Ip addressing assignment help, computer science, Basic Computer Science

Assignment Help:
An IP address consists of 4 contiguous octets and is generally written in Dotted Decimal Notation in the form:

A.B.C.D


Where:
A represents the most significant octet, D the least significant octet
A,B,C and D are integers between 0 and 255


The 32 bits in an IP address are split between a unique:

Net ID which represents the network to which the host or gateway is attached
Host ID which uniquely identifies a specific host within that network

Note: The Net ID always precedes the Host ID.

Special and Reserved Addresses

There are groups of reserved addresses (RFC 1918: Address Allocation for Private Internets)


10.0.0.0 – 10.255.255.255
This is a Class A address
172.16.0.0 – 172.31.255.255
This is a set of 16 contiguous class B addresses
192.168.0.0 - 192.168.255.255
This is a set of contiguous class C addresses.

Related Discussions:- Ip addressing assignment help, computer science

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Artificial intelligence-environments, Artificial Intelligence-Environments ...

Artificial Intelligence-Environments   We have seen that intelligent agents should take into description sure information when   choosing  a rational act,  including inform

Spreadsheet to provide a business solution, Gareth's Gardens is a small fir...

Gareth's Gardens is a small firm that specialises in planning and laying new gardens.  A particularly popular garden plan consists of a patio and lawn, together with a circular pon

Surveying, describe the two fundament purpose of surveying

describe the two fundament purpose of surveying

What is Assembler Programming?, To build assembler programs with TASM prog...

To build assembler programs with TASM programs is a different program structure than from using debug program. It''s important to comprise the subsequent assembler commands: ..CODE

HACKER, Briefly explain who a hacker is and what the activities of a hacker...

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Arrays, Write an application that stores at least five different department...

Write an application that stores at least five different department and supervisor names in a two-dimensional array. Allow the user to enter a department name (such as “Marketing”)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd