Supernetting in Network Layer
Last Updated :
13 Mar, 2024
Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided into multiple smaller subnetworks. In Supernetting, multiple networks are combined into a bigger network termed a Supernetwork or Supernet. In this article, we'll explore the purpose and advantages of supernetting, along with essential considerations for its implementation.
What is Supernetting?
Supernetting is the process of aggregating routes to multiple smaller networks. Thus saving storage space in the routing table, simplifying routing decisions, and reducing route advertisements to neighboring gateways. Supernetting has helped address the increasing size of routing tables as the Internet has expanded. Supernetting is mainly used in Route Summarization, where routes to multiple networks with similar network prefixes are combined into a single routing entry, with the routing entry pointing to a Super network, encompassing all the networks. This in turn significantly reduces the size of routing tables and also the size of routing updates exchanged by routing protocols.
More specifically,
- When multiple networks are combined to form a bigger network, it is termed super-netting
- Super netting is used in route aggregation to reduce the size of routing tables and routing table updates
Important Points for Supernetting
- All the Networks should be contiguous.
- The block size of every network should be equal and must be in form of 2n.
- First Network id should be exactly divisible by whole size of supernet.
Example: Suppose 4 small networks of class C:
200.1.0.0,
200.1.1.0,
200.1.2.0,
200.1.3.0
Build a bigger network that has a single Network Id.
Explanation: Before Supernetting routing table will look like as:
Network Id | Subnet Mask | Interface |
---|
200.1.0.0 | 255.255.255.0 | A |
200.1.1.0 | 255.255.255.0 | B |
200.1.2.0 | 255.255.255.0 | C |
200.1.3.0 | 255.255.255.0 | D |
First, let's check whether three conditions are satisfied or not:
- Contiguous: You can easily see that all networks are contiguous all having size 256 IP Addresses( or 254 Hosts )..
Range of first Network from 200.1.0.0 to 200.1.0.255. If you add 1 in last IP address of first network that is 200.1.0.255 + 0.0.0.1, you will get the next network id which is 200.1.1.0. Similarly, check that all network are contiguous. - Equal size of all network: As all networks are of class C, so all of them have a size of 256 which is in turn equal to 28.
- First IP address exactly divisible by total size: When a binary number is divided by 2n then last n bits are the remainder. Hence in order to prove that first IP address is exactly divisible by while size of Supernet Network. You can check that if last n (n here refers to the number of bits required to represent the Total Size of the Supernet) bits are 0 or not.
In the given example first IP is 200.1.0.0 and whole size of supernet is 4*28 = 210. If last 10 bits of first IP address are zero then IP will be divisible.

Last 10 bits of first IP address are zero (highlighted by green color). So 3rd condition is also satisfied.
Advantages of Supernetting
- Control and reduce network traffic
- Helpful to solve the problem of lacking IP addresses
- Minimizes the routing table i.e, it cannot cover a different area of the network when combined and all the networks should be in the same class and all IP should be contiguous
Conclusion
In conclusion, supernetting is a networking technique that consolidates multiple smaller networks into a larger one, simplifying routing and reducing the size of routing tables. It's a valuable tool in managing the growth of internet routing tables and optimizing network performance. However, it requires careful consideration of network characteristics and adherence to specific conditions for effective implementation.
Similar Reads
Efficiency of CSMA/CD Prerequisite - Introduction to Ethernet, Basics of CSMA/ CD Carrier sense multiple access with collision detection (CSMA/CD) - The CSMA method does not tell us what to do in case there is a collision. Carrier sense multiple access with collision detection (CSMA/CD) adds to the CSMA algorithm to deal
3 min read
Efficiency Of Token Ring Token Ring protocol is a communication protocol used in Local Area Network (LAN). In a token ring protocol, the topology of the network is used to define the order in which stations send. The stations are connected to one another in a single ring. It uses a special three-byte frame called a "token"
4 min read
Stop and Wait ARQ Stop and Wait ARQ is a Sliding Window Protocol method used for the reliable delivery of data frames. The stop-and-wait ARQ is used for noisy channels or links to handle flow and error control between sender and receiver. The Stop and Wait ARQ protocol sends a data frame and then waits for an acknowl
9 min read
Sliding Window Protocol | Set 1 (Sender Side) Reliable data transmission is critical in computer networking, particularly across long distances or in networks that have high latency. The Sliding Window Protocol is a critical component in obtaining this reliability. It is part of the OSI model's Data Link Layer and is used in several protocols,
8 min read
What is MAC Address? To communicate or transfer data from one computer to another, we need an address. In computer networks, various types of addresses are introduced; each works at a different layer. A MAC address, which stands for Media Access Control Address, is a physical address that works at the Data Link Layer. I
12 min read
Collision Avoidance in wireless networks We take a close look at so-called WiFi which is also known as IEEE standard 802.11 Consider the situation depicted in the figure, where each of the four nodes is able to send and receive signals that reach just the nodes to its immediate left and right. For example, B can exchange frames with A and
6 min read
Difference between Unicast, Broadcast and Multicast in Computer Network The cast term here signifies some data(stream of packets) is being transmitted to the recipient(s) from the client(s) side over the communication channel that helps them to communicate. Let's see some of the "cast" concepts that are prevailing in the computer networks field. What is Unicast?This typ
5 min read
Collision Domain and Broadcast Domain in Computer Network Prerequisite - Network Devices, Transmission Modes The most common network devices used are routers and switches. But we still hear people talking about hubs, repeaters, and bridges. Do you ever wonder why these former devices are preferred over the latter ones? One reason could be: 'because they ar
5 min read
Introduction of Classful IP Addressing An IP address is an address that has information about how to reach a specific host, especially outside the LAN. An IP address is a 32-bit unique address having an address space of 232.Classful IP addressing is a way of organizing and managing IP addresses, which are used to identify devices on a ne
11 min read
IPv4 Datagram Header IP stands for Internet Protocol and v4 stands for Version Four (IPv4). IPv4 was the primary version brought into action for production within the ARPANET in 1983. IP version four addresses are 32-bit integers which will be expressed in decimal notation. In this article, we will discuss about IPv4 da
4 min read