Premium Essay

Subnetting and Ipv4 Addresses

In:

Submitted By barrymc67
Words 2448
Pages 10
Project Description

Implement an appropriate addressing scheme, to subnet an IP address for different sized subnets.

Introduction

I have undertaken this project for the module network models and technologies. The project requires me to implement addressing schemes and to subnet an IP address for different sized subnets. The following topics will also be discussed: * Binary * HEX & decimal number systems * Octet, IP Address, IPv4/IPv6 * Subnet Mask * Network and Host IDs * Address Classes, classful and classless address schemes * Minimising wasteful use of IP addresses * CIDR * Subnetting * VLSM * Health and Safety * Evaluation * Bibliography

Binary
Computers see things in terms of binary. In binary everything is described as having two values or states: on or off, true or false, 1 or 0 and yes or no. A light switch could be regarded as a binary system, since it is always either on or off. As complex as they might seem computers can be regarded as a box full of light switches. Each switch is called a bit which is short for binary digit and a computer can turn each of these bits on or off.
The computer describes 1 as being on and 0 as being off. By itself, a single bit is kind of useless, as it can only represent one of two things. Imagine if you could only count using either zero or one. Alone, you could never count past one. On the other hand, if you got a bunch of friends together who could also count using zero or one and you added all your friends’ ones together, your group of friends could count as high as they wanted, dependent only on how many friends you had.
Computers work in the exact same way. By arranging bits in groups, the computer is able to describe more complex ideas than just on or off. The most common arrangement of bits in a group is called a byte, which is a group of eight

Similar Documents

Premium Essay

The History of Ipv4 and Beginning of Ipv6

...The History of IPv4 And Beginning of IPv6 Mathew J. Jones ITT Technical Institute IPv6 is the future of Internet Protocol, but first, it is important to recognize and identify IPv4 and talk a little about its history. The history of IPv6 is also something that needs to be discussed as even though it has not been implemented yet, it does have a brief history. Also, we can compare and contrast the two Internet Protocols with the advantages and disadvantages of both. There will also be mention of DHCP, and how DHCP servers can be configured to use IPv6. First, it is important to talk about the history of IPv4, but first IP’s, or Internet Protocol, main principle is routing network packets. This essentially creates internetworking, which establishes the Internet. In IP, or at the IP level, the main task is to deliver packets from the host to the destination host. But to do this the host and the destination host needs an address, and this is where IPv4 (and later IPv6) comes into play. IPv4 was then created to hand this, “In the 1980s, when the Internet went live to the public, IPv4 was the fourth revision of Internet Protocol, and the first offered to the public. IPv4 is the general standard of delivery of information between devices connected to the Internet.” (Dooly, 2013) After this, the Department of Defense eventually took on IPv4 as it’s own preferred method. It became the universal method of addressing of the world. IPv4 uses a 32-bit address of numbers and...

Words: 935 - Pages: 4

Premium Essay

Checkpoint Tcp/Ip

...Checkpoint: TCP/IP LAN Plan 1. An IPv6 address is made up of how many bits? a. 32 b. 48 c. 64 d. 128 e. 256 The answer to this question is d. Ipv6 address has 128 bits which is better than Ipv4 which has only 32 bit addresses. If I understand it with Ipv4 the amount of addresses will soon run out. With Ipv6 as stated in the book unless every star in the universe were assigned an address it is unlikely to run out of addresses. With Ipv4 it was stated that there are only 4 billion possible addresses. With Ipv6 there are 3.4x10^38 or 34 followed by 37 zeroes. Ipv6 resolves some problems found in Ipv4 such as limited addresses, security, sometimes complicated setup and quality of service (QoS). QoS describes the ability of a network to prioritize data packets based on the type of information. Ipv6 makes the handling of special packets easier to implement, such as applications that use video or audio. Whereas Ipv4 uses a dotted decimal in 8 bit sections, Ipv6 uses a hexadecimal format in 16 bit sections. At first I was a bit confused over what this meant and looking at the address example further confused me. Then after further reading I discovered that each 16 bit section was ended with a colon. It was explained that there are three sections to the address they are public topology, a site topology, and an interface identifier. If I am right then the address giving in the book would break down like this: 2001:DB8:0:0:0:2ed3:340:ab The first 3 16 bit sections 2001:DB8:0: represent...

Words: 1749 - Pages: 7

Premium Essay

Unknown

...| | | | Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses contained in the packet. IP defines packet structures that encapsulate the data to be delivered and defines the addressing used to identify the source and destination information. IP is a service in the connection-oriented Transmission Control Protocol (TCP) – thus it is often referred to as the TCP/IP Suite. Two versions of IP: IP Version | Number Format | # of Bits | Example | | | | | | | | | Subnets/Subnetting Subnetting is the practice of dividing a large network into two or more smaller networks (subnets) – this is typically done to improve manageability and performance. Subnet Methods | | | | | Classful: Classful subnetting is a method for allocating IP addresses using five classes of...

Words: 1730 - Pages: 7

Premium Essay

It 240 Week4

...Chapter 5 Questions (Subnetting) Brian M. Robinson IT/240 February 1, 2013 Derrick Sorrells Chapter 5 Questions (Subnetting) 1. An IPv6 address is made up of how many bits? An Ipv6 address is made up of 128 bits. Because IPv6 has 128 bits, instead of the 32 bits that IPv4 has, the need for private addressing is eliminated. This is because IPv6 has 3.4 x 10^38 addresses, compared to the 4 billion addresses that IPv4 has. This is more than enough IP addresses to handle the needs of networking for the foreseeable future and beyond. 2. The subnet mask of an IP address does which of the following? The subnet mask defines network and host portions of an IP address. The most important task performed by subnetting is that it helps determine whether the host is communicating with computer that is on the same network, or subnet, or a different network or subnet. The distinction matters because if the host is talking to a computer on the same subnet, then no router is needed. If the two are on separate subnets, then the router must then be involved to facilitate communications. 4. Which of the following is a private IP address and can’t be routed across the Internet? a. 192.156.90.100 b. 172.19.243.254 c. 11.200.99.180 d. 221.24.250.207 e. 12.12.12.12 The IP address 172.19.243.254 is a private address and cannot be routed across the internet. For Class A, addresses beginning with 10; for Class B, addresses starting with 172.16 and running through 172.31; and for Class...

Words: 824 - Pages: 4

Premium Essay

Final

...NT1210 Final Exam Review 8 to 10 Introducing the Internet Protocol (IP)  TCP/IP Model review: Layers 1 and 2 Protocols Example LAN/WAN Standards and Types in the TCP/IP Model 2 Figure 8-1 Introducing the Internet Protocol (IP)  TCP/IP Model review: Upper layers define non-physical (logical) networking functions Various Perspectives on the TCP/IP Model and Roles 3 Figure 8-2 Introducing the Internet Protocol (IP)  Network Layer protocols  IP: Most important protocol defined by Network layer  Almost every computing device on planet communicates, and most use IP to do so  Network layer also defines other protocols 4 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 1 Name ICMP ARP DHCP DNS Full Name Comments Messages that hosts and routers use to manage Internetwork Control and control packet forwarding process; used by Message Protocol ping command Address Resolution Used by LAN hosts to dynamically learn Protocol another LAN host’s MAC address Dynamic Host Used by host to dynamically learn IP address Configuration Protocol (and other information) it can use Allows hosts to use names instead of IP Domain Name address; needs DNS server to translate name System/Service into corresponding IP address (required by IP routing process) Other TCP/IP Network Layer Protocols Table 8-1 5 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 2 Name Full Name ...

Words: 9644 - Pages: 39

Premium Essay

Ccna Chapter 6

...questions: What are the differences between classful and classless IP addressing? What is VLSM, and what are the benefits of classless IP addressing? ■ ■ What is the role of the classless interdomain routing (CIDR) standard in making efficient use of scarce IPv4 addresses? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary at the end of the book. classful IP addressing page 280 prefix aggregation page 285 network prefix page 286 contiguous page 294 discontiguous address assignment page 280 supernet page 280 private addressing page 281 high-order bits page 282 supernetting page 294 This is a prepublication draft of the manuscript. The final book will publish in December and will be available for purchase at http://www.ciscopress.com/title/9781587132063. raft Manuscript Draft Ma cript Draft Manuscript Dra Manuscript Draft Manuscri raft Manuscript Draft Ma uscript Draft Manuscript raft Manuscript Draft Ma script Draft Manuscript D ft Manuscript Draft Manu ript Draft Manuscript Dra Manuscript Draft Manuscri t Draft Manuscript Draft M nuscript Draft Manuscript 280 Routing Protocols and Concepts, CCNA Exploration Companion Guide Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address, limiting the Internet—then known as ARPANET—to 256 networks. Early on, it became obvious that this was not going to be enough address space. In...

Words: 10468 - Pages: 42

Premium Essay

Computer Networks and Ip Addressing

...value of the Internet and the number of sites connected to the Internet. As the Internet grows, the value of each site's connection to the Internet increases because it provides the organization with access to an ever expanding user/customer population. Internet Scaling Problems Over the past few years, the Internet has experienced two major scaling issues as it has struggled to provide continuous and uninterrupted growth: - The eventual exhaustion of the IPv4 address space - The ability to route traffic between the ever increasing number of networks that comprise the Internet The first problem is concerned with the eventual depletion of the IP address space. The current version of IP, IP version 4 (IPv4), defines a 32-bit address which means that there are only 232 (4,294,967,296) IPv4 addresses available. This might seem like a large number of addresses, but as new markets open and a significant portion of the world's population becomes candidates for IP addresses, the finite number of IP addresses...

Words: 7368 - Pages: 30

Premium Essay

Yemsy

...address indicates where it is. A route indicates how to get there."[2] The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address, was developed in 1995.[3] IPv6 was standardized as RFC 2460 in 1998,[4] and its deployment has been ongoing since the mid-2000s. IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6). The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities. IP versions Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6. Each version defines an IP address differently. Because of its prevalence, the generic term IP address typically still refers to the addresses defined by IPv4. The gap in version sequence between IPv4 and...

Words: 660 - Pages: 3

Premium Essay

Ipv6

...generation internet protocol that is in the making of taking over the current internet protocol which is IPv4 or Internet Protocol version 4. Continue reading to learn more about IPv6. “The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. With the unprecedented expansion of Internet usage in recent years - especially by population dense countries like India and China. The impending shortage of address space (availability) was recognized by 1992 as a serious limiting factor to the continued usage of the Internet run on IPv4. With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns. IPv6 uses a128-bit address size compared with the 32-bit system used in IPv4 and will allow for as many as 3.4x1038 possible addresses, enough to cover every inhabitant on planet earth several times over. The 128-bit system also provides for...

Words: 950 - Pages: 4

Premium Essay

Studyguide for Nt1210 Mid Term

...1230 Client server Topics • Transmission Control Protocol (TCP)/Internet Protocol (IP) for Wired and Wireless Networks • The Open Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to support any and all types of networked communications • TCP/IP was developed as part of the ARPAnet project in the 1960’s (the early development of the current Internet) • TCP/IP became a unifying and reliable element that enabled interoperability across incompatible systems • One of TCP/IP's most basic yet critical functions is its preparation of application data for transmission across a network. • TCP/IP accepts data of virtually any size from applications (typically in the form of a file) and chops it up into smaller, more manageable chunks called segments (segmentation) • In communicating, TCP handles flow control, IP handles addressing • Being a suite of different protocols, TCP/IP includes such protocols as DNS, DHCP, http, ftp, POP3, SMTP and TELNET. Other TCP protocols may be found at http://www.protocols.com/pbook/tcpip1.htm The Open Systems Interconnections (OSI) Model The most common way to illustrate the communication...

Words: 1931 - Pages: 8

Premium Essay

Ipv4 and Ipv6

...Corlynn Wright IT 221 Mr. H 9/19/13 Introduction to Networking Concepts Fill in the Blank 1. The most widely used IP addressing scheme is IPv4 2. The most recent and largest address space IP addressing scheme is IPv6 3. To distribute IP addresses automatically, a network administrator would configure the DHCP service. Dynamic Host Configuration Protocol (DHCP) 4. The first attempt at breaking up IP address space used classfull addressing to provide address ranges of differing sizes. 5. Prior to the introduction of the Domain Name System, computers used HOSTS files to map human-readable named to IP addresses. 6. A(n) subnet mask is used to separate the host address portion of an IP address from the network address. 7. The subnet mask within the TCP/IP configuration is used to distinguish the network address from the host address. 8. In dotted-decimal notation, each IPv4 address is broken up into four octets. 9. Server computers and other systems that need to be accessed reliably by network clients should be configured with a(n) static IP address 10. The method of breaking up IP address space into address ranges of flexible size is called Classless Inter-Domain Routing (CIDR) Multiple Choice 1. What must each host on a TCP/IP network be configured with in order to communicate with other hosts? IP address 2...

Words: 418 - Pages: 2

Premium Essay

Ip Addresses Classes and Special-Use Ip Address Space

...IP Addresses Classes and Special-Use IP Address Space The history behind IP address classes can be dated back to September of 1981. With the standardization of IP, each system connected to an IP-based internet required a unique 32-bit internet address value. The first part of the address identifies the network that the host is present in, while the second part identifies that particular host. While more and more host machines are established on a particular network comes the need to properly identify each of them. All host connected to a network share the same network number (which is the first part of the address value) but must have a unique host number (second part). The only way hosts can share the same host number is if they are on 2 different networks. As years past more and more networks were established throughout the entire world. To handle the flexibility of growing networks, internet designers decided that IP address space should be divided into three address classes: Class A, Class B, and Class C. These three classes are the more publicly available classes and are the most well known. There are also two more classes that are not publicly available: classes D and E. These 2 classes are more for experimental purpose and are not issued publicly. Classes are determined by the first few binary bits of a IP address. These bits known as high-order bits are read by IP software to determine the logical network and host addresses for a device. Each class designates what...

Words: 765 - Pages: 4

Premium Essay

Itm 310

...For example the listing in Ch2 in the following indicates that start on page 42 where the OSI Model starts and study up to 55 (refer to the book pages). Ch 2: Networking Standards and the OSI Model • The OSI Model o Application Layer o Presentation Layer o Session Layer o Transport Layer o Network Layer o Data Link Layer o Physical Layer Ch 4: Introduction to TCP/IP Protocols • IPv4 Addressing o Subnet Mask • IPv6 Addressing • Assigning IP Addresses o DHCP (Dynamic Host Configuration Protocol) o Private and Link-Local Addresses Ch 6: Network Hardware, Switching, and Routing • Repeaters and Hubs • Bridges • Switches o Switching Methods o VLANs and Trunking o STP (Spanning Tree Protocol) • Routers o Router Characteristics and Functions o Routing Protocols Ch 7: Wide Area Networks • PSTN • X.25 and Frame Relay • T-Carriers o Types of T-Carriers o T-Carrier Connectivity • DSL (Digital Subscriber Line) • Broadband Cable • ATM Ch 9: In-Depth TCP/IP Networking • Designing TCP/IP-Based Networks o Subnetting o CIDR (Classless Interdomain Routing) o Subnetting in IPv6 o Internet Gateways o Address Translation • TCP/IP Mail Services o SMTP o MIME o POP o IMAP • Additional TCP/IP Utilities o Ipconfig o Nbtstat o Hostname, Host, and Nslookup o Traceroute (Tracert) Ch 10: Virtual Networks and Remote Access • Remote Access and Virtual Computing o Dial-Up Networking o Remote Access Servers o Remote Access Protocols • VPNs (Virtual...

Words: 346 - Pages: 2

Premium Essay

Asdf

... * OSI model * TCP/UDP ix. Connection oriented/connectionless x. Windowing * Types of destinations xi. Unicast xii. Broadcast xiii. Multicast * Cables xiv. Ethernet xv. Serial * Duplex 2. TCP/IP * OSI model * TCP/IP or DOD model * DHCP * Basic port numbers * TCP xvi. virtual circuits (three-way handshake) xvii. Headers * UDP xviii. Headers * IP xix. Headers * Frame xx. Header * ICMP * ARP * RARP * Proxy ARP 3. IP addressing / Subnetting /VLSM / Summarization * Binary to decimal * IP address classes * CIDR * IP Subnet Zero * Subnetting * VLSM * Summarization 4. Router interface * Router components * Modes * Configuration register * Keyboard shortcuts 5. IOS management * Boot up sequence * Configuration saves and loads * SSH * resolving hostnames 6. dynamic routing * ip address support xxi. classful xxii. classless * types of routing protocols xxiii. distance vector * Split Horizon * Infinite Metric (Poison Reverse) xxiv. link state xxv. hybrid routing (EIGRP) * Routing protocols (show commands) xxvi. Directly Connected:...

Words: 458 - Pages: 2

Premium Essay

Ipv6

...different colors in. Could they make it any more difficult to remember? When it comes to Secret, Top Secret, TS/SCI, and above networks how are the network engineers supposed to build, maintain, and expand their networks at the same pace as with IPv4? I mean you can’t write the Secret IP’s or subnets down, well you’re not supposed to anyway. Of course they will have classified documents and network diagrams and notebooks, but that kind of stuff would have to be kept in a safe and you would have to go through a whole process just to take a look at your books. With all that said, I will have to give them credit for developing an IP format that will have a ton more addresses and will take so much longer to exhaust and is much more secure than its predecessor. Ok, with that part out of the way let’s take a look at the history of IPv6. The need for a new version of the so widely used internet protocol came out of the explosion of internet capable devices and the growing population of consumers that have or will have home computers, laptops, or any of a number of mobile wi-fi capable devices. The years which have passed since the publishing of IPv4 in 1981 has shown the IETF just how much and how quickly the number of IP addresses were being consumed....

Words: 1846 - Pages: 8