Subnet Masking

Posted on 2011-11-01
Last Modified: 2012-05-12

Can I please get the worked solution and the easy steps to follow for the following question
As the Network Administrator in your company you apply to your local ISP for a pool
of IP addresses and you are allocated the public IP address pool defined by
How many public IP addresses has your company been allocated?
What is the subnet mask associated with this address pool?
What is the network address?
What is the broadcast address?
If the organisation uses a flat network without subnets then how many hosts can be
attached to the network? Explain you answer clearly.
You are required to subdivide your IP address pool into 4 equal subnets by choosing the
correct subnet mask.
Show clearly how your choice of subnet mask will generate the required subnets and list
the IP address range of each subnet.
Show the subnet address for each subnet and the broadcast address for each subnet.
Question by:kerry83
    LVL 5

    Accepted Solution

    The subnet mask is You have been allocated 62 addresses. The network address is The broadcast address is Assuming the router takes 1 address, you can attach 61 hosts to this network if it is not subnetted. To subdivide you use the mask adding 2 bits to the network mask. The four subnets are,,, and

    subnet             range                                   broadcast
    LVL 5

    Expert Comment

    To convert the /26 to a subnet mask, write 26 1's followed by 32-26 0's (which is six). break in to groups of 8 and covert each 8 bit binary number to decimal.s
    LVL 5

    Assisted Solution

    The number of 0's at the end give you the host portion of your network, in this case you have 6 zeros, so the host portion is 2**6 or 64. Since the low value is the network address and the high value is the broadcast, you subtract 2 and get the number of network addresses or hosts as 62. Your router counts as one of these hosts leaving 61 other hosts.

    Author Comment

    I've requested that this question be deleted for the following reason:

    question answered
    LVL 5

    Expert Comment

    If the question was answered, it shouldn't be deleted and points should be awarded.

    Expert Comment

    Starting the auto-close procedure on behalf of the question asker.

    Community Support Moderator

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    I know for anybody starting from Beginner to Expert in Networking knows what OSI model. But this tutorial is for freshers or those who are new to networking world. Why I am putting OSI in such simple and compact manner is because it enables you to k…
    The article explains the protocols and technology which is involved when two computers on different TCP/IP networks communicate with each other. In the diagram, a router is used to segregate two networks. The networks are and 192…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now