Subnet/address mask, Computer Networking

Assignment Help:

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another 32-bit number that specifies the boundary that is called as the Subnet Mask or Address Mask.

Suppose

D = Destination Address

(A, M)= (32-bit IP Address, 32-bit Address Mask)

 

 A = = (D & M)

Now as an example take a 32-bit mask:

11111111 11111111 00000000 00000000

Which can be denoted in dotted decimal number as 255.255.0.0.

Consider a network prefix:

 10000000 00010010 00000000 00000000

 

Which can be shown in dotted decimal number as 128.10.0.0.

Consider a destination address: 128.10.2.3

That has Binary equivalent as:

 10000000 00010010 00000010 00000011

 

A logical 'and' between M and D gives the binary result as:

 10000000 00100010 00000000 00000000

 

Which is similar to prefix 128.10.0.0.


Related Discussions:- Subnet/address mask

Ethernet cable, what is max length of cable I can use

what is max length of cable I can use

Guided and unguided transmission media, Name various types of guided and un...

Name various types of guided and unguided transmission media. If you are connecting your office computers through a local area network which transmission media would you use? Why?

Timing in mpi program, MPI_Wtime ( ) returns elapsed wall-clock time in sec...

MPI_Wtime ( ) returns elapsed wall-clock time in seconds as some arbitrary point in past. Elapsed time for program segment is specified by the difference between MPI_Wtime values a

Networking, What is the implication of increasing and decreasing subnet Bit...

What is the implication of increasing and decreasing subnet Bits?

Programming based on data parallelism, Programming Based on Data Parallelis...

Programming Based on Data Parallelism In a data parallel programming model, the focus is on data distribution. Every processor works with a portion of data. We shall discuss on

Working of internet, As discussed in the earlier section each computer link...

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer

Explain the process of piggybacking, Q. Explain the process of piggybacking...

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

Issues with bridges connecting different lans, Issues with Bridges Connecti...

Issues with Bridges Connecting Different LANs - Frame format - differences in frame structure, fields used (example Ethernet to Token Ring) - Payload size - size of data en

Calculate output voltage amplitude from the circuit, Question The circu...

Question The circuit in the figure is driven by a 9 mV amplitude signal generator with an output impedance of 2 kW. What is the output voltage amplitude from the circuit in the

Hierarchy of dns servers application layer , Hierarchy of DNS Servers ...

Hierarchy of DNS Servers DNS uses a large number of server organized in hierarchical  fashion  and distribution  around the world. No single DNS server has all  of the  mappin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd