wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Subnet Masking

profile
Ronak Gala
Feb 27, 2022
0 Likes
1 Discussions
94 Reads

Subnet masks are used to design subnetworks, or subnets, that connect local networks. It determines both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

In simplistic terms, you can create a subnet mask by taking the 32-bit value of an existing IP address, choosing how many subnets you want to create or alternatively, how many nodes you need on each subnet, and then setting all subsequent network bits to "1" and host bits to "0". The resulting 32-bit value is your subnet mask.

A subnet mask also pinpoints the endpoints of the range of IP addresses for a subnet. In any given network, two host addresses are always reserved for special purposes. The "0" address becomes the network address or network identification and the "255" address is assigned as a broadcast address. These cannot be assigned to a host.


Comments ()


Sign in

Read Next

VIRTUAL MACHINES

Blog banner

Process states

Blog banner

Deadlock

Blog banner

Race Condition

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Scheduling

Blog banner

Who decides your overthinking, anyway?

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Evolution of operating system

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Spyware

Blog banner

Memory Management

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

MORDERN UNIX SYSTEM

Blog banner

The Evolution of Operating Systems

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

DISK SCHEDULING

Blog banner

GUIDE TO GIS

Blog banner

Evolution of Operating Sytems

Blog banner

15 Interesting Facts about India

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

WINDOWS I/ O

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

What is Spyware? and examples of them.

Blog banner

Modern operating system

Blog banner

Cache memory

Blog banner

Modern operating system

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Virtualisation

Blog banner

Memory Management

Blog banner

Penetration Testing

Blog banner

Mutual exclusion

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Marvel Cinematic Universe

Blog banner