Solved

Subnet Mask address...

Posted on 1998-05-18
11
530 Views
Last Modified: 2013-12-23
HI: I am trying to figure out the subnet mask address for my network...  our network IPs are between 33 to 62

and everything else in that network are not ours and must be excluded.  What should I use as our subnet mask?
Thanks
0
Comment
Question by:Sieger
  • 5
  • 4
  • 2
11 Comments
 
LVL 3

Expert Comment

by:jlove1
ID: 1562145
255.255.255.227

256 - (62 - 33)


There ya go.. hope this helps :-)
For more info e-mail jlove1@email.usps.gov
0
 
LVL 1

Expert Comment

by:sniderd
ID: 1562146
Actually, the mask is 255.255.255.224

I used 202.224.224.0 as an example Class C address

Here are your subnets

Subnet           Hosts            Hosts            Broadcast
Address          From             To               Address
202.224.224.0    202.224.224.1    202.224.224.30   202.224.224.31
202.224.224.32   202.224.224.33   202.224.224.62   202.224.224.63
202.224.224.64   202.224.224.65   202.224.224.94   202.224.224.95
202.224.224.96   202.224.224.97   202.224.224.126 202.224.224.127
202.224.224.128  202.224.224.129  202.224.224.158 202.224.224.159
202.224.224.160  202.224.224.161  202.224.224.190 202.224.224.191
202.224.224.192  202.224.224.193  202.224.224.222 202.224.224.223
202.224.224.224  202.224.224.225  202.224.224.254 202.224.224.255

Don't use subnet 0 (unless using ip subnet-zero command) and subnet 7.
Address space wasted by subnetting =  29.13% ( 17.32% with ip subnet-zero)
0
 
LVL 1

Author Comment

by:Sieger
ID: 1562147
Sindred, the table is very helpful.  but for what I saw there.. the 202.224.224.32 seems
exactly what I wanted.. isn't it the one rather than 202.224.224.224?
0
 
LVL 1

Author Comment

by:Sieger
ID: 1562148
oops I am sorry.. I don't know what the heck i was talking about :)

0
 
LVL 1

Author Comment

by:Sieger
ID: 1562149
What I wanna say is am I supposed to define 202.224.224.32 as my network if the addresses ranged from 202.224.224.33 to 202.224.224.62 rather than 202.224.224.0?
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 3

Expert Comment

by:jlove1
ID: 1562150
I'll tell you this much: the first part WILL BE
255.255.255.SOMETHING OR OTHER

Now, secondly.. did the list of IPs that you gave me include the router and broadcast address? If so, then the SUBNETMASK should be
255.255.227.. if not then the 255.255.224 will be correct.
let me know
tanx
0
 
LVL 1

Author Comment

by:Sieger
ID: 1562151
alright.. 33 is the route, 62 is the last IP I can assign to a machine.. so 63 is the boardcast..
0
 
LVL 1

Expert Comment

by:sniderd
ID: 1562152
That is the subnet you are using. You are using a Class C IP address of 202.224.224.0 in this example.

The subnet mask is 255.255.255.224

If you are using 202.224.224.33 - 202.224.224.62, those are the available IP addresses on subnet or network 202.224.224.32, your broadcast address is 202.224.224.63

This mask creates six seperate usable subnets with 30 hosts on each.

When seting up a PC or other host, use one of the thirty addresses. When documenting your network, refer tp this as subnet/network 202.224.224.32

Does this help ???
0
 
LVL 1

Author Comment

by:Sieger
ID: 1562153
sindred please answer the Q so I can give you credit..  jLove1, thanks for you help too but I think Sindred got a slightly better answer....
0
 
LVL 1

Expert Comment

by:sniderd
ID: 1562154
jlove1 : If you ever get 255.255.255.227 to work as a subnet mask, you will have invented an entirely new version of TCP/IP which I am sure everyone will be interested to learn about. Until then, that mask will never work.

Any address within that address range could be the router address, it does not have to be the first address in the subnet.

x.x.x.63 is your broadcast address
0
 
LVL 1

Accepted Solution

by:
sniderd earned 100 total points
ID: 1562155
OK, Thanks.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Change Time 5 43
Lost hyper V virtual network 1 38
Printer locally over VPN 2 54
help!! No network & No Internet connectivity 4 21
Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now