wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Subnet Masking

profile
Ronak Gala
Feb 27, 2022
0 Likes
1 Discussions
93 Reads

Subnet masks are used to design subnetworks, or subnets, that connect local networks. It determines both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

In simplistic terms, you can create a subnet mask by taking the 32-bit value of an existing IP address, choosing how many subnets you want to create or alternatively, how many nodes you need on each subnet, and then setting all subsequent network bits to "1" and host bits to "0". The resulting 32-bit value is your subnet mask.

A subnet mask also pinpoints the endpoints of the range of IP addresses for a subnet. In any given network, two host addresses are always reserved for special purposes. The "0" address becomes the network address or network identification and the "255" address is assigned as a broadcast address. These cannot be assigned to a host.


Comments ()


Sign in

Read Next

Direct Memory Access

Blog banner

Synchronization

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Operation system

Blog banner

INTERNET

Blog banner

Business Engineering

Blog banner

security requirements for safe e-payment

Blog banner

Memory management

Blog banner

Social Media Marketing Trends 2022

Blog banner

Firewall in Computer Network

Blog banner

Policies for Service Transition

Blog banner

Password Generator - Lisp

Blog banner

Social Engineering Attacks

Blog banner

Note on Process, Process creation and Process termination

Blog banner

GOOGLE

Blog banner

INSTAGRAM

Blog banner

Importance of internet

Blog banner

Dekkers Algorithm

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

security controls

Blog banner

Importance of Education

Blog banner

Cache memory

Blog banner

Amazon

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Measuring IT Risk

Blog banner

Data Visualization

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Multicore CPUs

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Virtual memory in os

Blog banner

STARVATION

Blog banner

CRISP-DM Methodology

Blog banner

File Allocation Methods

Blog banner

Music

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Deming’s Process

Blog banner