< Return to Video

Free CCNA | Subnetting (Part 1) | Day 13 | CCNA 200-301 Complete Course

  • 0:01 - 0:07
    Welcome to Jeremy’s IT Lab. This is a free,
    complete course for the CCNA. If you like
  • 0:07 - 0:13
    these videos, please subscribe to follow along
    with the series. Also, please like and leave
  • 0:13 - 0:17
    a comment, and share the video to help spread
    this free series of videos. Thanks for your
  • 0:17 - 0:19
    help.
  • 0:19 - 0:25
    In this we will be talking about ‘subnetting’.
    This is a very big topic for the CCNA, but
  • 0:25 - 0:30
    not just for the test, it’s an essential
    skill for a network engineer. Many people
  • 0:30 - 0:36
    have trouble understanding subnetting, but
    let me assure you, it is NOT difficult. Subnetting
  • 0:36 - 0:42
    is very simple if you take it step-by-step.
    So, I’m going to split subnetting into 2
  • 0:42 - 0:47
    , or maybe even 3 videos so we can take our
    time to really understand subnetting without
  • 0:47 - 0:53
    getting lost. Now, because subnetting is such
    an important topic and many people have trouble
  • 0:53 - 0:58
    with it, there are already plenty of subnetting
    videos on youtube. Of course feel free to
  • 0:58 - 1:03
    check out those videos too, there are some
    different tricks and techniques people teach
  • 1:03 - 1:08
    that can speed up the subnetting process.
    I, however, will simply outline the basic
  • 1:08 - 1:14
    steps involved in subnetting, I will avoid over-complicating the topic. My end
  • 1:14 - 1:20
    goal for these videos is that you understand
    and can do subnetting. So let’s get started.
  • 1:20 - 1:28
    So, what will we cover in this video? Only
    a couple things. First is C I D R, pronounced
  • 1:28 - 1:35
    CIDR, which stands for classless inter-domain
    routing. What exactly is that? Well, remember
  • 1:35 - 1:43
    I introduced the IPv4 address classes, such
    as class A, B, and C? Well, CIDR throws all
  • 1:43 - 1:49
    that away and lets us be more flexible with
    our IPv4 networks. Then, of course, we’ll
  • 1:49 - 1:54
    cover the process of subnetting, taking it
    step-by-step so you don’t get lost.
  • 1:54 - 2:00
    Now, before I get into CIDR, let’s review
    these IPv4 address classes, so we can then
  • 2:00 - 2:07
    understand the need for classLESS IPv4 addressing.
    There are five classes of IPv4 addresses,
  • 2:07 - 2:15
    A, B, C, D, and E. Class A addresses have
    a first octet beginning with 0, and the rest
  • 2:15 - 2:20
    of the bits can either be 0 or 1. This leads
    to a decimal range for the first octet of
  • 2:20 - 2:29
    0 to 127. Remember, an IPv4 address is 32
    bits, so there are 4 octets, 4 groups of 8
  • 2:29 - 2:42
    bits, in an IPv4 address. This makes the class
    A address range from 0.0.0.0 through 127.255.255.255.
  • 2:42 - 2:47
    Now, remember there are some special and reserved
    addresses in these ranges that can’t be
  • 2:47 - 2:52
    used for normal IP addresses on a device,
    but for this video we’ll just include all
  • 2:52 - 3:00
    of them in Class A. Class B addresses have
    a first octet beginning with 1 0 , and the
  • 3:00 - 3:07
    other 6 bits can be either 0 or 1. This gives
    a range for the first octet of 128 through
  • 3:07 - 3:19
    191. The address range for class B is 128.0.0.0
    through 191.255.255.255. Class C addresses
  • 3:19 - 3:25
    have the first three bits set to 1 1 0, and
    the others can be either 0 or 1. If you write
  • 3:25 - 3:34
    that range in decimal that is 192 through
    223. The address range is therefore 192.0.0.0
  • 3:34 - 3:43
    through 223.255.255.255. Class D addresses
    begin with 1 1 1 0 in binary, which gives
  • 3:43 - 3:50
    a range of 224 through 239 for the first octet
    of the address. This means that the address range
  • 3:50 - 4:02
    for class D is 224.0.0.0 through 239.255.255.255.
    Finally, class E address begin with 1 1 1 1
  • 4:02 - 4:11
    in binary, so the first octet range is 240
    through 255, and therefore the address range is 240.0.0.0
  • 4:11 - 4:14
    through 255.255.255.255.
  • 4:14 - 4:22
    However, only the class A, B and C addresses
    can be assigned to a device as an IP address,
  • 4:22 - 4:29
    as classes D and E have special purposes I
    mentioned in the IPv4 addressing videos. Class
  • 4:29 - 4:35
    A addresses have a /8 prefix length, meaning
    the first octet identifies the network and
  • 4:35 - 4:40
    the other three octets are used for individual
    hosts within the network. Class B addresses
  • 4:40 - 4:46
    have a /16 prefix length, so the first two
    octets identify the network, and the last
  • 4:46 - 4:52
    two octets identify individual hosts within
    that network. Class C addresses have a prefix
  • 4:52 - 4:58
    length of /24, so the first three octets are
    used to identify the network, and only the
  • 4:58 - 5:03
    last octet is used to identify individual
    hosts within that network.
  • 5:03 - 5:08
    The different prefix lengths give different
    characteristics to these classes. As you can
  • 5:08 - 5:14
    see, there are few class A networks available,
    only 128, actually less than that because
  • 5:14 - 5:21
    some are reserved, like the 127.0.0.0/8 range,
    which you may remember is used for loopback
  • 5:21 - 5:26
    addresses. Because only the first octet of
    a class A address is used for the network
  • 5:26 - 5:32
    ID, there are three whole octets available
    for addresses within each class A network,
  • 5:32 - 5:40
    so there are 16 million, 777 thousand, 216
    addresses in each class A network. That is
  • 5:40 - 5:48
    2 to the power of 24, because there are 3
    octets, 3 times 8 equals 24 bits. Class B
  • 5:48 - 5:55
    addresses are different, there more class
    B networks, 16,384, but fewer addresses per
  • 5:55 - 6:03
    network, 65,536, which is still very many
    addresses of course. Finally, there are very
  • 6:03 - 6:13
    many class C networks, 2 million 97 thousand
    152 networks, but only 256 addresses per network.
  • 6:13 - 6:20
    So, how does a company get their own network
    to use? Well, IP addresses are assigned to
  • 6:20 - 6:26
    companies or organizations by a non-profit
    American corporation called the IANA, the
  • 6:26 - 6:33
    Internet Assigned Numbers Authority. The IANA
    assigns IPv4 address and networks to companies
  • 6:33 - 6:39
    based on their size. For example, a very large
    company might receive a Class A or Class B
  • 6:39 - 6:44
    network, remember there are lots of available
    addresses to use for hosts in each class A
  • 6:44 - 6:50
    and class B network, while a small company
    might receive a class C network, because there
  • 6:50 - 6:57
    are fewer addresses in each class C network,
    only 256. However, this system led to many
  • 6:57 - 7:03
    wasted IP addresses, so multiple methods of
    improving this system have been created. Let
  • 7:03 - 7:09
    me give you an example of how this strict
    system of addresses can waste IP addresses.
  • 7:09 - 7:16
    So, here are two routers. As you can see,
    R1 has three networks connected to it here.
  • 7:16 - 7:21
    Remember that routers are used to connect different
    networks, so each of these links are separate
  • 7:21 - 7:28
    Layer 3 networks, different IP networks. R2
    also has three networks connected here. Perhaps
  • 7:28 - 7:33
    each of these networks will have a few switches,
    with many end hosts such as PCs and servers
  • 7:33 - 7:40
    connected to these switches. However, there
    is one more network here. That’s this network
  • 7:40 - 7:45
    connecting these two routers. This is known
    as a ‘point-to-point’ network, meaning
  • 7:45 - 7:52
    that its a network connecting two points,
    in this case R1 and R2. For example, this
  • 7:52 - 7:57
    might be a connection between offices in different
    cities, let’s say San francisco and new
  • 7:57 - 7:59
    york.
  • 7:59 - 8:05
    So, because this is a point-to-point network,
    we don’t need a large address block, so
  • 8:05 - 8:14
    let’s use a class C network, 203.0.113.0/24.
    Because this is a class C network, there are
  • 8:14 - 8:23
    256 addresses in the network. Minus 1 for
    the network address, 203.0.113.0, minus one
  • 8:23 - 8:31
    for the broadcast address, 203.0.113.255,
    minus one for R1’s address, which I’ll
  • 8:31 - 8:40
    assign as 203.0.113.1, and minus 1 for R2’s
    address, which I’ll assign as 203.0.113.2.
  • 8:40 - 8:47
    That’s a total of 4 addresses used, and
    252 addresses WASTED. Clearly, this is not
  • 8:47 - 8:51
    an ideal system.
  • 8:51 - 8:57
    Before introducing CIDR, here’s another
    quick example of address waste. A company,
  • 8:57 - 9:05
    company X, needs IP addressing for 5000 end
    hosts. This is a problem. Why? A class C network
  • 9:05 - 9:11
    does not provide enough addresses, so a class
    B network must be assigned. Because a class
  • 9:11 - 9:18
    B network allows for about 65,000 addresses,
    this results in about 60,000 addresses being
  • 9:18 - 9:20
    wasted.
  • 9:20 - 9:24
    When the Internet was first created, the creators
    did not predict that the Internet would become
  • 9:24 - 9:30
    as large as it is today. This resulted in
    wasted address space like the examples I showed
  • 9:30 - 9:36
    you, and there are many more examples that
    I could show you. The total IPv4 address space
  • 9:36 - 9:41
    includes over 4 billion addresses, and that
    seemed like a huge number of addresses when
  • 9:41 - 9:52
    IPv4 was created, but now address space exhaustion
    is a big problem, there's not enough addresses. One way to solve, or remedy this is
  • 9:52 - 10:00
    CIDR. The IETF (Internet Engineering Task
    Force) introduced CIDR in 1993 to replace
  • 10:00 - 10:04
    the ‘classful’ addressing system.
  • 10:04 - 10:10
    With CIDR, the requirements of ‘class A
    address must use a /8 network mask, class
  • 10:10 - 10:18
    B must use /16, and class C must use /24’
    were removed. This allowed larger networks
  • 10:18 - 10:24
    to be split into smaller networks, allowing
    greater efficiency. These smaller networks
  • 10:24 - 10:29
    are called ‘subnetworks’ or ‘subnets’.
    Let’s look at an example of splitting a
  • 10:29 - 10:34
    larger network into a smaller network so you
    can see how it works.
  • 10:34 - 10:41
    Here’s the same point-to-point network we
    looked at before. Previously, it was assigned
  • 10:41 - 10:49
    the 203.0.113.0/24 network space, but that
    resulted in lots of wasted addresses. Let’s
  • 10:49 - 10:56
    write this out in binary. Here’s the binary,
    with the dotted decimal underneath. Now, the
  • 10:56 - 11:05
    prefix length is /24, so here’s the network
    mask, also known as the subnet mask, 255.255.255.0.
  • 11:05 - 11:11
    Remember, all ‘1s’ in the subnet mask
    indicate that the same bit in the address
  • 11:11 - 11:17
    is the network portion. In this case, I made
    the network portion blue, and the host portion
  • 11:17 - 11:26
    is red. Well, how many host bits are there? 8, because
    it’s one octet. So, how many potential hosts, or how
  • 11:26 - 11:34
    many usable addresses are there? Well, the
    formula is this. 2 to the power of 8, minus
  • 11:34 - 11:42
    2, equals 254 usable addresses. What is the
    8? Well, it’s the number of host bits, which is
  • 11:42 - 11:49
    8 in this case. And why minus 2? Those are
    the network address and broadcast address,
  • 11:49 - 11:54
    we can’t assign them to a device so we have
    to remove them from the number of usable addresses.
  • 11:54 - 12:02
    So, we have 254 usable addresses, but we only
    need two, one for R1 and one for R2.
  • 12:02 - 12:09
    However, CIDR allows us to assign different
    prefix lengths, it doesn’t have to be /24.
  • 12:09 - 12:13
    Let’s get some practice calculating the
    number of hosts with different prefix
  • 12:13 - 12:34
    lengths. 203.0.113.0/25. 203.0.113.0/26, 203.0.113.0/27,
    /28, /29, /30, /31, and finally /32. I’ve
  • 12:34 - 12:40
    put /31 and /32 in red because they’re a
    little bit special, you’ll see when you
  • 12:40 - 12:46
    try to calculate it. So, pause the video here
    and try to calculate how many usable address
  • 12:46 - 12:54
    are in each network...okay, let’s check
    out the answers.
  • 12:54 - 13:02
    So, here is 203.0.113.0, but this time with
    a /25 mask. Notice that the network portion
  • 13:02 - 13:07
    of the address has extended into the first
    bit of the last octet, and the mask
  • 13:07 - 13:16
    in dotted decimal is now written as 255.255.255.128.
    I changed the color of the extra bit to purple,
  • 13:16 - 13:21
    but it is part of the network portion, the blue
    part. If you don’t remember how to convert
  • 13:21 - 13:27
    from binary to dotted decimal, make sure you
    review that, it’s very important for subnetting.
  • 13:27 - 13:32
    Now there are 7 bits in the host portion of
    the address, so the number of usable addresses
  • 13:32 - 13:40
    is 2 to the power of 7, minus 2, which equals
    126. Once again, we only need 2 addresses,
  • 13:40 - 13:47
    one for R1 and one for R2, so we will be wasting
    124 addresses. That’s better than wasting
  • 13:47 - 13:54
    252 addresses with a /24 prefix length, but
    still its wasteful.
  • 13:54 - 14:02
    How about a /26 prefix length? Notice that
    it’s now written 255.255.255.192 in dotted
  • 14:02 - 14:08
    decimal, because two bits of the last octet
    are now part of the network portion. Since
  • 14:08 - 14:15
    there are 6 host bits, there are now 62 usable
    addresses in this network. If we were to use
  • 14:15 - 14:24
    a /26 network mask for the 203.0.113.0 network,
    we would be wasting 60 addresses. Getting
  • 14:24 - 14:28
    better, but we can make this network even
    smaller.
  • 14:28 - 14:34
    Now that you get the idea, let’s speed it
    up. For a /27 prefix length, the mask is written
  • 14:34 - 14:43
    as 255.255.255.224 in dotted decimal. There
    are now 5 host bits, so that means there are
  • 14:43 - 14:49
    30 usable addresses. As you can see, the address
    space is getting smaller and smaller as we extend the
  • 14:49 - 14:51
    network mask.
  • 14:51 - 15:01
    For a /28 prefix length, the mask is written
    as 255.255.255.240 in dotted decimal. There
  • 15:01 - 15:08
    are now only 4 host bits, so that means there
    are 14 usable addresses. After assigning addresses
  • 15:08 - 15:14
    to R1 and R2 this would mean only 12 wasted
    addresses. But we can make this address space
  • 15:14 - 15:20
    even smaller, to make our addressing even
    more efficient.
  • 15:20 - 15:28
    If we use a /29 prefix length, the mask is
    written as 255.255.255.248 in dotted decimal.
  • 15:28 - 15:35
    Now we have only 3 host bits, so that means
    there are just 6 usable addresses. Again,
  • 15:35 - 15:42
    after we give R1 and R2 addresses there would
    be only 4 wasted addresses.
  • 15:42 - 15:50
    If we use a /30 prefix length, the mask is
    written as 255.255.255.252 in dotted decimal.
  • 15:50 - 15:57
    There are now only 2 host bits, so that means
    2 usable addresses. So, this is perfect! There
  • 15:57 - 16:03
    are 4 total addresses, that's the network address,
    the broadcast address, R1’s address, and
  • 16:03 - 16:08
    R2’s address. That means 0 wasted addresses!
  • 16:08 - 16:19
    Before moving on to /31 and /32 let me clarify
    a little bit. So, instead of 203.0.113.0/24,
  • 16:19 - 16:30
    we will use 203.0.113.0/30, which is a subnet
    of that larger class C network. 203.0.113.0/30
  • 16:30 - 16:38
    includes the address range of 203.0.113.0
    through 203.0.113.3. Let me show you that
  • 16:38 - 16:50
    in binary. Here is 203.0.113.0 in binary,
    the host portion all 0s. Here is 203.0.113.1,
  • 16:50 - 17:00
    203.0.113.2, and 203.0.113.3. These are the
    4 addresses in the network, these two being
  • 17:00 - 17:07
    the two usable addresses which are assigned
    to R1 and R2. So we took up 4 addresses with
  • 17:07 - 17:15
    this subnet, what about the other addresses
    in the 203.0.113.0/24 range? The remaining
  • 17:15 - 17:25
    addresses in the address block, which are 203.0.113.4 – 203.0.113.255, are now available
  • 17:25 - 17:34
    to be used in other subnets! That’s the
    magic of subnetting. Instead of using 203.0.113.0/24
  • 17:34 - 17:42
    and wasting 252 addresses, we can use /30 and
    waste no addresses. Or, perhaps there is another
  • 17:42 - 17:47
    way to make this even more efficient? Let’s
    look into it.
  • 17:47 - 17:57
    If we use a /31 prefix length, the mask is
    written as 255.255.255.254 in dotted decimal.
  • 17:57 - 18:06
    There is now only 1 host bit, so that means...0
    usable addresses. 2 to the power of 1 is 2,
  • 18:06 - 18:12
    minus 2 for the network and broadcast addresses,
    means 0 addresses that we can assign to devices.
  • 18:12 - 18:20
    So, you used to not be able to use /31 network
    prefixes because of this. HOWEVER, for a point
  • 18:20 - 18:25
    to point connection like this it actually
    is possible to use a /31 mask. Let’s check
  • 18:25 - 18:27
    it out.
  • 18:27 - 18:41
    So here’s the 203.0.113.0/31 network, R1
    is 203.0.113.0 and R2 is 203.0.113.1. The
  • 18:41 - 18:51
    203.0.113.0/31 network consists of the addresses
    from 203.0.113.0 through 203.0.113.1...which
  • 18:51 - 18:59
    is actually only two addresses. Here they
    are in binary. there’s 203.0.113.0, and
  • 18:59 - 19:06
    there’s 203.0.113.1. Normally this would
    be a problem, because it leaves no usable
  • 19:06 - 19:10
    addresses after subtracting the network and
    broadcast addresses, but for point-to-point
  • 19:10 - 19:16
    networks like this, a dedicated connection
    like this between two routers, there is actually
  • 19:16 - 19:21
    no need for a network address or a broadcast
    address. So, we can break the rules in this
  • 19:21 - 19:27
    case and assign the only two addresses in
    this network to our routers. Note that, if
  • 19:27 - 19:32
    you try this configuration on a Cisco router,
    you’ll get a warning like this, reminding
  • 19:32 - 19:37
    you to make sure that this is a point-to-point
    link, but it is a totally valid configuration.
  • 19:37 - 19:47
    So, once again The remaining addresses in
    the 203.0.113.0/24 address block, which are 203.0.113.2
  • 19:47 - 19:55
    – 255 are now available to be
    used in other networks! But this time we’ve
  • 19:55 - 20:02
    saved even more addresses, using only 2 addresses
    instead of 4 for this point-to-point connection.
  • 20:02 - 20:08
    People still do use /30 for point-to-point
    connections at times, but /31 masks are totally
  • 20:08 - 20:14
    valid and more efficient than /30 so I recommend
    this method!
  • 20:14 - 20:23
    But we still haven’t looked at the /32 mask.
    A /32 mask is written as 255.255.255.255 in
  • 20:23 - 20:30
    dotted decimal, making the entire address
    the network portion, there are no host bits.
  • 20:30 - 20:35
    If you calculate this using our formula, you
    will get -1 usable addresses...clearly the
  • 20:35 - 20:42
    formula doesn’t work in this case. You won’t
    be able to use a /32 mask in this case, and
  • 20:42 - 20:47
    you will probably never use a /32 mask to
    configure an actual interface. However, there
  • 20:47 - 20:53
    are some uses for a /32 mask, for example
    when you want to create a static route not
  • 20:53 - 21:00
    to a network, but just to one specific host,
    you can use a /32 mask to specify that exact
  • 21:00 - 21:06
    host. Anyway, I’ll talk about that later
    in the course, just know that /32 masks are
  • 21:06 - 21:10
    used at some points, but you don’t have
    to worry about them for now.
  • 21:10 - 21:16
    Here’s a simple chart showing the dotted
    decimal subnet masks, and their equivalent
  • 21:16 - 21:21
    in CIDR notation. That’s right, the way
    of writing a prefix with a slash followed
  • 21:21 - 21:30
    by the prefix length, like /25, /26, etc.
    is called CIDR notation, because it was introduced
  • 21:30 - 21:37
    with the CIDR system. Previously, only the
    dotted decimal method was used. Note that
  • 21:37 - 21:42
    I’ve showed you only how to subnet a class
    C network so far, but we will look at
  • 21:42 - 21:50
    class B and class A networks as well, with
    prefix lengths like /17, /11, /9, etc.
  • 21:50 - 21:56
    I spent a lot of time on just that one
    example, but I hope you can see the use of
  • 21:56 - 22:01
    subnetting, dividing a larger network into
    smaller networks, called subnets. Instead
  • 22:01 - 22:07
    of using the whole 203.0.113.0/24 network
    for the point to point connection, we can
  • 22:07 - 22:14
    use a /30 subnet and use only 4 addresses,
    or even better use a /31 subnet and use only
  • 22:14 - 22:20
    2 addresses. I’ll give one more example
    of subnetting before finishing up this video.
  • 22:20 - 22:24
    In the next video I’ll give you some practice
    problems and walk you through them so you
  • 22:24 - 22:27
    can get some hands-on practice with subnetting.
  • 22:27 - 22:34
    So, here’s a scenario. There are 4 networks
    connected to R1, with many hosts connected
  • 22:34 - 22:41
    to each switch. There are 45 hosts per network,
    R1 needs an IP address in each network so
  • 22:41 - 22:50
    its address is included in the range. You
    have received the 192.168.1.0/24 network,
  • 22:50 - 22:54
    and you must divide the network into four
    subnets that can accommodate the number of
  • 22:54 - 23:02
    hosts required. First off, are there enough
    addresses in the 192.168.1.0/24 network in
  • 23:02 - 23:09
    the first place? So, we need 45 hosts per network,
    including R1, but also remember that each
  • 23:09 - 23:15
    network has a network and broadcast address,
    so that’s plus 2, so we need 47 addresses
  • 23:15 - 23:24
    per subnet. 47 times 4 equals 188, so there’s
    no problem in terms of the number of hosts.
  • 23:24 - 23:33
    192.168.1.0/24 is a class C network, so there
    are 256 addresses, so we will be able to assign
  • 23:33 - 23:36
    4 subnets to accommodate all hosts, no problem.
  • 23:36 - 23:42
    Okay let’s see how we can calculate the
    subnets we need to make. We need four equal
  • 23:42 - 23:50
    sized subnets with enough room for at least
    45 hosts. Here, I’ve written out 192.168.1.0
  • 23:50 - 24:00
    with a /30 mask, 255.255.255.252. I skipped
    /32 and /31, since these aren’t point to
  • 24:00 - 24:08
    point links, we can’t use /31, and definitely
    cant use /32. Since there are 2 host bits,
  • 24:08 - 24:14
    the formula to determine the number of usable
    addresses is 2 to the power of 2, minus 2.
  • 24:14 - 24:21
    2 to the power of 2 is 2 times 2, which is
    4. So that means there are 2 usable addresses
  • 24:21 - 24:28
    in a /30 network. Clearly not enough room
    to accommodate the 45 hosts we have.
  • 24:28 - 24:36
    How about if we use a /29 mask to make these subnets, can we fit
    the 45 hosts we need? There are 3 host bits,
  • 24:36 - 24:44
    so the formula is 2 to the power of 3 minus
    2. 2 to the power of 3 is 2 times 2 times
  • 24:44 - 24:52
    2, which is 8. Therefore there are 6 usable
    addresses, not enough for 45 hosts.
  • 24:52 - 25:00
    How about if we use /28? There are 4 host
    bits, so the formula is 2 to the power of 4
  • 25:00 - 25:08
    minus 2. 2 to the power of 4 is 2 times 2
    times 2 times 2, which is 16. So, that means there are
  • 25:08 - 25:13
    14 usable addresses, once again not enough for 45 hosts.
  • 25:13 - 25:23
    How about /27? There are 5 host bits, so the
    formula is 2 to the power of 5 minus 2. And 2 to
  • 25:23 - 25:30
    the power of 5 is 2 times 2 times 2 times
    2 times 2, which equals 32. So that means
  • 25:30 - 25:35
    30 usable addresses, again not enough
    for 45 hosts.
  • 25:35 - 25:42
    How about a /26 subnet mask? There are now 6
    host bits, so the formula is 2 to the power
  • 25:42 - 25:51
    of 6 minus 2. 2 to the power of 6 is 2 times
    2 times 2 times 2 times 2 times 2, which equals
  • 25:51 - 25:59
    64. That means there are 62 usable addresses.
    So, it looks like we’ve found our number! /27
  • 25:59 - 26:05
    doesn’t provide enough address space. /26
    provides more than we need, but we have to
  • 26:05 - 26:11
    go with /26. Unfortunately we can’t always
    make subnets have exactly the number of addresses
  • 26:11 - 26:17
    you want. There might be some unused address
    space. That’s actually fine, since its good
  • 26:17 - 26:20
    to have some room for growth anyway.
  • 26:20 - 26:27
    So I think this video has gone on long enough.
    Instead of finishing this task in this video, I’ll make
  • 26:27 - 26:37
    it this week’s quiz. The first subnet (Subnet
    1) is 192.168.1.0/26. What are the remaining
  • 26:37 - 26:42
    subnets? To help you out, here’s a hint. Find the broadcast address of Subnet
  • 26:42 - 26:50
    1. The next address after that is the network address
    of Subnet 2. And then just repeat the process for Subnets
  • 26:50 - 26:56
    3 and 4. Post your answers in the comment
    section, and I’ll also go over the answer
  • 26:56 - 26:58
    in the next video.
  • 26:58 - 27:05
    So, what did we cover in this video? We covered
    CIDR, classless inter-domain routing, which
  • 27:05 - 27:11
    removes the rules of class A, B and C networks
    and lets us be more flexible with network
  • 27:11 - 27:17
    addressing, according to the size of the network.
    We also covered the process of subnetting,
  • 27:17 - 27:22
    but mostly just the basics. Hopefully you
    understand the purpose of subnetting, and
  • 27:22 - 27:27
    know a little bit about how to do it. I’ll
    clarify and expand upon many things in the
  • 27:27 - 27:34
    next video, but also feel free to ask any
    questions you have in the comment section.
  • 27:34 - 27:39
    For today’s video there won’t be a practice
    lab, that will be after I’ve finished explaining everything about
  • 27:39 - 27:44
    subnetting. There will be flashcards, however,
    to help you review some of the things learned
  • 27:44 - 27:48
    in this video. You can download them from the link in the description.
  • 27:48 - 27:53
    I’ve also recently enabled the membership
    feature for my channel. If you want to leave
  • 27:53 - 27:59
    a monthly tip to support me, this is another
    great way to do so. Click join here under
  • 27:59 - 28:02
    the video to check it out.
  • 28:02 - 28:08
    For those who become a JCNP, aka Jeremy Certified
    Network Professional, -level supporter, I’ll
  • 28:08 - 28:15
    give you a shoutout at the end of my videos.
    So first of all, thank you so much to Vance Simmons. I just
  • 28:15 - 28:19
    enabled the membership feature and haven’t
    said anything about it yet, and he became my first
  • 28:19 - 28:25
    JCNP-level supporter. Thank you so much for supporting
    the channel, I hope the videos are helping
  • 28:25 - 28:33
    you out. And for my JCNA-level supporters,
    thanks to you too.
  • 28:33 - 28:38
    Thank you for watching. Please subscribe to
    the channel, like the video, leave a comment,
  • 28:38 - 28:43
    and share the video with anyone else studying
    for the CCNA. If you want to leave a tip,
  • 28:43 - 28:49
    check the links in the description. I'm also
    a Brave verified publisher and accept BAT,
  • 28:49 - 28:54
    or Basic Attention Token, tips via the Brave
    browser. That's all for now.
Title:
Free CCNA | Subnetting (Part 1) | Day 13 | CCNA 200-301 Complete Course
Description:

more » « less
Video Language:
English
Duration:
28:54

English subtitles

Revisions Compare revisions