?
Solved

minimum number of bits

Posted on 2006-07-22
2
Medium Priority
?
1,264 Views
Last Modified: 2012-06-27
the minimum number of bits that can be borrowed to form a subnet
0
Comment
Question by:teera
2 Comments
 
LVL 22

Accepted Solution

by:
Rick Hobbs earned 400 total points
ID: 17161814
Depends on the network address class.
0
 
LVL 5

Assisted Solution

by:jeffkell
jeffkell earned 1000 total points
ID: 17161992
As rickhobbs notes, it depends on the address class.  Classful subnetting is used so infrequently I'll skip that possibility and assume you are using classless addressing.

Let's assume you have a CIDR-style address range assigned to you that you wish to subnet.

You cannot use the "last" or "all-ones" subnet as that is reserved for network broadcasts.

You typically should not use the "first" or "all-zeroes" subnet by tradition, but some devices do allow use of this subnet.  For Cisco devices, for example, you enable "ip subnet-zero".

So for practical purposes, the "minimum number of bits" is two, giving you four subnets. You can't use the last, so you get two workable subnets (or three if all devices on subnet zero allow for subnet zero addressing).
0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question