Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
Home/ Questions/Q 3185
Next
In Process
Sneha Singh
Sneha SinghLevel 40
Asked: September 16, 20212021-09-16T13:48:28+05:30 2021-09-16T13:48:28+05:30

Which Subnet Mask Would Be Used If 5 Host Bits Are Available?

Which Subnet Mask Would Be Used If 5 Host Bits Are Available?
  • 0
  • 1 1 Answer
  • 50 Views
  • 0 Followers
Answer
Share
  • Facebook

    Related Questions

    • What Do You Mean By Https?
    • How To Check TLS Version On Aix Server?
    • How To Change Permissions For Entire Directory In Linux?
    • What Does The Tracert Command Do?
    • How To Connect Uverse Receiver To Wifi?

    1 Answer

    • Voted
    • Oldest
    • Recent
    1. Maryam Khalid Bronze
      2021-10-20T09:34:50+05:30Added an answer on October 20, 2021 at 9:34 am

      Which subnet mask would be used if 5 host bits are available?

      Each device has its unique IP address no other device has the same address as any other device because the IP address is used for the device identification on an IP network. The IP address has 32 bits and it is broke into the pieces such as the host portion and the network portions with the help of the subnet mask.

      The subnet mask is used in the process of subnetting. A question that is common about subnet masks and frequently asked in an exam is: Which subnet mask would be used if 5 host bits are available? However, we are going to discuss the subnet mask and its working. With the help of this, you can easily determine the answer to the question. Without delay let’s begin with the topic!

      The subnet mask and its working

      A subnet mask divides the IP address into the host portion and the network portion. it can define the range of the address of IPs within the network. The subnet mask identifies the parts of the IP addresses the mask are not visible when the packets are traveling along with the internet, instead they have the destination addresses of the router which has the same address as the subnet mask.

      There is two forms of the subnet mask which are listed in the following:

      Default subnet mask:

      The default mask has been designated for only the single network in the relatively class, the number of the bits is destined for the address class.

      Custom subnet mask:

      The custom subnet mask as the name suggests it is customized by the administrator and can be accessed or accommodate many networks.

      Subnetting

      The process of the break the network is the subnetting, the subnet mask work with subnetting. by maintaining the subnet mask the IP address number can be adjusted within the available network. subnetting create multiple networks in classes A, B, C if the subnetting does not happen then you can only use one network in the relatively classes. To form the subnetwork ID, you need to enlarge the natural mask by adding the bits to the host portion of the address.

      The common subnet mask of the home is 225.225.225.0 it can be elaborated in a way that the subnet mask gives the authority up to 254 IP addresses to be used in the network .in a simple way 254 devices are connected to the network and access the internet. With the help of the subnet mask, the other devices can determine that either it is connected to the same network or from another network.

      Let’s take a look at the example to determine the network portion and the host portion. let’s assume the subnet mask is 255.255.255.0 if we convert it is the binary form then it is 11111111.11111111.11111111. 00000000. while the IP address is 192.168.0.101 and the binary form is 11000000.10101000.00000000.01100101

      It is simple to differ the network part and host part the binary form of subnet mask 1 indicates that the same bit of the IP address is the network portion which means the first three octets in the IP addresses is the network part, so the part 192.168.0 is the network part and 101 is the host portion.

      The subnet mask of the 255.255.255.224 is used when the 5 hosts bits are available because the 255.255.255.0 has 8 host bits while the 255.255.255 .240 has 4 bits and 255.255.255.128 has 7 host bits.

      • 0
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
      • Select as best answer

    You must login to add an answer.

    Continue with Google
    or use

    Forgot Password?

    Need An Account, Sign Up Here

    Sidebar

    Top Members

    Shailendra Yadav

    Shailendra Yadav

    • 2k Questions
    • 52k Points
    Level 50
    Sneha Singh

    Sneha Singh

    • 2k Questions
    • 41k Points
    Level 40
    Nilay Sharma

    Nilay Sharma

    • 0 Questions
    • 33k Points
    Level 30
    • Popular
    • Comments
    • Farwa Khalid

      Half Duplex Versus Full Duplex

      • 3 Comments
    • Farwa Khalid

      What Is Split Horizon

      • 0 Comments
    • Farwa Khalid

      What Is Ping Spoofing

      • 0 Comments
    • Farwa Khalid

      What Is Wireless Isolation?

      • 0 Comments
    • Farwa Khalid

      What Is Radio Network Controller?

      • 0 Comments
    • What is Circuit Switching - Network Classmate
      What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
    • Difference Between Router And Switch - Network Classmate
      Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
    • Communication Protocols - Network Classmate
      Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

    • Home
    • Groups page
    • Communities
    • Questions
      • New Questions
      • Trending Questions
      • Must read Questions
      • Hot Questions
    • Polls
    • Tags
    • Badges




    Footer

    Important Links

    • Home
    • Article
    • Q&A
    • Guest Post

    Useful Categories

    • Basic Networking
    • Basic Security
    • CCNA R & S
    • CCNA Security
    • Download

    Legal Stuff

    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Service
    • User Data Policy

    Social Links

    • Facebook
    • Instagram
    • Twitter
    • Telegram
    • Linkedin

    Copyrights © 2023 Network Classmate™. All Rights Reserved.
    Designed by LeadsNut

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage vendors Read more about these purposes
    View preferences
    {title} {title} {title}