当前位置:网站首页>What is a subnet mask? (Powercert animated videos)
What is a subnet mask? (Powercert animated videos)
2022-06-25 20:58:00 【Leap soil and tea】
What is Subnet Mask?
This article is a translation of the following link video :
【IT Hard core animation handling / Chinese and English double characters 】 What is a subnet mask ?
Example of subnet mask
Suppose you have a small business ,IP Address :192.168.1.0, Subnet mask :255.255.255.0, Now suppose your small business has a total of 12 Computers , all 12 All computers are on the same network , These computers belong to different departments , Represented by color , But suppose you want to divide these computers into three different networks , In this way, each department can not see the network traffic of other departments .
therefore , You want to split a network in your enterprise into three small networks .
The method of splitting this network into smaller networks is realized through subnets , The method is to change the default subnet mask by borrowing some bits specified by the host and using them to create a subnet .
- In this subnet mask , We will change some zeros in the host part to one , So we can create more networks .
- If we keep the subnet mask unchanged , It will get a containing 256 Network of hosts , Technically speaking , We must now subtract the host , Because the values are 1,0 Reserved for broadcast and network addresses respectively , So we actually have 254 Available hosts .
We need to change this subnet mask , So we can generate the three networks we need
for example , Let's borrow one from the mainframe section , This is our new subnet mask , So now the fourth binary octet is 128, Because when you calculate the first bit of the binary octet , It's equal to 128.
1) Borrow a bit , This will divide the network in two , So now it is no longer a containing 254 Network of hosts , Instead, provide two networks or each subnet that contains 126 Of hosts .
2) Now let's continue borrowing another bit from the host section , Now we have borrowed two people from the host , So this is the new subnet mask in our fourth binary octet 192, So by borrowing two , This will further divide the network , Now we will have four subnets , Each subnet has 62 Console host .
3) Let's borrow another bit from the host part again , This is a new subnet mask , By borrowing 3 position , This will divide the network into 8 Subnet , Each subnet has 30 Console host .
4) If we borrow four bits , We will get 16 Subnet , Each subnet has 14 Console host
5) If we borrow 5 A bit , We will get 32 Subnet , Each subnet has 6 Host computer .
6) If we borrow 6 position , We will get 64 Subnet , Each subnet has two hosts
7) If we borrow 7 position , It will provide us with 128 Subnet , But no hosts are available .
The more bits the network portion borrows from the host portion , The number of networks that can be created doubles , However, the number of hosts per network will also be reduced by half at each bidding .
If we want to divide this network into three smaller networks or subnets , We have to borrow two bits from the host part , So even if we only need three networks , This subnet mask at least allows the network to work with it . Therefore, the new custom subnet mask of our three subnets is 255.255.255.192
So now our network is divided into three smaller subnets .
IP Address classification
- Addresses and subnet masks fall into five different categories , namely A To E class .
- A,B,C Classes are used for commercial purposes
- You can IP The number in the first octet of the address and the default subnet mask to distinguish which category they belong to .
A、B and C Class IP Diagram of address and default subnet mask
Now? , When organizations need to be connected , They will need one according to the needs of the organization IP Address category , This category is based on the number of hosts they have . therefore , If an organization has many hosts , They will need one A class IP Address , One A class IP Addresses can be generated up to 1600 Ten thousand hosts .
A class IP The host part of the address is very large , The host uses three octets , This is why it can generate so many hosts . An example of an organization needing so many hosts is similar to Internet Service provider , Because they need to put millions IP Address distribution to all customers .
One B class IP The address can generate up to 65000 hosts . This category is applicable to large and medium-sized organizations .
One C class IP Addresses can generate 254 Console host . One C class IP Addresses are used for small organizations and families with few hosts .
CIDR
The subnet mask can also be called CIDR To represent .CIDR Represents classless inter domain routing , Also known as slash notation . Slash notation is a shorter way to write a subnet mask , It does this by writing a forward slash , Then write a number in the count subnet mask to achieve this
for example , If you see IP The address is denoted by a slash 24. This means that the length of the subnet mask is 24 position , That is to say, its length is 24 position .
If the sign is a slash 25, This means that the length of the subnet mask is 25 position , Or if it's a slash 26, This means that the length of the subnet mask is 26 position , Or if CIDR The notation is a slash 8, This means that the length of the subnet mask is 8 position .
边栏推荐
- R language quantile autoregressive QAR analysis pain index: time series of unemployment rate and inflation rate
- [buucry] sensor (Manchester code)
- Jingxi Pinpin wechat applet -signstr parameter encryption
- Intra domain information collection for intranet penetration
- COMP9024
- Lesson 4 beautifulsoup
- 2022年启牛学堂证券开户安全嘛?
- 启牛学堂证券开户安全嘛?
- Mysqldumpslow out slow statements in the database
- Cross project measurement is a good helper for CTOs and PMOS
猜你喜欢
Interviewer: why does TCP shake hands three times and break up four times? Most people can't answer!

Sonar series: continuous scanning through Jenkins integrated sonarqube (IV)

Compile 6relayd using the cross compiler
Attention to government and enterprise users! The worm prometei is spreading horizontally against the local area network
MySQL installation tutorial
Yunzhisheng atlas supercomputing platform: computing acceleration practice based on fluid + alluxio (Part I)
A new paradigm for large model application: unified feature representation optimization (UFO)

Log4j2 vulnerability battle case

Must see the summary! In depth learning era, you should read 10 articles to understand image classification!
Boomfilter learning
随机推荐
[golang] leetcode intermediate - the kth largest element in the array &
Several ways to obtain domain administrator privileges
Lesson 4 beautifulsoup
[distributed system design profile (1)] raft
Analysis and cleaning of kdevtmpfsi virus content
OLED driver learning based on ssd1306 (I): SSD Chinese command table (handling)
ZK implementation of distributed global counter for cursor application scenario analysis
股市小白通过网上进行股票开户安全吗?
Lesson 1 Preparation
Inventory - those automated test interview questions you can't help but know
Basic process of configuring utf8 in idea
[deep learning series] - visual interpretation of neural network
Desktop network error display red ×, Component failed to start
laf. JS - open source cloud development framework (readme.md)
Docker failed to remotely access 3306 after installing MySQL
Sqlmap for interface security testing
Getting started and using postman
Day 29/100 local SSH password free login to remote
Detailed explanation of unified monitoring function of multi cloud virtual machine
Exploration of advanced document editor design in online Era










2) Now let's continue borrowing another bit from the host section , Now we have borrowed two people from the host , So this is the new subnet mask in our fourth binary octet 192, So by borrowing two , This will further divide the network , Now we will have four subnets , Each subnet has 62 Console host .













