Subnet/address mask, Computer Networking

Assignment Help:

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another 32-bit number that specifies the boundary that is called as the Subnet Mask or Address Mask.

Suppose

D = Destination Address

(A, M)= (32-bit IP Address, 32-bit Address Mask)

 

 A = = (D & M)

Now as an example take a 32-bit mask:

11111111 11111111 00000000 00000000

Which can be denoted in dotted decimal number as 255.255.0.0.

Consider a network prefix:

 10000000 00010010 00000000 00000000

 

Which can be shown in dotted decimal number as 128.10.0.0.

Consider a destination address: 128.10.2.3

That has Binary equivalent as:

 10000000 00010010 00000010 00000011

 

A logical 'and' between M and D gives the binary result as:

 10000000 00100010 00000000 00000000

 

Which is similar to prefix 128.10.0.0.


Related Discussions:- Subnet/address mask

What is nic and wan, What is NIC and WAN? NIC is short for Network Inte...

What is NIC and WAN? NIC is short for Network Interface Card. This is a peripheral card that is joined to a PC in order to connect to a network. Each NIC has its own MAC addres

Firewall rules based on a fictitious organisation, Question 1 requires you ...

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t

What do you mean by protocol, What do you mean by Protocol? In the cont...

What do you mean by Protocol? In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a netw

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Compute shortest path, Compute the shortest path from t to all network node...

Compute the shortest path from t to all network nodes.

Netware ipx addressing uses a network number, NetWare IPX addressing uses a...

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

Briefly explain the terms ''cohesion'' and ''coupling'', QUESTION 1 (a)...

QUESTION 1 (a) Draw a use-case model for the above system. You must identify all possible actors and use-cases. (b) Assume you are using the Rational Unified Process a

url connection instance, What is the difference among URL instance and URL...

What is the difference among URL instance and URL Connection instance? Ans) A URL instance represents the location of a resource, and a URL Connection instance shows a link for

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd