
Appendix C TCP/IP Protocol 343
When you use an LMHOSTS file, be sure to keep it up to date and
organized following these guidelines:
• Update an LMHOSTS file whenever a computer is changed, added
to, or removed from the network.
• Because LMHOSTS files are searched one line at a time from the
beginning, list remote computers in priority order, with the ones used
most often at the top of the file. This increases the speed of searches
for the most often used LMHOSTS entries.
Advanced Concepts
If your network is large enough to use class A or B IP addresses, the
network may be divided into subnets. A subnet is a segment of a
network used to divide a network into more manageable groups.
Subnets may be based on different departments, the type of network
media connecting the computers, and so on.
Each subnet is identified by a specified portion of the node portion of
the IP address of each computer in the subnet. This portion of the IP
address is used as the network number for the subnet.
Using subnets, you divide the number of computers that can be placed
on a network over a number of subnets. This essentially translates the
IP address from 2 (network, node) to 3 (network, subnetwork, node)
divisions.
A subnet mask specifies which portion of the IP address should be used
as the network number for the subnet. The format of the subnet mask is
the same as the format for IP addressing:
For more information about the subnet mask, see the previous table. For
more information about how to define subnets in your network, see
Internetworking with TCP/IP, Volume I, by Douglas E. Comer
(Prentice Hall, 1991).
Microsoft TCP/IP uses a modified bnode implementation of RFC1001
and RFC1002 which implements both broadcast- and session-based
transmissions. The Microsoft implementation uses session transmission
(instead of broadcast transmission) whenever possible to reduce the
number of broadcasts, and thus reduce the network load.
Comentarios a estos manuales