wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Subnet Masking

profile
Ronak Gala
Feb 27, 2022
0 Likes
1 Discussions
93 Reads

Subnet masks are used to design subnetworks, or subnets, that connect local networks. It determines both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

In simplistic terms, you can create a subnet mask by taking the 32-bit value of an existing IP address, choosing how many subnets you want to create or alternatively, how many nodes you need on each subnet, and then setting all subsequent network bits to "1" and host bits to "0". The resulting 32-bit value is your subnet mask.

A subnet mask also pinpoints the endpoints of the range of IP addresses for a subnet. In any given network, two host addresses are always reserved for special purposes. The "0" address becomes the network address or network identification and the "255" address is assigned as a broadcast address. These cannot be assigned to a host.


Comments ()


Sign in

Read Next

How to Conquer Depression ?

Blog banner

Process Creation

Blog banner

Web Site

Blog banner

Threads

Blog banner

Semaphores

Blog banner

"Life as a Part-time Student"

Blog banner

What your Favorite colour says about You?

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Smartsheet

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Memory Management

Blog banner

Crypto tax evasion

Blog banner

Threads

Blog banner

Dos (Denial of service) Attack

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Why Friendship at Work is Important

Blog banner

Assignment-3

Blog banner

Deadlock

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Smartsheet

Blog banner

15 Interesting Facts about India

Blog banner

Processes : Process description and control

Blog banner

Microsoft powerpoint presentation

Blog banner

Security and E-mail

Blog banner

Internet of Things and cyber security

Blog banner

VIRTUAL MACHINES

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Vulnerability Assessment

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Save Girl Child

Blog banner

Blog on Smartsheet.

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Data Mining

Blog banner

Technological Advancement

Blog banner

Deadlock and Starvation

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

BharatPe

Blog banner

MAILFENCE

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

I/O Buffering

Blog banner

Memory Management Techniques

Blog banner