:11 - 9:18
    B network allows for about 65,000 addresses, this results in about 60,000 addresses being wasted.
  • 9:20 - 9:24
    When the Internet was first created, the creators did not predict that the Internet would become
  • 9:24 - 9:30
    as large as it is today. This resulted in wasted address space, like the examples I showed
  • 9:30 - 9:36
    you, and there are many more examples that I could show you. The total IPv4 address space
  • 9:36 - 9:41
    includes over 4 billion addresses, and that seemed like a huge number of addresses when
  • 9:41 - 9:52
    IPv4 was created, but now address space exhaustion is a big problem. There's not enough addresses. One way to solve, or remedy, this problem is
  • 9:52 - 10:00
    CIDR. The IETF (Internet Engineering Task Force) introduced CIDR in 1993 to replace
  • 10:00 - 10:02
    the classful addressing system.
  • 10:04 - 10:10
    With CIDR, the requirements of Class A addresses to use an 8-bit network mask, Class
  • 10:10 - 10:18
    B to use 16, and Class C to use 24 were removed. This allowed larger networks
  • 10:18 - 10:24
    to be split into smaller networks, allowing greater efficiency. These smaller networks
  • 10:24 - 10:29
    are called subnetworks, or subnets. Let’s look at an example of splitting a
  • 10:29 - 10:34
    larger network into a smaller network so you can see how it works.
  • 10:34 - 10:41
    Here’s the same point-to-point network we looked at before. Previously, it was assigned
  • 10:41 - 10:49
    the 203.0.113.0/24 network space, but that resulted in lots of wasted addresses. Let’s
  • 10:49 - 10:56
    write this out in binary. Here’s the binary, with the dotted decimal underneath. Now, the
  • 10:56 - 11:05
    prefix length is 24, so here’s the network mask, also known as the subnet mask: 255.255.255.0.
  • 11:05 - 11:11
    Remember, all 1s in the subnet mask indicate that the same bit in the address
  • 11:11 - 11:17
    is the network portion. In this case, I’ve made the network portion blue, and the host portion
  • 11:17 - 11:26
    is red. Well, how many host bits are there? 8, because it’s one octet. So, how many potential hosts, or how
  • 11:26 - 11:34
    many usable addresses, are there? Well, the formula is this: 2 to the power of 8 minus
  • 11:34 - 11:42
    2 equals 254 usable addresses. What is the 8? Well, it’s the number of host bits, which is
  • 11:42 - 11:49
    8 in this case. And why minus 2? Those are the network address and the broadcast address.
  • 11:49 - 11:54
    We can’t assign them to a device, so we have to remove them from the number of usable addresses.
  • 11:54 - 12:02
    So, we have 254 usable addresses, but we only need two--one for R1 and one for R2.
  • 12:02 - 12:09
    However, CIDR allows us to use different prefix lengths, so it doesn’t have to be 24.
  • 12:09 - 12:14
    Let’s get some practice calculating the number of hosts within different prefix lengths.
  • 12:14 - 12:34
    203.0.113.0/25, 203.0.113.0/26, 203.0.113.0/27, /28, /29, /30, /31, and finally /32. I’ve
  • 12:34 - 12:40
    put /31 and /32 in red because they’re a little bit special, as you’ll see when you
  • 12:40 - 12:46
    try to calculate it. So, pause the video here and try to calculate how many usable addresses
  • 12:46 - 12:54
    are on each network. Okay, let’s check out the answers.
  • 12:54 - 13:02
    So, here is 203.0.113.0/25, but this time with a /25 mask. Notice that the network portion
  • 13:02 - 13:07
    of the address has extended into the first bit of the last octet, and the mask
  • 13:07 - 13:16
    in dotted decimal is now written as 255.255.255.128. I changed the color of the extra bit to purple,
  • 13:16 - 13:21
    but it is part of the network portion, which is the blue part. If you don’t remember how to convert
  • 13:21 - 13:27
    from binary to dotted decimal, make sure you review that; it’s very important for subnetting.
  • 13:27 - 13:32
    Now, there are 7 bits in the host portion of the address, so the number of usable addresses
  • 13:32 - 13:40
    is 2 to the power of 7 minus 2, which equals 126. Once again, we only need two addresses--
  • 13:40 - 13:47
    one for R1 and one for R2--so we will be wasting 124 addresses. That’s better than wasting
  • 13:47 - 13:54
    252 addresses with a /24 prefix length, but it’s still wasteful.
  • 13:54 - 14:02
    How about a /26 prefix length? Notice that it’s now written as 255.255.255.192 in dotted
  • 14:02 - 14:08
    decimal, because two bits of the last octet are now part of the network portion. Since
  • 14:08 - 14:15
    there are six host bits, there are now 62 usable addresses in this network. If we were to use
  • 14:15 - 14:24
    a /26 network mask for the 203.0.113.0 network, we would be wasting 60 addresses. Getting
  • 14:24 - 14:28
    better, but we can make this network even smaller.
  • 14:28 - 14:34
    Now that you get the idea, let’s speed it up. For a /27 prefix length, the mask is written
  • 14:34 - 14:43
    as 255.255.255.224 in dotted decimal. There are now five host bits, so that means there are
  • 14:43 - 14:50
    30 usable addresses. As you can see, the address space is getting smaller and smaller as we extend the network mask.
  • 14:51 - 15:01
    For a /28 prefix length, the mask is written as 255.255.255.240 in dotted decimal. There
  • 15:01 - 15:08
    are now only four host bits, so that means there are 14 usable addresses. After assigning addresses
  • 15:08 - 15:14
    to R1 and R2, this would mean only 12 wasted addresses, but we can make this address space
  • 15:14 - 15:20
    even smaller to make our addressing even more efficient.
  • 15:20 - 15:28
    If we use a /29 prefix length, the mask is written as 255.255.255.248 in dotted decimal.
  • 15:28 - 15:35
    Now we have only three host bits, so that means there are just six usable addresses. Again,
  • 15:35 - 15:42
    after we give R1 and R2 addresses, there would be only four wasted addresses.
  • 15:42 - 15:50
    If we use a /30 prefix length, the mask is written as 255.255.255.252 in dotted decimal.
  • 15:50 - 15:57
    There are now only two host bits, so that means two usable addresses. So, this is perfect. There
  • 15:57 - 16:03
    are four total addresses: the network address, the broadcast address, R1’s address, and
  • 16:03 - 16:08
    R2’s address. That means zero wasted addresses.
  • 16:08 - 16:19
    Before moving on to look at the /31 and /32 prefix lengths, let me clarify a little bit. So, instead of 203.0.113.0/24,
  • 16:19 - 16:30
    we will use 203.0.113.0, which is a subnet of that larger Class C network. 203.0.113.0
  • 16:30 - 16:38
    includes the address range of 203.0.113.0 through 203.0.113.3. Let me show you that
  • 16:38 - 16:50
    in binary. Here is 203.0.113.0 in binary, the host portion all zeroes. Here is 203.0.113.1,
  • 16:50 - 17:00
    203.0.113.2, and 203.0.113.3. These are the four addresses in the network, with these two being
  • 17:00 - 17:07
    the two usable addresses, which are assigned to R1 and R2. So, we took up four addresses with
  • 17:07 - 17:15
    this subnet. What about the other addresses in the 203.0.113.0/24 range? The remaining
  • 17:15 - 17:25
    addresses in the address block, which are 203.0.113.4 through 203.0.113.255, are now available
  • 17:25 - 17:34
    to be used in other subnets. That’s the magic of subnetting. Instead of using 203.0.113.0/24
  • 17:34 - 17:42
    and wasting 252 addresses, we can use /30 and waste no addresses. Or, perhaps there is another
  • 17:42 - 17:47
    way to make this even more efficient. Let’s look into it.
  • 17:47 - 17:57
    If we use a /31 prefix length, the mask is written as 255.255.255.254 in dotted decimal.
  • 17:57 - 18:06
    There is now only one host bit, so that means zero usable addresses. Two to the power of one is two,
  • 18:06 - 18:12
    minus two for the network and broadcast addresses, means zero addresses that we can assign to devices.
  • 18:12 - 18:20
    So, you used to not be able to use /31 network prefixes because of this. However, for a point-to-point
  • 18:20 - 18:26
    connection like this, it actually is possible to use a /31 mask. Let's check it out.
  • 18:27 - 18:41
    So, here’s the 203.0.113.0/31 network. R1 is 203.0.113.0, and R2 is 203.0.113.1. The
  • 18:41 - 18:51
    203.0.113.0/31 network consists of addresses from 203.0.113.0 through 203.0.113.1, which
  • 18:51 - 18:59
    is actually only two addresses. Here they are in binary. There’s 203.0.113.0, and
  • 18:59 - 19:06
    there’s 203.0.113.1. Normally, this would be a problem because it leaves no usable
  • 19:06 - 19:10
    addresses after subtracting the network and broadcast addresses, but for point-to-point
  • 19:10 - 19:16
    networks like this, a dedicated connection like this between two routers, there is actually
  • 19:16 - 19:21
    no need for a network address or a broadcast address. So, we can break the rules in this
  • 19:21 - 19:27
    case and assign the only two addresses in this network to our routers. Note that if
  • 19:27 - 19:32
    you try this configuration on a Cisco router, you’ll get a warning like this, reminding
  • 19:32 - 19:37
    you to make sure that this is a point-to-point link, but it is a totally valid configuration.
  • 19:37 - 19:50
    So, once again, the remaining addresses in the 203.0.113.0/24 address block, which are 203.0.113.2 through 203.0.113.255,
  • 19:50 - 19:55
    are now available to be used in other networks. But this time, we've
  • 19:55 - 20:02
    saved even more addresses, using only two addresses instead of four for this point-to-point connection.
  • 20:02 - 20:08
    People still do use 30 for point-to-point connections at times, but 31 masks are totally
  • 20:08 - 20:12
    valid and more efficient than 30, so I recommend this method.
  • 20:14 - 20:23
    But, we still haven't looked at the 32 mask. A 32 mask is written as 255.255.255.255 in
  • 20:23 - 20:30
    dotted decimal, making the entire address the network portion. There are no host bits.
  • 20:30 - 20:35
    If you calculate this using our formula, you will get one usable address. Clearly, the
  • 20:35 - 20:42
    formula doesn't work in this case. You won't be able to use a 32 mask in this case, and
  • 20:42 - 20:47
    you will probably never use a 32 mask to configure an actual interface. However, there
  • 20:47 - 20:53
    are some uses for a 32 mask. For example, when you want to create a static route not
  • 20:53 - 21:00
    to a network, but to just one specific host, you can use a 32 mask to specify that exact host.
  • 21:00 - 21:06
    Anyway, I'll talk about that later in the course. Just know that 32 masks are
  • 21:06 - 21:10
    used at some points, but you don't have to worry about them for now.
  • 21:10 - 21:16
    Here's a simple chart showing the dotted decimal subnet masks and their equivalent
  • 21:16 - 21:21
    in CIDR notation. That's right, the way of writing a prefix with a slash followed
  • 21:21 - 21:30
    by the prefix length, like 25, 26, etc., is called CIDR notation because it was introduced
  • 21:30 - 21:37
    with the CIDR system. Previously, only the dotted decimal method was used. Note that
  • 21:37 - 21:42
    I've shown you only how to subnet a class C network so far, but we will look at
  • 21:42 - 21:50
    class B and class A networks as well, with prefix lengths like 17, 11, 9, etc.
  • 21:50 - 21:56
    I spent a lot of time on just that one example, but I hope you can see the use of
  • 21:56 - 22:00
    subnetting--dividing a larger network into smaller networks called subnets.
  • 22:00 - 22:07
    Instead of using the whole 203.0.113.0/24 network for the point-to-point connection, we can
  • 22:07 - 22:14
    use a 30 subnet and use only four addresses, or even better, use a 31 subnet and use only
  • 22:14 - 22:20
    two addresses. I'll give one more example of subnetting before finishing up this video.
  • 22:20 - 22:24
    In the next video, I'll give you some practice problems and walk you through them so you
  • 22:24 - 22:27
    can get some hands-on practice with subnetting.
  • 22:27 - 22:34
    So, here's a scenario: There are four networks connected to R1, with many hosts connected
  • 22:34 - 22:41
    to each switch. There are 45 hosts per network. R1 needs an IP address in each network, so
  • 22:41 - 22:50
    its address is included in that 45-host number. You have received the 192.168.0.14 network,
  • 22:50 - 22:54
    and you must divide the network into four subnets that can accommodate the number of
  • 22:54 - 23:02
    hosts required. First off, are there enough addresses in the 192.168.0.14 network in
  • 23:02 - 23:09
    the first place? We need 45 hosts per network, including R1, but also remember that each
  • 23:09 - 23:16
    network has a network and broadcast address, so that's plus two. So, we need 47 addresses per subnet.
  • 23:16 - 23:24
    47 times 4 equals 188, so there's no problem in terms of the number of hosts.
  • 23:24 - 23:33
    192.168.0.0/24 is a class C network, so there are 256 addresses. Therefore, we will be able to assign
  • 23:33 - 23:36
    four subnets to accommodate all hosts, no problem.
  • 23:36 - 23:43
    Okay, let's see how we can calculate the subnets we need to make. We need four equal-sized subnets
  • 23:43 - 23:50
    with enough room for at least 45 hosts. Here, I've written out 192.168.0.10
  • 23:50 - 24:00
    with a 30 mask, 255.255.255.252. I skipped 32 and 31 since these aren't point-to-point links.
  • 24:00 - 24:08
    We can't use 31 and definitely can't use 32. Since there are two host bits,
  • 24:08 - 24:14
    the formula to determine the number of usable addresses is
  • 24:14 - 24:21
    2^2 - 2. 2^2 is 2 times 2, which is 4, so that means there are two usable addresses
  • 24:21 - 24:28
    in a 30 network. Clearly, not enough room to accommodate the 45 hosts we have.
  • 24:28 - 24:36
    How about if we use a 29 mask to make these subnets? Can we fit the 45 hosts we need? There are three host bits,
  • 24:36 - 24:44
    so the formula is 2^3 - 2. 2^3 is 2 times 2 times
  • 24:44 - 24:52
    2, which is 8. Therefore, there are six usable addresses, not enough for 45 hosts.
  • 24:52 - 25:00
    How about if we use 28? There are four host bits, so the formula is 2^4 - 2.
  • 25:00 - 25:08
    2^4 is 2 times 2 times 2 times 2, which is 16. So, that means there are
  • 25:08 - 25:13
    14 usable addresses--once again, not enough for 45 hosts.
  • 25:13 - 25:23
    How about 27? There are five host bits, so the formula is 2^5 - 2. And 2^5
  • 25:23 - 25:30
    is 2 times 2 times 2 times 2 times 2, which equals 32. So that means
  • 25:30 - 25:35
    30 usable addresses. Again, not enough for 45 hosts.
  • 25:35 - 25:44
    How about a 26 subnet mask? There are now six host bits, so the formula is 2^6 - 2.
  • 25:44 - 25:51
    2^6 is 2 times 2 times 2 times 2 times 2 times 2, which equals 64.
  • 25:51 - 25:59
    That means there are 62 usable addresses. So, it looks like we've found our number. 27
  • 25:59 - 26:05
    doesn't provide enough address space, but 26 provides more than we need, so we have to
  • 26:05 - 26:11
    go with 26. Unfortunately, you can't always make subnets have exactly the number of addresses
  • 26:11 - 26:17
    you want. There might be some unused address space. That's actually fine, since it's good
  • 26:17 - 26:20
    to have some room for growth anyway.
  • 26:20 - 26:27
    So, I think this video has gone on long enough. Instead of finishing this task in this video, I'll make
  • 26:27 - 26:37
    it this week's quiz. The first subnet, subnet one, is 192.168.0.16. What are the remaining
  • 26:37 - 26:43
    subnets? To help you out, here's a hint: Find the broadcast address of subnet one.
  • 26:43 - 26:50
    The next address after that is the network address of subnet two. And then just repeat the process for subnets
  • 26:50 - 26:57
    three and four. Post your answers in the comment section, and I'll also go over the answer in the next video.
  • 26:58 - 27:05
    So, what did we cover in this video? We covered CIDR (Classless Inter-Domain Routing), which
  • 27:05 - 27:11
    removes the rules of class A, B, and C networks and lets us be more flexible with network
  • 27:11 - 27:17
    addressing, according to the size of the network. We also covered the process of subnetting,
  • 27:17 - 27:22
    but mostly just the basics. Hopefully, you understand the purpose of subnetting and
  • 27:22 - 27:27
    know a little bit about how to do it. I will clarify and expand upon many things in the
  • 27:27 - 27:34
    next video, but also feel free to ask any questions you have in the comments section.
  • 27:34 - 27:39
    For today's video, there won't be a practice lab; that will be after I've finished explaining everything about
  • 27:39 - 27:44
    subnetting. There will be flashcards, however, to help you review some of the things learned
  • 27:44 - 27:48
    in this video. You can download them from the link in the description.
  • 27:48 - 27:53
    I've also recently enabled the membership feature for my channel. If you want to leave
  • 27:53 - 27:59
    a monthly tip to support me, this is another great way to do so. Click "Join" here under
  • 27:59 - 28:01
    the video to check it out.
  • 28:02 - 28:08
    For those who become a JCNP (Jeremy Certified Network Professional) level supporter, I'll
  • 28:08 - 28:15
    give you a shoutout at the end of my videos. So, first of all, thank you so much to Vance Simmons. I just
  • 28:15 - 28:19
    enabled the membership feature and haven't said anything about it yet, and he became my first
  • 28:19 - 28:25
    JCNP level supporter. Thank you so much for supporting the channel. I hope the videos are helping
  • 28:25 - 28:30
    you out. And for my JCNA level supporters, thanks to you too.
  • 28:33 - 28:38
    Thank you for watching. Please subscribe to the channel, like the video, leave a comment,
  • 28:38 - 28:43
    and share the video with anyone else studying for the CCNA. If you want to leave a tip,
  • 28:43 - 28:49
    check the links in the description. I'm also a Brave verified publisher and accept BAT
  • 28:49 - 28:53
    or (Basic Attention Token) tips via the Brave browser. That's all for now.
Title:
Free CCNA | Subnetting (Part 1) | Day 13 | CCNA 200-301 Complete Course
Description:

more » « less
Video Language:
English
Duration:
28:54

English subtitles

Revisions Compare revisions