0 évaluation0% ont trouvé ce document utile (0 vote)
9 vues2 pages
The document contains three tables that show how IP addresses from class A, B and C can be subnetted by borrowing bits from the host portion. Each table lists the number of bits borrowed, the corresponding subnet mask, the effective number of subnets created and number of hosts per subnet. Borrowing more bits from the host portion results in more effective subnets but fewer hosts per subnet.
The document contains three tables that show how IP addresses from class A, B and C can be subnetted by borrowing bits from the host portion. Each table lists the number of bits borrowed, the corresponding subnet mask, the effective number of subnets created and number of hosts per subnet. Borrowing more bits from the host portion results in more effective subnets but fewer hosts per subnet.
The document contains three tables that show how IP addresses from class A, B and C can be subnetted by borrowing bits from the host portion. Each table lists the number of bits borrowed, the corresponding subnet mask, the effective number of subnets created and number of hosts per subnet. Borrowing more bits from the host portion results in more effective subnets but fewer hosts per subnet.