Overview
Direct Answer
A subnet is a logical partition of an IP network created by applying a subnet mask to divide a larger network address space into smaller, manageable segments. This segmentation enables organisations to control traffic flow, enforce security policies, and optimise routing efficiency within their infrastructure.
How It Works
Subnetting uses a subnet mask (e.g., 255.255.255.0) applied to an IP address to determine which portion identifies the network and which identifies individual hosts. Devices calculate whether another IP address belongs to the same subnet by performing a bitwise AND operation between the IP address and the mask; only devices in the same subnet can communicate directly without routing intervention.
Why It Matters
Subnetting reduces broadcast domains, minimising unnecessary network traffic and improving performance across large deployments. It enables granular access control policies, supports compliance requirements by isolating sensitive systems, and simplifies network administration by creating logical groupings aligned with organisational departments or functions.
Common Applications
Enterprise data centres use subnetting to separate production, development, and administrative networks. Healthcare organisations subnet patient data networks from general office networks to meet regulatory isolation requirements. Educational institutions partition networks by campus, faculty, and student access levels.
Key Considerations
Excessive subnetting fragments address space and increases routing complexity; conversely, insufficient subnetting undermines security boundaries and creates broadcast congestion. IP address planning must balance current requirements with future growth capacity.
More in Networking & Communications
5G
InfrastructureThe fifth generation of mobile network technology offering higher speeds, lower latency, and massive device connectivity.
Network Function Virtualisation
Cloud NetworkingReplacing dedicated network hardware with software running on commodity servers.
VPN
InfrastructureVirtual Private Network — a technology creating a secure, encrypted connection over a less secure network like the internet.
SSL/TLS
Protocols & StandardsSecure Sockets Layer/Transport Layer Security — cryptographic protocols providing secure communication over a computer network.
Network Topology
Protocols & StandardsThe arrangement of elements such as nodes, links, and devices in a computer network.
mTLS
Protocols & StandardsMutual Transport Layer Security — a protocol where both client and server authenticate each other using certificates.
Mesh Network
Protocols & StandardsA network topology where each node relays data for the network, providing self-healing and redundant paths.
Network Orchestration
Protocols & StandardsThe automated coordination and management of network resources, services, and policies across infrastructure.