wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Subnet Masking

profile
Ronak Gala
Feb 27, 2022
0 Likes
1 Discussions
93 Reads

Subnet masks are used to design subnetworks, or subnets, that connect local networks. It determines both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

In simplistic terms, you can create a subnet mask by taking the 32-bit value of an existing IP address, choosing how many subnets you want to create or alternatively, how many nodes you need on each subnet, and then setting all subsequent network bits to "1" and host bits to "0". The resulting 32-bit value is your subnet mask.

A subnet mask also pinpoints the endpoints of the range of IP addresses for a subnet. In any given network, two host addresses are always reserved for special purposes. The "0" address becomes the network address or network identification and the "255" address is assigned as a broadcast address. These cannot be assigned to a host.


Comments ()


Sign in

Read Next

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Deadlock

Blog banner

Some web vulnerabilities

Blog banner

Types Of Interrupt

Blog banner

Fashion marketing in india

Blog banner

SPAM

Blog banner

Interrupts

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Modern Operating system

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Drawing tips for a beginner

Blog banner

Supervised and Unsupervised Learning

Blog banner

Dancing Classes In Mumbai

Blog banner

I/O Buffering

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Raid

Blog banner

GOOGLE

Blog banner

Paid Email

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Internet of Things

Blog banner

Deadlocks

Blog banner

IT Service Continuity Management

Blog banner

Processes : Process description and control

Blog banner

Bulk E-mail software

Blog banner

Deadlock in operating system

Blog banner

E-security systems | CCTV

Blog banner

Virtual memory

Blog banner

EMAIL INVESTIGATION

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

A Heartfelt Act of Kindness

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Understanding the 'Ambiverts'

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

LTE Technology

Blog banner

Inventory management software system

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Data Lake

Blog banner