Solved

What is the significance of the Sub-net Mask Number of 255.255.255.0 for Network Connection?

Posted on 2007-11-25
2
595 Views
Last Modified: 2013-11-12
Hi Everyone:

       I am curious about the meaning or significance of the subnet mask number of 255.255.255.0.  This number seems to always be static in both home wired and home wireless network connections.  What does each set of numbers represent?  Does each set of numbers represent a network with the actual number of 255 being the maximum number of computers which can occupy that network?  Much like a network within a network or subnet?

        Any shared thoughts to this question will be appreciated.

        Thank you

        George
0
Comment
Question by:GMartin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 66

Accepted Solution

by:
johnb6767 earned 500 total points
ID: 20347237
Subnet mask - Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Subnet_mask

255.255.255.0 is a class C mask, and that is the most common in home and small office networks.
0
 

Author Closing Comment

by:GMartin
ID: 31412143
Hi

       Thank you for the link.  The information contained within it certainly addressed this question and many more which came up as well.

         George
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the purchase of CloudCommand by Comcast customers are left in a bind as subscriptions expire and render the AP's disabled. The following will explain how to flash your Ubiquiti AP's with CloudCommand firmware back to Ubiquiti firmware. HOWTO…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question