?
Solved

minimum number of bits

Posted on 2006-07-22
2
Medium Priority
?
1,260 Views
Last Modified: 2012-06-27
the minimum number of bits that can be borrowed to form a subnet
0
Comment
Question by:teera
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 22

Accepted Solution

by:
Rick Hobbs earned 400 total points
ID: 17161814
Depends on the network address class.
0
 
LVL 5

Assisted Solution

by:jeffkell
jeffkell earned 1000 total points
ID: 17161992
As rickhobbs notes, it depends on the address class.  Classful subnetting is used so infrequently I'll skip that possibility and assume you are using classless addressing.

Let's assume you have a CIDR-style address range assigned to you that you wish to subnet.

You cannot use the "last" or "all-ones" subnet as that is reserved for network broadcasts.

You typically should not use the "first" or "all-zeroes" subnet by tradition, but some devices do allow use of this subnet.  For Cisco devices, for example, you enable "ip subnet-zero".

So for practical purposes, the "minimum number of bits" is two, giving you four subnets. You can't use the last, so you get two workable subnets (or three if all devices on subnet zero allow for subnet zero addressing).
0

Featured Post

Turn your laptop into a mobile console!

The CV211 Laptop USB Console Adapter provides a direct Laptop-to-Computer connection for fast and easy remote desktop access with no software to install.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question