Q

# Can you assign an IP address ending in .0 or .255?

## Learn how to assign an IP address ending in .0 or .255 from networking fundamentals expert Chris Partsenidis in this Q&A.

Can you assign an IP address ending in .0 or .255?

There is much confusion about addresses ending in .0 or .255 and this is clearly the result of misunderstanding the rules of subnetting – a topic most newcomers dread!

Even though the answer is pretty much straight forward (no, you can't in most cases, but there are some exceptions!), I'm going to take a different approach and give you a bit of theory as to why you can't use certain addresses to help you truly understand the reason and not just memorize a range of numbers.

As you would already know, every network uses some type of addressing scheme. This is required in order for the computers to communicate with each other. The ranges used can vary and depend on the administrator's preference and the network's requirements. As such, most select the good old 192.168.0.0 address range, while some prefer shorter addresses like 10.0.0.0. These addresses are what we call 'logical' addresses, meaning that they are based purely on software (the operating system).

One of the very basic rules in IP networks is that every...  logical network, no matter how small or big it is, must have a network identifier address and a network broadcast address. To make things simple, the engineers that designed all the above though it would be a great idea to use the first and last addresses of each logical network to do their job!

So, as you've already correctly guessed, networks ending in .0 or .255 are not usable… in most cases! The reason for this is because we tend to allocate full Class C type addresses to our networks, making it obviously very simple for us to administer.

A standard Class C network consists of 256 addresses (0 to 255 inclusive), of which one is the network address (.0) and the other is the network broadcast address (.255).

To help make this clear, if we selected network address 192.168.0.0/255.255.255.0 for our office, then we can say that:

The network identifier would be 192.168.0.0
Valid (or usuable) ip addresses would be 192.168.0.1 to 192.168.0.254.

In the above example, addresses .0 & .255 are not usable, but in the one to follow, they are:

Consider a huge office with more than 15,000 workstations. You decide that you want all these hosts in one logical network, so a Class A network address is not able to cover your needs. A Class B gives you a total of 65,535 IP addresses – a really big network which you would surely want to break down, but for the sake of this example, we won't.

If we consider 172.16.0.0 / 255.255.0.0 as the preferred choice, then the network characteristics are as follows:

Network identifier: 172.16.0.0
Valid (or usable) IP addresses: 172.16.0.1 to 172.16.255.254

If you take a closer look at the valid addresses, you'll notice that IP addresses 172.16.255.0 and 172.16.0.255 can be used!

The above example is the reason I didn't want you to memorize that all addresses ending in .0 or .255 cannot be assigned!

The trick to understanding all the above is of course the network theory. If you would like to read more about subnetting, IP classes e.t.c. then I'd highly advise you to visit www.Firewall.cx and check out one of the worlds finest tutorials to subnetting and IP addressing.

This was last published in January 2005

## Content

Find more PRO+ content and other member only offers, here.

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### White-box switches save green, but they aren't for everyone

While some networking pros say white-box switching is the 'next big thing,' others argue that's a myth that needs busting. As ...

## SearchEnterpriseWAN

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

• ### Cloud-managed networking makes VPN a snap

Provisioning and deploying a WAN and VPN is an everyday function for engineers. But can you do that for an office 4,000 miles ...

• ### Three new takes on WAN optimization

Once considered new technology, WAN optimization is now widespread, and enterprises are including it in their networks from the ...

## SearchUnifiedCommunications

• ### Avaya updates contact-center platform for midsize companies

In UC news, Avaya updates its contact-center platform to support midsize companies, while join.me offers real-time collaboration ...

• ### UCaaS-to-SaaS integrations lend competitive advantage in enterprise

SaaS integrations that connect UCaaS platforms with business-critical systems such as Salesforce can dramatically improve the ...

• ### SaaS-collaboration integrations: Let's talk, cloud to cloud

It's time for clouds to get social. SaaS-collaboration integrations can ease multicloud woes in the enterprise and may ultimately...

## SearchMobileComputing

• ### Mobility in manufacturing fights an uphill battle

The challenges of adopting mobility in manufacturing are unique, compared with other industries. Outdated machinery makes it ...

• ### Alternative mobile OSes try but fail to rise in the enterprise

Alternative mobile operating systems to Android and iOS have tried but failed to unseat the key players. Does a new mobile OS ...

• ### Six must-haves for IT's mobile security checklist

Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items ...

## SearchDataCenter

• ### IT slowly embraces composable infrastructure

If there will be a way to make an enterprise data center as efficient and optimized as cloud computing, composable infrastructure...

• ### Examine data collection problems with big data, IoT in mind

Networking challenges and data collection problems can occur when IT tries to deploy IoT and big data into a data center. ...

• ### Challenges of IoT include big data, data analysis for enterprise

Implementing big data and IoT is difficult for enterprise IT teams due to major challenges on the network. Here's how IT can ...

## SearchITChannel

• ### Three tips for dealing with the IT labor shortage

IT companies should seek out motivated workers, commit to continuous learning and invest in employee well-being to minimize the ...

• ### CHIME asks Trump to ease meaningful use regulations

CIO organization CHIME is calling on the President-elect to reduce the number of regulations on healthcare providers by delaying ...

• ### Docker acquires Infinit for persistent container storage

Docker persistent storage and stateful applications are the next front in the container wars, and Docker Inc. has fired a major ...

Close