Subnetting! The very word can send shivers down the spine of many aspiring network engineers. But fear not! At its core, subnetting is a logical and essential skill that, once understood, will significantly boost your networking prowess. In this guide, we’ll break down subnetting into bite-sized, practical steps.
What is Subnetting?
Imagine a large apartment building (your network) with hundreds of individual apartments (host devices). Without a system, it would be chaotic trying to find the right apartment. Subnetting is like creating floors and numbering apartments logically within those floors.
In networking terms, subnetting is the process of dividing a larger network IP address range into smaller, more manageable subnetworks (subnets). This helps to:
- Organize your network: Makes it easier to manage and troubleshoot.
- Improve security: You can isolate different parts of your network.
- Optimize network performance: Reduces broadcast traffic within the entire network.
Understanding the Basics: IP Addresses and Network Masks
Before we dive into the how-to, let’s quickly recap IP addresses and network masks:
- IP Address (IPv4): A 32-bit numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It’s typically written in dotted decimal notation (e.g., 192.168.1.10). An IP address has two parts: the network portion and the host portion.
- Network Mask: A 32-bit number that separates the network portion of the IP address from the host portion. It works by having a series of ‘1’s for the network bits and a series of ‘0’s for the host bits (e.g.,
- 255.255.255.0).

The Subnetting Process: Borrowing Bits
The core of subnetting involves “borrowing” bits from the host portion of the IP address and using them to create new network portions (the subnets).
Imagine you have the network address 192.168.1.0
with a default subnet mask of 255.255.255.0
(/24 in CIDR notation). This gives you one network with 254 usable host addresses (2^8 – 2, we subtract 2 for the network and broadcast addresses).
Now, let’s say you need two separate networks. You can borrow one bit from the host portion:
- Original mask:
11111111.11111111.11111111.00000000
(/24) - New mask (borrowing 1 bit):
11111111.11111111.11111111.10000000
(/25)
The borrowed bit creates two subnets:
- Subnet 1: Network address
192.168.1.0
, Usable host range:192.168.1.1
–192.168.1.126
, Broadcast address:192.168.1.127
- Subnet 2: Network address
192.168.1.128
, Usable host range:192.168.1.129
–192.168.1.254
, Broadcast address:192.168.1.255
By borrowing one bit, you created 2 subnets, each capable of supporting 126 usable hosts (2^7 – 2).
A Subnetting Table Example
Borrowed Bits | Subnets Created (2^borrowed bits) | Host Bits Remaining | Usable Hosts per Subnet (2^host bits – 2) | New Subnet Mask (/CIDR) |
1 | 2 | 7 | 126 | 255.255.255.128 (/25) |
2 | 4 | 6 | 62 | 255.255.255.192 (/26) |
3 | 8 | 5 | 30 | 255.255.255.224 (/27) |
Practical Application
Imagine you have a small office with two departments: Sales (needing up to 50 devices) and Marketing (needing up to 20 devices). Using the /26
subnet mask would give you 4 subnets with 62 usable hosts each, which is sufficient for both departments and leaves room for expansion.
Conclusion
Subnetting might seem daunting initially, but by understanding the concept of borrowing bits and how it affects the network and host portions of an IP address, you’re well on your way to mastering it. Practice with different scenarios and subnet masks, and you’ll find it becomes a fundamental tool in your networking toolkit!