{"id":28696,"date":"2025-01-22T19:19:41","date_gmt":"2025-01-22T19:19:41","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=28696"},"modified":"2025-01-22T19:20:14","modified_gmt":"2025-01-22T19:20:14","slug":"the-history-behind-netmasks","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/","title":{"rendered":"The History behind Netmasks"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/alejandro-acosta\/\">Alejandro Acosta<\/a>, R+D Coordinator at LACNIC<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>Do you remember when you were learning about netmasks? You probably thought that they were useless, that you wouldn&#8217;t need them, and wondered why they had invented something so insane. In addition to putting a smile on your face, I hope to convince you of their importance within the gigantic Internet ecosystem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Goal<\/strong><\/h2>\n\n\n\n<p>This blog post summarizes the history and milestones behind the concept of netmasks in the world of IPv4. This story begins in a world where classes didn&#8217;t exist (flat addressing), it then goes through a classful era and concludes with a totally classless Internet (CIDR). The information is based on excerpts from RFCs 790, 1338, and 1519, as well as on &#8216;Internet-history&#8217; mailing list threads.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Do you know what a netmask is?<\/strong><\/h2>\n\n\n\n<p>If you&#8217;re reading this document, I assume you do :-) but here&#8217;s a mini explanation: <em>a netmask is used to identify and divide an IP address into a network address and a host address<\/em>, in other words, <em>it specifies the subnet partitioning system<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the purpose of netmasks?<\/strong><\/h2>\n\n\n\n<p><strong>Routing:<\/strong> Netmasks are used by routers to determine the network part of an IP address and route packets correctly.<\/p>\n\n\n\n<p><strong>Subnetting:<\/strong> Netmasks are used to create smaller networks.<\/p>\n\n\n\n<p><strong>Aggregation:<\/strong> Netmasks allow creating larger prefixes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Have netmasks always existed?<\/strong><\/h2>\n\n\n\n<p>Interestingly, netmasks haven&#8217;t always existed. In the beginning, IP networks were flat, and it was always assumed 8 bits were used for the network and 24 bits for the host. In other words, the first octet represented the network, while the remaining three octets corresponded to the host. It is also worth noting that many years ago, they were also referred to as <em>bitmasks<\/em> or simply <em>masks<\/em> \u2014 the latter term is still widely used today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>This means that classes (A, B, C, D) have not always existed<\/strong><\/h2>\n\n\n\n<p>Classes were not introduced until Jon Postel&#8217;s RFC was published (September 1981), in other words, there was a time before classless and classful addressing. The introduction of the classful system was driven by the need to accommodate networks of different sizes, as the original 8-bit network ID was insufficient (256 networks). While the classful system attempted to address the limitations of a flat address space, it also faced scalability limitations. In the classful world, the netmask was implicit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Classes did not solve every issue<\/strong><\/h2>\n\n\n\n<p>Although the classful system represented an improvement over the original (flat) design, it was not efficient. The fixed size of the network and host portions of IP addresses led to exhaustion of the IP address space, particularly with the growing number of networks larger than a Class C but smaller than a Class B. This resulted in the development of Classless Interdomain Routing (CIDR), which uses Variable Length Subnet Masks (VLSM).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"974\" height=\"1024\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig1-que-historia-hay-detras-de-las-famosas-mascaras-de-red-974x1024.png\" alt=\"\" class=\"wp-image-28679\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig1-que-historia-hay-detras-de-las-famosas-mascaras-de-red-974x1024.png 974w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig1-que-historia-hay-detras-de-las-famosas-mascaras-de-red-285x300.png 285w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig1-que-historia-hay-detras-de-las-famosas-mascaras-de-red-314x330.png 314w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig1-que-historia-hay-detras-de-las-famosas-mascaras-de-red-768x808.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig1-que-historia-hay-detras-de-las-famosas-mascaras-de-red-300x316.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig1-que-historia-hay-detras-de-las-famosas-mascaras-de-red.png 1316w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><\/figure>\n\n\n\n<p>Excerpt from RFC 790<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--28696\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/expanding-the-ipv6-documentation-space\/\">Expanding the IPv6 Documentation Space<\/a><\/div><\/div><\/section>\n\n\n<h2 class=\"wp-block-heading\"><strong>Did you know that netmasks were not always written with contiguous bits \u201con\u201d from left to right?<\/strong><\/h2>\n\n\n\n<p>In the beginning, netmasks didn&#8217;t have to be \u201clit\u201d or \u201cturned on\u201d bit by bit from left to right. This means that masks such as 255.255.192.128 were entirely valid. This configuration was accepted by routers (IMPs, the first routers) and various operating systems, including BSDs and SunOSs. In other words, until the early 1990s, it was still possible for netmasks to have non-contiguous bits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why was it decided that it would be mandatory for bits to be turned on from left to right?<\/strong><\/h2>\n\n\n\n<p>There were several reasons for this decision, the main one relating to routing and the well-known concept of \u201clongest match\u201d where routers select the route with the longest subnet mask that matches the packet&#8217;s destination address.<em> If the bits are not contiguous<\/em>, the computational complexity is very high. In short, efficiency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Back then, IPv4 exhaustion was already underway<\/strong><\/h2>\n\n\n\n<p>IPv4 resource exhaustion is not a recent phenomenon. In fact, item #1 of the first section of RFC 1338 mentions the exhaustion of Class B network address space, noting that Class C is too small for many organizations, and Class B is too large to be widely allocated. This led to pressure on the Class B address space, which was exhausted. Furthermore, item #3 of the same RFC mentions the \u201cEventual exhaustion of the 32-bit IP address space\u201d (1992).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CIDR tackles the solutions of the past, which later became the problems of the time<\/strong><\/h2>\n\n\n\n<p>The creation of classes led to the creation of more networks, which meant an increase in prefixes and consequently a higher consumption of memory and CPU. Thus, in September 1993, RFC 1519 introduced the concept of CIDR, which brought with it solutions to different challenges, including the ability to perform supernetting (i.e., being able to turn off bits from right to left) and attempting to reduce the number of network prefixes. It should be noted that RFC 1338 also maintained similar concepts.<\/p>\n\n\n\n<p>Finally, prefix notation (\/nn) also appeared thanks to CIDR and was possible because the \u201con\u201d and \u201coff\u201d bits of the netmask were contiguous.<\/p>\n\n\n\n<p>In summary, the primary goals of CIDR were to slow the growth of routing tables and improve efficiency in the use of IP address space.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"539\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig2-que-historia-hay-detras-de-las-famosas-mascaras-de-red-1024x539.png\" alt=\"\" class=\"wp-image-28682\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig2-que-historia-hay-detras-de-las-famosas-mascaras-de-red-1024x539.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig2-que-historia-hay-detras-de-las-famosas-mascaras-de-red-300x158.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig2-que-historia-hay-detras-de-las-famosas-mascaras-de-red-627x330.png 627w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig2-que-historia-hay-detras-de-las-famosas-mascaras-de-red-768x405.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig2-que-historia-hay-detras-de-las-famosas-mascaras-de-red.png 1310w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Timeline<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"504\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig3-que-historia-hay-detras-de-las-famosas-mascaras-de-red-1024x504.png\" alt=\"\" class=\"wp-image-28685\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig3-que-historia-hay-detras-de-las-famosas-mascaras-de-red-1024x504.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig3-que-historia-hay-detras-de-las-famosas-mascaras-de-red-300x148.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig3-que-historia-hay-detras-de-las-famosas-mascaras-de-red-671x330.png 671w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig3-que-historia-hay-detras-de-las-famosas-mascaras-de-red-768x378.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig3-que-historia-hay-detras-de-las-famosas-mascaras-de-red-1536x756.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/fig3-que-historia-hay-detras-de-las-famosas-mascaras-de-red-2048x1007.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusions<\/strong><\/h2>\n\n\n\n<p>The concept of the netmask has evolved significantly since its origin, from not existing in a flat addressing scheme, to a rigid and then to a flexible model with CIDR. Initially, classful networks and non-contiguous masks created inefficiency and scalability issues as the Internet expanded.<\/p>\n\n\n\n<p>A key change was the requirement of contiguous \u201con\u201d bits, as this simplified the route selection process and allowed routers to operate more efficiently.<\/p>\n\n\n\n<p>This document highlights the key milestones and motivations behind the evolution of IP addressing and underscores the importance of understanding the historical context to fully appreciate the Internet&#8217;s current architecture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>References<\/strong><strong><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>RFC <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc1338\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/datatracker.ietf.org\/doc\/html\/rfc1338<\/a><\/li>\n\n\n\n<li>RFC <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc1338\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/datatracker.ietf.org\/doc\/html\/rfc<\/a>1380<\/li>\n\n\n\n<li>RFC <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc1338\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/datatracker.ietf.org\/doc\/html\/rfc<\/a>1519<\/li>\n\n\n\n<li>RFC <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc790\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/datatracker.ietf.org\/doc\/html\/rfc790<\/a><\/li>\n\n\n\n<li>ISOC \u201cInternet History\u201d mailing list, thread with the subject \u201cThe netmask\u201d: <a href=\"https:\/\/elists.isoc.org\/pipermail\/internet-history\/2025-January\/010060.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/elists.isoc.org\/pipermail\/internet-history\/2025-January\/010060.html<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By Alejandro Acosta, R+D Coordinator at LACNIC Introduction Do you remember when you were learning about netmasks? You probably thought that they were useless, that you wouldn&#8217;t need them, and wondered why they had invented something so insane. In addition to putting a smile on your face, I hope to convince you of their importance [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28688,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1357],"tags":[1360,1280],"archivo":[1345,1451],"taxonomy-authors":[1248],"tipo_autor":[],"class_list":["post-28696","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs","tag-labs","tag-routing","archivo-editions","archivo-highlights-2023","taxonomy-authors-alejandro-acosta-en"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | The History behind Netmasks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | The History behind Netmasks\" \/>\n<meta property=\"og:description\" content=\"By Alejandro Acosta, R+D Coordinator at LACNIC Introduction Do you remember when you were learning about netmasks? You probably thought that they were useless, that you wouldn&#8217;t need them, and wondered why they had invented something so insane. In addition to putting a smile on your face, I hope to convince you of their importance [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-22T19:19:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T19:20:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"The History behind Netmasks\",\"datePublished\":\"2025-01-22T19:19:41+00:00\",\"dateModified\":\"2025-01-22T19:20:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/\"},\"wordCount\":995,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png\",\"keywords\":[\"Labs\",\"Routing\"],\"articleSection\":[\"Labs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/\",\"name\":\"LACNIC Blog | The History behind Netmasks\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png\",\"datePublished\":\"2025-01-22T19:19:41+00:00\",\"dateModified\":\"2025-01-22T19:20:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The History behind Netmasks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | The History behind Netmasks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | The History behind Netmasks","og_description":"By Alejandro Acosta, R+D Coordinator at LACNIC Introduction Do you remember when you were learning about netmasks? You probably thought that they were useless, that you wouldn&#8217;t need them, and wondered why they had invented something so insane. In addition to putting a smile on your face, I hope to convince you of their importance [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2025-01-22T19:19:41+00:00","article_modified_time":"2025-01-22T19:20:14+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"The History behind Netmasks","datePublished":"2025-01-22T19:19:41+00:00","dateModified":"2025-01-22T19:20:14+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/"},"wordCount":995,"commentCount":1,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png","keywords":["Labs","Routing"],"articleSection":["Labs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/","url":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/","name":"LACNIC Blog | The History behind Netmasks","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png","datePublished":"2025-01-22T19:19:41+00:00","dateModified":"2025-01-22T19:20:14+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/the-history-behind-netmasks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"The History behind Netmasks"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/comprender-mascaras-de-red-enrutamiento-y-redes-locales.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":28676,"post_title":"\u00bfQu\u00e9 historia hay detr\u00e1s de las famosas m\u00e1scaras de red?","slug":"que-historia-hay-detras-de-las-famosas-mascaras-de-red","href":"https:\/\/blog.lacnic.net\/que-historia-hay-detras-de-las-famosas-mascaras-de-red\/"},{"locale":"pt_BR","id":28700,"post_title":"Qual \u00e9 a hist\u00f3ria por tr\u00e1s das famosas m\u00e1scaras de rede?","slug":"qual-e-a-historia-por-tras-das-famosas-mascaras-de-rede","href":"https:\/\/blog.lacnic.net\/pt-br\/qual-e-a-historia-por-tras-das-famosas-mascaras-de-rede\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=28696"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28696\/revisions"}],"predecessor-version":[{"id":28698,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28696\/revisions\/28698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/28688"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=28696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=28696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=28696"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=28696"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=28696"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=28696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}