Mcitp doesn’t change. The subnet address scheme takes a part of the host address and recycles it as a subnet address. Bit positions are stolen from the host address to be used for the subnet identifier. Figure 2.4 shows how an IP address can be given a subnet address. Because the Widget, Inc., network is a Class B network, the first two bytes specify the net- work address and are shared by all machines on the network—regardless of their particular subnet. Here, every machine’s address on the subnet must have its third byte read 0000 0001. The fourth byte, the host address, is the unique number that identifies the actual host within that subnet. Figure 2.5 illustrates how a network address and a subnet address can be used together. How to Use Subnet Masks For the subnet address scheme to work, every machine on the network must know which part of the host address will be used as the network address. This is comptia security certification accomplished by assigning each machine a subnet mask. The network administrator creates a 32-bit subnet mask comprised of 1s and 0s. The 1s in the subnet mask represent the positions in the IP address that refer to the network and subnet addresses. The 0s represent the positions that refer to the host part of the address. Figure 2.6 illustrates this combination. In the Widget, Inc., example, the first two bytes of the subnet mask are 1s because Widget’s network address is a Class B address, formatted as Network.Network.Node.Node . The third byte, normally assigned as part of the host address, is now used to represent the subnet address. ">In order to maximize the efficient use of the assigned address space, machines on a particular network share the same of network address. In Figure 2.3, you can see that all the Widget, Inc., machines have a network address 130.57. That principle is constant. In subnetting, it’s the host address that’s manipulated; the network address Mcitp doesn’t change. The subnet address scheme takes a part of the host address and recycles it as a subnet address. Bit positions are stolen from the host address to be used for the subnet identifier. Figure 2.4 shows how an IP address can be given a subnet address. Because the Widget, Inc., network is a Class B network, the first two bytes specify the net- work address and are shared by all machines on the network—regardless of their particular subnet. Here, every machine’s address on the subnet must have its third byte read 0000 0001. The fourth byte, the host address, is the unique number that identifies the actual host within that subnet. Figure 2.5 illustrates how a network address and a subnet address can be used together. How to Use Subnet Masks For the subnet address scheme to work, every machine on the network must know which part of the host address will be used as the network address. This is comptia security certification accomplished by assigning each machine a subnet mask. The network administrator creates a 32-bit subnet mask comprised of 1s and 0s. The 1s in the subnet mask represent the positions in the IP address that refer to the network and subnet addresses. The 0s represent the positions that refer to the host part of the address. Figure 2.6 illustrates this combination. In the Widget, Inc., example, the first two bytes of the subnet mask are 1s because Widget’s network address is a Class B address, formatted as Network.Network.Node.Node . The third byte, normally assigned as part of the host address, is now used to represent the subnet address.
Related Articles -
a+ test, a+ practice, a+ certification cost,
|