Anda di halaman 1dari 15

2 Bits Borrowed

Class C
11111111

11111111

11111111

1
128

S.N.M.

255

255
b

1
+

64

Use the formula 2

0
+

0
+

0
+

0
+

0
+

192
# of Usable Subnets

- 2 where b is equal to the # of bits borrowed.

(2x2) - 2

# of Usable Hosts

- 2 where n is equal to the # of bits not borrowed.

26 bits not borrowed - 2

62

(2x2x2x2x2x2) - 2

n
Use the formula 2 where n is equal to the # of bits not borrowed.
The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.

26 bits not borrowed

1st usable subnet range


and increment value

64

(2x2x2x2x2x2)

Usable Subnet

Starting Address

Host Address

Broadcast Address

xxx.xxx.xxx.64

xxx.xxx.xxx.65

xxx.xxx.xxx.127

xxx.xxx.xxx.128

xxx.xxx.xxx.129

xxx.xxx.xxx.191

Net - ID
1st Subnet

0
+

22 bits borrowed - 2

# of Usable Hosts

Range of Subnets

255

Use the formula 2

# of Usable Subnets

2nd Subnet

Usable Subnet
Hosts

Start
End

Broadcast Address
Usable Subnet
Hosts

Start

Host - ID

128

64

32

16

xxx.xxx.xxx. 64
xxx.xxx.xxx. 65
xxx.xxx.xxx.126
xxx.xxx.xxx.127

0
0
0
0

1
1
1
1

xxx.xxx.xxx.128
xxx.xxx.xxx.129

1
1

0
0

2nd Subnet

Hosts
Broadcast Address

End

xxx.xxx.xxx.190
xxx.xxx.xxx.191

1
1

0
0

3 Bits Borrowed

Class C
11111111

11111111

11111111

1
128

S.N.M.

255

# of Usable Subnets

# of Usable Hosts

Range of Subnets

255

Use the formula 2

255
b

64

1
+

32

0
+

0
+

0
+

(2x2x2) - 2

# of Usable Hosts

30

(2x2x2x2x2) - 2

n
Use the formula 2 where n is equal to the # of bits not borrowed.
The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.

25 bits not borrowed

# of Usable Subnets

- 2 where n is equal to the # of bits not borrowed.

25 bits not borrowed - 2

224

- 2 where b is equal to the # of bits borrowed.

23 bits borrowed - 2
Use the formula 2

(2x2x2x2x2)

1st usable subnet range


and increment value

32

Usable Subnet

Starting Address

Host Address

Broadcast Address

xxx.xxx.xxx.32

xxx.xxx.xxx.34

xxx.xxx.xxx.63

xxx.xxx.xxx.64

xxx.xxx.xxx.65

xxx.xxx.xxx.95

xxx.xxx.xxx.96

xxx.xxx.xxx.96

xxx.xxx.xxx.127

xxx.xxx.xxx.128

xxx.xxx.xxx.127

xxx.xxx.xxx.159

xxx.xxx.xxx.160

xxx.xxx.xxx.158

xxx.xxx.xxx.191

xxx.xxx.xxx.192

xxx.xxx.xxx.189

xxx.xxx.xxx.223

4 Bits Borrowed

Class C
11111111

11111111

11111111

1
128

S.N.M.

255

# of Usable Subnets

# of Usable Hosts

Range of Subnets

255

Use the formula 2

255
b

64

1
+

32

1
+

0
+

16

0
+

14

(2x2x2x2) - 2

# of Usable Hosts

14

(2x2x2x2) - 2

n
Use the formula 2 where n is equal to the # of bits not borrowed.
The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.

24 bits not borrowed

# of Usable Subnets

- 2 where n is equal to the # of bits not borrowed.

24 bits not borrowed - 2

240

- 2 where b is equal to the # of bits borrowed.

24 bits borrowed - 2
Use the formula 2

(2x2x2x2)

1st usable subnet range


and increment value

16

Usable Subnet

Starting Address

Host Address

Broadcast Address

xxx.xxx.xxx.16

xxx.xxx.xxx.17

xxx.xxx.xxx.31

xxx.xxx.xxx.32

xxx.xxx.xxx.33

xxx.xxx.xxx.47

xxx.xxx.xxx.48

xxx.xxx.xxx.49

xxx.xxx.xxx.63

xxx.xxx.xxx.64

xxx.xxx.xxx.65

xxx.xxx.xxx.79

xxx.xxx.xxx.80

xxx.xxx.xxx.81

xxx.xxx.xxx.95

xxx.xxx.xxx.96

xxx.xxx.xxx.97

xxx.xxx.xxx.111

xxx.xxx.xxx.112

xxx.xxx.xxx.113

xxx.xxx.xxx.127

xxx.xxx.xxx.128

xxx.xxx.xxx.129

xxx.xxx.xxx.143

xxx.xxx.xxx.144

xxx.xxx.xxx.145

xxx.xxx.xxx.159

10

xxx.xxx.xxx.160

xxx.xxx.xxx.161

xxx.xxx.xxx.175

11

xxx.xxx.xxx.176

xxx.xxx.xxx.177

xxx.xxx.xxx.191

12

xxx.xxx.xxx.192

xxx.xxx.xxx.193

xxx.xxx.xxx.207

13

xxx.xxx.xxx.208

xxx.xxx.xxx.209

xxx.xxx.xxx.223

14

xxx.xxx.xxx.224

xxx.xxx.xxx.225

xxx.xxx.xxx.239

5 Bits Borrowed

Class C
11111111

11111111

11111111

1
128

S.N.M.

255

# of Usable Subnets

# of Usable Hosts

Range of Subnets

255

Use the formula 2

255
b

64

1
+

32

1
+

1
+

16

0
+

30

(2x2x2x2x2) - 2

# of Usable Hosts

(2x2x2) - 2

n
Use the formula 2 where n is equal to the # of bits not borrowed.
The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.

23 bits not borrowed

# of Usable Subnets

- 2 where n is equal to the # of bits not borrowed.

23 bits not borrowed - 2

248

- 2 where b is equal to the # of bits borrowed.

25 bits borrowed - 2
Use the formula 2

(2x2x2)

1st usable subnet range


and increment value

Usable Subnet

Starting Address

Host Address

Broadcast Address

xxx.xxx.xxx.8

xxx.xxx.xxx.9

xxx.xxx.xxx.15

xxx.xxx.xxx.16

xxx.xxx.xxx.17

xxx.xxx.xxx.23

xxx.xxx.xxx.24

xxx.xxx.xxx.25

xxx.xxx.xxx.31

xxx.xxx.xxx.32

xxx.xxx.xxx.33

xxx.xxx.xxx.39

xxx.xxx.xxx.40

xxx.xxx.xxx.41

xxx.xxx.xxx.47

26

xxx.xxx.xxx.208

xxx.xxx.xxx.209

xxx.xxx.xxx.215

27

xxx.xxx.xxx.216

xxx.xxx.xxx.217

xxx.xxx.xxx.223

28

xxx.xxx.xxx.224

xxx.xxx.xxx.225

xxx.xxx.xxx.231

29

xxx.xxx.xxx.232

xxx.xxx.xxx.233

xxx.xxx.xxx.239

30

xxx.xxx.xxx.240

xxx.xxx.xxx.241

xxx.xxx.xxx.247

6 Bits Borrowed

Class C
11111111

11111111

11111111

1
128

S.N.M.

255

# of Usable Subnets

# of Usable Hosts

Range of Subnets

255

Use the formula 2

255
b

64

1
+

32

1
+

1
+

16

0
+

62

(2x2x2x2x2x2) - 2

# of Usable Hosts

(2x2) - 2

n
Use the formula 2 where n is equal to the # of bits not borrowed.
The result identifies the first "usable" subnet range will be and also identify the
increments of the ranges.

22 bits not borrowed

# of Usable Subnets

- 2 where n is equal to the # of bits not borrowed.

22 bits not borrowed - 2

252

- 2 where b is equal to the # of bits borrowed.

26 bits borrowed - 2
Use the formula 2

(2x2)

1st usable subnet range


and increment value

Usable Subnet

Starting Address

Host Address

Broadcast Address

xxx.xxx.xxx.4

xxx.xxx.xxx.5

xxx.xxx.xxx.7

xxx.xxx.xxx.8

xxx.xxx.xxx.9

xxx.xxx.xxx.11

xxx.xxx.xxx.12

xxx.xxx.xxx.13

xxx.xxx.xxx.15

xxx.xxx.xxx.16

xxx.xxx.xxx.17

xxx.xxx.xxx.19

xxx.xxx.xxx.20

xxx.xxx.xxx.21

xxx.xxx.xxx.23

58

xxx.xxx.xxx.232

xxx.xxx.xxx.233

xxx.xxx.xxx.235

59

xxx.xxx.xxx.236

xxx.xxx.xxx.237

xxx.xxx.xxx.239

60

xxx.xxx.xxx.240

xxx.xxx.xxx.241

xxx.xxx.xxx.243

61

xxx.xxx.xxx.244

xxx.xxx.xxx.245

xxx.xxx.xxx.247

62

xxx.xxx.xxx.248

xxx.xxx.xxx.249

xxx.xxx.xxx.251

Class C

Subnet Mask

# of Usable
Subnets

# of Usable
Hosts

Subnet Ranges

Add the binary value of the bits borrowed


(128 + 64 + 32 + . . . )

Multiply the bits


borrowed - 2
2b - 2

Multiply the bits not


borrowed - 2
2n - 2

Multiply the bits not borrowed


2n

.1100 0000

.1110 0000

255.255.255.192

255.255.255.224

xxx.xxx.xxx.64

62 xxx.xxx.xxx.128

xxx.xxx.xxx.32
xxx.xxx.xxx.64
xxx.xxx.xxx.96
30 xxx.xxx.xxx.128
xxx.xxx.xxx.160
xxx.xxx.xxx.192

.1111 0000

255.255.255.240

14

14

.1111 1000

255.255.255.248

30

.1111 1100

255.255.255.252

62

xxx.xxx.xxx.16
xxx.xxx.xxx.32

xxx.xxx.xxx.8
xxx.xxx.xxx.16

xxx.xxx.xxx.4
xxx.xxx.xxx.8

Subnet Mask
Add the binary value of the bits borrowed
(128 + 64 + 32 + . . . )

.1100 0000

.1110 0000

.1111 0000

.1111 1000

.1111 1100

# of Usable # of Usable
Subnets
Hosts
Multiply the bits
borrowed - 2
2b - 2

Multiply the bits not


borrowed - 2
2n - 2

Subnet
Ranges
Multiply the bits not
borrowed
2n

Class B

Subnet Mask

# of Usable
Subnets

# of Usable
Hosts

Subnet Ranges

Add the binary value of the bits borrowed


(128 + 64 + 32 + . . . )

Multiply the bits


borrowed - 2
2b - 2

Multiply the bits not


borrowed - 2
2n - 2

Multiply the bits not borrowed


2n

.1100 0000.0000 0000

.1110 0000.0000 0000

.1111 0000.0000 0000

.1111 1000.0000 0000

.1111 1100.0000 0000

255.255.192.0

255.255.224.0

255.255.240.0

255.255.248.0

255.255.252.0

14

30

62

16,382

xxx.xxx.64.0
xxx.xxx.128.0

8,190

xxx.xxx.32.0
xxx.xxx.64.0
xxx.xxx.96.0
xxx.xxx.128.0
xxx.xxx.160.0
xxx.xxx.192.0

4,094

xxx.xxx.16.0
xxx.xxx.32.0

2,046

xxx.xxx.8.0
xxx.xxx.16.0

1,022

xxx.xxx.4.0
xxx.xxx.8.0

10

11

.1111 1110.0000 0000

.1111 1111.0000 0000

.1111 1111.1000 0000

.1111 1111.1100 0000

.1111 1111.1110 0000

255.255.254.0

255.255.255.0

255.255.255.128

255.255.255.192

255.255.255.224

126

254

510

1,022

2,046

510

xxx.xxx.2.0
xxx.xxx.4.0

254

xxx.xxx.1.0
xxx.xxx.2.0

126

xxx.xxx.0.128
xxx.xxx.1.0
xxx.xxx.1.128

62

xxx.xxx.0.64
xxx.xxx.0.128
xxx.xxx.0.192
xxx.xxx.1.0
xxx.xxx.1.64

30

xxx.xxx.0.32
xxx.xxx.0.64
...
xxx.xxx.0.224
xxx.xxx.1.0
xxx.xxx.1.32

12

13

14

.1111 1111.1111 0000

.1111 1111.1111 1000

.1111 1111.1111 1100

255.255.255.240

255.255.255.248

255.255.255.252

4,094

8,190

16,382

14

xxx.xxx.0.16
xxx.xxx.0.32
...
xxx.xxx.0.240
xxx.xxx.1.0
xxx.xxx.1.16

xxx.xxx.0.8
xxx.xxx.0.16
...
xxx.xxx.0.248
xxx.xxx.1.0
xxx.xxx.1.8

xxx.xxx.0.4
xxx.xxx.0.8
...
xxx.xxx.0.252
xxx.xxx.1.0
xxx.xxx.1.4

Subnet Mask
Add the binary value of the bits borrowed
(128 + 64 + 32 + . . . )

2 .1100 0000.0000 0000


3 .1110 0000.0000 0000
4 .1111 0000.0000 0000
5 .1111 1000.0000 0000
6 .1111 1100.0000 0000
7 .1111 1110.0000 0000
8 .1111 1111.0000 0000
9 .1111 1111.1000 0000
10 .1111 1111.1100 0000
11 .1111 1111.1110 0000

# of Usable # of Usable
Subnets
Hosts
Multiply the bits
borrowed - 2
2b - 2

Multiply the bits not


borrowed - 2
2n - 2

Subnet
Ranges
Multiply the bits not
borrowed
2n

12 .1111 1111.1111 0000


13 .1111 1111.1111 1000
14 .1111 1111.1111 1100

Class C

Subnet Mask

# of Usable
Subnets

# of Usable
Hosts

Subnet Ranges

Add the binary value of the bits borrowed


(128 + 64 + 32 + . . . )

Multiply the bits


borrowed - 2
2b - 2

Multiply the bits not


borrowed - 2
2n - 2

Multiply the bits not borrowed


2n

.1100 0000

.1110 0000

/26

/27

255.255.255.192

255.255.255.224

xxx.xxx.xxx.64

62 xxx.xxx.xxx.128

xxx.xxx.xxx.32
xxx.xxx.xxx.64
xxx.xxx.xxx.96
30 xxx.xxx.xxx.128
xxx.xxx.xxx.160
xxx.xxx.xxx.192

.1111 0000

/28

255.255.255.240

14

14

.1111 1000

/29

255.255.255.248

30

.1111 1100

/30

255.255.255.252

62

xxx.xxx.xxx.16
xxx.xxx.xxx.32

xxx.xxx.xxx.8
xxx.xxx.xxx.16

xxx.xxx.xxx.4
xxx.xxx.xxx.8

Anda mungkin juga menyukai