Network plus N10-007 ExamNotes for sub-objective 1.4 Part 2 of 2

Share This Post

Network+ N10-007 ExamNotes for sub-objective 1.4 Given a scenario, configure the appropriate IP addressing components – Part 2 of 2

Click here to go back to the Network+ ExamNotes Table of Content

1.4 Given a scenario, configure the appropriate IP addressing components

Subnetting – Classful

Classes A, B, C, D, and E
CIDR notation (IPv4 vs. IPv6)

Click here if you want to view a video walkthrough of a Performance Based Question

Address assignments

IP reservations

Click here to go back to the Network+ ExamNotes Table of Content



Classful addressing is the simplest form of subnetting as it uses whole octets to identify the Network ID. IPv4 addresses are assigned to Classes A, B, C, D, and E as you will see Class D and E networks are reserved. Using classful subnetting the network IDs will break down as shown below.

Classes A, B, C, D, and E
Network Class Network octets in Capitals (N), hosts in lowercase (h). Network ID bits Host ID bits
A NNNNNNNN.hhhhhhhh.hhhhhhhh.hhhhhhhh 8 24
B NNNNNNNN.NNNNNNNN.hhhhhhhh.hhhhhhhh 16 16

Binary representation

Network Class Default Binary Mask Network ID bits Dotted Decimal Mask
A 11111111.00000000.00000000.00000000 8
B 11111111.11111111.00000000.00000000 16
C 11111111.11111111.11111111.00000000 24

Class D addresses are reserved for multicasting.

Class E addresses are reserved for research.

Classless addressing differs from Classful addressing because it allows the subnet mask to use bits from the preceding octet(s) to increase or decrease the bits used for the Network ID and Host ID respectively.

CIDR (Classless Interdomain Routing)

Since you really need the subnet mask to determine the number of bits in the Network and Host IDs a shorthand method was created to allow you to determine the number of bits used for the network ID using slash (/) notation. CIDR notation takes the host IP address and follows it with a slash and number like /24 following the IP address. Here’s an example the address and subnet could be written as indicating a class C network using 24 bits for the network portion. This can be abbreviated to with CIDR notation. Should an additional network bit be required you can borrow that bit with creating two additional subnets. These would have the network ID 11000000.10101000.00000000.00000000 or 11000000.10101000.00000000.10000000 with 16 bits available for the host ID. Here’s a brief graphic that shows the relationship of CIDR and the binary representation of a /32 network.

Color graphic of a binary representation of a slash 32 network
Binary representation of a /32 network

So far creating subnets was a matter of dividing the new subnets into smaller equal portions. In practice, this could prove to be an inefficient approach as some subnets may waste addresses while others may need more. Variable Length Subnet Masks (VLSM) was developed to allow subnets to be further divided to more efficiently match the needs of the network. You create the largest subnet first then “subnet the subnet” from there.

CIDR notation (IPv4 vs. IPv6)

IPv6 Networks differ substantially from IPv4 as they are classless, do not use subnet masks and a single subnet can support 18,446,744,073,709,551,616 on a Residential – /64 network.

Address assignments


In order to manage IP addressing and configuration on network clients, a DHCP (Dynamic Host Configuration Protocol) server is used. The DHCP server automatically provides all of the configuration information to clients while preventing address duplication. The process will be familiar to those using a residential gateway or SOHO router. The DHCP server is provided a range of addresses (scope) available for it to provide to clients. Addresses are not permanently or statically assigned to clients by the server. They are leased. When the lease expires it can be renewed by the client or assigned to a different client. The configuration information provided to the client includes the lease time, when the lease was obtained and when it expires, the default gateway address and primary and secondary DNS server addresses. This process is transparent to the user. The DHCP server listens on port 67 for the client to request DHCP service. When the request is received the server responds on port 68 with the configuration.

Since the DHCP assigned IP address is not static you may obtain a different address each time you log on to the network. This works well for standard clients but some devices, printers, for example, require a permanent address to be consistently accessible to the clients. In this case, the server is configured to use the same address for that device using an IP reservation. When the server sees the MAC address of the printer it will provide the same address to it consistently. Static IP addresses can be used along with DHCP. To avoid conflicts the statically assigned addresses should be excluded from the servers address range using an IP exclusion.


DHCPv6 handles dynamic address assignment much the same way DHCPv4 does with the exception of the ports used. DHCPv6 listens on port 546 and responds on port 547. The IPv6 process is known as autoconfiguration and assigns addresses using FE80::/64 as the first 64 bits. The host portion of the address can be assigned randomly or it can use the EUI-64 method shown below. 


When you manually set the IP address it is known as a static IP address. Statically assigned addresses are used when servers, printers, and other network devices need to be consistently available to the network nodes at the same address. Static addressing increases administrative overhead but is necessary for devices that provide network services. Otherwise, DHCP is the preferred method.


Automatic Private IP Addressing (APIPA) is an addressing method used when a DHCP client is unable to obtain a lease from the server. APIPA takes over and assigns addresses in the to IP range. This configuration will remain in place until a DHCP server is located.


In IPv6 addressing the first 64 bits represent the network portion of the address. The remaining 64 bits can be randomly generated or they can be based on the device’s MAC address. Since a MAC address is 48 bits more host bits are needed. The 48 bit MAC address uses EUI-64 (Extended Unique Identifier-64) to be converted to meet the 64-bit standard. This calls for an additional 16 bits to be added and the inversion of the seventh bit.

That’s it for objective 1.4. Good luck on the test!

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Artificial Intelligence

AI Math for Programmers

Is the math needed by programmers to succeed in AI a surmountable challenge? Many programmers worry that they “can’t do math” and so feel they

How ChatGPT thinks debugging by ChatGPT can look like. This is a black and white abtract rendering.
Artificial Intelligence

How ChatGPT can cut your debugging time

Ever found yourself tangled in the web of bugs and glitches in your code? Fear not, for the power of debugging is here to save the day! Debugging, the art of uncovering and squashing those pesky coding errors, is an essential skill for any programmer on their epic quest for smooth-running software. With countless challenges awaiting, it’s reassuring to know that a multitude of tools exist to ease this noble endeavor. Enter ChatGPT, a remarkable ally in your coding adventures.

One thought on “Network plus N10-007 ExamNotes for sub-objective 1.4 Part 2 of 2

  1. In the CIDR section is a typo:
    These would have the network ID 11000000.10101000.00000000.00000000 or 11000000.10101000.00000000.10000000 with 16 bits available for the host ID.
    “16 bits” should be changed to “7 bits”.
    Also, the graphic in the CIDR section is wrong as each “Suffix” can only have (two less) “Hosts” than mentioned: The Network ID and Broadcast Address are reserved, so the number of hosts is two less than the table indicates.

Leave a Reply

Your email address will not be published. Required fields are marked *

Pass the exam on the first try guaranteed

By continuing to browse this site, you accept the use of cookies and similar technologies that will allow the use of your data by CertBlaster in order to produce audience statistics- see our privacy policy.