Get the latest AI workflows to boost your productivity and business performance, delivered weekly by expert consultants. Enjoy step-by-step guides, weekly Q&A sessions, and full access to our AI workflow archive.
Summary
This video sheds light on the basics of subnet masks, highlighting their crucial role in distinguishing the network and host parts of an IP address. It begins with an introduction to IPv4 addresses, explaining them as unique identifiers for devices on a network. The concept of subnetting is discussed, addressing how subnet masks help in managing large networks by dividing them into smaller sub-networks to reduce broadcast traffic and enhance network efficiency. The video further delves into binary conversion of IP addresses, subnet masks, and highlights subnetting benefits, linking them to network management. It concludes with a beginner-friendly tip on accessing more resources for novices in networking.
Highlights
Subnet masks help identify the network and host parts of an IP address, vital for subnetting.🗺️
Binary numbers are crucial as computers read IPs and subnet masks in binary format, not decimal.🔢
Subnetting is a strategy to manage large networks effectively by turning them into smaller subnets.🔍
Classes of networks (A, B, C) and their capacities help determine suitable IP address classes based on host needs.🏢
Slash notation offers a simplified way to denote subnet masks using CIDR.📏
Key Takeaways
An IP address is essential for network communication, acting as an identifier for devices.🔑
Subnet masks distinguish network and host portions of an IP address, crucial for subnetting.🌐
Understanding binary formatting is key when working with IP addresses and subnet masks.💡
Subnetting breaks a large network into smaller ones, reducing broadcast traffic and boosting efficiency.📉
CIDR or Slash Notation is a compact way to express subnet masks, simplifying representation.📝
Overview
In this animated video, the intricacies of IP addresses and subnet masks are demystified. The discussion kicks off with a foundational explanation of IPv4 addresses, portrayed as identifier codes that enable communication between devices on a network. Using subnet masks to define network and host parts of an address, the video elucidates the role these masks play in subnetting.
Exploring the technical aspect, the video sheds light on binary formatting and its significance. It elaborates on the conversion of IP addresses and subnet masks from decimal to binary, illustrating how bits function within these addresses. The highlight is on how properly employing subnet masks can streamline network traffic and enhance efficiency by reducing broadcast chaos.
Towards the end, viewers are introduced to CIDR or classless inter-domain routing, a neater method of expressing subnet masks. Providing a practical viewpoint, the video suggests resources for beginners keen to further their understanding of networking concepts, ensuring a well-rounded comprehension of subnet masks and their applications.
Chapters
00:00 - 01:00: Introduction to Subnet Masks This chapter introduces the concept of subnet masks. It begins by explaining that before one can understand subnet masks, it's essential to know what an IP address is. An IP address serves as an identifier for computers or devices on a network, necessary for communication. The chapter focuses on IPv4 addresses, which are 32-bit numeric addresses written as four numbers separated by periods.
01:00 - 02:30: Understanding IP Addresses This chapter covers the concept of IP addresses, explaining that an IP address is made up of two primary parts: the network address and the host address. An octet is mentioned, where each octet in an IP address ranges from 0 to 255. The network address, or network ID, is a unique number assigned to a network, while the host address, or host ID, is designated for individual hosts within that network.
02:30 - 04:30: Binary Conversion of IP Addresses and Subnet Masks This chapter explains the importance of unique host addresses in a network. It emphasizes the role of subnet masks in distinguishing the network and host portions of an IP address. Subnet masks, resembling IP addresses, are used to mask the network section by revealing the bits used in the network within an IP address.
04:30 - 06:30: Identifying Network and Host Portions The chapter titled 'Identifying Network and Host Portions' discusses the concept of subnet masks and how they are represented in decimal format, which is not meaningful to computers and networks. This is because computers interpret numbers in a binary format, which consists of 1s and 0s, known as bits. The chapter explains the binary representation of IP addresses and subnet masks, highlighting the significance of understanding this binary structure.
06:30 - 08:30: Importance of Network and Host Segregation The chapter titled 'Importance of Network and Host Segregation' discusses the fundamental concepts of binary numbers and their role in computer networks. It explains how binary numbers are derived from IP addresses and subnet masks, using an 8-bit octet chart as a reference. Each bit in the octet holds a specific value, starting from 1 on the right and doubling as it moves left, up to 128. The chapter provides insight into how these binary bits, represented as either 1 or 0, are crucial for network communication.
08:30 - 14:30: Subnetting Example and Benefits The chapter titled 'Subnetting Example and Benefits' discusses how IP addresses can be manipulated using binary numbers to yield different outcomes, specifically by adjusting the 1s and 0s within an octet. This manipulation allows for a range of numbers from 0 to 255. For instance, it explains how to derive a binary number from an IP address, highlighting the conversion process starting with an example IP like 192 in the first octet. The chapter underscores the utility of understanding binary conversion for effective subnetting. It also emphasizes the significance of subnetting in network management, illustrating the advantages of subnetting in terms of addressing flexibility, efficient use of IP addresses, and enhanced network security.
14:30 - 17:00: IP Address Classes This chapter explains the process of converting an IP address class component into its binary equivalent by strategically placing 1s under specific slots (bit positions) to match the desired decimal number, in this case, 192. It highlights that placing a '1' in the 128 and 64 positions in binary yields a total of 192, while other positions are '0' since they are not needed. The chapter focuses on understanding binary conversion and its relevance in representing IP addresses.
17:00 - 18:00: CIDR Notation This chapter explains the process of converting decimal numbers into binary using the CIDR notation. It involves placing '1's under specific numbers in the binary table to sum up to the required total, as demonstrated with the example of octet 168, followed by 1 and 0. The chapter simplifies the understanding of CIDR notation through practical examples.
18:00 - 18:00: Conclusion and Subscription Reminder The chapter concludes with an explanation of binary numbers in the context of IP addresses and subnet masks. It illustrates how an IP address is represented in binary form and how the subnet mask's first three octets being 255 translates to all 1s in binary, while the last octet is all 0s, completing the discussion on binary conversion relevant to networking.
Subnet Mask - Explained Transcription
00:00 - 00:30 What is a subnet mask? So that is a topic of this
video. Now before we talk about what a subnet mask is we must first talk about what an IP address
is. An IP address is an identifier for a computer or device on a network. Every device has to
have an IP address for communication purposes. And to be specific, I'm talking about an IPv4
address. An IPv4 address is a 32-bit numeric address, written as four numbers, separated
by periods. Each group of numbers that are
00:30 - 01:00 separated by periods is called an octet. The
number range in each octet is from 0 - 255. An IP address consists of two parts. The first
part is the network address and the second part is the host address. The network address or network
ID is a number that's assigned to a network. So every network will have a unique address. The
host address or host id is what's assigned to hosts
01:00 - 01:30 within that network such as computers, servers,
tablets, routers, and so on. So every host will have a unique host address. Now the way to tell
which portion of the IP address is the network or the host, is where the subnet mask comes in.
A subnet mask is a number that resembles an IP address. And it reveals how many bits in the IP
address are used for the network by masking the network portion of the IP address. Now in the
world of computers and networks, IP addresses
01:30 - 02:00 and subnet masks in this decimal format here
are meaningless. And this is because computers and networks don't read them in this format and
that's because they only understand numbers in a binary format, which are 1s and 0s. And these
are called bits. So the binary number for this IP address is this number here. And the binary
number for this subnet mask is this number.
02:00 - 02:30 And these are the numbers that computers and
networks only understand. So the next question is, how do we get these binary numbers from this IP
address and this subnet mask? So here we have an 8 bit octet chart. The bits in each octet are
represented by a number. So starting from the right, the first bit has a value of 1 and then
the number doubles with each step. So there's 2 then 4, 8, and so on, all the way up to 128. Each
bit in the octet can be either a 1 or a 0. If the
02:30 - 03:00 number is a 1 then the number that it represents
counts. If the number is a 0 then the number that it represents does not count. So by manipulating
the 1s and 0s in the octet you can come up with a number range from 0 - 255. So for example,
the first octet in this IP address is 192. So how do we get a binary number out of 192? First
you look at the octet chart and then you will
03:00 - 03:30 put 1s under the numbers that would add up to the
total of 192. So you would put a 1 in the 128 slot and then a 1 in the 64 slot. So now if we count
all the numbers that we have 1s underneath them, you would get a total of 192. All of the other
bits would be 0s because we don't need to count them since we already have our number. So this
number here is the binary bit version of 192.
03:30 - 04:00 So let's do the next octet which is
168. So let's put a 1 under 128, 32, and 8. And then all the rest would be 0s. So if
we were to add all the numbers that we have 1s underneath them we would get a total of 168.
The next octet is 1. So we'll put a 1 in the 1 slot and when you add up only 1 you get 1. And
the last octet is 0, which makes things simple
04:00 - 04:30 because all the binary numbers would be all 0s.
So here is the binary number for our IP address. Now the subnet mask binary conversion is
exactly the same way. So in this subnet mask the first 3 octets are 255. So if we
were to look at this subnet mask in binary form, the first 3 octets would be all 1s
because when you count all the numbers in an octet it will equal 255. And
then the last octet would be all 0s.
04:30 - 05:00 So here we have our IP address and subnet mask
in binary form lined up together. So the way to tell which portion of this IP address is the
network part, is when the subnet mask binary digit is a 1 it will indicate the position of the
IP address that defines the network. So we'll cross out all the digits in the IP address
that line up with the 1s in the subnet mask.
05:00 - 05:30 And when you do this it will reveal that the
first 3 octets of the IP address is the network portion and the remaining is the
host portion. So the 1s in the subnet mask indicate the network address and the 0s indicate
the host addresses. So in another example let's use a different IP address and subnet mask and
let's put them in binary form. So in this example the first 2 octets are 255 and the last
2 octets are 0. So if we cross out all the
05:30 - 06:00 digits in the IP address that line up with
the 1s in the subnet mask, we'll see that the first 2 octets is the network portion
and the last 2 octets is the host portion. And let's do one more, and in this subnet mask
the first octet is 255 and the rest are 0. And then we'll cross out all the digits again, and
this time it reveals that the first octet is the
06:00 - 06:30 network portion and the last 3 octets are for
hosts. Now figuring out the network and host parts of an IP address using these default subnet masks
was simple. Because as I stated before, when you count all the numbers in an octet it will equal
255. So we automatically know that the numbers in the octet are all 1s, so we really didn't
have to see the IP address or subnet mask in its binary format because it's so simple. But
what if the subnet mask was this number here
06:30 - 07:00 where the first two octets are 255 but the
third octet is 224? So this is a little trickier. So here is the binary number for this subnet mask.
The first two octets are all 1s and in the third octet, the first three bits are 1s which will
equal 224, because starting from the left, when you add the first 3 bits in an octet it adds
up to 224. So let's put this subnet mask and IP
07:00 - 07:30 address in its binary format. And again if we cross
out all the digits in the IP address that line up with the 1s in the subnet mask, we'll see that
in the IP address, the first 2 octets and the first 3 bits in the third octet is the network
part and the 13 remaining bits are used for hosts. So another question is, why does an IP address have
a network and a host part? Why can't it just have
07:30 - 08:00 a host part to uniquely assign each device an IP
address? So why does it have a network part also? Now the reason for this is manageability. It's
for breaking down a large network into smaller networks or sub networks, which is known as
subnetting. So for example let's say that there were no small networks. Let's say that an
organization has a large amount of computers in one huge network. Now when a computer wants to talk to another computer, it needs to know how
08:00 - 08:30 and where to reach that computer. And it does this by using a broadcast. A broadcast is when a computer sends out data to all computers on a network
so it can locate and talk to a certain computer. So for example let's say that this computer here
wanted to communicate with this computer over here So what happens next is that this computer
here will send out a broadcast out on the
08:30 - 09:00 network asking the target computer to identify
itself so it can communicate with it. But the problem with this is that every computer on this
network will also receive the broadcast because they are all on the same network. So as you can
imagine, if every computer on this large network was broadcasting to every other computer, just to
communicate, it would be chaos. It would slow down the network and potentially bring it to a halt
because of the tremendous amount of broadcast
09:00 - 09:30 traffic it would cause. And it might even cause
fires, well not really but, and if a problem were to happen on the network it would be very difficult
to pinpoint because the network is so big. So in order to prevent this networks need to be broken
down into smaller networks and networks are broken down and physically separated by using routers. And
by using routers this would alleviate the problem of excessive traffic because broadcasts do not go
past routers. Broadcasts only stay within a network
09:30 - 10:00 So now instead of one large network, this network
is broken down into 6 subnetworks or subnets. So now if this computer here wanted to communicate
with this computer over here, the computer will send out a broadcast that only the computers in
its subnetwork can receive. But since the target computer is on a different subnetwork here,
the data will be sent to the default gateway,
10:00 - 10:30 which is the router, and then the router will
intelligently route the data to the destination. So this is why IP addresses have a network
portion and a host portion, so networks can be logically broken down into smaller
networks which is known as subnetting. Hey guys I just want to break in here and tell you
that if you're a beginner and you want to learn more about networking, I highly recommend
an audio book that will help you do that. I linked it in the description below and
you can download and listen to it for free.
10:30 - 11:00 Just get the book by signing up for the free
30-day trial of Amazon audible premium plus. But even if you cancel your audible membership at
any time during the 30 days, the audio book is still yours to keep forever without paying anything.
So just click the amazon affiliate link below and by doing that you'll also be supporting my
channel because I still get commission even if you decide to cancel. So once again it's completely
free and thank you. So let's do an example here, so
11:00 - 11:30 let's say that you have a small business and
that this is your IP address and subnet mask Now let's say that your small business has a total
of 12 computers and all 12 of these computers are on a single network. And these computers belong to
different departments indicated by their colors But let's say that you wanted to separate
the computers into 3 different networks So that each department won't see the other
department's network traffic. So instead of
11:30 - 12:00 having 1 network in your business, you want
to break it down into 3 small networks. So the way to break this network down into smaller
networks is by subnetting. Subnetting is done by changing the default subnet mask by borrowing
some of the bits that were designated for hosts and using them to create subnets. So in
this subnet mask we're going to change some of the 0s in the host portion into 1s
so we can create more networks. So if we leave
12:00 - 12:30 the subnet mask the way it is, it will give us 1
network with 256 hosts. Now technically we have to subtract 2 hosts because the values that are
all 1s and 0s are reserved for the broadcast and network address respectively, so we actually
have 254 usable hosts. But we need to change this subnet mask so we can produce the 3
networks that we need. So for example let's borrow 1 bit from the host portion. So here
is our new subnet mask. So now the fourth octet
12:30 - 13:00 is 128 because when you count the first bit in
an octet it equals 128. So by borrowing 1 bit this will divide the network in half. So now
instead of having 1 network with 254 hosts this will give us 2 networks or subnets with
126 hosts in each subnet. Now let's keep going and borrow another bit from the host portion. So
now we are borrowing a total of 2 bits from the
13:00 - 13:30 host portion. So here is our new subnet mask, and
the fourth octet is 192. So by borrowing 2 bits this will divide the network even further and
now it'll give us 4 subnets with 62 hosts each. And again let's borrow another bit from the
host portion. So here is our new subnet mask. And by borrowing 3 bits this will divide the
network into 8 subnets with 30 hosts each.
13:30 - 14:00 So if we continue breaking down this network,
here is the result if we borrow 4 bits which will give us 16 subnets with 14 hosts
each. And here is the result if we borrow 5 bits which will give us 32 subnets with 6 hosts each.
And if we borrow 6 bits this will give us 64 subnets with 2 hosts in each subnet. Now
this is pretty much the limit because if we borrow 7 bits it will give us 128 subnets
but with 0 usable hosts. So as you can see
14:00 - 14:30 the more bits the network portion borrows from
the host portion, the amount of networks that can be created doubles with each bit. But also the
amount of hosts per network gets cut in half with each bit. So going back to our business
example, if we wanted to break this network down into 3 smaller networks or subnets we would
have to borrow 2 bits from the host portion. so even though we only need 3 networks, this
subnet mask will give us at least 4 networks
14:30 - 15:00 to work with. So our new custom subnet mask
for our 3 subnets would be 255.255.255.192 So now our network is broken down
into 3 smaller networks or subnets. Now just to be clear, this video is about subnet
masks. This is not a full lesson on subnetting because there's a little more to subnetting than
what I showed you here. I'm just showing you how
15:00 - 15:30 subnet masks relate to subnetting. Now IP addresses and subnet masks come in 5 different classes. Which are classes A - E. However 3 of
these classes are for commercial use. So here is a chart of the IP addresses and default subnet masks
which are class A, B, and C. And you can tell by the number in the first octet of the IP address and by
the default subnet mask which class they belong to Now when an organization needs networking they
will need an IP address class according to the
15:30 - 16:00 needs of that organization, which is based on how
many hosts they have. So if an organization has a very large amount of hosts, they will need a class
A IP address. A class A IP address can produce up to 16 million hosts. So as you can see, in a default
class A subnet mask, the host part is very large 3 octets are used for hosts which is
why it can produce so many. An example of an
16:00 - 16:30 organization that would need this many hosts
would be something like an internet service provider, because they would need to distribute
millions of IP addresses to all their customers. A class B IP address can produce up to 65,000
hosts. This class is given to medium to large organizations. And a class C IP
address can produce 254 hosts. Class C IP addresses are used in small organizations
and homes that don't have a lot of hosts.
16:30 - 17:00 Now subnet masks can also be expressed in
a different method called CIDR and CIDR stands for classless inter-domain routing, which
is also known as slash notation. Slash notation is a shorter way to write a subnet mask. And it
does this by writing a forward slash and then a number counting the 1s in the subnet mask. So for
example if you see an IP address like this, with
17:00 - 17:30 a CIDR notation of /24 this means that the
subnet mask is 24 bits in length, meaning it has 24 1s. If the CIDR notation is /25 this
means that the subnet mask is 25 bits in length Or if it's /26 this means that the
subnet mask is 26 bits in length. Or if the cider notation is /8 this means
that the subnet mask is 8 bits in length
17:30 - 18:00 So I want to thank you all for watching
this video on subnet masks. Don't forget to subscribe and get the audio book for free using
the link below. And I'll see you in the next video.