Subnet/address mask, Computer Networking

Assignment Help:

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another 32-bit number that specifies the boundary that is called as the Subnet Mask or Address Mask.

Suppose

D = Destination Address

(A, M)= (32-bit IP Address, 32-bit Address Mask)

 

 A = = (D & M)

Now as an example take a 32-bit mask:

11111111 11111111 00000000 00000000

Which can be denoted in dotted decimal number as 255.255.0.0.

Consider a network prefix:

 10000000 00010010 00000000 00000000

 

Which can be shown in dotted decimal number as 128.10.0.0.

Consider a destination address: 128.10.2.3

That has Binary equivalent as:

 10000000 00010010 00000010 00000011

 

A logical 'and' between M and D gives the binary result as:

 10000000 00100010 00000000 00000000

 

Which is similar to prefix 128.10.0.0.


Related Discussions:- Subnet/address mask

State about the future of the intranet, Future of the intranet At ...

Future of the intranet At present, the world of information technology is guided bythe C 3 paradigm that stands for Command, Control and Communication, which is normally

How do we describe the concept of dpu, How do we explain the method of DPU,...

How do we explain the method of DPU, Segments, Datagram, Frame and  packet?

Packet takes through an internetwork, What utility can you use to see the p...

What utility can you use to see the path a packet takes through an internetwork? Ans) Trace - Uses Time-To-Live (TTL) values to make messages from each router used along the pat

Selective repeat ARQ, Selective Repeat ARQ - Processing at the receive...

Selective Repeat ARQ - Processing at the receiver additionally complex - The window size is reduced to 2(m-1) (2m/2 at most) - Both the transmitter as well as the receiv

Explain sonet frame transaction, Sonet Frame Transaction Transmitted ...

Sonet Frame Transaction Transmitted one subsequent to another without any gap in between. First 2 bytes - alignment bytes. F628 in Hex. - define the beginning of every

Define some solutions of security, What is Security solutions Though t...

What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

What is meant by asymmetric multiprocessing (amp), It imposes hierarchy and...

It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated t

What is meant by asymmetrical protocols, There is a many-to-one relationshi...

There is a many-to-one relationship among clients and server. Clients always start the dialog by requesting a service. Servers are passively awaiting for requests from clients.

Flow control in TCP, Q. Flow control in TCP? The amount of data a s...

Q. Flow control in TCP? The amount of data a source is able to send before receiving an ACK from the destination Whether to send 1 byte of data as well as wait for ACK

Message oriented middleware , What is Message Oriented Middleware (MOM)? ...

What is Message Oriented Middleware (MOM)? Ans) MOM permits general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate ove

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd