With fixed-length subnet veiling (FLSM) the comparable number of addresses has designated for each subnet. It is a succession of quantities of perpetual length that smoothes out bundle steering inside the subnets of a restrictive organization.

Assuming all the sub-network has comparative necessities for the quantity of hosts, these fixed-size address squares would be sufficient.

However, most often that isn’t true. Fixed-length subnet veiling (FLSM) likewise alluded to as regular subnetting. The Traditional Subnetting strategy causes misuse of IP Addresses. Since similar number of addresses distributed to each sub-network even the necessity isn’t comparable.

The geography displayed in Figure 1 above requires 5 subnets, one for the four LANs, and one for WAN association between switches. Utilizing conventional subnetting with the location of, we can acquire w bit from the third octet and 2 pieces from the last octet of the host part to meet the subnet need of 5 subnets.

As displayed in Figure 2, getting 3 pieces makes 8 subnets and leaves 6 host bits with 62 usable hosts for every subnet. This arrangement makes the ideal subnets and meets the host need of the biggest LAN.

However this customary subnetting meets the prerequisites of the biggest LAN and partitions the location space into sufficient number of subnets, So it brings about the significant misuse of unused addresses.

For instance, just two locations have expected for WAN subnet, But each subnet has 62 usable addresses, there are 60 unused addresses accessible in this subnets. This likewise restricts the development of the organization by diminishing the absolute number of subnets accessible.

This clumsy utilization of addresses is the component of customary subnetting. Conventional subnetting plan to this situation isn’t proficient and furthermore a brimming with squander.

To stay away from a misuse of IP address subnetting a subnet, or utilizing Variable Length Subnet Mask (VLSM), was plan. Figure 3 Show the pie diagram for the above table of fixed-length subnet covering (FLSM).

Applying a customary subnetting plan to this situation isn’t extremely proficient and is inefficient. All things considered, this model is a decent model for showing how we can utilize subnetting a subnet to expand address usage. Subnetting a subnet, or utilizing a variable-length subnet veil (VLSM), to try not to squander addresses.