Kamis, 31 Maret 2011

The subnet mask is the term information technology



The subnet mask is the term information technology in the English language that refers to the 32-bit binary number that is used to distinguish the network ID with the host ID, indicating the location of a host, whether on a local network or outside network.

for setting the subnet mask, you specify want to create a subnet with what class. I mean, its IP class. For example:

subnet mask: 255.0.0.0 <--- class A subnet mask subnet mask: 255.255.0.0 <--- class B subnet mask subnet mask: 255.255.255.0 <--- class C subnet mask * Class A subnet can be built as many as 256 x 256 = 65 536, with the total number who could be using that computer's IP on the network is 16,387,064 class A IP address. * subnet a class B subnet 256 can be constructed, with the total number of IP a computer on the network is 64 516 class B IP address. subnet mask IP addresses that follow. # IP address Setting up the IP address where mao IP class (A, B, C). For computer network with computer sum <256 computers, better IP pk class C. Saving network resources. NB: To check the configuration of IP address, subnet mask, gateway, open a command prompt, type "ipconfig". IP Address Subnetting Class A
Subnetting a class B IP address


Subnetting Class C IP Address


A subnet mask is usually expressed in dotted decimal notation (dotted decimal notation), as well as IP addresses. After all bits set as the network ID and host ID, the 32-bit value will be converted to dotted decimal notation. It should be noted, that although represented as a dotted decimal notation, the subnet mask is not an IP address.
Classes address Subnet mask (binary) Subnet mask (decimal)
Class A 255.0.0.0 11111111.00000000.00000000.00000000
Class B 255.255.0.0 11111111.11111111.00000000.00000000
Class C 255.255.255.0 11111111.11111111.11111111.00000000

Representation of prefix length (prefix length) of a subnet mask
Classes address Subnet mask (binary) Subnet mask (decimal) Length Prefix
Class A 255.0.0.0 11111111.00000000.00000000.00000000 / 8
Class B 255.255.0.0 11111111.11111111.00000000.00000000 / 16
Class C 255.255.255.0 11111111.11111111.11111111.00000000 / 24

Determining the Network address Identifier
P lamat 10000011 01101011 10100100 00011010 (131107164026)
Subnet Mask 11111111 11111111 11110000 00000000 (255255240000)
-------------------------------------------------- ----------------
Network ID 10000011 01101011 10100000 00000000 (131107160000)
READ MORE - The subnet mask is the term information technology
READ MORE - The subnet mask is the term information technology

Network Topology

Network Topology is, things that explains the geometric relationship between the basic elements making up the network, namely nodes, links, and station. Network topology can be divided into 5 main categories as below.

1. Bus Topology

This topology is the initial topology in use to connect computers. In this topology each computer is connected to a long cable with multiple terminals, and at the end of the cable must end with a terminator. This topology is rarely used in ordinary computer network because it has some shortcomings such as its probable collision data stream, if one device is broken or there is damage to one part of the computer network will not work immediately before the damage is solved.

This topology was originally used as a medium cable Coaxial introduction of data and information. But at this point in building this topology in computer network using fiber optic cable (fiber optic) but combined with other network topology to maximize performance.



2. Ring Topology

Or ring topology is often called a ring topology is a network topology where each computer connected to make a circle. With a sense that every computer that is connected into a network of inter-connected to two other computers to form a similar network with a ring.


The advantages of this topology is the cable used may be more savings. But the shortcomings of this topology is the network expansion will be difficult because every computer will interconnect.

3. Token Ring Topology

This topology is similar to the ring topology but making more in perfected. Can be viewed from the difference image.


In the picture clearly shows how the token ring connecting cable made ​​a circle first and later will make terminals on each computer and other devices.

4. Star Topology

Or star topology is more often called a star topology. In this topology we have used the help of other tools to connect your computer network. Examples of tools in use here is the hub, switch, etc.
In one picture is clearly seen to function as a central hub connecting the computers that are interconnected. The advantage of this topology is very much at all of them easier to manage network admin, allows the addition of computers or terminals, ease of detecting defects and errors in the network. But with its many advantages in terms of topology this is not without flaws. Shortcomings include waste of cable, which centered on the hub of control sometimes so critical problems if in case of damage to the hub, then all the networks will not be in use.


5. Tree Topology

Topology tree or hierarchical topology also called and could also be called multilevel topology is the topology that can be used on the network in the storied office.
In the picture we can see the relationship between one computer to another computer with a branching hierarchy clear. central center or who are at the very top of an active central central while underneath is a passive central.
READ MORE - Network Topology
READ MORE - Network Topology
.::BY JUMBHO MY AT HOME IN THE JEPARA CITY OF BEAUTIFUL::.