Subnet/address mask, Computer Networking

Assignment Help:

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another 32-bit number that specifies the boundary that is called as the Subnet Mask or Address Mask.

Suppose

D = Destination Address

(A, M)= (32-bit IP Address, 32-bit Address Mask)

 

 A = = (D & M)

Now as an example take a 32-bit mask:

11111111 11111111 00000000 00000000

Which can be denoted in dotted decimal number as 255.255.0.0.

Consider a network prefix:

 10000000 00010010 00000000 00000000

 

Which can be shown in dotted decimal number as 128.10.0.0.

Consider a destination address: 128.10.2.3

That has Binary equivalent as:

 10000000 00010010 00000010 00000011

 

A logical 'and' between M and D gives the binary result as:

 10000000 00100010 00000000 00000000

 

Which is similar to prefix 128.10.0.0.


Related Discussions:- Subnet/address mask

Operating system for clients, Operating system for Clients All of the ...

Operating system for Clients All of the clients running popular operating systems such as Microsoft Windows, Mac OS, UNIX, etc., could be used to function as backbone software

Issues with bridges connecting different lans, Issues with Bridges Connecti...

Issues with Bridges Connecting Different LANs - Frame format - differences in frame structure, fields used (example Ethernet to Token Ring) - Payload size - size of data en

computer computinons, Difference between synchronous tdm and statistical t...

Difference between synchronous tdm and statistical tdm

Introduction to operating system for parallel computer, INTRODUCTION T...

INTRODUCTION This part discusses the additional requirements at software levels and operating system which will create the parallel programs run on parallel hardware. Collecti

Dns records and messages - application layer, DNS Records  and Messages ...

DNS Records  and Messages Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  reco

Advantages of ospf - network layer and routing , Advantages of OSPF OSP...

Advantages of OSPF OSPF an is having different  advantages. These are as follows. OSPF  is an open standard supported by many  vendors. OSPF converges quickly. OSPF au

What command do we use to disable domain lookup, no ip domain-lookupcommand...

no ip domain-lookupcommand is use to disable domain lookup

Describe the datawarehouse and data mining, Question 1: ‘There is an ov...

Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant

Maximum hop count for link-state protocols, Normal 0 false fa...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Networking concepts and applications, iLab 2: Office Network Expansion ...

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd