wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Subnet Masking

profile
Ronak Gala
Feb 27, 2022
0 Likes
1 Discussions
94 Reads

Subnet masks are used to design subnetworks, or subnets, that connect local networks. It determines both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

In simplistic terms, you can create a subnet mask by taking the 32-bit value of an existing IP address, choosing how many subnets you want to create or alternatively, how many nodes you need on each subnet, and then setting all subsequent network bits to "1" and host bits to "0". The resulting 32-bit value is your subnet mask.

A subnet mask also pinpoints the endpoints of the range of IP addresses for a subnet. In any given network, two host addresses are always reserved for special purposes. The "0" address becomes the network address or network identification and the "255" address is assigned as a broadcast address. These cannot be assigned to a host.


Comments ()


Sign in

Read Next

Incorporating Automation into Digital Forensics.

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Security Issues and Countermeasures

Blog banner

Buffer overflow

Blog banner

This too shall pass

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Deadlock and Starvation

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

How to Grow Your Brand on YouTube Without a Big Budget

Blog banner

Information Technology In E- Commerce

Blog banner

I/O Management and Disk Scheduling

Blog banner

Swiggi

Blog banner

R Programming

Blog banner

The IT Service Lifecycle

Blog banner

John Titor: The Time Traveler

Blog banner

I/O Buffering

Blog banner

Different memory allocation strategies

Blog banner

How can parents support a child’s mental health?

Blog banner

Online Education

Blog banner

De-Coding Love

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Hacking Mobile Platforms

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Types Of Interrupt

Blog banner

Data Warehouse Bus Matrix

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Time Series Analysis

Blog banner

Paginng In OS

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

What is Virtual Memory

Blog banner

Deadlock in Operating System

Blog banner

Benefits of yoga and meditation

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

VIRTUAL MACHINES

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Delhi city

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner