Skip to content

Asad Ijaz

Hey there, I'm Asad Ijaz Khattak, and I'm not your typical writer and blogger – I'm the voice behind the scenes at the renowned website, "networkustad.com." When it comes to the digital realm, I'm all about technology, networking, and cybersecurity. Picture this: I'm not just someone who writes about tech; I'm a certified expert in the field. I proudly hold the titles of Cisco Certified Network Professional (CCNP) and Cisco Certified Network Associate (CCNA). So, when I talk about networking, I'm not just whistling in the dark; I know my stuff! My website is like a treasure trove of knowledge. You'll find a plethora of articles and tutorials covering a wide range of topics related to networking and cybersecurity. It's not just a website; it's a learning hub for anyone who's eager to dive into the world of bits, bytes, and secure connections. And here's a fun fact: I'm not a lone wolf in this journey. I'm a proud member and Editor of Team NetworkUstad. Together, we're on a mission to empower people with the knowledge they need to navigate the digital landscape safely and effectively. So, if you're ready to embark on a tech-savvy adventure, stick around with me, Asad Ijaz Khattak. We're going to unravel the mysteries of technology, one article at a time!"

3 Comments

  1. Subnetting based on host requirement » Networkustad
    July 26, 2019 @ 4:31 pm

    […] here in this lesson, we will discuss the subnetting based on the host requirements. So we will jump right into the examples for better understanding.  […]

    Reply

  2. Jordan Smith
    March 11, 2020 @ 6:35 pm

    How would this work with a type c address? I have 192.168.0.0 does this mean I only use the last octet for borrowing hosts?

    Reply

    • Shahab Ali
      March 12, 2020 @ 1:14 am

      If you have a Class C Network than you have eight bits for subnetting. Usually, in class C network we made subnetting up to 6 bits (/30).

      Reply

Leave a Reply