[imath]\bold{khan}[/imath] was catching red herring

Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}23\) prefix, or the subnet mask \(\displaystyle 255.255.254.0\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.2.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.254.0\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.2.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.254.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.255.0.0\)
\(\displaystyle 1.255.2.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.255.254.0\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}24\) prefix, or the subnet mask \(\displaystyle 255.255.255.0\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.1.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.255.0\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.255.0.0\)
\(\displaystyle 1.255.1.0\)
\(\displaystyle \cdots\)
\(\displaystyle 1.255.255.0\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}25\) prefix, or the subnet mask \(\displaystyle 255.255.255.128\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.128\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.128\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.128\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.128\)
 
Last edited:
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}26\) prefix, or the subnet mask \(\displaystyle 255.255.255.192\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.64\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.192\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.64\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.192\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.64\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.192\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.64\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.192\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}27\) prefix, or the subnet mask \(\displaystyle 255.255.255.224\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.32\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.224\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.32\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.224\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.32\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.224\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.32\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.224\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}28\) prefix, or the subnet mask \(\displaystyle 255.255.255.240\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.16\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.240\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.16\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.240\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.16\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.240\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.16\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.240\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}29\) prefix, or the subnet mask \(\displaystyle 255.255.255.248\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.8\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.248\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.8\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.248\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.8\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.248\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.8\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.248\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}30\) prefix, or the subnet mask \(\displaystyle 255.255.255.252\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.4\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.252\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.4\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.252\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.4\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.252\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.4\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.252\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}31\) prefix, or the subnet mask \(\displaystyle 255.255.255.254\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.254\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.254\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.254\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.254\)
 
Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}31\) prefix, or the subnet mask \(\displaystyle 255.255.255.254\).

Then, you would tell her that the \(\displaystyle \text{IP}\)

\(\displaystyle 1.5.0.0\)

is the network address because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.254\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.254\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.254\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.254\)
Oops!

😱

Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}31\) prefix, or the subnet mask \(\displaystyle 255.255.255.254\).

Then, you would tell her that the \(\displaystyle \text{IP}\)s

\(\displaystyle 1.5.0.0\)
\(\displaystyle 1.5.1.2\)


are the network addresses because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle 1.0.0.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.254\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.254\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle \textcolor{red}{1.5.1.2}\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.254\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.2\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.254\)
 
FINALLY.

Now suppose she gave you a \(\displaystyle \text{CIDR}\) with a \(\displaystyle \text{/}32\) prefix, or the subnet mask \(\displaystyle 255.255.255.255\).

Then, you would tell her that the \(\displaystyle \text{IP}\)s

\(\displaystyle 1.0.0.1\)
\(\displaystyle 1.5.0.0\)
\(\displaystyle 1.5.1.2\)

are the network addresses because in this situation the network addresses are:

\(\displaystyle 1.0.0.0\)
\(\displaystyle \textcolor{red}{1.0.0.1}\)
\(\displaystyle \cdots\)
\(\displaystyle 1.0.0.255\)
\(\displaystyle \cdots\)
\(\displaystyle \textcolor{red}{1.5.0.0}\)
\(\displaystyle 1.5.0.1\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.0.255\)
\(\displaystyle 1.5.1.0\)
\(\displaystyle 1.5.1.1\)
\(\displaystyle \textcolor{red}{1.5.1.2}\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.1.255\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.0\)
\(\displaystyle 1.5.255.1\)
\(\displaystyle \cdots\)
\(\displaystyle 1.5.255.255\)

The funny thing is that the ip addresses:

\(\displaystyle 1.0.0.1\)
\(\displaystyle 1.5.0.0\)
\(\displaystyle 1.5.1.2\)

are also host addresses and broadcast addresses. Therefore, every ip

ranges from \(\displaystyle 0.0.0.0\) to \(\displaystyle 255.255.255.255\) in (a \(\displaystyle \text{CIDR}\) block with a \(\displaystyle \text{/}32\) prefix, or the subnet mask \(\displaystyle 255.255.255.255\)) is three in one. That is:

It is a \(\displaystyle \textcolor{blue}{\bold{network \ address}}\), a \(\displaystyle \textcolor{red}{\bold{host \ address}}\), and a \(\displaystyle \textcolor{green}{\bold{broadcast \ address}}\)!
 
Top