wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Subnet Masking

profile
Ronak Gala
Feb 27, 2022
0 Likes
1 Discussions
94 Reads

Subnet masks are used to design subnetworks, or subnets, that connect local networks. It determines both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

In simplistic terms, you can create a subnet mask by taking the 32-bit value of an existing IP address, choosing how many subnets you want to create or alternatively, how many nodes you need on each subnet, and then setting all subsequent network bits to "1" and host bits to "0". The resulting 32-bit value is your subnet mask.

A subnet mask also pinpoints the endpoints of the range of IP addresses for a subnet. In any given network, two host addresses are always reserved for special purposes. The "0" address becomes the network address or network identification and the "255" address is assigned as a broadcast address. These cannot be assigned to a host.


Comments ()


Sign in

Read Next

Rain

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Evolution of Operating System

Blog banner

Memory

Blog banner

10 Survival Tips that might save your life

Blog banner

Memory Management - operating system

Blog banner

Strengthening Active Directory Security

Blog banner

Virus

Blog banner

GIS Bharat Maps

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Student Grade Calculator in LISP

Blog banner

Types of Threads

Blog banner

Hash password! Is it really secured?

Blog banner

Threats To Computer System

Blog banner

Deadlock

Blog banner

MOVEMBER

Blog banner

Cache Memory

Blog banner

Service Operations in ITSM

Blog banner

IP ADDRESS

Blog banner

Developments in Modern Operating Systems

Blog banner

Interrupts in OS

Blog banner

Linker

Blog banner

Install Ubuntu Easily

Blog banner

KAHAWA TEA

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Virtual Memory

Blog banner

Theads

Blog banner

Linux Threads:

Blog banner

RAID and It's Levels

Blog banner

Virtual memory in Operating System

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Stop Racism

Blog banner

Data Science in Mental Health Prediction

Blog banner

What is Vishing?

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Different Types of Data

Blog banner

Smitten Kitchen Keepers

Blog banner

Security Issues and Countermeasures

Blog banner

Modern Operating System

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Photorec - media recovery tool

Blog banner

What is E-commerce

Blog banner