IT PARK
    Most Popular

    Is the enterprise ready to protect its cloud computing?

    Mar 18, 2023

    Neural AI, the next frontier of artificial intelligence

    Mar 18, 2023

    What are the benefits of using SSD in laptops

    Mar 15, 2023

    IT PARK IT PARK

    • Home
    • Encyclopedia

      Differences between SSDs and HDDs

      Mar 22, 2023

      What is a discrete graphics card

      Mar 21, 2023

      What is Qualcomm three carrier aggregation

      Mar 20, 2023

      What is resolution? What does resolution mean?

      Mar 19, 2023

      How to solve the problem of computer blue screen? What about the blue screen of the computer?

      Mar 18, 2023
    • AI

      What is the neural network of artificial intelligence?

      Mar 22, 2023

      What is the core issue of AI technology?

      Mar 21, 2023

      What is AI?

      Mar 20, 2023

      Will the latest AI "kill" programming

      Mar 19, 2023

      Neural AI, the next frontier of artificial intelligence

      Mar 18, 2023
    • Big Data

      What is the maximum value of big data

      Mar 22, 2023

      How does big data start? From small data to big data

      Mar 21, 2023

      What is big data? What can big data do?

      Mar 20, 2023

      Benefits of big data analysis and how to analyze big data

      Mar 19, 2023

      Six benefits of big data for enterprises

      Mar 18, 2023
    • CLO

      SaaS sprawl: meaning, hazard, status quo and mitigation plan

      Mar 22, 2023

      What is the difference between cloud computing and virtualization?

      Mar 21, 2023

      What is cloud computing?

      Mar 20, 2023

      Four advantages are highlighted, and cloud computing is the trend

      Mar 19, 2023

      Is the enterprise ready to protect its cloud computing?

      Mar 18, 2023
    • IoT

      How does the Internet of Things affect business?

      Mar 22, 2023

      Five effective business models of Internet of Things

      Mar 21, 2023

      Use the Internet of Things to find new business models

      Mar 20, 2023

      Six ways for the Internet of Things to change the business model

      Mar 19, 2023

      6 Ways to Make Money for IoT Products

      Mar 18, 2023
    • Blockchain

      Blockchain Foundation - What is Blockchain Technology

      Mar 22, 2023

      After the collision between quantum computing and blockchain - quantum blockchain

      Mar 21, 2023

      What is blockchain? Simply understand blockchain

      Mar 20, 2023

      How does the Internet of Things affect the working world?

      Mar 19, 2023

      What is Bitcoin?

      Mar 18, 2023
    IT PARK
    Home » Encyclopedia » What is the subnet mask
    Encyclopedia

    What is the subnet mask

    Subnet mask is also called network mask, address mask and subnet mask. It is used to indicate which bits of an IP address identify the subnet where the host is located and which bits identify the bit mask of the host. The subnet mask cannot exist alone. It must be used in combination with the IP address. The subnet mask has only one function, which is to divide an IP address into two parts: network address and host address. The subnet mask is the basic knowledge that everyone who uses the Internet must master. Only by mastering it can you truly understand the TCP/IP protocol settings. Let's explain what subnet mask is in simple terms.
    Updated: Mar 10, 2023
    What is the subnet mask

    Subnet mask is also called network mask, address mask and subnet mask. It is used to indicate which bits of an IP address identify the subnet where the host is located and which bits identify the bit mask of the host. The subnet mask cannot exist alone. It must be used in combination with the IP address. The subnet mask has only one function, which is to divide an IP address into two parts: network address and host address. The subnet mask is the basic knowledge that everyone who uses the Internet must master. Only by mastering it can you truly understand the TCP/IP protocol settings. Let's explain what subnet mask is in simple terms.

    How to divide the subnet? First, you must memorize the power of 2: the values from the 0th power to the 9th power of 2 are: 1, 2, 4, 8, 16, 32, 64, 128, 256, and 512. Another thing to understand is: subnetting is based on taking away the host bit, and using this taken away part as the subnet bit. So this means that the more subnets there are, the fewer hosts there will be.

    The subnet mask is used to distinguish which part of the IP address is the network address and which part is the host address. It consists of 1 and 0, 32 bits long, and all 1 bits represent the network number. Not all networks require subnets. Therefore, a concept is introduced: default subnet mask. The default subnet mask of class A IP address is 255.0.0.0; that of class B is 255.255.0.0; and that of class C is 255.255.255.0.

    CIDR is called classless inter-domain routing. ISPs often use this method to assign addresses to customers. ISPs provide customers with a block size (block size), similar to this: 192.168.10.32/28, this row of numbers tells you your subnet mask How much is it, /28 represents how many bits are 1, and the maximum is /32. But you must know that: no matter it is a class A, class B or other class address, the maximum available address can only be /30, that is, 2 bits are reserved for the host bit.

    Several shortcuts for subnetting:

     

    1. How many subnets will be generated by the subnet mask you choose?: 2 to the power of x-2 (x represents the subnet bit, that is, the part whose binary system is 1) PS: here x means to exclude the default The subnet bits after the mask, for example, the network address 192.168.1.1, the mask 255.255.255.192, because it is a class C address, the mask is 255.255.255.0. Then 255.255.255.192(x.x.x.11000000) uses two 1s as subnet bits.

     

    1. How many hosts can each subnet have?: 2 to the power of y-2 (y represents the host bit, that is, the part whose binary system is 0)

     

    1. What is the effective subnet?: Effective subnet number = 256-decimal subnet mask (the result is called block size or base number)

     

    1. What is the broadcast address of each subnet?: Broadcast address = next subnet number - 1

     

    1. What are the effective hosts of each subnet?: Ignore the addresses of all 0s and all 1s in the subnet, and the remaining ones are valid host addresses.

     

    The last valid host address = the next subnet number - 2 (that is, the broadcast address - 1)

    encyclopedias subnet mask computer network
    Previous Article On the Importance of Cloud Access Security Agent CASB
    Next Article Neural AI, the next frontier of artificial intelligence

    Related Articles

    Encyclopedia

    What are the advantages of full frame SLR camera

    Mar 14, 2023
    Encyclopedia

    What does the server mean

    Mar 11, 2023
    Encyclopedia

    Differences between SSDs and HDDs

    Mar 22, 2023
    Most Popular

    Is the enterprise ready to protect its cloud computing?

    Mar 18, 2023

    Neural AI, the next frontier of artificial intelligence

    Mar 18, 2023

    What are the benefits of using SSD in laptops

    Mar 15, 2023
    Copyright © 2023 itheroe.com. All rights reserved. | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.