Subnet/address mask, Computer Networking

Assignment Help:

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another 32-bit number that specifies the boundary that is called as the Subnet Mask or Address Mask.

Suppose

D = Destination Address

(A, M)= (32-bit IP Address, 32-bit Address Mask)

 

 A = = (D & M)

Now as an example take a 32-bit mask:

11111111 11111111 00000000 00000000

Which can be denoted in dotted decimal number as 255.255.0.0.

Consider a network prefix:

 10000000 00010010 00000000 00000000

 

Which can be shown in dotted decimal number as 128.10.0.0.

Consider a destination address: 128.10.2.3

That has Binary equivalent as:

 10000000 00010010 00000010 00000011

 

A logical 'and' between M and D gives the binary result as:

 10000000 00100010 00000000 00000000

 

Which is similar to prefix 128.10.0.0.


Related Discussions:- Subnet/address mask

Explain the term- encryption, Explain the term- Encryption Because all ...

Explain the term- Encryption Because all of the user traffic, as well as control traffic, is digitized in second generation systems, it is a relatively simple matter to encrypt

Determine the rate of communication line, Determine the rate of communicati...

Determine the rate of communication line The dog could carry 21 gigabytes or 168 gigabits. A speed of 18 km/hour that is equal to 0.005 km/sec. The time to travel the distance

Tqm in design manufacturing, Quality assurance through statistical methods...

Quality assurance through statistical methods is a key component in a manufacturing organization where TQM generally starts by sampling a random selection selection of th

What are the features of star and ring topology, What are the features of s...

What are the features of star and ring topology The three networks have following features: star: best case is = 2, average case is = 2, worst case is = 2 ring: best case

What are the major technologies to create client application, What are the ...

What are the five major technologies that can be used to create Client/Server applications? Database Servers Groupware TP Monitors Distributed Objects Intranets.

Error detection in lrc - performance, LRC - Performance Detects ev...

LRC - Performance Detects every burst errors up to length n (number of columns) If two bits in one data unit are damaged as well as two bits in exactly same positions

Multicast routing protocols, Multicast Routing Protocols Multicast gr...

Multicast Routing Protocols Multicast group addresses are assigned by IANA [Internet Assigned Numbers Authority for well known services and protocols. Information is exchang

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd