Fact-checked by Grok 2 weeks ago

Subnet

A subnet, or subnetwork, is a logical of a larger () network into smaller, more manageable segments that share a common network prefix. This division, known as subnetting, enables efficient allocation of addresses, reduces by limiting broadcast traffic to specific areas, and enhances through isolation of traffic flows. Subnets are defined using a subnet mask, which specifies the portion of an dedicated to the network and subnet identifiers versus the host identifiers, allowing devices within the same subnet to communicate directly without through external gateways. Subnetting emerged as a response to the limitations of early classful IP addressing systems, which allocated fixed-size blocks (Classes A, B, and C) that often wasted addresses or failed to scale with organizational needs. Formalized in August 1985 by RFC 950, the Internet Standard Subnetting Procedure introduced a three-level addressing hierarchy—network prefix, subnet number, and host number—to subdivide existing networks without requiring additional global addresses from the Network Information Center (NIC). This innovation addressed routing table bloat and administrative overhead in growing networks, initially prohibiting the use of all-0s and all-1s subnets to avoid confusion with classful addressing, though modern protocols like OSPF and IS-IS now support them. Over time, subnetting evolved with advancements like Variable Length Subnet Masking (VLSM) in 1009 (1987), which permitted flexible mask lengths within the same network for optimized address usage. The introduction of (CIDR) in 1519 (1993) further refined subnetting by replacing rigid classes with prefix-length notation (e.g., /24), enabling hierarchical aggregation and delaying . Today, subnets remain fundamental to TCP/IP networking, supporting everything from LANs to infrastructures, and extend to through similar prefix-based mechanisms for in modern distributed systems.

Fundamentals of Subnets

Definition and Purpose

A , or subnetwork, is a logically visible subdivision of an , consisting of one or more physical networks that share a common network prefix and function as a single entity within the broader internetwork. This logical division enables the segmentation of a larger into smaller, manageable portions without requiring separate physical , allowing hosts within the same subnet to communicate directly while isolating them from other parts of the . The concept of subnetting originated in the mid-1980s as the grew beyond its initial two-level of networks and hosts, necessitating more granular address management. Formalized in RFC 950, published in August 1985 by the Network Working Group, subnetting was introduced to enable organizations to divide a single network into multiple subnets, supporting hierarchical addressing and enhancing efficiency by reducing the propagation of local connectivity details to global routing tables. This standard built on earlier proposals, such as RFC 917 from 1984, and marked a pivotal shift toward hierarchical addressing in TCP/IP networks. The primary purposes of subnetting include optimizing IP address utilization by allocating smaller address blocks where full prefixes would be wasteful, thereby conserving IPv4 resources. It also improves by isolating traffic between segments, limiting the scope of broadcasts and potential attack vectors; enhances by containing broadcasts within subnets to reduce congestion; and supports in large environments by enabling modular growth without overhauling the entire addressing scheme. These benefits collectively address the limitations of topologies, promoting more efficient and secure operations. In real-world applications, subnetting is widely used in organizational networks to segregate departments—for instance, assigning distinct subnets to and teams to enforce controls and separately. In data centers, it facilitates by mapping virtual machines to isolated subnets, optimizing resource allocation and supporting cloud-scale deployments.

Basic Components

A subnet's fundamental structure relies on partitioning addresses into two primary components: the network prefix, which uniquely identifies the subnet within the larger , and the host identifier, which distinguishes individual devices or hosts connected to that subnet. This division enables efficient organization and routing of by isolating groups of addresses logically. The network prefix ensures that all addresses within a subnet share the same initial bits, while the host identifier allows for unique assignment to endpoints like computers or routers. At the binary level, addresses form fixed-length strings—32 bits for IPv4 and 128 bits for —that are segmented based on the prefix length, commonly expressed in slash notation such as /24, where the number indicates the count of bits allocated to the network prefix. The remaining bits then serve as the host identifier, determining the number of possible unique hosts in the subnet. This binary delineation provides a scalable for address allocation across diverse network sizes. For , the extended bit length supports vastly larger address pools while maintaining the same prefix-host separation principle. Subnet masks play a crucial role in this partitioning by acting as binary overlays that delineate the boundary between prefix and host bits through a series of 1s followed by 0s. In IPv4, a mask like 255.255.255.0 (binary 11111111.11111111.11111111.00000000) corresponds to a /24 prefix, masking the first 24 bits as the network portion. This mechanism facilitates the logical isolation of subnets without altering the underlying address format. Subnets are designed as contiguous blocks of sequential IP addresses to promote routing efficiency, as routers can aggregate these ranges into summarized routes, reducing table sizes and processing overhead in large networks. This contiguity ensures that all addresses in a subnet fall within a continuous numeric sequence, optimizing path determination and minimizing broadcast domains.

Subnetting in IPv4

Address Structure and Prefix Determination

IPv4 addresses consist of 32 bits, typically represented in dotted decimal notation as four octets separated by periods, where each octet ranges from 0 to 255 (e.g., 192.168.1.1). This format facilitates human readability while encoding the structure used in network protocols. In the initial classful addressing system outlined in RFC 791, IPv4 addresses were categorized into classes A, B, and C based on the leading bits of the first octet, which implicitly defined the network prefix length: class A addresses (first octet 1–126) allocated 8 bits for the network, class B (128–191) used 16 bits, and class C (192–223) employed 24 bits. This rigid structure, while simplifying early allocations, proved inefficient for varying network sizes and contributed to address space exhaustion. The shift to classless addressing, enabled by Classless Inter-Domain Routing (CIDR) in RFC 1519 (1993), eliminated class boundaries and introduced variable prefix lengths to optimize address allocation and routing table efficiency. Under CIDR, the prefix length is explicitly specified (e.g., /16 for a 16-bit network portion), allowing subnets to borrow bits from the host portion of any classful address. To identify the network prefix, administrators apply a subnet mask—a 32-bit value with consecutive 1s from the left indicating the network bits—or the equivalent slash notation prefix length. The network address is derived by performing a bitwise AND operation between the full IP address and the subnet mask, isolating the network portion while zeroing the host bits. For instance, the private address block 10.0.0.0/8, reserved per RFC 1918, uses a subnet mask of 255.0.0.0 to denote an 8-bit prefix covering all addresses from 10.0.0.0 to 10.255.255.255. In practice, command-line tools assist in prefix determination without manual computation. The ipcalc utility, for example, processes an and to output the ; invoking ipcalc 172.16.0.0/12 yields the as 172.16.0.0/12, confirming the for that private block. Legacy systems may use to display interface details, including the inet and netmask (e.g., Mask:255.255.255.0 implying /24), while modern distributions favor the command for similar output, such as ip addr show revealing lengths in CIDR notation.

Subnet Mask Mechanics

A subnet mask in IPv4 is a 32-bit value that delineates the network portion from the host portion of an by using contiguous 1s in the representation for the network bits followed by 0s for the host bits. For instance, a /24 prefix corresponds to the mask 11111111.11111111.11111111.00000000, which in dotted decimal notation is 255.255.255.0. This structure allows routers and hosts to identify the boundaries of a local network efficiently. The primary mechanism of a subnet mask involves the bitwise AND operation, which extracts the network address from any IP address within the subnet. The formula is: network address = IP address bitwise AND subnet mask. In binary, the AND operation retains bits where both the IP address and mask have 1s, effectively zeroing out the host bits. For example, the IP address 192.168.1.100 (binary: 11000000.10101000.00000001.01100100) AND the mask 255.255.255.0 (binary: 11111111.11111111.11111111.00000000) yields 192.168.1.0 (binary: 11000000.10101000.00000001.00000000), confirming the network prefix. This operation is fundamental for determining whether a destination IP is local or requires routing. Subnet masks can be expressed in three equivalent notations: dotted decimal (e.g., 255.255.255.0), (e.g., 11111111.11111111.11111111.00000000), and CIDR slash notation (e.g., /24), where the slash indicates the number of leading 1 bits in the . The CIDR notation, introduced to support classless addressing, simplifies representation of variable prefix lengths without altering the underlying . Common subnet masks from /8 to /30 are summarized in the following table, showing the CIDR prefix, dotted decimal equivalent, and usable host range (calculated as 2^(32 - prefix length) - 2, excluding network and broadcast addresses; note that /31 supports 2 hosts for point-to-point links per RFC 3021, and /32 supports 1 host).
CIDR PrefixSubnet Mask (Decimal)Usable Hosts
/8255.0.0.016,777,214
/16255.255.0.065,534
/24255.255.255.0254
/25255.255.255.128126
/26255.255.255.19262
/27255.255.255.22430
/28255.255.255.24014
/29255.255.255.2486
/30255.255.255.2522

Subnet Division Process

The subnet division process in IPv4 involves systematically partitioning a given space into smaller subnetworks by extending the subnet mask through bit borrowing from the host portion. This procedure begins with selecting a base network, such as 192.168.0.0/16, which provides a large address pool for subdivision. The next step is to determine the required number of subnets and hosts per subnet, then borrow the appropriate number of bits from the host field to create subnet bits; for instance, extending from /16 to /24 borrows 8 bits, yielding 2^8 = 256 subnets, each capable of supporting up to 254 usable hosts after reserving the network and broadcast addresses. Finally, calculate the address ranges for each subnet by incrementing the subnet identifier in the borrowed bits while keeping the host bits variable within each block, such as 192.168.0.0/24 (ranging from 192.168.0.0 to 192.168.0.255) and 192.168.1.0/24 (ranging from 192.168.1.0 to 192.168.1.255). The number of subnets created follows the power-of-2 rule based on the borrowed bits (n), resulting in 2^n possible subnets, though early implementations excluded the all-zeroes and all-ones subnets, limiting usable subnets to 2^n - 2; modern practices, enabled by commands like Cisco's "ip subnet-zero," allow full utilization. Similarly, the size of each subnet is determined by the remaining host bits (h), providing 2^h addresses total, with 2^h - 2 usable for hosts to account for the reserved and broadcast addresses. These calculations ensure efficient allocation without overlap, adhering to the contiguous bit positioning recommended for subnet fields. A practical example illustrates this process: dividing the Class A 10.0.0.0/8 into /20 subnets borrows 12 bits from the 24 available host bits, creating 2^12 = 4096 subnets, each with 2^12 - 2 = 4094 usable hosts. The subnet ranges increment by 16 in the third octet (since 2^4 = 16, reflecting the 4 bits in the third octet used for subnetting beyond /16). The first few ranges are: 10.0.0.0/20 (10.0.0.0 to 10.0.15.255), 10.0.16.0/20 (10.0.16.0 to 10.0.31.255), and 10.0.32.0/20 (10.0.32.0 to 10.0.47.255). To automate these calculations and reduce errors, network administrators often use software tools such as online subnet calculators or integrated utilities in software. On Cisco IOS routers, while there is no built-in command for automatic subnet generation, administrators configure subnets directly via commands like " 192.168.1.1 255.255.255.0" after manual or tool-assisted planning, with verification using "show brief."

Host Capacity and Special Addresses

In IPv4 subnetting, the capacity for usable host addresses within a subnet is determined by the number of bits allocated to the host portion of the address. If h represents the number of host bits, the total number of possible addresses is $2^h, but two addresses are reserved: one for the network identifier and one for the . Thus, the formula for usable hosts is $2^h - 2. For example, a /24 subnet, with 8 host bits, provides $2^8 - 2 = 254 usable host addresses. Special addresses within a subnet include the network address, formed by setting all host bits to 0 (e.g., 192.168.1.0 for a /24 subnet), which identifies the subnet itself and cannot be assigned to a , and the , formed by setting all host bits to 1 (e.g., 192.168.1.255 for the same subnet), used to send packets to all hosts on that subnet. Additionally, the address block 127.0.0.0/8 is reserved for internal communication within a , where packets sent to addresses in this range (typically 127.0.0.1) are looped back by the local stack without transmission over . Historically, RFC 950 prohibited the use of the subnet-zero (all subnet bits 0) and all-ones subnet (all subnet bits 1) to avoid ambiguity with non-subnetted special addresses, such as the all-zeros network identifier. However, this restriction was lifted in 1995 by RFC 1878 to improve address efficiency, allowing all possible subnets to be utilized in modern implementations. For edge cases like point-to-point links, /31 subnets (31-bit prefixes) provide exactly two usable addresses without a dedicated broadcast or network address, as both endpoints share the link and use limited broadcast (255.255.255.255) instead; this conserves addresses while supporting direct connections. Similarly, /32 prefixes define a single-host subnet with one usable address, suitable for host routes or looped configurations on such links.

Subnetting in IPv6

IPv6 Address Hierarchy

addresses are 128-bit identifiers expressed in notation, divided into eight groups of four digits separated by colons, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334, with allowed using double colons (::) to represent one or more consecutive groups of zeros, for example 2001:db8:85a3::8a2e:370:7334. This notation supports prefix length indication in CIDR format, like 2001:db8::/32, to denote the network portion. The structure of a global IPv6 address follows a hierarchical division into three main fields: the global routing prefix (typically 48 bits, assigned by upstream providers for ), the subnet ID (16 bits, used to identify individual subnets or links within a ), and the interface ID (64 bits, uniquely identifying a network interface on the link). This division totals 128 bits, with the first 64 bits dedicated to and subnetting (global routing prefix + subnet ID) and the remaining 64 bits for host identification, enabling stateless autoconfiguration via mechanisms like SLAAC. At the hierarchical levels, the provider (global routing prefix) forms the top tier for regional and global routing, followed by the prefix (often a /48 allocation encompassing the global routing prefix and subnet ID space), which allows sites to delegate subnets automatically. Within a , the subnet prefix (typically /64) is used for local area networks (LANs), providing 2^64 addresses per subnet for hosts, while the interface ID ensures uniqueness at the device level. This layered approach—provider, , subnet—facilitates scalable delegation without address exhaustion concerns. The addressing architecture is defined in 4291, published in 2006, which outlines the format, types, and hierarchical model for addresses. Complementing this, 6177 from 2011 provides guidance on end-site assignments, recommending a /56 for typical sites to yield 256 /64 subnets, while mandating /64 for individual LANs to support autoconfiguration and avoid fragmentation. Compared to IPv4's flat 32-bit structure, 's 128-bit expanse eliminates address scarcity, allocating vast blocks (e.g., 2^80 per /48 site ) that reduce the need for complex conservation techniques, while the inherent hierarchy streamlines subnetting and aggregation.

Subnet Allocation Strategies

In networks, end sites are typically assigned a /56 per RFC 6177 recommendations for , providing 256 /64 subnets for internal subnetting, though /48 allocations (yielding 65,536 /64 subnets) remain common for larger sites. This block is then divided into multiple /64 subnets, each suitable for a single link or , as /64 is the recommended size to support features like Stateless Address Autoconfiguration (SLAAC). For instance, from the 2001:db8:1::/56, an administrator might create subnets such as 2001:db8:1:0::/64 for one department and 2001:db8:1:1::/64 for another, incrementing the fourth hextet to denote sequential subnets. This approach ensures hierarchical routing and scalability. Subnet allocation strategies in IPv6 emphasize flexibility and automation to accommodate diverse network environments. Automatic configuration via SLAAC allows hosts to self-assign addresses within a /64 subnet by combining the router-advertised prefix with an interface identifier, typically derived from the or randomly generated for , enabling plug-and-play deployment without central tracking. Alternatively, manual assignment uses in stateless mode to provide prefixes and options alongside SLAAC, or in stateful mode for full , where the assigns specific addresses and maintains records to manage resources and enforce policies like address reuse after expiration. Stateful is particularly useful in enterprise settings requiring centralized oversight, such as integrating with systems. Best practices for subnet allocation prioritize long-term manageability and efficiency. To avoid renumbering during growth or provider changes, planning involves allocating subnets in contiguous blocks, such as reserving powers of two like 2^12 (4096 subnets) for anticipated expansion, while incorporating buffer zones of 100-300% to handle unforeseen needs without disrupting existing assignments. The hierarchy supports this by delineating global routing prefixes from site-local subnetting. Efficient documentation and utilization of allocated blocks are guided by the HD-ratio method, which measures assignment density to balance address sparsity—essential for future-proofing—with practical usage. Defined in RFC 3531, the HD-ratio uses a (typically 0.80-0.94 for ) to determine when additional space is justified; for example, assigning 33% of a /56 (about 85 /64 subnets) under an HD-ratio of 0.80 signals efficient use without over-allocation, promoting sparse techniques like leftmost or centermost bit assignment to minimize renumbering risks. This approach ensures sustainable management across hierarchical levels, from ISPs to end sites.

Differences from IPv4 Practices

IPv6's vastly larger 128-bit address space, compared to IPv4's 32 bits, provides an abundance of addresses that eliminates the need for () commonly used in IPv4 to conserve scarce resources. This abundance enables organizations to assign globally routable addresses directly to devices, simplifying design and enhancing end-to-end connectivity. In practice, IPv6 subnets are typically fixed at a /64 length to ensure compatibility with Stateless Address Autoconfiguration (SLAAC), which relies on a 64-bit combined with a 64-bit identifier for automatic host addressing. This standardization contrasts with IPv4's variable subnet sizes driven by address scarcity, promoting uniform subnet allocation and reducing configuration complexity. Unlike IPv4, which requires subnet masks and bitwise AND operations to determine network portions of addresses, IPv6 exclusively uses prefix lengths (e.g., /64) in its addressing notation, streamlining routing decisions without additional mask computations. Routing tables and protocols in IPv6 directly interpret the prefix length to identify the network boundary, making address resolution more efficient and less error-prone than IPv4's mask-based approach. IPv6 incorporates a dedicated subnet ID field, typically 16 bits within a /48 site allocation, to identify local subnets, differing from IPv4's practice of borrowing bits from the host portion for subnetting. This fixed structure discourages Variable-Length Subnet Masking (VLSM) in favor of uniform /64 subnets, avoiding the fragmentation and management overhead seen in IPv4 networks where bits are flexibly borrowed to create varying subnet sizes. The result is a more predictable hierarchy that supports scalable site-local addressing without the need for complex mask calculations. During migration, IPv6 subnet planning is influenced by transition mechanisms such as dual-stack operation, where hosts and routers maintain both IPv4 and stacks, allowing parallel subnet deployments without immediate restructuring. Tunneling protocols like further impact planning by embedding IPv6 prefixes within IPv4 addresses (e.g., 2002::/16), enabling IPv6 traffic over existing IPv4 infrastructures and facilitating gradual subnet integration. These mechanisms support flexible coexistence but require careful prefix selection to avoid overlaps during the shift from IPv4-dominant to IPv6-preferred networks.

Advanced Subnetting Techniques

Variable-Length Subnet Masking

Variable-Length Subnet Masking (VLSM) is a subnetting technique that extends traditional fixed-length subnetting by allowing the use of multiple subnet masks of varying lengths within the same major network, enabling more efficient allocation of IP addresses to subnets of different sizes. This approach was first formally acknowledged in the requirements for Internet gateways, permitting different masks on interfaces within a subnetted network to accommodate diverse host requirements without adhering to a single mask length. VLSM builds on the foundational subnetting procedures outlined in earlier standards, but introduces flexibility for hierarchical division of address space. Implementation of VLSM involves a hierarchical starting with the largest required subnet and progressively allocating smaller ones from the remaining , ensuring no overlap and contiguous mask bits. For instance, consider the network 192.168.0.0/24, which provides 256 addresses. To support departments needing 100, 50, and 10 hosts respectively (requiring at least 100, 50, and 10 usable host addresses, respectively), the first subnet uses a /25 (192.168.0.0/25), yielding 126 usable hosts. The remaining half (192.168.0.128/25) is then subdivided: a /26 (192.168.0.128/26) for 62 usable hosts, leaving 192.168.0.192/26 for further division into a /28 (192.168.0.192/28) with usable hosts. This method, supported by standard subnet tables, optimizes usage by assigning only necessary addresses to each segment. The primary benefits of VLSM include significant conservation of IP address space in heterogeneous networks where host counts vary, reducing waste compared to uniform fixed masks that might over-allocate to smaller groups. For the example above, VLSM utilizes 208 addresses for the three subnets, leaving room for additional allocations, whereas fixed /26 masks across four potential subnets would waste at least 64 addresses on unused segments. However, VLSM requires classless routing protocols capable of handling variable prefixes, such as OSPF and BGP, which became standard in router implementations following the requirements mandating support for arbitrary-length masks and longest-prefix matching. Protocols like RIP version 1, which assume fixed masks, cannot propagate VLSM routes correctly, necessitating upgrades to RIP v2, EIGRP, or for full deployment.

Integration with CIDR

Classless Inter-Domain (CIDR) represents an extension of subnetting principles to the inter-domain level, enabling the aggregation of multiple networks into supernets to optimize efficiency. Introduced in RFC 1519 in September 1993, CIDR employs variable-length prefixes, allowing network administrators to allocate addresses without adhering to rigid class boundaries and facilitating route summarization across autonomous systems. For instance, four contiguous /24 networks—such as 192.168.0.0/24 through 192.168.3.0/24—can be combined into a single /22 prefix (192.168.0.0/22), which encompasses the address range from 192.168.0.0 to 192.168.3.255. This supernetting capability contrasts with traditional subnetting, which focuses on dividing a given network into smaller subnetworks, by instead promoting consolidation to minimize overhead. CIDR's integration with routing protocols relies on the (LPM) algorithm to resolve ambiguities when multiple prefixes overlap for a given destination. Under LPM, routers select the most specific route by prioritizing the prefix with the greatest number of matching bits; for example, a /24 prefix would take precedence over a broader /16 prefix for an address falling within both. This mechanism ensures accurate in environments with hierarchical address assignments, building directly on subnet mask concepts but applying them at scale to reduce table sizes. Updated specifications in RFC 4632 further clarify CIDR's role in prefix-based , emphasizing its compatibility with variable-length subnet masking techniques. The adoption of CIDR profoundly mitigated the routing table explosion of the early 1990s, when the rapid allocation of numerous small class C networks threatened to overwhelm routers with millions of entries. By enabling efficient aggregation and address conservation, CIDR stemmed this growth, preserving IPv4 space and supporting the Internet's expansion. In modern networks, CIDR remains integral to protocols like version 4 (BGP-4), which explicitly incorporates CIDR for advertising aggregated routes across global domains, ensuring scalability in inter-domain .

References

  1. [1]
    What is a subnet (subnetwork)? | Definition from TechTarget
    Jun 24, 2024 · A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an Internet Protocol (IP) network.
  2. [2]
    What is a subnet? | How subnetting works - Cloudflare
    A subnet, or subnetwork, is a network inside a network. Subnets make networks more efficient. Through subnetting, network traffic can travel a shorter distance.
  3. [3]
    TCP/IP addressing and subnetting - Windows Client | Microsoft Learn
    Jan 15, 2025 · Subnet or Subnetwork--A smaller network created by dividing a larger network into equal parts. TCP/IP--Used broadly, the set of protocols, ...
  4. [4]
    [PDF] Understanding IP Addressing: Everything You Ever Wanted To Know
    Apr 26, 1996 · When subnetting was first defined in RFC 950, it prohibited the use of the all-0s and the all-1s subnet. The reason for this restriction was to ...<|control11|><|separator|>
  5. [5]
    RFC 950: Internet Standard Subnetting Procedure
    This memo discusses the utility of "subnets" of Internet networks, which are logically visible sub-sections of a single Internet network.
  6. [6]
    What Is Subnetting? How Subnets Work - IT Glossary - SolarWinds
    Subnetting is the process of logically dividing an IP network into more subnetworks. Subnetting: What Is a Subnet? How It Works
  7. [7]
    Understand Host and Subnet Quantities - Cisco
    Subnetting and Tables. As a concept, subnetting divides the network into smaller portions called subnets. This is done with borrowed bits from the host portion ...
  8. [8]
    5 Subnetting Benefits - Network Computing
    1. Improve network performance and speed · 2. Reduce network congestion · 3. Boost network security · 4. Control network growth · 5. Ease administration.
  9. [9]
    Introduction to IP addressing and subnetting - TechTarget
    Dec 26, 2023 · Network devices use the subnet mask to determine which part of a host's IP address is the network ID and which part is the host ID. Subnet masks ...
  10. [10]
    Understanding IP Addresses, Subnets, and CIDR Notation for ...
    Dec 15, 2021 · IP addresses uniquely identify network devices. Subnets divide networks into smaller sections. CIDR notation specifies the number of ...
  11. [11]
    Configure IP Addresses and Unique Subnets for New Users - Cisco
    Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do not subnet, you are only able to use ...
  12. [12]
    What is CIDR? - CIDR Blocks and Notation Explained - Amazon AWS
    CIDR allows routers to organize IP addresses into multiple subnets more efficiently. A subnet is a smaller network that exists within a network. For example, ...
  13. [13]
    RFC 791: Internet Protocol
    The internet protocol is designed for use in interconnected systems of packet-switched computer communication networks. Such a system has been called a catenet.
  14. [14]
    RFC 950 - Internet Standard Subnetting Procedure - IETF Datatracker
    RFC 950 August 1985 Internet Standard Subnetting Procedure Appendix II. Examples These examples show how a host can find out the address mask using the ICMP ...
  15. [15]
    RFC 1918 - Address Allocation for Private Internets - IETF Datatracker
    RFC 1918 describes address allocation for private internets, using reserved IP address blocks (10/8, 172.16/12, 192.168/16) for networks without external ...
  16. [16]
    ipcalc(1) - Linux man page - Die.net
    ipcalc provides a simple way to calculate IP information for a host. The various options specify what information ipcalc should display on standard out.
  17. [17]
    RFC 1519 - Classless Inter-Domain Routing (CIDR) - IETF Datatracker
    This memo discusses strategies for address assignment of the existing IP address space with a view to conserve the address space and stem the explosive growth ...
  18. [18]
    [PDF] IPv4 CIDR Chart
    IP Addresses. Bits. Prefix. Subnet Mask. 1. 0. /32. 255.255.255.255. 2. 1. /31. 255.255.255.254. 4. 2. /30. 255.255.255.252. 8. 3. /29. 255.255.255.248.
  19. [19]
    [PDF] IP Addressing Guide - Cisco
    Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do not subnet, you can only use one.Missing: official | Show results with:official
  20. [20]
    Configure Subnet Zero and All-Ones Subnet - Cisco
    Feb 7, 2023 · Subnetting has guidelines that cover the use of the first and the last subnets, known as subnet zero and the all-ones subnet, respectively.
  21. [21]
    IP Addressing: IPv4 Addressing Configuration Guide - Cisco
    Feb 16, 2016 · This chapter contains information about, and instructions for configuring IPv4 addresses on interfaces that are part of a networking device.Missing: process official
  22. [22]
    RFC 1878 - Variable Length Subnet Table For IPv4 - IETF Datatracker
    This memo clarifies issues surrounding subnetting IP networks by providing a standard subnet table. This table includes subnetting for Class A, B, and C ...
  23. [23]
    RFC 5735 - Special Use IPv4 Addresses - IETF Datatracker
    RFC 5735 Special Use IPv4 Addresses January 2010 127.0.0.0/8 - This block is assigned for use as the Internet host loopback address. A datagram sent by a ...
  24. [24]
    RFC 3021 - Using 31-Bit Prefixes on IPv4 Point-to-Point Links
    This document is based on the idea that conserving IP addresses on point-to-point links (using longer than a 30-bit subnet mask) while maintaining ...
  25. [25]
    RFC 4291: IP Version 6 Addressing Architecture
    This specification defines the addressing architecture of the IP Version 6 protocol. It includes the basic formats for the various types of IPv6 addresses.
  26. [26]
    RFC 6177: IPv6 Address Assignment to End Sites
    This document reviews the architectural and operational considerations of end site assignments as well as the motivations behind the original recommendations ...
  27. [27]
    RFC 3177 - IAB/IESG Recommendations on IPv6 Address ...
    This document provides recommendations to the addressing registries (APNIC, ARIN and RIPE-NCC) on policies for assigning IPv6 address blocks to end sites.
  28. [28]
    RFC 4862: IPv6 Stateless Address Autoconfiguration
    ### Summary of SLAAC for IPv6 Address Configuration and Subnet Allocation
  29. [29]
  30. [30]
    RFC 5375 - IPv6 Unicast Address Assignment Considerations
    This document aims to provide the information and recommendations relevant to planning the addressing aspects of IPv6 deployments.
  31. [31]
    RFC 3531 - of an IPv6 Address Block - IETF Datatracker
    RFC 3531 - A Flexible Method for Managing the Assignment of Bits of an IPv6 Address Block.Missing: HD- | Show results with:HD-
  32. [32]
    RFC 8200: Internet Protocol, Version 6 (IPv6) Specification
    **Summary of RFC 8200: IPv6 Address Space Size and Relation to NAT/Differences from IPv4**
  33. [33]
    RFC 7421: Analysis of the 64-bit Boundary in IPv6 Addressing
    ### Key Differences in IPv6 Subnetting from IPv4
  34. [34]
    RFC 4291: IP Version 6 Addressing Architecture
    ### Summary of IPv6 Subnet Prefixes and Differences from IPv4 (RFC 4291)
  35. [35]
    RFC 6177 - IPv6 Address Assignment to End Sites - IETF Datatracker
    This document reviews the architectural and operational considerations of end site assignments as well as the motivations behind the original recommendations ...
  36. [36]
    RFC 4213 - Basic Transition Mechanisms for IPv6 Hosts and Routers
    This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. Two mechanisms are specified, dual stack and ...
  37. [37]
    RFC 3056: Connection of IPv6 Domains via IPv4 Clouds
    ### Summary of 6to4 Tunneling Impact on Subnet Planning in IPv6 Migration from IPv4 (RFC 3056)
  38. [38]
    RFC 1009 - Requirements for Internet gateways - IETF Datatracker
    This RFC summarizes the requirements for gateways to be used between networks supporting the Internet protocols.
  39. [39]
    How to configure Variable-Length Subnet Masks (VLSMs)
    Jun 22, 2009 · Variable-Length Subnet Masks (VLSMs) allow the use of different masks for the same network number on different interfaces, which allows the user to conserve IP ...
  40. [40]
    RFC 1812: Requirements for IP Version 4 Routers
    Below is a merged summary of RFC 1812 sections related to Classless Routing, Variable Length Subnet Masks (VLSM), and Variable Length Masks. The information is consolidated into a dense, tabular format (CSV-style) to retain all details from the provided segments, followed by a concise narrative summary for clarity. URLs are included at the end for reference.
  41. [41]
    RFC 4271 - A Border Gateway Protocol 4 (BGP-4) - IETF Datatracker
    This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.