当前位置:网站首页>Class A, B, C networks and subnet masks in IPv4
Class A, B, C networks and subnet masks in IPv4
2022-07-06 03:59:00 【yanwu_ nuc】
Reference article
Reference article
When two computers connected to a network communicate with each other , The packets they transmit contain some additional information , These additional information is the address of the computer that sends the data and the address of the computer that receives the data . When the network exists with IP Protocol based communication , These addresses for sending and receiving data are IP Address .
The following are involved IP All addresses are Ipv4 Of 32 position IP Address
IP Address format :IP Address = network address + The host address
IP Address according to network address Mainly can be divided into A、B、C Three types of address
1. A class IP Address
One A class IP Address by 1 Byte network address and 3 Byte host address composition , The highest bit of the network address must be “0”, Address range from 1.0.0.0 To 126.0.0.0. Usable A There are 126 individual , Every network can hold 1 More than 100 million hosts .
2. B class IP Address
One B class IP Address by 2 Byte network address and 2 Byte host address composition , The highest bit of the network address must be “10”, Address range from 128.0.0.0 To 191.255.255.255. Usable B There are 16382 individual , Every network can hold 6 More than ten thousand hosts .
3. C class IP Address
One C class IP Address by 3 Byte network address and 1 Byte host address composition , The highest bit of the network address must be “110”. Range from 192.0.0.0 To 223.255.255.255.C Class network up to 209 More than a , Every network can hold 254 Host computer .
Subnet mask (subnet mask):
The subnet mask is a 32 Bit address , For shielding IP Part of the address to distinguish between a network ID and a host ID , The subnet mask cannot exist alone , It has to be combined with IP Address used together .
Function of subnet mask :
1、 For shielding IP Part of the address to distinguish between a network ID and a host ID , Only Network identity The same two hosts can communicate with each other without routing .
The subnet mask must match IP Address to use . For common Networks A、 B、C class IP The binary and decimal correspondence of the default subnet mask of the address is shown in the table 1 Shown .
The working process of subnet mask is : take 32 Bit subnet mask and IP Address carries out bitwise logic in binary form “ And ” The result of the operation is the network address , Sum the result of the subnet mask binary non with IP Address binary logic “ And ”(AND) operation , What you get is the host address .
Such as :192.168.10.11 AND 255.255.255.0, The result is 192.168.10.0, The meaning of its expression is : The IP The address belongs to 192.168.10.0 The network , Its host number is 11, That is, the number in this network is 11 The host .
2、 The second is to put a big IP The network is divided into several small subnetworks .
In order to better manage the network in the intranet , Network administrators also take advantage of the subnet mask , Artificially divide a larger intranet into more small subnets , recycling Three layer switch The routing function of realizes the interconnection of subnets , So as to effectively solve the network broadcast storm and network virus and many other network management problems .
The subnet mask mechanism provides a method for subnet partition . Its effect is : Reduce traffic on the network ; save IP Address ; Easy to manage ; Solve some problems of the physical network itself . After using the subnet mask to divide the subnets , Communication is possible in the subnet , Cannot communicate across subnets , Routers should be used for communication between subnets , And correctly configure the static routing information . Divide subnets , You should follow the rules of subnet partition structure . Is to use continuous 1 stay IP Add the network address in the address , At the same time, reduce the number of bits representing the host address .
for example ,IP The address is 130.39.37.100, The network address is 130.39.37.0、 The subnet address is 130.39.37.0、 The subnet mask is 255.255.255.0, The network address part and the subnet identification part are “1” Corresponding , The host identification part is “0” Corresponding . Use CIDR Expressed as :130.39.37.100/24 namely IP Address / Mask length . On the third byte 255 The corresponding 8 Bit binary value is to lend the host address bits to the network address part , Acts as the number of bits for dividing subnets .
边栏推荐
- Database, relational database and NoSQL non relational database
- [meisai] meisai thesis reference template
- Python book learning notes - Chapter 09 section 01 create and use classes
- Stack and queue
- ESP32(基于Arduino)连接EMQX的Mqtt服务器上传信息与命令控制
- Image super resolution using deep revolutionary networks (srcnn) interpretation and Implementation
- SSTI template injection explanation and real problem practice
- Basic knowledge of binary tree, BFC, DFS
- 自动化测试怎么规范部署?
- Network security - Security Service Engineer - detailed summary of skill manual (it is recommended to learn and collect)
猜你喜欢
ESP32(基于Arduino)连接EMQX的Mqtt服务器上传信息与命令控制
LTE CSFB test analysis
Flask learning and project practice 8: introduction and use of cookies and sessions
Data analysis Seaborn visualization (for personal use)
C#(二十九)之C#listBox checkedlistbox imagelist
Basic knowledge of binary tree, BFC, DFS
User experience index system
After five years of testing in byte, I was ruthlessly dismissed in July, hoping to wake up my brother who was paddling
On Data Mining
Image super resolution using deep revolutionary networks (srcnn) interpretation and Implementation
随机推荐
Pytoch foundation - (2) mathematical operation of tensor
Chinese brand hybrid technology: there is no best technical route, only better products
[PSO] Based on PSO particle swarm optimization, matlab simulation of the calculation of the lowest transportation cost of goods at material points, including transportation costs, agent conversion cos
The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
User experience index system
[practical exercise] face location model based on skin color
BUAA magpie nesting
MySQL 中的数据类型介绍
Blue Bridge Cup - day of week
Schnuka: 3D vision detection application industry machine vision 3D detection
The Research Report "2022 RPA supplier strength matrix analysis of China's banking industry" was officially launched
Python book learning notes - Chapter 09 section 01 create and use classes
How to standardize the deployment of automated testing?
Facebook and other large companies have leaked more than one billion user data, and it is time to pay attention to did
[FPGA tutorial case 12] design and implementation of complex multiplier based on vivado core
MySQL about self growth
Simple blog system
Differential GPS RTK thousand search
[Qt5] QT QWidget immediately appears and disappears
如何修改表中的字段约束条件(类型,default, null等)