Premium Essay

Ip Address

In: Computers and Technology

Submitted By nikkodavid02
Words 957
Pages 4
GROUP PAPER # 1

TSINFOTE: MANAGING CONCEPTS FOR INFORMATION TECHNOLOGY

Submitted To:
Professor Mennen Aracid

Submitted By:
Patrick Nicholas David

06 Aug 2013

Discussion Questions:
1. How many possible ways can an individual connect to the internet? What are the devices needed for each connection mode? How do you think the landscape will change in the next five years?

* 1st - via DSL connection provided by internet provider like PLDT or globe * analog: dial up internet access. old school * mobile or GPRS * modem connected through copper cable or fiber cable * fibre optics - broadband and leased line * satellite internet service/connection

Landscape in 5 Years:

* satellite connection * Device needed: pc, laptop, cellphone with built in wireless card that can server as a wireless hotspot * Another would be via USB dongle with sin card capable for GSM connection like 3G or LTE * devised on sunglasses or reading glasses with voice command * internet access that can be seen in your peripheral vision and can be access through brain waves. you just need some implant in the brain * IMT-Advance" which have a theoretical max speed if 1 gbit /Second

2. What is an IP address?

* IP address - a unique identifier assigned to your PC in a network connection * Internet Protocol address is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. Source: Wikipedia

a. How do you know your computer’s IP address? * command prompt then ipconfig * if you have a virtual network computing (vnc) icon, you can hover on it to see your IP address

b. How do you know you are behind a firewall? * if you cannot access sites like facebook and twitter in a certain location like the office but you can do

Similar Documents

Premium Essay

About Ip Address

...twenty-first Century, the society presented a number of important features of digital, network and information technology, it is a network as the core of the information age. To realize the information, we must rely on the perfect network, because the network will be very rapid transmission of information, and to improve the network will have to improve the construction of the network Ip address database. Because the Internet is based on the Ip address, each Ip has its physical location in theory. In the IP address of the library to do better with sina, Taobao, Tencent, pure, and 17MON and foreign IP library very much, but most famous is maxmind, they are the IP data were good collection management. This paper designed to achieve the independent Ip address library construction, through their own design procedures for the Ip address of the grab, parse, and will meet the requirements of the Ip data saved to the Mysql database. The system data sources are divided into two parts, one part is to grab the spider to grab the data through the program operation, there is a part of the artificial way to collect Ip data. In order to ensure the data coverage and accuracy for the system is operated for a long time, the spiders crawl data capture enough data, and some redundant data from databases are merged in order to improve the query efficiency of the database. This design is based on the use of Maven management projects through the background to build the springmvc framework to achieve the...

Words: 336 - Pages: 2

Premium Essay

Ip Address Classes

...IP Addresses Classes and Special-Use IP Address Space The A, B, C IP address classes were first introduced in the 1970s as the original routing scheme to organize IP addresses into manageable, recognizable chunks. They were designed to signify different sizes of networks. Class A was for large networks that didn’t need many networks but instead needed a lot of hosts. Class B was medium sized with more networks but less hosts. Class C was for small organizations that needed many networks but few hosts. This system worked well until the 1990s when, due to demand, a classless system was developed called the CIDR (classless inter domain routing) system. CIDR allows for a more flexible allocation and customization of a network’s routing system. The address spaces are as follows: Class A’s first octet ranges from 1 to 126 Class B’s first octet ranges from 128 to 191 Class C’s first octet ranges from 192 to 223 Class D’s first octet ranges from 226 to 239 and are multicast addresses comprised of either pull or push types. A first octet that starts with 127, 224 and 225 are reserved for government use and testing. RFC 1918 IP address ranges are private and can be used within any network to subnet or expand their network. They will never go over the internet and are automatically dropped by any router connected to the internet. They are as follows: Class A = 10.0.0.1 through 10.255.255.254 Class B = 172.16.0.1 through 172.31.255.254 Class C = 192.168.0.1 through 192.168...

Words: 445 - Pages: 2

Premium Essay

Ip Address Schema

...In order to properly address the Infrastructure upgrade of the Kamazon Network our group decided that an appropriate ip address schema that will take into account the idea that people will be using more than just a desktop computer. They will have tablets, laptops, departmental printers, and smart phones. This is also based upon the understanding that every Department will have at least two printers for the staff and one for the Manager/Supervisor or VP of that Department. So with that being said, we estimated that could be at least three or more accurately four ip addresses per employee. So we multiplied the number of users per department by the number of estimated devices that each employee will be using. With the rationale in mind of estimating that there would be at least 4 possible devices per user, plus three possible printers per department, and the addition of a Wireless Access Point on the Management floor, network hardware which should include the printers we previously mentioned, one router for the LAN and WAN connections, a wireless access point, 12 printers for the entire organizations printing needs, and 5 servers We determined that there had to be one File and Print server, A Directory server that is also running DNS and DHCP, an E-commerce/Database server, a Web Proxy server and a Web server. It is understood that these servers are not part of the project plan per se, but by establishing an entirely new ip address schema we must address the number of servers...

Words: 3659 - Pages: 15

Premium Essay

Ip Address Class

...IP Addresses Classes and Special-Use IP Address Space History of IP Classes. When IP was first standardized in September 1981, the specification required that each system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value. Systems that have interfaces to more than one network require a unique IP address for each network interface. To provide the flexibility required to support networks of varying sizes, the Internet designers decided that the IP address space should be divided into three address classes-Class A, Class B, and Class C. This is often referred to as classful addressing. Each class fixes the boundary between the network prefix and the host number at a different point within the 32-bit address. Class A Class A network address has an 8-bit network prefix, with the highest order bit set to 0 (zero) and a 7-bit network number, followed by a 24-bit host number. Today, Class A networks are referred to as “/8s” since they have an 8-bit network prefix. A maximum of 126 (27 -2) /8 networks can be defined. Each /8 supports a maximum of 224 -2 (16,777,214) hosts per network. Since the /8 address block contains 231 (2,147,483,648) individual addresses and the IPv4 address space contains a maximum of 232 (4,294,967,296) addresses, the /8 address space is 50 percent of the total IPv4 unicast address space. Class B Class B network address has a 16-bit network prefix, with the two highest order bits set to 1-0 and a 14-bit network number...

Words: 786 - Pages: 4

Premium Essay

Ip Address Scenario

...Unit 1 Exercise 1 IP address scenario There are many factors involved in this scenario. For example, the building may lend itself to certain network designs. You may have multiple floors or a single floor. Multiple data closets or just one. You may have virtualized servers or desktops. You will want to accommodate all these into your design. 50% may seem like too much now, but realistically, 200 or 300% might be more acurate. A simple design you can consider is 1 floor with a single data closet serving 150 users. You need: A core network Networks for your firewall, dmz, remote vpn clients, etc switch mgmt network server network voice network wireless network networks for other services you have not yet identified, like security, cameras, fire, door, video, etc You should have multiple domain servers and dhcp servers While you can get away with using high end switches for dhcp, a couple windows servers will do the trick and give more insight when you are troubleshooting Most systems can get along with dhcp, so that is fine, (some older systems still need host files) but there are support benefits to statically assigned addresses. In any case, you will want reserved space in these networks for your network devices, ie. vlans, redundant or clustered systems, etc. For you design, you could use the 10.1.0.0 address space using /21 (10.1.0.1 - 10.1.7.254) Your netmask on the devices will be 255.255.255.0 Reserve the first and last 20 or so addresses in each dhcp...

Words: 694 - Pages: 3

Premium Essay

Ip Address Scenario

...Theren Woods 9/24/2015 NT 1210 Unit 1. Exercise 1. IP Addressing Scenario A design for a 1 floor office with a single data closet serving 145 to 254 users would need a core network, networks for firewall, a switch management network, a server network, voice network, wireless network, and a network for future services to accommodate the potential 50% growth the company intends to happen. The subnet range that should be used to accommodate 145 hosts plus a potential 50% growth within the next two years should be 255.255.255.0. This subnet mask range would support 254 hosts and this particular scenario is only planning for no more than 218. The IP addresses should be statically assigned because dynamically assigned IP addresses can change each time you connect to the internet but statically assigned IP addresses are reserved for the user and don’t change over time. Statically assigned IP addresses would definitely be best for an office environment because you want the same IP addresses everyday so the computers can talk to the server and with one another daily. You should have more than one network/subnets for computers, printers, future use and other host that may be needed. If DHCP is used you should use a Windows Server because it is safer. Normally a hacker will try to penetrate your router or firewall first so if that happens they will also have your DHCP. If it is on a server that’s another added layer to try and hack...

Words: 255 - Pages: 2

Premium Essay

Nt1210 Unit 2 Ip Address

...IP addresses: Networks and hosts (http://support.microsoft.com/kb/164015) An IP address is a 32-bit number that uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network. IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation. For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32 bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits. These eight bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation. For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks do not know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is...

Words: 884 - Pages: 4

Premium Essay

Nt 2460 Ip Networking Address

...Before the eighties, computers were large and bulky. IBM and a couple of companies were leading the way towards a smaller PC and mainframes. Intel (which started in the mid-sixties) was starting their own revolution which was making a difference in the burgeoning computer environment. Microsoft and Apple were not yet there, but the biggest thing is that there was no internet. Not like we know it today. No IP Addresses as well. In the seventies, there was a beginning to networking and the IP Addresses. IP Addresses were created as the original Internet routing scheme during this period. The IEEE (The Institute of Electrical and Electronic Engineers) was instrumental in the creation of the five (5) IP Classes. As a matter of fact, these classes weren’t created to meet the needs of an ever expanding Internet. When the IEEE proposed these classes, each of the 5 classes was designed for a specific purpose. For example, Class A (0000) was designed to meet the needs of large networks. This is the reason why this class will only support 126 networks. But each network can support 16,777,214 hosts. Class B (1000) was designed for medium-sized networks. This class will support 16,384 networks and is limited to 65,534 hosts per network. Class C (1100) supports 2,097,152 networks but only 254 hosts per network. In the eighties, things started to happen. Network classes were introduced more, but subnet masks were not available as yet. It wasn’t until the nineties that subnet masks...

Words: 1232 - Pages: 5

Premium Essay

Ip Addresses Classes and Special-Use Ip Address Space

...IP Addresses Classes and Special-Use IP Address Space An IP address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier to find electronic devices connected to one another on a network. Therefore, each device in the network must have its own unique address. An IP address is like a mailing address that is used to deliver data to a computer. Some IP addresses are meant to be unique within the scope of the Internet, whereas others are meant to be unique within the scope of a specific network. When IP was first standardized in September 1981, the specification required that each system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value. Systems that have interfaces to more than one network require a unique IP address for each network interface. To provide the flexibility required to support networks of varying sizes, the Internet designers decided that the IP address space should be divided into three address classes-Class A, Class B, and Class C. This is often referred to as classful addressing. Each class fixes the boundary between the network prefix and the host number at a different point within the 32-bit address (Semeria, 2013). Class | Leading bits | Size of network number bit field | Size of rest bit field | Number of networks | Hosts per network | Start address | End address | A | 0 | 8 | 24 | 127 (2 are reserved) | 16,777,214...

Words: 630 - Pages: 3

Premium Essay

Ip Adresses Classes and Special-Use Ip Address Space

...IP ADRESSES CLASSES AND SPECIAL-USE IP ADDRESS SPACE NT2640 ENRIGHT 3/19/2016 DURAZO ENRIGHT NT2640 “Class A IP addresses were used for networks that had a large number of hosts on the network. The class permitted up to 126 networks by using the first octet of the address for the network identification. The first bit in this octet was always fixed or set to be zero. The following seven bits in the octet were then set to one which would complete the network identification” (tech faq, n.d.). In class A the most significant bits begin with a zero. In class B they begin with a 10. The class C begin with a 110. Class D IP addresses were reserved for multicasting purposes. These addresses begin with an octet in the 224-239 range. They would have leading bits of 1 1 1 0 and includes addresses from 224.0.0.0 to 239.255.255.255. I. RFC 1918 address ranges are: 10.0.0.0/8 (10.0.0.0 - 10.255.255.255) 172.16.0.0/12 (172.16.0.0 - 172.31.255.255) 192.168.0.0/16 (192.168.0.0 - 192.168.255.255) As required by RFC 1918, these addresses will never be routed outside the campus network. II. RFC 1918 addresses that IST will not route inside campus are: 10.0.0.0/12 (10.0.0.0 - 10.15.255.255) 192.168.0.0/16 (192.168.0.0 - 192.168.255.255) Campus computer users can use addresses in those two ranges however they like, confident that these addresses will not be routed by IST. ENRIGHT ...

Words: 1317 - Pages: 6

Premium Essay

Ip Addresses Classes and Special-Use Ip Address Space

...IP Addresses Classes and Special-Use IP Address Space To provide the flexibility required to support networks of varying sizes, Internet designers decided that the IP address space should be divided into three address classes-Class A, Class B, and Class C. This is often referred to as classful addressing. Each class fixes the boundary between the network prefix and the host number at a different point within the 32-bit address. One of the fundamental features of classful IP addressing is that each address contains a self-encoding key that identifies the dividing point between the network prefix and the host number. Network Address Classes Address Class | Octets Used | First Network ID | Last Network ID | Number of Networks | Class A | 1 | 1.x.y.z | 126.x.y.z | 126 | Class B | 2 | 128.0.y.z[*] | 191.255.y.z | 16,384 | Class C | 3 | 192.0.0.z | 223.255.255.z | 2,097152 | Host Address Classes Address Class | Octets Used | First Host ID | Last Host ID | Number of Hosts | Class A | 3 | w.0.0.1 | w.255.255.254 | 16,777,214 | Class B | 2 | w.x.0.1 | w.x.255.254 | 65,534 | Class C | 1 | w.x.y.1 | w.x.y.254 | 254 | Class D is reserved for IP multicast addresses. The first four high-order bits are set to 1110. The remaining 28 bits are used for individual IP multicast addresses. Multicast Backbone on the Internet (MBONE) is an extension to the Internet that supports IP multicasts and uses Class D addresses. MBONE allows a single packet to have...

Words: 539 - Pages: 3

Premium Essay

Ip Addresses Classes and Special-Use Ip Address Space

...IP Addresses Classes and Special-Use IP Address Space The history behind IP address classes can be dated back to September of 1981. With the standardization of IP, each system connected to an IP-based internet required a unique 32-bit internet address value. The first part of the address identifies the network that the host is present in, while the second part identifies that particular host. While more and more host machines are established on a particular network comes the need to properly identify each of them. All host connected to a network share the same network number (which is the first part of the address value) but must have a unique host number (second part). The only way hosts can share the same host number is if they are on 2 different networks. As years past more and more networks were established throughout the entire world. To handle the flexibility of growing networks, internet designers decided that IP address space should be divided into three address classes: Class A, Class B, and Class C. These three classes are the more publicly available classes and are the most well known. There are also two more classes that are not publicly available: classes D and E. These 2 classes are more for experimental purpose and are not issued publicly. Classes are determined by the first few binary bits of a IP address. These bits known as high-order bits are read by IP software to determine the logical network and host addresses for a device. Each class designates what...

Words: 765 - Pages: 4

Premium Essay

Ip Addresses Classes and Special-Use Ip Address Space

...To provide the flexibility required to support networks of varying sizes, internet designers decided that the IP address space should be divided into three address classes-Class A, Class B, and Class C. This is often referred to as classful addressing. Each class fixes the boundary between the network prefix and the host number at a different point within the 32-bit address. One of the fundamental features of the classful IP addressing is that each address contains a self-encoding key that identifies the dividing point between the network prefix and the host number. Network Address Classes Address Class Octets Used First Network ID Last Network ID Number of Networks Class A 1 1.x.y.z 126.x.y.z 126 Class B 2 128.0.y.z(*) 191.255.y.z 16,384 Class C 3 192.0.0.z 223.255.255.z 2,097152 Host Address Classes Address Class Octets Used First Network ID Last Network ID Number of Networks Class A 3 w.0.0.1 w.255.255.254 16,777,214 Class B 2 w.x.0.1 w.x.255.254 65,534 Class C 1 w.x.y.1 w.x.y.254 254 Class D is reserved for IP multicast addresses. The first four high-order bits are set to 1110. The remaining 28 bits are used for individual IP multicast addresses. Multicast Backbone on the Internet (MBONE) allows a single packet to have multiple destinations and is most often used in real-time audio and video...

Words: 260 - Pages: 2

Premium Essay

Ip Addresses Classes and Special-Use Ip Address Space.

...An IP address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier to find electronic devices connected to one another on a network. Therefore, each device in the network must have its own unique address. An IP address is like a mailing address that is used to deliver data to a computer. Some IP addresses are meant to be unique within the scope of the Internet, whereas others are meant to be unique within the scope of a specific network. There are three types of IP Address classes A, B, and C that were defined for universal unicast addressing. Depending on the class derived, the network identification was based on octet boundary segments of the entire address. Each class used successively additional octets in the network identifier, thus reducing the possible number of hosts in the higher order classes B and C. Class Leading bits Size of network number bit field Size of rest bit field Number of networks Addresses per network Start address End address A 0 8 24 128 (27) 16,777,216 (224) 0.0.0.0 127.255.255.255 B 10 16 16 16,384 (214) 65,536 (216) 128.0.0.0 191.255.255.255 C 110 24 8 2,097,152 (221) 256 (28) 192.0.0.0 223.255.255.255 RFC 1918 Address Allocation for Private Internets Service Providers. Efforts are in progress within the community to find long term solutions to both of these problems. Meanwhile it is necessary to revisit address allocation procedures...

Words: 377 - Pages: 2

Premium Essay

You Are't Your Ip Address

...You Aren’t Your IP-Address A simple point that may have been obvious to everyone apart from lawyers has taken years and millions of dollars to sort out … that a person and an IP Address are not one and the same. Why has something so basic at its very core taken so long to be decided by the courts, as Judge Baker seemed to do with consummate ease in VPR Internationale v. Does 1-1017 (2:11-cv-02068-HAB –DGB) in Illinois. The problem arises from the complete inability of copyright holders to penetrate the wall thrown up by IP Address technology. As such VPR sought to have to have an irrebuttable presumption established that if infringing content is downloaded via an IP-Address then the owner of that address is liable or guilty for infringement. Nonsensical at it’s core you might rightly think for it is analogous to many other areas of law where such a concept would not hold true. Just as drugs found within a home that a squatter occupies do not necessarily belong to the person on the lease, the IP address owner should be treated accordingly, especially where the ability to share an unsecured address is so simple to the modern user. Over the last few years we have seen an upsurge in cyber bullying by copyright holders seeking to shakedown companies with the threat of §512(h) federal subpoenas in order to force then to disclose IP addresses. A prime proponent of this has been Zuffa LLC against Justin.tv and Ustream.tv with regards to rebroadcasting UFC events. There have been...

Words: 555 - Pages: 3