Today, the standard methods for moving the network/host address boundary are variable-length subnet masking (VLSM) for host addressing and routing inside a routing domain, and classless interdomain ...
Have you learned to think and dream in hex yet? That is what you are going to have to look forward to as we transition to using IPv6. Because we will be working in hexadecimal numbers we may need a ...
In addition to IPv4 (often written as just IP), there is IP version 6 (IPv6). IPv6 was developed as IPng (“IP:The Next Generation” because the developers were supposedly fans of the TV show “Star Trek ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Table 1. This table illustrates subnet masks. The number after the “/” in the CIDR notation ...
In my previous post I wrote about all the positives we get from the almost incomprehensibly massive IPv6 address space, all there for our enjoyment if we will just break free of our long-ingrained ...
Supernetting was created as a way to solve the problem of routing tables growing beyond our current ability to manage the exhaustion of Class B network address space. Much like one area code ...
If they duplicated the subnet, the firewall shouldn't have accepted it. If it did, then it was likely bridging two subnets. If the ISP legitimately wanted to use that RFC1918 subnet, this would still ...
My book I'am reading IP fundamentals has gotten a bit confusing when getting combining several subnets which uses more bits for it's subnet number into one single subnet such as combining four /24 ...
If computers in an open network talk freely with one another and two computers start talking at the same time, you have a “data collision.” Collisions may be arbitrated via Carrier Sense Multiple ...
Subnet Mask divides the IP address into two segments and informs the computer which part is the network bit and which one is the host bit. For example, if there is an IP address: 192.168.0.1, it will ...