$
%!

50

Transmission Control Protocol/Internet Protocol, a suite of communication protocols,
allows networked computers to share files and system resources, such as hard disks
and printers.
+&
One of the ways a single network address can span multiple physical networks is
through subnetting, which divides the host part of an Inter net address into a physical
network part and a host part. In other words, it creates a hierarchical address, which
identifies a subnet within an internet and then a host within a sub net.
The main advantage of subnetting is that it accommodates large growth since a given
gateway does not need to know as much detail about distant destinations as it does
about local ones.

1

»Note:
If the subnet mask remains set to the default (000.000.000.000) in the Subnet
Mask configuration menu, gateways are automatic sensed. If you identify a subnet
mask, this automatic sensing is disabled.
If a subnet address is used to identify a host, you must also designate a
corresponding 32-bit subnet mask. Like Internet and subnet addresses, the subn et
mask is written in binary form for the network. Bits are set to 1 if the network treats the
corresponding bit in the Internet address as part of th e network address, and to 0 if it
treats the bit as part of the host identifier. For example, the binary subnet mask
11111111 11111111 11111111 00000000
specifies that the first three groups of eight digits in the Internet addre ss identify the
network and subnet and that the fourth group identifies the host on that subne t. How-
ever, these numbers are more commonly written in decimal form. For example, the
binary subnet mask above would be written in decimal form as
255.255.255.0