Solved

Mnemonic to calculate Supernetting

Posted on 2014-02-08
2
225 Views
Last Modified: 2014-02-16
Hi

I must teach our trainees how to calculate Supernetting by mental arithmetic as they need it for School.
I leaned this a long time ago but have forgotten this as this is used very rare.

Can you please explain me the best way how to calculate this stuff and tell me about your mnemonic’s?

Many thanks in advance
0
Comment
Question by:*** Hopeleonie ***
2 Comments
 
LVL 25

Accepted Solution

by:
Fred Marshall earned 500 total points
ID: 39845865
Well, I don't know if I'd necessarily use the term "supernetting" as it may connote things not intended.  I'm hoping that you're asking about the following:

Given: an IP address and subnet mask 192.168.1.33/24
With /24 or 255.255.255.0, the "33" is the host address and 192.168.1.0 is the network address.

Question: What is the next (i.e. smallest) larger subnet that will include the address and subnet of the given address?

Answer: Remove the least significant "1" bit from the subnet mask and see:

255.255.255.0 decimal is 11111111 11111111 1111111 00000000 binary.
So, we use:
11111111 11111111 11111110 00000000 or 255.255.254.0
(since in the third octet, 255 -1 = 254)
and, if you wanted to go to an even larger subnet you would remove the two least significant "1" bits for:
11111111 11111111 11111100 00000000 or 255.255.252.0 (255-3 = 252)

The network address changes as follows:
If you remove the least significant "1" bit from the subnet mask, you also remove the least significant bit from the network address you're staring with.  So:
192.168.1.0 is
 11000000 10101000 00000001 00000000
Removing the least significant "1" bit gives
11000000 10101000 00000000 00000000
or 192.168.0.0

I don't know if that's a mnemonic but I hope it helps...
0
 
LVL 18

Author Closing Comment

by:*** Hopeleonie ***
ID: 39863939
@fmarshall
Thanks a lot. Learned a lot from you :-)
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Please see preceding article here: http://www.experts-exchange.com/Networking/Operating_Systems/A_11209-Root-Bridge-Election.html Figure 1 After Root Bridge has been elected, then what?..... Let's start by defining a Root Port in la…
Have you ever thought of installing a power system that generates solar electricity to power your house? Some may say yes, while others may tell me no. But have you noticed that people around you are now considering installing such systems in their …
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now