Q
Problem solve Get help with specific problems with your technologies, process and projects.

# Can you assign an IP address ending in .0 or .255?

## Learn how to assign an IP address ending in .0 or .255 from networking fundamentals expert Chris Partsenidis in this Q&A.

Can you assign an IP address ending in .0 or .255?

There is much confusion about addresses ending in .0 or .255 and this is clearly the result of misunderstanding the rules of subnetting – a topic most newcomers dread!

Even though the answer is pretty much straight forward (no, you can't in most cases, but there are some exceptions!), I'm going to take a different approach and give you a bit of theory as to why you can't use certain addresses to help you truly understand the reason and not just memorize a range of numbers.

As you would already know, every network uses some type of addressing scheme. This is required in order for the computers to communicate with each other. The ranges used can vary and depend on the administrator's preference and the network's requirements. As such, most select the good old 192.168.0.0 address range, while some prefer shorter addresses like 10.0.0.0. These addresses are what we call 'logical' addresses, meaning that they are based purely on software (the operating system).

One of the very basic rules in IP networks is that every...  logical network, no matter how small or big it is, must have a network identifier address and a network broadcast address. To make things simple, the engineers that designed all the above though it would be a great idea to use the first and last addresses of each logical network to do their job!

So, as you've already correctly guessed, networks ending in .0 or .255 are not usable… in most cases! The reason for this is because we tend to allocate full Class C type addresses to our networks, making it obviously very simple for us to administer.

A standard Class C network consists of 256 addresses (0 to 255 inclusive), of which one is the network address (.0) and the other is the network broadcast address (.255).

To help make this clear, if we selected network address 192.168.0.0/255.255.255.0 for our office, then we can say that:

The network identifier would be 192.168.0.0
Valid (or usuable) ip addresses would be 192.168.0.1 to 192.168.0.254.

In the above example, addresses .0 & .255 are not usable, but in the one to follow, they are:

Consider a huge office with more than 15,000 workstations. You decide that you want all these hosts in one logical network, so a Class A network address is not able to cover your needs. A Class B gives you a total of 65,535 IP addresses – a really big network which you would surely want to break down, but for the sake of this example, we won't.

If we consider 172.16.0.0 / 255.255.0.0 as the preferred choice, then the network characteristics are as follows:

Network identifier: 172.16.0.0
Valid (or usable) IP addresses: 172.16.0.1 to 172.16.255.254

If you take a closer look at the valid addresses, you'll notice that IP addresses 172.16.255.0 and 172.16.0.255 can be used!

The above example is the reason I didn't want you to memorize that all addresses ending in .0 or .255 cannot be assigned!

The trick to understanding all the above is of course the network theory. If you would like to read more about subnetting, IP classes e.t.c. then I'd highly advise you to visit www.Firewall.cx and check out one of the worlds finest tutorials to subnetting and IP addressing.

This was last published in January 2005

## Content

Find more PRO+ content and other member only offers, here.

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### ONF puts focus on white box switches with Stratum project

The Open Networking Foundation formed Stratum, an open source networking project intended to create more interoperability among ...

• ### Aryaka adds new security layers to global private network

Through security partnerships, Aryaka's Passport platform offers six security layers to provide additional protection in case one...

• ### Network subscription packages gain steam among enterprises

Networking suppliers are increasingly offering network subscription packages, as enterprises have become more familiar with ...

## SearchEnterpriseWAN

• ### How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• ### How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

## SearchUnifiedCommunications

• ### Twilio Flex provides a customizable cloud contact center platform

Twilio Flex offers a customizable interface that sits atop the vendor's application development platform. The offering could ...

• ### AWS attacks rivals with Amazon Chime pricing

Amazon Web Services is switching Amazon Chime pricing to a usage model to lure businesses away from rivals Slack, Microsoft Teams...

• ### New Masergy UCaaS feature helps avoid overpayments

Masergy UCaaS customers can use their human resource applications to automate adding and deleting UCaaS users. The new feature ...

## SearchMobileComputing

• ### Android enterprise device management cheat sheet

Don't get overwhelmed when managing Android devices in the enterprise. Check out this cheat sheet to understand and use features ...

• ### Explore the features of unified endpoint management

UEM can ease pain points for IT or it could create complications. To decide whether this is a good approach, IT pros should do ...

• ### Take a mobile-first approach to digital transformation

There's no denying it: Smartphones have changed everything, from personal life to business. Get on board with digital ...

## SearchDataCenter

• ### IBM cloud services to secure mainframes out to the edge

Big Blue will introduce IBM cloud services that use blockchain, containers and its z14 mainframes to deliver improved security ...

• ### Four disadvantages of hyper-converged infrastructure systems

Problems with scalability and unexpected licensing costs can create problems for organizations that deploy hyper-converged ...

• ### IBM Power9 servers seek market inroads to AI, cloud

IBM follows up its first Power9 server with a raft of systems designed to appeal to a wider array of markets -- most notably, AI ...

## SearchITChannel

• ### IBM bolsters data security in its cloud services

Big Blue will introduce IBM cloud services that use blockchain, containers and its z14 mainframes to deliver improved security ...

• ### Accenture-Disney deal: Blockchain at the movies

A recently revealed Accenture-Disney alliance aims to apply virtual reality, machine learning and blockchain in immersive ...

• ### Managed services pricing: Tips for creating predictable revenue

Many MSPs still rely heavily on an hourly billing rate and cost-plus pricing. Michael Backers, an MSPAlliance board member, ...

Close