import{s as ho,ae as Xn,af as uo,f as o,a,l as A,g as l,D as f,c as i,h as C,d as e,m as P,i as s,r as g}from"./scheduler.2f9f1739.js";import{S as mo,i as co,b as m,d,m as c,a as $,t as b,e as w}from"./index.f9f1dac6.js";import{g as $o,a as fo}from"./styles.a749dd55.js";import{S as bo}from"./seriesLayout.493d67f0.js";import{I as B}from"./image.a4587660.js";import{L}from"./link.4e908ad9.js";function wo(h){let r;return{c(){r=A("What is a Network Class?")},l(u){r=P(u,"What is a Network Class?")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function Co(h){let r;return{c(){r=A("Network Classes - Oracle")},l(u){r=P(u,"Network Classes - Oracle")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function _o(h){let r;return{c(){r=A("tool")},l(u){r=P(u,"tool")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function vo(h){let r;return{c(){r=A("How to calculate a subnet mask from hosts and subnet - TechTarget")},l(u){r=P(u,"How to calculate a subnet mask from hosts and subnet - TechTarget")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function go(h){let r;return{c(){r=A("Parts of the IP Address - Oracle")},l(u){r=P(u,"Parts of the IP Address - Oracle")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function xo(h){let r;return{c(){r=A("Network Classes - Oracle")},l(u){r=P(u,"Network Classes - Oracle")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function ko(h){let r;return{c(){r=A("What is a network class - cbtnuggets")},l(u){r=P(u,"What is a network class - cbtnuggets")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function Ao(h){let r;return{c(){r=A("The CIDR Notation - Cbtnuggets")},l(u){r=P(u,"The CIDR Notation - Cbtnuggets")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function Po(h){let r;return{c(){r=A("What is a subnet - Cloudflare")},l(u){r=P(u,"What is a subnet - Cloudflare")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function To(h){let r;return{c(){r=A("Subnet - Techtarget")},l(u){r=P(u,"Subnet - Techtarget")},m(u,p){s(u,r,p)},d(u){u&&e(r)}}}function yo(h){let r,u="What is a subnet?",p,T,_="A subnet or a subnetwork just as the name suggests is - a tiny network inside of a larger network. But to be more technically accurate with the definition, we can say that “a subnet is a logical partition of an Internet Protocol (IP)”. Logical because it not a physical component, but rather a virtual.",x,y,Zn="Subnets are used to group networks into smaller chunks in other to make addressing and traffic flow easier and smoother. These groups are defined either by logic or location.",Te,R,ts="Think of this way, Imagine a town with 256 houses, numbered 0 to 255. Without organization, a delivery person might need to check every house to find the right one.",ye,U,es="Now, let’s divide this town into four subnets of 64 houses each: 0-63, 64-127, 128-191, and 192-255. If a package needs to go to house 227, the delivery person knows immediately to go to the fourth subnet (192-255) and only needs to search within those 64 houses, instead of searching the entire town, reducing the time each delivery person spends on the road (traffic).",Ie,G,ns="IP addresses are like the house numbers, and subnets help routers quickly determine which part of the network to send data to, reducing traffic and improving efficiency.",Be,K,ss="How Subnets Works",Le,Q,os="The IP address as you know is a 32-bit number that uniquely identifies a network interface on a machine. An IP address is typically written in decimal digits, formatted as four 8-bit fields (octet) separated by periods. Each octet represents a byte of the IP address. This form of representing the bytes of an IP address is often referred to as the <strong>dotted-decimal format</strong>.",De,V,ls="The bytes of the IP address are further classified into two parts:",He,Y,as="<li>Network part</li> <li>Host part</li>",Me,ee,J,Ee,X,is="<strong>Network part</strong>",Fe,Z,rs="This part specifies the unique number assigned to your network. It also identifies the class of network assigned. In the above figure, the network part takes up two bytes of the IP address.",Ne,tt,us="<strong>Host part</strong>",qe,et,fs="This is the part of the IP address that you assign to each host. It uniquely identifies this machine on your network. <strong>Note</strong> that for each host on your network, the network part of the address will be the same, but the host part must obviously be different.",Se,nt,ps="What separates the Network Prefix and the Host ID depends on whether the address is a Class A, B or C address.",je,ne,st,Oe,ot,hs="<strong>Class A Network Numbers</strong>",ze,lt,ms="A class A network number uses the first eight bits of the IP address as its “network part/id.” The remaining 24 bits comprise the host part of the IP address.",We,se,at,Re,it,ds="The values assigned to the first byte of class A network numbers fall within the range 0-127. Consider the IP address 75.4.10.4. The value 75 in the first byte indicates that the host is on a class A network. The remaining bytes, 4.10.4, establish the host address.",Ue,rt,cs="<strong>Class B Network Numbers</strong>",Ge,ut,$s="A class B network number uses 16 bits for the network number and 16 bits for host numbers. The first byte of a class B network number is in the range 128-191. In the number 129.144.50.56, the first two bytes, 129.144, are assigned by the InterNIC, and comprise the network address. The last two bytes, 50.56, make up the host address.",Ke,oe,ft,Qe,pt,bs="Class B is typically assigned to organizations with many hosts on their networks.",Ve,ht,ws="<strong>Class C Network Numbers</strong>",Ye,mt,Cs="Class C network numbers use 24 bits for the network number and 8 bits for host numbers. Class C network numbers are appropriate for networks with few hosts—the maximum being 254. A class C network number occupies the first three bytes of an IP address. Only the fourth byte is reserved for hosts.",Je,le,dt,Xe,ct,_s="The first byte of a class C network number covers the range 192-223. The second and third each cover the range 1- 255. A typical class C address might be 192.5.2.5. The first three bytes, 192.5.2, form the network number. The final byte in this example, 5, is the host number.",Ze,ae,$t,tn,I,ie,vs="Learn more about network class:",Wn,H,Rn,M,en,bt,gs="<strong>Subnet Number</strong>",nn,wt,xs="Apart from the network and host ID, a third player can comes in, and that is the <strong>subnet</strong>. If you choose to divide your network into subnets, you need to assign a <strong>subnet number</strong> for the subnet. You can maximize the efficiency of the IP address space by using some of the bits from the host number part of the IP address as another network identifier for the subnet.",sn,re,Ct,on,_t,ks="A <strong>subnet mask</strong> is used to identify the part of the address that is available for use a the <strong>Subnet ID</strong> (essentially used to calculate the network and host portion of an IP address)",ln,vt,As="Subnet Mask",an,gt,Ps="A subnet mask is a 32-bit number used in conjunction with an IP address that identifies the network and host portions of a network component. Let’s say you have an IP address of 192.68.75.0/24. The subnet mask would be 255.255.255.0, or in binary, 111111.111111.111111.000000. This notation provides an easy way for a network to determine which portions of an IP address can be allocated to a host, hence borrows from it to create a subnet ID.",rn,xt,Ts="A class A network would have a subnet mask of 255.0.0.0, B would have 255.255.0.0 and C would have 255.255.255.0.",un,kt,ys="Calculate Subnet Mask",fn,At,Is="If a subnet mask 255.255.255.0 is applied to the IP address 129.144.41.101, the result is the IP address of 129.144.41.0.",pn,Pt,Bs="129.144.41.101 & 255.255.255.0 = 129.144.41.0 (our network ID)",hn,Tt,Ls=`In binary form, the operation is: 10000001.10010000.00101001.01100101 (IP address) ANDed with 11111111.11111111.11111111.00000000 (subnet mask)`,mn,ue,yt,dn,It,Ds="<p>Note: A subnet mask would always be a stream of 1’s then 0, it can’t be interrupted. say for example <code>11111111.101110111.1111111.00000</code> is not a valid subnet mask.</p>",cn,E,Un,F,Gn,$n,fe,Bt,bn,Lt,Hs="<strong>Article resource on calculating subnet masks</strong>",wn,pe,N,Cn,Dt,Ms="To calculate the number of hosts that can be acheived on a subnet mask:",_n,Ht,Es="<li>Convert the subnet mask to binary notation</li> <li>Count the number of 0’s.</li> <li>Raise 2 to the power of that number.</li>",vn,Mt,Fs="Take for Example the subnet mask:",gn,Et,Ns="<p>Dotted-Decimal form: 255.255.248.0</p> <p>Dotted-Binary form: 11111111.11111111.11111000.00000000</p> <p>Counting, we find we have 11 zeros.</p> <p>So the number of host we can have on this subnet is <strong>2^11 = 2048.</strong></p> <p>but remember we have to subtract the network identifier and the broadcast address, which gives us <strong>2046</strong> usable hosts.</p>",xn,Ft,qs="<p>So the formula is <code>2^(number of zeros) - 2</code></p>",kn,Nt,Ss="CIDR Notation",An,qt,js="Another way to write a subnet is using the CIDR (Classless Inter-Domain Routing) notation. The CIDR notation basically just states the number of bits the network is occupying.",Pn,St,Os="CIDR notation is used to identify Network Prefix and Mask, where the subnet mask is a number that indicates the number of ones in the Mask (e.g., 172.16.2.0/24). This is also known as Variable-Length Subnet Masking and CIDR.",Tn,jt,zs="<strong>For example.</strong>",yn,Ot,Ws="192.14.32.0<code>/24</code> - this tells us that the first three 8-bit groups (octet) is the network ID.",In,zt,Rs="A <code>/24</code> subnet means that the first 24 bits are <code>1</code>s, and the rest are <code>0</code>s. The binary for a <code>/24</code> subnet mask would be.",Bn,Wt,Us="11111111.11111111.11111111.00000000",Ln,Rt,Gs="<p>Thus if we’re to calculate the number of host using this CIDR notation. it would be:</p> <p><strong>2^(32-24) - 2 = 254.</strong></p> <p>“-2” because we have to remove our network id and broadcast, remember?</p>",Dn,he,Ut,Hn,Gt,Ks="So what happen to packets when they pass through a subnetwork?",Mn,Kt,Qs="When you’re sending a packet to a host in a subnet, It goes through the normal networking procedure, but with some extra layers. The process happens as follows:",En,Qt,Vs="<li>The packet is first checked to see if it is intended for a device within the <strong>same subnet</strong> as the sender.</li> <li>The <strong>subnet mask</strong> of the source IP address is used to determine which part of the IP address represents the network and which part represents the host.</li> <li>If the destination IP address belongs to the same subnet, the packet is delivered directly to the target device within the local network.</li> <li>If the destination IP address belongs to a different subnet, the packet needs to be routed through a <strong>gateway</strong> or <strong>router</strong>.</li>",Fn,Vt,Ys="In essence, when a packet passes through a subnet, it undergoes <strong>routing</strong> if it’s destined for a different subnet, and <strong>direct delivery</strong> if it’s destined for the same subnet. During routing, each router examines the packet and forwards it closer to its destination based on the subnet structure and routing protocols.",Nn,Yt,Js="Final Thoughts",qn,Jt,Xs="Subnet major benefit is in Improved Network Performance, because, when a device broadcasts a packet, it’ll reach all the network devices, burdening the network. Without proper context, broadcast packets can also spam devices within the network. This can lead to degraded network performance. By creating subnets, it limits the scope of intra-network broadcast messages to a specific subnet. This also enables efficient communication between devices in a subnet and sends a packet for routing outside the subnet if a destination address isn’t part of the subnet, leading to minimum network congestion.",Sn,Xt,Zs="Resources",jn,v,me,q,Kn,de,S,Qn,ce,j,Vn,$e,O,Yn,be,z,Jn,we,W,On,Zt,to="<strong>Stay Subtle</strong>",zn;return J=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726639998403_8.png",alt:"Graphic"}}),st=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726640005221_9.png",alt:"a table showing the network classes from A-E"}}),at=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726640012111_10.png",alt:"Byte Assignment in a Class A AddressGraphic"}}),ft=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726640021713_11.png",alt:"GraByte Assignment in a Class B Addressphic"}}),dt=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726640049942_12.png",alt:"Byte Assignment in a Class C AddressGraphic"}}),$t=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726640058654_9.png",alt:"Division of IP Address Space / Network classes"}}),H=new L({props:{href:"https://www.cbtnuggets.com/blog/technology/networking/introduction-to-subnetting-what-is-a-network-class",rel:"nofollow",$$slots:{default:[wo]},$$scope:{ctx:h}}}),M=new L({props:{href:"https://docs.oracle.com/cd/E19504-01/802-5753/6i9g71m2o/index.html#planning3-78185",rel:"nofollow",$$slots:{default:[Co]},$$scope:{ctx:h}}}),Ct=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726640465842_Add+a+subheading.png"}}),yt=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726749804129_Add+a+subheading1.png",alt:"Deriving network address from ip address and subnet mask"}}),F=new L({props:{href:"https://www.solarwinds.com/free-tools/advanced-subnet-calculator",rel:"nofollow",$$slots:{default:[_o]},$$scope:{ctx:h}}}),Bt=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726750152786_image.png",alt:"Subnet Mask Calculator - Solar Winds"}}),N=new L({props:{href:"https://www.techtarget.com/searchnetworking/tip/IP-addressing-and-subnetting-Calculate-a-subnet-mask-using-the-hosts-formula",rel:"nofollow",$$slots:{default:[vo]},$$scope:{ctx:h}}}),Ut=new B({props:{src:"https://paper-attachments.dropboxusercontent.com/s_72A924DAA00497F468555CC6BFB00A4C149A6D95BBB8CD0D5266A292F697A67E_1726751443329_Add+a+subheading2.png"}}),q=new L({props:{href:"https://docs.oracle.com/cd/E19504-01/802-5753/6i9g71m2o/index.html#planning3-fig-2",rel:"nofollow",$$slots:{default:[go]},$$scope:{ctx:h}}}),S=new L({props:{href:"https://docs.oracle.com/cd/E19504-01/802-5753/6i9g71m2o/index.html#planning3-78185",rel:"nofollow",$$slots:{default:[xo]},$$scope:{ctx:h}}}),j=new L({props:{href:"https://www.cbtnuggets.com/blog/technology/networking/introduction-to-subnetting-what-is-a-network-class",rel:"nofollow",$$slots:{default:[ko]},$$scope:{ctx:h}}}),O=new L({props:{href:"https://www.cbtnuggets.com/blog/technology/networking/proper-cidr",rel:"nofollow",$$slots:{default:[Ao]},$$scope:{ctx:h}}}),z=new L({props:{href:"https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/",rel:"nofollow",$$slots:{default:[Po]},$$scope:{ctx:h}}}),W=new L({props:{href:"https://www.techtarget.com/searchnetworking/definition/subnet",rel:"nofollow",$$slots:{default:[To]},$$scope:{ctx:h}}}),{c(){r=o("h2"),r.textContent=u,p=a(),T=o("p"),T.textContent=_,x=a(),y=o("p"),y.textContent=Zn,Te=a(),R=o("p"),R.textContent=ts,ye=a(),U=o("p"),U.textContent=es,Ie=a(),G=o("p"),G.textContent=ns,Be=a(),K=o("h2"),K.textContent=ss,Le=a(),Q=o("p"),Q.innerHTML=os,De=a(),V=o("p"),V.textContent=ls,He=a(),Y=o("ul"),Y.innerHTML=as,Me=a(),ee=o("p"),m(J.$$.fragment),Ee=a(),X=o("p"),X.innerHTML=is,Fe=a(),Z=o("p"),Z.textContent=rs,Ne=a(),tt=o("p"),tt.innerHTML=us,qe=a(),et=o("p"),et.innerHTML=fs,Se=a(),nt=o("p"),nt.textContent=ps,je=a(),ne=o("p"),m(st.$$.fragment),Oe=a(),ot=o("p"),ot.innerHTML=hs,ze=a(),lt=o("p"),lt.textContent=ms,We=a(),se=o("p"),m(at.$$.fragment),Re=a(),it=o("p"),it.textContent=ds,Ue=a(),rt=o("p"),rt.innerHTML=cs,Ge=a(),ut=o("p"),ut.textContent=$s,Ke=a(),oe=o("p"),m(ft.$$.fragment),Qe=a(),pt=o("p"),pt.textContent=bs,Ve=a(),ht=o("p"),ht.innerHTML=ws,Ye=a(),mt=o("p"),mt.textContent=Cs,Je=a(),le=o("p"),m(dt.$$.fragment),Xe=a(),ct=o("p"),ct.textContent=_s,Ze=a(),ae=o("p"),m($t.$$.fragment),tn=a(),I=o("p"),ie=o("strong"),ie.textContent=vs,Wn=a(),m(H.$$.fragment),Rn=a(),m(M.$$.fragment),en=a(),bt=o("p"),bt.innerHTML=gs,nn=a(),wt=o("p"),wt.innerHTML=xs,sn=a(),re=o("p"),m(Ct.$$.fragment),on=a(),_t=o("p"),_t.innerHTML=ks,ln=a(),vt=o("h2"),vt.textContent=As,an=a(),gt=o("p"),gt.textContent=Ps,rn=a(),xt=o("p"),xt.textContent=Ts,un=a(),kt=o("h3"),kt.textContent=ys,fn=a(),At=o("p"),At.textContent=Is,pn=a(),Pt=o("p"),Pt.textContent=Bs,hn=a(),Tt=o("p"),Tt.textContent=Ls,mn=a(),ue=o("p"),m(yt.$$.fragment),dn=a(),It=o("blockquote"),It.innerHTML=Ds,cn=a(),E=o("p"),Un=A("As a bonus, I found this "),m(F.$$.fragment),Gn=A(" that can help you play around with calculating subnet masks:"),$n=a(),fe=o("p"),m(Bt.$$.fragment),bn=a(),Lt=o("p"),Lt.innerHTML=Hs,wn=a(),pe=o("p"),m(N.$$.fragment),Cn=a(),Dt=o("p"),Dt.textContent=Ms,_n=a(),Ht=o("ul"),Ht.innerHTML=Es,vn=a(),Mt=o("p"),Mt.textContent=Fs,gn=a(),Et=o("blockquote"),Et.innerHTML=Ns,xn=a(),Ft=o("blockquote"),Ft.innerHTML=qs,kn=a(),Nt=o("h3"),Nt.textContent=Ss,An=a(),qt=o("p"),qt.textContent=js,Pn=a(),St=o("p"),St.textContent=Os,Tn=a(),jt=o("p"),jt.innerHTML=zs,yn=a(),Ot=o("p"),Ot.innerHTML=Ws,In=a(),zt=o("p"),zt.innerHTML=Rs,Bn=a(),Wt=o("p"),Wt.textContent=Us,Ln=a(),Rt=o("blockquote"),Rt.innerHTML=Gs,Dn=a(),he=o("p"),m(Ut.$$.fragment),Hn=a(),Gt=o("h3"),Gt.textContent=Ks,Mn=a(),Kt=o("p"),Kt.textContent=Qs,En=a(),Qt=o("ul"),Qt.innerHTML=Vs,Fn=a(),Vt=o("p"),Vt.innerHTML=Ys,Nn=a(),Yt=o("h3"),Yt.textContent=Js,qn=a(),Jt=o("p"),Jt.textContent=Xs,Sn=a(),Xt=o("h4"),Xt.textContent=Zs,jn=a(),v=o("ul"),me=o("li"),m(q.$$.fragment),Kn=a(),de=o("li"),m(S.$$.fragment),Qn=a(),ce=o("li"),m(j.$$.fragment),Vn=a(),$e=o("li"),m(O.$$.fragment),Yn=a(),be=o("li"),m(z.$$.fragment),Jn=a(),we=o("li"),m(W.$$.fragment),On=a(),Zt=o("p"),Zt.innerHTML=to},l(t){r=l(t,"H2",{"data-svelte-h":!0}),f(r)!=="svelte-cn50nj"&&(r.textContent=u),p=i(t),T=l(t,"P",{"data-svelte-h":!0}),f(T)!=="svelte-1laa54t"&&(T.textContent=_),x=i(t),y=l(t,"P",{"data-svelte-h":!0}),f(y)!=="svelte-3dlqef"&&(y.textContent=Zn),Te=i(t),R=l(t,"P",{"data-svelte-h":!0}),f(R)!=="svelte-1eq1zsf"&&(R.textContent=ts),ye=i(t),U=l(t,"P",{"data-svelte-h":!0}),f(U)!=="svelte-105jnnw"&&(U.textContent=es),Ie=i(t),G=l(t,"P",{"data-svelte-h":!0}),f(G)!=="svelte-nu1mh3"&&(G.textContent=ns),Be=i(t),K=l(t,"H2",{"data-svelte-h":!0}),f(K)!=="svelte-syvnz4"&&(K.textContent=ss),Le=i(t),Q=l(t,"P",{"data-svelte-h":!0}),f(Q)!=="svelte-1p48wn4"&&(Q.innerHTML=os),De=i(t),V=l(t,"P",{"data-svelte-h":!0}),f(V)!=="svelte-1ufkij2"&&(V.textContent=ls),He=i(t),Y=l(t,"UL",{"data-svelte-h":!0}),f(Y)!=="svelte-vzdcyk"&&(Y.innerHTML=as),Me=i(t),ee=l(t,"P",{});var n=C(ee);d(J.$$.fragment,n),n.forEach(e),Ee=i(t),X=l(t,"P",{"data-svelte-h":!0}),f(X)!=="svelte-1cyw824"&&(X.innerHTML=is),Fe=i(t),Z=l(t,"P",{"data-svelte-h":!0}),f(Z)!=="svelte-1udc4j7"&&(Z.textContent=rs),Ne=i(t),tt=l(t,"P",{"data-svelte-h":!0}),f(tt)!=="svelte-seyexe"&&(tt.innerHTML=us),qe=i(t),et=l(t,"P",{"data-svelte-h":!0}),f(et)!=="svelte-15a3aua"&&(et.innerHTML=fs),Se=i(t),nt=l(t,"P",{"data-svelte-h":!0}),f(nt)!=="svelte-6w7drc"&&(nt.textContent=ps),je=i(t),ne=l(t,"P",{});var Ce=C(ne);d(st.$$.fragment,Ce),Ce.forEach(e),Oe=i(t),ot=l(t,"P",{"data-svelte-h":!0}),f(ot)!=="svelte-nma8ou"&&(ot.innerHTML=hs),ze=i(t),lt=l(t,"P",{"data-svelte-h":!0}),f(lt)!=="svelte-1hb76es"&&(lt.textContent=ms),We=i(t),se=l(t,"P",{});var _e=C(se);d(at.$$.fragment,_e),_e.forEach(e),Re=i(t),it=l(t,"P",{"data-svelte-h":!0}),f(it)!=="svelte-ojtzzq"&&(it.textContent=ds),Ue=i(t),rt=l(t,"P",{"data-svelte-h":!0}),f(rt)!=="svelte-jtq7on"&&(rt.innerHTML=cs),Ge=i(t),ut=l(t,"P",{"data-svelte-h":!0}),f(ut)!=="svelte-11uziro"&&(ut.textContent=$s),Ke=i(t),oe=l(t,"P",{});var ve=C(oe);d(ft.$$.fragment,ve),ve.forEach(e),Qe=i(t),pt=l(t,"P",{"data-svelte-h":!0}),f(pt)!=="svelte-c17ica"&&(pt.textContent=bs),Ve=i(t),ht=l(t,"P",{"data-svelte-h":!0}),f(ht)!=="svelte-wc2t2o"&&(ht.innerHTML=ws),Ye=i(t),mt=l(t,"P",{"data-svelte-h":!0}),f(mt)!=="svelte-1wb5t0x"&&(mt.textContent=Cs),Je=i(t),le=l(t,"P",{});var ge=C(le);d(dt.$$.fragment,ge),ge.forEach(e),Xe=i(t),ct=l(t,"P",{"data-svelte-h":!0}),f(ct)!=="svelte-m9ujac"&&(ct.textContent=_s),Ze=i(t),ae=l(t,"P",{});var xe=C(ae);d($t.$$.fragment,xe),xe.forEach(e),tn=i(t),I=l(t,"P",{});var D=C(I);ie=l(D,"STRONG",{"data-svelte-h":!0}),f(ie)!=="svelte-yw7reo"&&(ie.textContent=vs),Wn=i(D),d(H.$$.fragment,D),Rn=i(D),d(M.$$.fragment,D),D.forEach(e),en=i(t),bt=l(t,"P",{"data-svelte-h":!0}),f(bt)!=="svelte-82exur"&&(bt.innerHTML=gs),nn=i(t),wt=l(t,"P",{"data-svelte-h":!0}),f(wt)!=="svelte-13fqee7"&&(wt.innerHTML=xs),sn=i(t),re=l(t,"P",{});var ke=C(re);d(Ct.$$.fragment,ke),ke.forEach(e),on=i(t),_t=l(t,"P",{"data-svelte-h":!0}),f(_t)!=="svelte-1sejmw6"&&(_t.innerHTML=ks),ln=i(t),vt=l(t,"H2",{"data-svelte-h":!0}),f(vt)!=="svelte-zvyw4n"&&(vt.textContent=As),an=i(t),gt=l(t,"P",{"data-svelte-h":!0}),f(gt)!=="svelte-125x82n"&&(gt.textContent=Ps),rn=i(t),xt=l(t,"P",{"data-svelte-h":!0}),f(xt)!=="svelte-1h4y6vg"&&(xt.textContent=Ts),un=i(t),kt=l(t,"H3",{"data-svelte-h":!0}),f(kt)!=="svelte-sh4ftn"&&(kt.textContent=ys),fn=i(t),At=l(t,"P",{"data-svelte-h":!0}),f(At)!=="svelte-3ce4mq"&&(At.textContent=Is),pn=i(t),Pt=l(t,"P",{"data-svelte-h":!0}),f(Pt)!=="svelte-kwxoch"&&(Pt.textContent=Bs),hn=i(t),Tt=l(t,"P",{"data-svelte-h":!0}),f(Tt)!=="svelte-l7vuwh"&&(Tt.textContent=Ls),mn=i(t),ue=l(t,"P",{});var Ae=C(ue);d(yt.$$.fragment,Ae),Ae.forEach(e),dn=i(t),It=l(t,"BLOCKQUOTE",{"data-svelte-h":!0}),f(It)!=="svelte-ww693x"&&(It.innerHTML=Ds),cn=i(t),E=l(t,"P",{});var te=C(E);Un=P(te,"As a bonus, I found this "),d(F.$$.fragment,te),Gn=P(te," that can help you play around with calculating subnet masks:"),te.forEach(e),$n=i(t),fe=l(t,"P",{});var Pe=C(fe);d(Bt.$$.fragment,Pe),Pe.forEach(e),bn=i(t),Lt=l(t,"P",{"data-svelte-h":!0}),f(Lt)!=="svelte-16aqrx5"&&(Lt.innerHTML=Hs),wn=i(t),pe=l(t,"P",{});var eo=C(pe);d(N.$$.fragment,eo),eo.forEach(e),Cn=i(t),Dt=l(t,"P",{"data-svelte-h":!0}),f(Dt)!=="svelte-1f6cf1d"&&(Dt.textContent=Ms),_n=i(t),Ht=l(t,"UL",{"data-svelte-h":!0}),f(Ht)!=="svelte-1a3pece"&&(Ht.innerHTML=Es),vn=i(t),Mt=l(t,"P",{"data-svelte-h":!0}),f(Mt)!=="svelte-d9lwb4"&&(Mt.textContent=Fs),gn=i(t),Et=l(t,"BLOCKQUOTE",{"data-svelte-h":!0}),f(Et)!=="svelte-zw3yv"&&(Et.innerHTML=Ns),xn=i(t),Ft=l(t,"BLOCKQUOTE",{"data-svelte-h":!0}),f(Ft)!=="svelte-1qm23bo"&&(Ft.innerHTML=qs),kn=i(t),Nt=l(t,"H3",{"data-svelte-h":!0}),f(Nt)!=="svelte-8nezja"&&(Nt.textContent=Ss),An=i(t),qt=l(t,"P",{"data-svelte-h":!0}),f(qt)!=="svelte-v8e0wg"&&(qt.textContent=js),Pn=i(t),St=l(t,"P",{"data-svelte-h":!0}),f(St)!=="svelte-pyn6fn"&&(St.textContent=Os),Tn=i(t),jt=l(t,"P",{"data-svelte-h":!0}),f(jt)!=="svelte-in4mcq"&&(jt.innerHTML=zs),yn=i(t),Ot=l(t,"P",{"data-svelte-h":!0}),f(Ot)!=="svelte-1ydi969"&&(Ot.innerHTML=Ws),In=i(t),zt=l(t,"P",{"data-svelte-h":!0}),f(zt)!=="svelte-16gy9u2"&&(zt.innerHTML=Rs),Bn=i(t),Wt=l(t,"P",{"data-svelte-h":!0}),f(Wt)!=="svelte-1dlao7a"&&(Wt.textContent=Us),Ln=i(t),Rt=l(t,"BLOCKQUOTE",{"data-svelte-h":!0}),f(Rt)!=="svelte-19mqcfw"&&(Rt.innerHTML=Gs),Dn=i(t),he=l(t,"P",{});var no=C(he);d(Ut.$$.fragment,no),no.forEach(e),Hn=i(t),Gt=l(t,"H3",{"data-svelte-h":!0}),f(Gt)!=="svelte-148txww"&&(Gt.textContent=Ks),Mn=i(t),Kt=l(t,"P",{"data-svelte-h":!0}),f(Kt)!=="svelte-lswkh2"&&(Kt.textContent=Qs),En=i(t),Qt=l(t,"UL",{"data-svelte-h":!0}),f(Qt)!=="svelte-19i23lq"&&(Qt.innerHTML=Vs),Fn=i(t),Vt=l(t,"P",{"data-svelte-h":!0}),f(Vt)!=="svelte-1n0bjd8"&&(Vt.innerHTML=Ys),Nn=i(t),Yt=l(t,"H3",{"data-svelte-h":!0}),f(Yt)!=="svelte-1h81dx6"&&(Yt.textContent=Js),qn=i(t),Jt=l(t,"P",{"data-svelte-h":!0}),f(Jt)!=="svelte-cs1rd0"&&(Jt.textContent=Xs),Sn=i(t),Xt=l(t,"H4",{"data-svelte-h":!0}),f(Xt)!=="svelte-nzx381"&&(Xt.textContent=Zs),jn=i(t),v=l(t,"UL",{});var k=C(v);me=l(k,"LI",{});var so=C(me);d(q.$$.fragment,so),so.forEach(e),Kn=i(k),de=l(k,"LI",{});var oo=C(de);d(S.$$.fragment,oo),oo.forEach(e),Qn=i(k),ce=l(k,"LI",{});var lo=C(ce);d(j.$$.fragment,lo),lo.forEach(e),Vn=i(k),$e=l(k,"LI",{});var ao=C($e);d(O.$$.fragment,ao),ao.forEach(e),Yn=i(k),be=l(k,"LI",{});var io=C(be);d(z.$$.fragment,io),io.forEach(e),Jn=i(k),we=l(k,"LI",{});var ro=C(we);d(W.$$.fragment,ro),ro.forEach(e),k.forEach(e),On=i(t),Zt=l(t,"P",{"data-svelte-h":!0}),f(Zt)!=="svelte-u4jmlr"&&(Zt.innerHTML=to)},m(t,n){s(t,r,n),s(t,p,n),s(t,T,n),s(t,x,n),s(t,y,n),s(t,Te,n),s(t,R,n),s(t,ye,n),s(t,U,n),s(t,Ie,n),s(t,G,n),s(t,Be,n),s(t,K,n),s(t,Le,n),s(t,Q,n),s(t,De,n),s(t,V,n),s(t,He,n),s(t,Y,n),s(t,Me,n),s(t,ee,n),c(J,ee,null),s(t,Ee,n),s(t,X,n),s(t,Fe,n),s(t,Z,n),s(t,Ne,n),s(t,tt,n),s(t,qe,n),s(t,et,n),s(t,Se,n),s(t,nt,n),s(t,je,n),s(t,ne,n),c(st,ne,null),s(t,Oe,n),s(t,ot,n),s(t,ze,n),s(t,lt,n),s(t,We,n),s(t,se,n),c(at,se,null),s(t,Re,n),s(t,it,n),s(t,Ue,n),s(t,rt,n),s(t,Ge,n),s(t,ut,n),s(t,Ke,n),s(t,oe,n),c(ft,oe,null),s(t,Qe,n),s(t,pt,n),s(t,Ve,n),s(t,ht,n),s(t,Ye,n),s(t,mt,n),s(t,Je,n),s(t,le,n),c(dt,le,null),s(t,Xe,n),s(t,ct,n),s(t,Ze,n),s(t,ae,n),c($t,ae,null),s(t,tn,n),s(t,I,n),g(I,ie),g(I,Wn),c(H,I,null),g(I,Rn),c(M,I,null),s(t,en,n),s(t,bt,n),s(t,nn,n),s(t,wt,n),s(t,sn,n),s(t,re,n),c(Ct,re,null),s(t,on,n),s(t,_t,n),s(t,ln,n),s(t,vt,n),s(t,an,n),s(t,gt,n),s(t,rn,n),s(t,xt,n),s(t,un,n),s(t,kt,n),s(t,fn,n),s(t,At,n),s(t,pn,n),s(t,Pt,n),s(t,hn,n),s(t,Tt,n),s(t,mn,n),s(t,ue,n),c(yt,ue,null),s(t,dn,n),s(t,It,n),s(t,cn,n),s(t,E,n),g(E,Un),c(F,E,null),g(E,Gn),s(t,$n,n),s(t,fe,n),c(Bt,fe,null),s(t,bn,n),s(t,Lt,n),s(t,wn,n),s(t,pe,n),c(N,pe,null),s(t,Cn,n),s(t,Dt,n),s(t,_n,n),s(t,Ht,n),s(t,vn,n),s(t,Mt,n),s(t,gn,n),s(t,Et,n),s(t,xn,n),s(t,Ft,n),s(t,kn,n),s(t,Nt,n),s(t,An,n),s(t,qt,n),s(t,Pn,n),s(t,St,n),s(t,Tn,n),s(t,jt,n),s(t,yn,n),s(t,Ot,n),s(t,In,n),s(t,zt,n),s(t,Bn,n),s(t,Wt,n),s(t,Ln,n),s(t,Rt,n),s(t,Dn,n),s(t,he,n),c(Ut,he,null),s(t,Hn,n),s(t,Gt,n),s(t,Mn,n),s(t,Kt,n),s(t,En,n),s(t,Qt,n),s(t,Fn,n),s(t,Vt,n),s(t,Nn,n),s(t,Yt,n),s(t,qn,n),s(t,Jt,n),s(t,Sn,n),s(t,Xt,n),s(t,jn,n),s(t,v,n),g(v,me),c(q,me,null),g(v,Kn),g(v,de),c(S,de,null),g(v,Qn),g(v,ce),c(j,ce,null),g(v,Vn),g(v,$e),c(O,$e,null),g(v,Yn),g(v,be),c(z,be,null),g(v,Jn),g(v,we),c(W,we,null),s(t,On,n),s(t,Zt,n),zn=!0},p(t,n){const Ce={};n&2&&(Ce.$$scope={dirty:n,ctx:t}),H.$set(Ce);const _e={};n&2&&(_e.$$scope={dirty:n,ctx:t}),M.$set(_e);const ve={};n&2&&(ve.$$scope={dirty:n,ctx:t}),F.$set(ve);const ge={};n&2&&(ge.$$scope={dirty:n,ctx:t}),N.$set(ge);const xe={};n&2&&(xe.$$scope={dirty:n,ctx:t}),q.$set(xe);const D={};n&2&&(D.$$scope={dirty:n,ctx:t}),S.$set(D);const ke={};n&2&&(ke.$$scope={dirty:n,ctx:t}),j.$set(ke);const Ae={};n&2&&(Ae.$$scope={dirty:n,ctx:t}),O.$set(Ae);const te={};n&2&&(te.$$scope={dirty:n,ctx:t}),z.$set(te);const Pe={};n&2&&(Pe.$$scope={dirty:n,ctx:t}),W.$set(Pe)},i(t){zn||($(J.$$.fragment,t),$(st.$$.fragment,t),$(at.$$.fragment,t),$(ft.$$.fragment,t),$(dt.$$.fragment,t),$($t.$$.fragment,t),$(H.$$.fragment,t),$(M.$$.fragment,t),$(Ct.$$.fragment,t),$(yt.$$.fragment,t),$(F.$$.fragment,t),$(Bt.$$.fragment,t),$(N.$$.fragment,t),$(Ut.$$.fragment,t),$(q.$$.fragment,t),$(S.$$.fragment,t),$(j.$$.fragment,t),$(O.$$.fragment,t),$(z.$$.fragment,t),$(W.$$.fragment,t),zn=!0)},o(t){b(J.$$.fragment,t),b(st.$$.fragment,t),b(at.$$.fragment,t),b(ft.$$.fragment,t),b(dt.$$.fragment,t),b($t.$$.fragment,t),b(H.$$.fragment,t),b(M.$$.fragment,t),b(Ct.$$.fragment,t),b(yt.$$.fragment,t),b(F.$$.fragment,t),b(Bt.$$.fragment,t),b(N.$$.fragment,t),b(Ut.$$.fragment,t),b(q.$$.fragment,t),b(S.$$.fragment,t),b(j.$$.fragment,t),b(O.$$.fragment,t),b(z.$$.fragment,t),b(W.$$.fragment,t),zn=!1},d(t){t&&(e(r),e(p),e(T),e(x),e(y),e(Te),e(R),e(ye),e(U),e(Ie),e(G),e(Be),e(K),e(Le),e(Q),e(De),e(V),e(He),e(Y),e(Me),e(ee),e(Ee),e(X),e(Fe),e(Z),e(Ne),e(tt),e(qe),e(et),e(Se),e(nt),e(je),e(ne),e(Oe),e(ot),e(ze),e(lt),e(We),e(se),e(Re),e(it),e(Ue),e(rt),e(Ge),e(ut),e(Ke),e(oe),e(Qe),e(pt),e(Ve),e(ht),e(Ye),e(mt),e(Je),e(le),e(Xe),e(ct),e(Ze),e(ae),e(tn),e(I),e(en),e(bt),e(nn),e(wt),e(sn),e(re),e(on),e(_t),e(ln),e(vt),e(an),e(gt),e(rn),e(xt),e(un),e(kt),e(fn),e(At),e(pn),e(Pt),e(hn),e(Tt),e(mn),e(ue),e(dn),e(It),e(cn),e(E),e($n),e(fe),e(bn),e(Lt),e(wn),e(pe),e(Cn),e(Dt),e(_n),e(Ht),e(vn),e(Mt),e(gn),e(Et),e(xn),e(Ft),e(kn),e(Nt),e(An),e(qt),e(Pn),e(St),e(Tn),e(jt),e(yn),e(Ot),e(In),e(zt),e(Bn),e(Wt),e(Ln),e(Rt),e(Dn),e(he),e(Hn),e(Gt),e(Mn),e(Kt),e(En),e(Qt),e(Fn),e(Vt),e(Nn),e(Yt),e(qn),e(Jt),e(Sn),e(Xt),e(jn),e(v),e(On),e(Zt)),w(J),w(st),w(at),w(ft),w(dt),w($t),w(H),w(M),w(Ct),w(yt),w(F),w(Bt),w(N),w(Ut),w(q),w(S),w(j),w(O),w(z),w(W)}}}function Io(h){let r,u;const p=[h[0],po];let T={$$slots:{default:[yo]},$$scope:{ctx:h}};for(let _=0;_<p.length;_+=1)T=Xn(T,p[_]);return r=new bo({props:T}),{c(){m(r.$$.fragment)},l(_){d(r.$$.fragment,_)},m(_,x){c(r,_,x),u=!0},p(_,[x]){const y=x&1?$o(p,[x&1&&fo(_[0]),x&0&&fo(po)]):{};x&2&&(y.$$scope={dirty:x,ctx:_}),r.$set(y)},i(_){u||($(r.$$.fragment,_),u=!0)},o(_){b(r.$$.fragment,_),u=!1},d(_){w(r,_)}}}const po={title:"What is a subnet? | How subnetting works",description:"Subnets are used to group networks into smaller chunks in other to make addressing and traffic flow easier and smoother. These groups are defined either by logic or location. ",date:"2024-09-20",lastmod:"2024-09-20",categories:["cyber security","networking","under the hood series"],label:"under the hood series",series:"uth",episode:6,layout:"series",published:!0};function Bo(h,r,u){return h.$$set=p=>{u(0,r=Xn(Xn({},r),uo(p)))},r=uo(r),[r]}class No extends mo{constructor(r){super(),co(this,r,Bo,Io,ho,{})}}export{No as default,po as metadata};