The ip addressing scheme, Computer Networking

Assignment Help:

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 32-bit IP address of the sender (source) as well as the receiver (destination).

THE IP ADDRESS HIERARCHY:

Each 32-bit Internet address is divided into two parts:

  • PREFIX:

 It shows the physical network to which the computers are attached.

  • SUFFIX:

 It shows an individual computer on the network.

The physical network in an Internet is given a unique value called as a network number. No two networks can be given the same network number and no two computers on the same network can be given the similar suffix. A suffix number can be used on more than one network.

The IP address architecture guarantees two important rules:

1. Each computer is given a unique address.

2. Although IP address assignment must be coordinated globally, suffixes may be given locally.


Related Discussions:- The ip addressing scheme

Define client and server, Question 1 Define client and server. Explain the...

Question 1 Define client and server. Explain the Client server model Question 2 What is a Mainframe System? Write down the features of Mainframe System Question 3

State the example of security audit as case study, State the Example of sec...

State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain

Explain imap, Short for Internet Message Access Protocol. This is another m...

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

D2D communication, I need to discuss with some one who expert in D2D commun...

I need to discuss with some one who expert in D2D communications in 5G networks.

Determine the names of network installation, Determine the names of Network...

Determine the names of Network installation ? Buying the components ? Cabling the network ? Installation of networking components such as hubs, switches, routers, gateway

Shared memory programming, We know that all processors share a common memor...

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implemen

Explain the concept of router-root path, Explain the concept of router-root...

Explain the concept of router-root path The mean router-router path is double the mean router-root path. Number levels of tree with root as 1 and the deepest level as n. The pa

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Describe peer-to-peer networking, You are requested to design a secure home...

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd