Skip to main content
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
N-able
  • Request a Quote
  • Try Now
    • N-able RMM
    • N-able N-central
    • N-able Backup
    • MSP Manager
    • N-able Mail Assure
    • N-able Passportal
    • N-able Risk Intelligence
    • N-able Take Control
Request quote
N-able
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare N-able RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
SolarWinds MSP is becoming Read More
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Networking An Overview of Subnet Classes
Networking

An Overview of Subnet Classes

By SolarWinds MSP
5 June, 2019

In order to effectively manage customer networks, it’s crucial that managed services providers (MSPs) have a firm grasp of internet protocols. You’ll need to understand how to subdivide a customer's network into subnets if you want to help your customers improve on essential operating functions. That being said, there’s no one-size-fits-all approach for using subnets to organize a network. In fact, it can be quite a complicated process with many technical quirks. Before you attempt to tackle it all, it’s important to understand IP networks and their unique classes. 

What is an IP subnet?

An IP subnet, often called a subnetwork, is a subdivision of an IP network. They can be best understood as the logical organization of connected network devices. Subnetting allows a company to break its large network into smaller, more organized divisions. The advantages of subnetting include: 

  • Improved efficiency: By breaking large networks into smaller ones, your customers can simplify basic tasks like troubleshooting. 
  • Better security: Subnetting can help customers more easily deploy security measures such as firewalls.
  • Reduce network traffic: Smaller networks equate to smaller broadcast domains. This can free up network congestion. 

The implementation of good subnetworking can go a long way in the day-to-day operations of your current and potential customers. 

First, it's important to understand some of the nuances about IP addresses in order to fully grasp how subnets can be implemented. Because IP is a connectionless protocol designed to operate without a central directory or monitor, networks rely on numerical addresses to deliver data across connected devices. These addresses allow a system to be recognized by other systems on the IP or on a specific network. It’s helpful to think of these numbers like a mailing address that identifies where postal mail comes from and where it should be delivered. The two primary versions of IP addresses are IPv4 and IPv6.  

IP addresses have two components: a network prefix and a host identifier. The prefix often takes up the majority of bits in the address. IPv4 addresses are designated by a 32-bit specification which is represented by 4 octets, or 8-bit units of digital information, ranging from 0-255. These addresses are frequently shown in decimal form rather than in binary, but for subnetting, it’s helpful to make the conversion. 

Subnets are implemented by borrowing bits from the host end of an IP address in order to divide the larger network into smaller subnetworks. This is accomplished with the use of a subnet mask. The new, modified IP address will have the same network and host components as before, but will now feature a subnet component as well.  

What are the classes of networks?

There are five classes of subnetworks: Class A, Class B, Class C, Class D, and Class E.  Each class relates to a specific range of IP addresses. Classes A, B, and C are used the most often by different networks.

Subnet classes are made unique by the number of bits their IP addresses have dedicated to a network and the number of bits dedicated to hosts.  They each have a default subnet mask. Classes can be identified by the number in the first octet of their address.

  • Class A: First Octet Value 0-126
  • Class B: First Octet Value 128-191
  • Class C: First Octet Value 192-233
  • Class D: First Octet Value 224-239
  • Class E: First Octet Value 240-255

Note that 127 is not accounted for because it denotes a loopback address. 

 

CTA Image

N-able Remote Monitoring and Management

Get the tools you need to manage, secure, and improve all things IT—all within a single web-based dashboard.

Try It Free Learn More

What is a Class A IP address? 

A Class A IP address reserves 8 bits for a network with 24 bits dedicated to hosts. Its IP address spans from 0 to 126. The Class A subnet mask is 255.0.0.0. Accordingly, Class A IP addresses are best used to serve incredibly large networks. 

In comparison to Class A, Class B IP addresses are better suited to serving smaller networks since they reserve 14 bits for a network, which leaves only 18 bits for hosts. Network addresses for these range from 128 to 191. Consequently, the default subnet mask for Class B is 255.255.0.0. In addition, Class C IP addresses are normally assigned to a very small-sized network. Their IP addresses range from 192 to 233 and their default subnet mask is 255.255.255.0.

It’s important to keep in mind that although it seems counterintuitive, the less bits an IP address reserves for a network, the more apt it is to serve subnets on bigger networks. This is because subnets are implemented on the host side of an IP address (so more network bits means less bits for the host to offer a subnet mask). 

What is the use of Class D and Class E IP addresses?

The uses of Class D and Class E IP addresses are mostly reserved for experimental purposes. For instance, a Class D IP address is almost exclusively reserved for multicasting applications. (Multicasting is a method of routing data on a computer network that allows a single or group of senders to communicate with a group of receivers). Unlike Classes A, B, and C, Class D is not available for use in normal networking operations. They don’t have subnet potential because there are no host bits within the Class D address space.  

Class E is often cited as having been created for future use, research, and development. Although these IP addresses are reserved, their actual use has never developed. As a result, most network implementations disregard this class altogether. In fact, Class E is sometimes classified as illegal or undefined. The one exception is IP address 255.255.255.255, which can be used as a broadcast address (a network address in which devices connect to a multiple-access communications network). 

Getting started with networking

If you are an MSP, you should be sure to do your research on the nuances of IP so you can help your customers take advantage of what subnetting offers. Developing a strong understanding of what goes into these network improvements is the first step in serving customers when they come asking for help with their networks.

Once your subnets are established, SolarWinds® RMM can help you with a number of networking tasks, for example using NetPath can help you ensure that all your subnets are running as expected and to spot any issues and quickly remediate them.

Explore our resource center for more information on network performance. Also read more about our IP Blacklist Prevention Solution.

 

Additional reading

Difference Between IPsec and SSL
How VPN Works and Common Uses of a VPN Corporate Network
How to Check Bandwidth Usage Across Your Network
You might also like...
Networking

5 Excellent Benefits of Using a Network Topology Tool

Networking

How to Perform a Network Audit: A Step-By-Step Guide

Networking

Network Visibility: A Complete Guide

Networking

Network Map Creation: 5 Simple Steps

Networking

The Most Effective Types of Network Topology: A Quick Guide for MSPs

Networking

Active Directory Cleanup Best Practices

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • PSA vs ITSM vs ESM: Part 2—Which is the right fit for your MSP?
  • 4 ways PSA software helps MSP businesses
  • PSA vs ITSM vs ESM: Part 1—What do they do? 
  • Endpoint security for Mac: What you need to know In 2021
  • A guide to patch management policies for MSPs
Categories:
  • Security (252)
  • Tips & Advice (130)
  • Backup & Disaster Recovery (97)
  • Best Practices (97)
  • Managed Services (89)
  • The Head Nerds (88)
  • Business Growth (79)
  • IT Support (43)
  • Business (42)
  • Automation (41)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (37)
  • Remote Management (31)
  • ITSM (26)
  • Data (23)
  • Networking (22)
  • Cloud Computing (21)
  • PSA (16)
  • Marketing (15)
  • Product (11)
  • Service Desk (7)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • Customer Service (3)
  • GDPR (3)
  • Internet of Things (3)
  • Training (2)
  • Research & Trends (2)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
  • Business Risk (1)
Show moreless
N-able

Products
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able EDR
  • N-able MSP Manager
  • N-able Mail Assure
  • N-able Risk Intelligence
  • N-able Take Control
  • N-able Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • COVID-19 Response
Support
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able Mail Assure
  • N-able Take Control
  • N-able MSP Manager
  • N-able Risk Intelligence
  • N-able Threat Monitor
  • N-able Passportal
  • N-able Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© N-able Solutions ULC and N-able Technologies Ltd.
All rights reserved.