Ip addressing assignment help, computer science, Basic Computer Science

Assignment Help:
An IP address consists of 4 contiguous octets and is generally written in Dotted Decimal Notation in the form:

A.B.C.D


Where:
A represents the most significant octet, D the least significant octet
A,B,C and D are integers between 0 and 255


The 32 bits in an IP address are split between a unique:

Net ID which represents the network to which the host or gateway is attached
Host ID which uniquely identifies a specific host within that network

Note: The Net ID always precedes the Host ID.

Special and Reserved Addresses

There are groups of reserved addresses (RFC 1918: Address Allocation for Private Internets)


10.0.0.0 – 10.255.255.255
This is a Class A address
172.16.0.0 – 172.31.255.255
This is a set of 16 contiguous class B addresses
192.168.0.0 - 192.168.255.255
This is a set of contiguous class C addresses.

Related Discussions:- Ip addressing assignment help, computer science

Data buses, Data buses: The availability of reliable digital semi-condu...

Data buses: The availability of reliable digital semi-conductor technology has enabled the inter-communication task between different equipment to be significantly improved. P

What is a stateless and and a stateful server, StatefulServer, maintains so...

StatefulServer, maintains some information between requests. Requires smaller messages, since some information is kept between contacts, example: FTP, telnet. Stateless Server req

Widening web, The Widening Web The idea, the whole world is agog...

The Widening Web The idea, the whole world is agog now had accidental origins. Here is how it all began. In early 1969, the U.S. Defence department financed a network fo

Courier company , disvange and advantege of providing intternet sservice to...

disvange and advantege of providing intternet sservice to customer

What is the difference between kernel mode and user mode fun, The differenc...

The difference between kernel mode and user mode gives a rudimentary form of security in the following manner. Convinced instructions could be executed only when the CPU is in kern

Define jumps and loops , The unconditional jumps in a written program in a...

The unconditional jumps in a written program in assembler language are specified by the jmp instruction; a jump is to moves the flow of the execution of a program by sending the co

Spreadsheet development, Basic steps/tasks involved in spreadsheets develop...

Basic steps/tasks involved in spreadsheets development

Ida* search-artificial intelligence, IDA* Search-Artificial intelligence: ...

IDA* Search-Artificial intelligence: A* search is a sophisticated and successful search strategy. yet, a problem with A* search is that it might  keep every states in its memor

Explain FDM : Frequency Division Multiplexing, Frequency Division Multiplex...

Frequency Division Multiplexing : FDM is an analog technique that is applied when he bandwidth of link is greater than the combined bandwidth of the signals to be transmitted. a

Where data could be hidden, QUESTION (a) Being just employed as junior ...

QUESTION (a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, ‘hey Moona Tambi, we have received a hard disk for examinat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd