answersLogoWhite

0


Best Answer

the corresponding bit in the ip address is a host bit

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What does a bit that is set to 0 in an ip subnet mask specify?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the subnet mask when ip address is 216.139.118.8?

There is no set subnet mask for different ip configurations. The most common default subnet mask is 255:255:255:0 though, if that helps.


Explain what is the subnet id of host 86.212.118.145 given a subnet mask 255.0.0.0?

You must extract the first 8 bits of the host address (since the subnet mask has the first 8 bits equal to 1), and set all others to zero. The answer in this case is 86.0.0.0.You must extract the first 8 bits of the host address (since the subnet mask has the first 8 bits equal to 1), and set all others to zero. The answer in this case is 86.0.0.0.You must extract the first 8 bits of the host address (since the subnet mask has the first 8 bits equal to 1), and set all others to zero. The answer in this case is 86.0.0.0.You must extract the first 8 bits of the host address (since the subnet mask has the first 8 bits equal to 1), and set all others to zero. The answer in this case is 86.0.0.0.


What is the meaning of the acronym VLSM?

There are several different meanings. Some include Variable Length Subnet Mask, Vietnam Logistics and Support Medal, Variable and Level Set Methods in Computer Vision, Virtual Laboratory for the Study of Mechanics and Virable Land Subnet Mask.


What is the difference between a Network address and Broadcast address?

When you set up a sub network you decide upon the subnet mask and this determines the network address (all zeros in the subnet portion of the address) and the broadcast address (all ones in the subnet portion of the address). When you assign the host addresses in your subnet, then you use the addresses between the network address and the broadcast address.


What do you use whe the IP addresses available are not contiguous?

I'm not sure what you mean by Contiguous. As long as the IP's are on the same subnet it doesn't matter which one they get from the range. THe Subnet mask, Gateway and possibly DNS addresses all need to be the same but the IP can be anything from the range. Use DHCP if possible so you know all your PC get the same network configuration. If this is a subnet issue then simply set the subnet mask appropriatley for your IP range - use an online calulator if you need help doing this.


If you set a systems subnet mask to 255.255.255.0 how many computers can you put on the network without using a router?

254. 256 minus the network address, minus the broadcast address.


What is meant by a 0.0.0.0 network address entry with a subnet mask if 0.0.0.0 in a pc's routing table?

It means the computer is set to get an IP address from a server (called DHCP) and it didn't get one.


How do you set the IP address in Linux?

set the IP address with the ifconfig command use the syntax: ifconfig interface address netmask up view your network interfaces with the command ifconfig then for example to set address to 172.12.0.1 on the interface eth0 use: ifconfig eth0 172.12.0.1 netmask 255.255.0.0 up make sure you have root permissions to do this, either be logged in as root or preceed the command with "sudo". you don't have to specify the subnet mask if you don't want to, but it is generally recommended to do so.


What kind of IP addressing is needed to prepare a computer to serve up remote desk top?

The settings below is the most simplistic network configuration required for two devices to communicate with each other on an IPv4 TCP/IP network, assuming that IP addresses 10.1.1.11 and 10.1.1.12 are available for use: Device-A IP: 10.1.1.11 Subnet Mask: 255.255.255.0 Device-B IP: 10.1.1.12 Subnet Mask: 255.255.255.0 This will put both devices on the same subnet which will allow them to communicate with each other. You can set the .11 and/or .12 number to any unused IP address.


What is the bionicle set with the mask of time?

There is no BIONICLE set with the Mask of Time (Kanohi Vahi)! The mask came as a promotional item, but it never came with a set. Only the golden Mask of Time came in 2004 with some Vahki sets.


How is a subnet mask created?

In computer networks based on the Internet Protocol Suite, a subnetwork, or subnet, is a portion of the network's computers and network devices that have a common, designated IP address routing prefix (cf. Classless Inter-Domain Routing, CIDR). A routing prefix is the sequence of leading bits of an IP address that precede the portion of the address used as host identifier (or rest field in early Internet terminology). In IPv4 installations, the routing prefix is often expressed as a "subnet mask", which is a bit mask covering the number of bits used in the prefix. It is frequently expressed in quad-dotted decimal representation, e.g., 255.255.255.0 is the subnet mask for the 192.168.1.0 network with a 24-bit routing prefix (192.168.1.0/24). Subnet masks in IPv4 do not have to have consecutive bits set, e.g., a subnet mask of "11111111001100110000000000000000" (binary) is permissible, albeit of little additional value, as it does not provide for more efficient address space utilization and cannot be represented in CIDR notation. IPv6 does not use subnet masks and such non-standard routing prefixes are not possible. The routing prefix of a subnet is often further divided into the network's network identifier and a subnet identifier. The network identifier is the leading set of address bits that is common to the prefixes of all subnets in the network. This would typically be the CIDR routing prefix of an organization's entire address space allocation. The subnet identifier consists of the remaining bits in a subnet's prefix after the network identifier. In the cited example, 192.168.0.0 is the network identifier (and 255.255.0.0 the network mask) and "1" is the subnet identifier. In a large organization's network, without subnetting, traffic levels can grow enough that excessive rates of Ethernet packet collisions become a bottle neck due to the nature of Ethernet (cf. carrier sense multiple access with collision detection). For this reason, subnetting can be used to break the network into smaller more efficient subnets. Such subnets can be arranged hierarchically, with the organization's network address space (see also Autonomous System) partitioned into a tree-like structure. Routers are used to manage traffic and constitute borders between subnets. Communication is of specific link-local character (Ethernet broadcast) only within the smallest subnet. A typical subnet is a physical network served by one router, for instance an Ethernet network (consisting of one or several Ethernet segments or local area networks, interconnected by network switches and network bridges) or a Virtual Local Area Network (VLAN). However, subnetting allows the network to be logically divided regardless of the physical layout of a network, since it is possible to divide a physical network into several subnets by configuring different host computers to use different routers. While improving network performance, subnetting increases routing complexity, since each locally connected subnet is typically represented by one row in the routing tables in each connected router. However, with intelligent design of the network, routes to collections of more distant subnets within the branches of a tree-hierarchy can be aggregated by single routes. Subnetting was originally introduced before the introduction of classful network addresses in IPv4 to allow a single larger network to have a number of smaller networks within it, controlled by several routers. Existing subnetting functionality in routers made the introduction of Classless Inter-Domain Routing seamless.


Are file permissions considered a bit mask?

a bit mask is the subtracted value that would allow you to obtain the actual file permission. For example, consider that a file permission of 777 gives everyone full permissions You want the default file permission for all files created to be 755 You would then set your umask value to 022 Think about it in binary. File permissions consist of three 3-bit numbers, whose values can range from 000 (decimal 0) to 111(decimal 7) 111 111 111 (full permissions, or, 777) -000 010 010 (subtract bit mask of 022) ------------------- 111 101 101 (actual file permissions 755) your default bit mask on linux is set in either /etc/bashrc or /etc/profile. If you want to set it for a single person, you could do it in your .bashrc or .profile in your home directory.