Ip addressing assignment help, computer science, Basic Computer Science

Assignment Help:
An IP address consists of 4 contiguous octets and is generally written in Dotted Decimal Notation in the form:

A.B.C.D


Where:
A represents the most significant octet, D the least significant octet
A,B,C and D are integers between 0 and 255


The 32 bits in an IP address are split between a unique:

Net ID which represents the network to which the host or gateway is attached
Host ID which uniquely identifies a specific host within that network

Note: The Net ID always precedes the Host ID.

Special and Reserved Addresses

There are groups of reserved addresses (RFC 1918: Address Allocation for Private Internets)


10.0.0.0 – 10.255.255.255
This is a Class A address
172.16.0.0 – 172.31.255.255
This is a set of 16 contiguous class B addresses
192.168.0.0 - 192.168.255.255
This is a set of contiguous class C addresses.

Related Discussions:- Ip addressing assignment help, computer science

Artificial intelligence agents, Artificial Intelligence Agents: We dis...

Artificial Intelligence Agents: We discussed what we will be talking about in Artificial Intelligence and why those things are important. This chapter is all about how we wi

Two degree of freedom system with matlab program, solution of two degree of...

solution of two degree of freedom system with matlab program???

C++, whats the out put of int main(){ int n=310; funcone(n); functwo(&n); ...

whats the out put of int main(){ int n=310; funcone(n); functwo(&n); cout return 0; } void funcone(intn) n=240; } void func two(intn*) { n=120; }

Operating system, Ask question describes deadlock avoidance#Minimum 100 wor...

Ask question describes deadlock avoidance#Minimum 100 words accepted#

Artificial intelligence-general considerations for search, General Consider...

General Considerations for Search If we can specify the first state, the operators and the goal check for a look for difficulty, then we know where to create, how to move and w

HACKER, Briefly explain who a hacker is and what the activities of a hacker...

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Example of autonomous rational agents, Example of autonomous rational agent...

Example of autonomous rational agents-Artificial intelligence The procedure of waste water treatment After the level of pollutants in waste water is find out,  following 5

What is Shortest-Remaining-Time (SRT) Scheduling?, • The SRT is the preemp...

• The SRT is the preemptive complement of SJF and helpful in time-sharing environment. • In SRT scheduling, the process with the least estimated run-time to completion is run next,

Process killed, 1. What actions need to be taken when a program terminates ...

1. What actions need to be taken when a program terminates or a process is killed? What if that process destruction is not the consequence of normal termination, but rather is the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd