IP address schema

Posted on 2015-01-25
Medium Priority
Last Modified: 2015-01-26
When a scheme is written as does the 24 mean?

I have a network range of to
subnet mask

How would I describe this scheme?  Would I use
Question by:al4629740
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 53

Assisted Solution

by:Will Szymkowski
Will Szymkowski earned 400 total points
ID: 40569928
This is called slash notation. This identifies how many hosts can be within this network. With a /24 network you can have a maximum of 256 host Now you have to take into consideration .1 and .255. 1. is the network ID and the .255 is the broadcast ID. So in actual fact you can have 254 usable IP's.

You also have dot notation with is represented as = /24

it is just another way of expressing the network subnet.

LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 400 total points
ID: 40569933
It's just another way of expressing the mask.  The number after the slash is the number of 1's in the mask.

So a /24 is the same as

And a /16 is the same as
LVL 37

Accepted Solution

bbao earned 800 total points
ID: 40570036
> what does the 24 mean?

24 means the subnet length is 24-bit in binary (comparing to the whole 32 bits of an IP address), the same meaning for the three groups of 255 in network mask

> How would I describe this scheme?

> Would I use

no, as given above.
LVL 70

Assisted Solution

Qlemo earned 400 total points
ID: 40570136
Correction: .1 is a valid IP address. .0 is the network address.

The /24 notation is also called CIDR - Classless Inter-Domain Routing, because you can use netmasks different from the classic classes A, B or C, which correspond to /8, /16 and /24.
LVL 53

Expert Comment

by:Will Szymkowski
ID: 40571616
Yes you are correct Qlemo. I just noticed that typo after there was already a post so I couldn't modify it.


Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question