VLSM, CIDR and IPv6 confusion.

Posted on 2005-04-24
Last Modified: 2009-08-04
Hi people,

Could someone helps me understand these things, please?

1- what's the different between VLSM and CIDR?
2- If we design IP based on CIDR, Will it be confused to the REAL world that you have duplicate IP address as someone else?
3- What kind of consideration when we want to upgrade from IPv4 to Ipv6?

Thanks a lot experts :)

Question by:sokhodom
    LVL 10

    Accepted Solution

    VLSM is used to further subnet your subnets.  It allows creating different size subnets and reduces IP address waste.  
    CIDR is kind of the opposite and is also called supernetting or aggregation or summarization.  It allows you to represent many subnets using one address/mask.  This is used on routers to reduce the size of access lists and routing tables and consequently reduce the processing requirements of routers and improves performance.

    CIDR can be used with either private IP addressing or public.  In fact, the Internet routers are already configured with CIDR using public addressing.  This certainly doesn't prevent you from using it on your private networks (, or  In fact, if you have a large network, you should plan the addressing with both VLSM AND summarization in mind.

    IPv6 migration will require co-existence with IPv4 for a long while through either or all of the following:
    Dual-stack (IPv4 and IPv6 on same machine), Translation (between 4 and 6) and Tunneling (from a v6 network to another via a v4 network)
    ... Here is the main tech page on IPv6 at Cisco for more info:
    LVL 8

    Author Comment

    Great explanation !! :)
    Thank you,

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    758 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now