wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Subnet Masking

profile
Ronak Gala
Feb 27, 2022
0 Likes
1 Discussions
93 Reads

Subnet masks are used to design subnetworks, or subnets, that connect local networks. It determines both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

In simplistic terms, you can create a subnet mask by taking the 32-bit value of an existing IP address, choosing how many subnets you want to create or alternatively, how many nodes you need on each subnet, and then setting all subsequent network bits to "1" and host bits to "0". The resulting 32-bit value is your subnet mask.

A subnet mask also pinpoints the endpoints of the range of IP addresses for a subnet. In any given network, two host addresses are always reserved for special purposes. The "0" address becomes the network address or network identification and the "255" address is assigned as a broadcast address. These cannot be assigned to a host.


Comments ()


Sign in

Read Next

Install Ubuntu Easily

Blog banner

OPERATING SYSTEM

Blog banner

Deadlock and starvation

Blog banner

Business Intelligence v/s Big Data

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

INTERNET SECURITY

Blog banner

Virtual Memory

Blog banner

Number Guessing game --lisp

Blog banner

How to use GIT & GITHUB

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Key to success in Sports

Blog banner

Deadlock

Blog banner

Deadlocks

Blog banner

Ethical Hacking

Blog banner

Operating system

Blog banner

Health and fitness

Blog banner

virtual memory

Blog banner

Article on Zoho Corporation

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner

MEMORY HIERARCHY

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Scheduling

Blog banner

Objectives and functions of Operating System...

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

EID UL FITR

Blog banner

Interrupts

Blog banner

How China Regained It's World's Largest Growing Economy Status

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Understanding Regression Analysis

Blog banner

Scheduling in Operating Systems

Blog banner

INTERNET

Blog banner

EMAIL INVESTIGATION

Blog banner

How to Conquer Depression ?

Blog banner

TRELLO

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Worms, viruses and Bots

Blog banner

Working with AES cryptographic algorithm using crypto++

Blog banner

Process, process creation and process termination

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner