Nt1210

In: Computers and Technology

Submitted By mikelarry30
Words 704
Pages 3
ip address classes and special-use ip address space




IP Addresses Classes and Special-Use IP Address Space
Samuel Abraham
ITT Technical Institute









NT2460
Mr. Taylor
6/25/2013



Class A Addresses
Class A addresses are used for very large networks with millions of hosts, such as the Internet. A Class A network number uses the first 8 bits of the IP address as its network ID. The remaining 24 bits make up the host part of the IP address. The value assigned to the first byte of a Class A network number falls within the range 0 to 127. For example, consider the IP address 75.4.10.4. The value 75 in the first byte indicates that the host is on a Class A network. The remaining bytes, 4.10.4, establish the host address. An RIR assigns only the first byte of a Class A number. Use of the remaining 3 bytes is left to the discretion of the owner of the network number. Only 126 Class A networks can exist because 0 is reserved for the network, and 127 is reserved for the loopback device, leaving 1 to 126 as usable addresses. Each Class A network can accommodate up to 16,777,214 hosts. The 10.x.x.x network is reserved for use by private networks for hosts that are not connected to the Internet. If you want to assign a Class A network and you are not visible on the Internet, you can use one of these network addresses.
Class B Addresses
Class B addresses are used for medium-size networks, such as universities and large businesses with many hosts. A Class B address uses 16 bits for the network number and 16 bits for the host number. The first byte of a Class B network number is in the range 128 to 191. In the number 129.144.50.56, the first 2 bytes, 129.144, are assigned by an RIR and make up the network address. The last 2 bytes, 50.56, make up the host address and are assigned at the discretion of the network's owner. A Class…...

Similar Documents

Nt1210 Midterm Study Guide

...NT1210 Midterm Study Guide * The term troubleshooting refers to finding a problem and evaluating it so that corrective action can be taken. * Extensive digitization is a process that began in the 1960s. * Networks have more than just a physical component. * International standards-setting bodies can affect standards established in the United States. * A bus topology does not form a closed loop. * The bit interval is the duration it takes a single bit to be transmitted. * Data communications is a subset of telecommunications. * Data can include or convey graphic images, sound, or video files. * The physical layers of the OSI and TCP/IP models are very similar. * The data communications phase associated with digitization is the first phase. * The portion of an IP address from which bits are borrowed when subnetting is the host. * The transport layer ultimately passes data up to the application layer. * A MAC address is associated with the Data Link Layer. * An IP address is associated with Network Layer. * Twisted pair, Coaxial and Fiber Optic are types of cable * The capacity of a circuit to carry data is its bandwidth. * A 32-bit bus can handle four times the data bits as an 8-bit bus. * LAN resources might include software, hardware and data. * Data bits are frequently passed through pins in a connector. * Synchronous protocols are the type of data link protocols primarily used to...

Words: 355 - Pages: 2

Nt1210

...Jasmine Perez NT1210 Chapter 2 Review Questions 1. Which of the following terms is the closest synonym to the term "computer networking"? c. Datacom 2. Ann uses her email address, me@here.com , to send an email to Bob, whose email address is you@there.com The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server. 3. According to this chapter, which of the following concepts happens happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States. c. The call uses both analog and digital electrical signals. e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end to end voice call between two home telephones in the United States? a. The call uses only analog electrical signals. d. The call represents short sounds as a unique set of bits. 5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video which of the following answers is the least likely to impact the size of the video file? a. A character set 6. A student records a video of a professor teaching a class. The student plans to later post the video online on...

Words: 992 - Pages: 4

Nt1210 Final Exam Notes

...NT1210 Introduction to Networking Final Exam Notes Bonus questions from lab work: Chapter 1 12-13 15 Chapter 2 48 Chapter 3 62 Chapter 4 86 Chapter 6 132 Chapter 8 148 Chapter 9 165 Chapter 10 177 Textbook questions: Page Note 4 Byte – 8 bits 84 Essentially, link refers to any cable between two devices, and node refers to any device. 77 HTTP, the Hypertext Transfer Protocol, defines the rules by which a web browser can ask for a web page from a web server, and the rules a web server uses to send the web page back to the web browser. 107 Every standard has two important features on which this book will focus. First, a standard documents ideas. Those ideas are the ideas that matter to anyone creating products to put in a network, or ideas that matter to people building a network. 107 Beyond the ideas in a standard, people must agree to a particular version of document. 110 The TCP/IP model organizes its standards into layers. The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work* 162 Simple Direct Current Circuit Using a Battery Current 169 Encoding scheme – In networking, the encoding scheme defines the electrical equivalent: the electricity that means a 1 or a 0. *Interpreted between nodes.* 171 With full duplex, both endpoints can send at the same time...

Words: 1336 - Pages: 6

Nt1210

...Kannard Johnson Mr. Baker NT1210 April 2 2013 Unit 1 Assignment Review Questions 1) Which of the following is true about 1 bit? a. C- Represents one binary digit. 2) Which of the following terms means approximately 106 bytes? b. D- Kilobyte 3) Which answer lists the correct number of bits associated with each term? c. C- 64 bits per quadruple word 4) Which of the following answers are true about random-access memory as it is normally used inside a personal computer? d. A- Used for short-term storage e. E- Is installed on the motherboard 5) This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? f. A- The CPU tells the RAM which address holds the data that the CPU wants to read. 6) Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report? g. C- Character set. 7) Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? h. D- The binary equivalent of decimal 132456789. 8) Which of the following is not a feature of a file system that might be used with a hard drive? i. A- An actuator arm 9) Which of the following are some of the important features supplied by files as defined by a computer OS? j. A- Keeps data in order...

Words: 680 - Pages: 3

Nt1210

...NT1210 Unit 4 Labs Unit 4 Labs NT1210 8/4/14 Unit 4 Labs Lab Review: 4.1 – Page: 82 and 83 1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network. 2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade. 3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow. Lab Review: 4.2 – Page: 85 1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line. 2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket. Lab Review: 4.3 – Page: 90 1. Ease of installation, lack of certified fiber optic specialists and changes to the physical design of the network later on. 2. By limiting the devices needed depending on the distance and need of each network. Verify the number of access points needed before the start. Lab Review: 4.4 – Page: 95 1. By selecting a specific layer and testing the health you can definitively say the problem lies either below or above that layer. Example: test the Transport layers health if it is ok you know the problem is in the Application layer. 2 A. B. If the cable is damaged in any way it should be checked. ----------------------- 3...

Words: 255 - Pages: 2

Nt1210 Essay

...Robin Woodruff NT1210 8/8/2014 Mrs. Oliver 1 Comparison between Microsoft and VMware With the Microsoft Cloud OS vision, people get one consistent platform that goes beyond just virtualization, and includes management, automation, development platform, network, data, and identity. Microsoft offers a platform that supports peoples’ needs from bare metal up through applications and out to devices, including mission-critical workloads, from leading solution providers that include Microsoft, Oracle and SAP. People can choose the platform that's right for their entire business, and adapt as the needs of their business change.​ In-text reference: (Microsoft, 2014). Microsoft changes Hyper-V in each version, which creates a learning curve for IT staff with every new Windows release. In-text reference: (IT World, 2014) VMware has publically changed its product roadmaps several times over the last few years. VMware touts these changes as product evolution, but existing people are left behind with a product that might be unsupported or unfit for the future. VMware's approach is to virtualize everything, and other components like apps, management, identity, and data are viewed through that lens only, without true consideration for the benefits provided by cloud services like application portability, resiliency, and elasticity as well as a common identity platform. Unlike Windows Server and Azure, VMware is not certified and supported by Oracle. In-text reference...

Words: 572 - Pages: 3

Nt1210 Lab 3

...Mason Schwarz NT1210 1/14/15 Lab 3 Lab 3.1 The network reference models refer to the TCP and the OSI models of communication between machine and server. The TCP model has a 5 layer process, whereas the OSI model has a 7 layer process. Each is important for sending and receiving data throughout the network. Lab 3.2 The OSI reference model is a networking model that serves as communication between a client and server. This is a 7 layer process. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from one client to another. The fifth layer sets up which software should run the data. The sixth layer determines how the data is presented. The seventh layer opens the application that the data is displayed on. Lab 3.3 The TCP model is exactly the same thing as the OSI model except for the fact that the last 3 layers are shown as 1. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from sender to receiver. The fifth layer sets up which software should run the data, determines how its presented and loads the proper......

Words: 343 - Pages: 2

Nt1210

...NT1210 INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the...

Words: 1306 - Pages: 6

Nt1210 Exam

...NT1210 Exam 1 Study Guide. 1. Approximately how many bytes are in a kilobyte (KB)?megabyte(MB)? 2. What are the parts of the hard drive? 3. How are voice communications converted to digital signals? 4. What does compression do to video files? 5. In this sample Web address,http://www.itt-tech.edu which part identifies the protocol being used? 6. Is the Internet one centrally controlled and managed network? 7. What manages peripheral devices on your computer? 8. What network topologies suffer from a single point of failure? 9. Define a networking standard? 10. What standards-setting body sets de facto standards? 11. Why is the TCP/IP model divided into layers? 12. What do routers do? 13. What is “encapsulation” when talking about data? 14. In TCP/IP networks, how are nodes identified layer 2 and layer 3? 15. Define the Physical Layer? 16. What is the result of the Wi-Fi Alliance’s input on how wireless devices act? 17. Frames are associated with the Layer of the TCP/IP and OSI models. 18. How do LANs and WANs differ on the way they use to send data? 19. Why is it important to understand alternating current when learning about networks? 20. What causes full duplex to transmit and receive simultaneously? 21. What does attenuate mean when describing data signals? 22. What is an RJ-45 used for on networks? 23. Which type of fiber is better for longer distances? Why? 24. 802.11g is for what type of technology? 25. What is CSMA/CA...

Words: 537 - Pages: 3

Nt1210 Final

...NT1210 FINAL EXAM EBOOK INSTITUTE DECEMBER 11, 2014 Nt1210 Final Exam eBook Institute NT1210 FINAL EXAM DOWNLOAD: NT1210 FINAL EXAM Getting Nt1210 Final Exam is easy and simple. Mostly you need to spend much time to search on search engine and doesnt get Nt1210 Final Exam documents that you need. We are here to serve you, so you can easily access, read and download its. No need to wasting time to lookup on another place to get Nt1210 Final Exam. We provide you Nt1210 Final Exam in PDF format so you can read and download its to your computer which this file are safe and virus free. You can read this document with Adobe Acrobat or other PDF Reader. We have massive collection of documents, books, eBook and pdf files including that you are looking Nt1210 Final Exam. To access this you just need to signed up and complete its through website to open your limited access for documents that you needs. So what do you waiting for? DOWNLOAD: NT1210 FINAL EXAM Nt1210 Final Exam 2 Nt1210 Final Exam eBook Institute Final Exam Nt1210 http://ebookinstitute.net/..../final-exam-nt1210.pdf Read or Download final exam nt1210 Online. Also you can search on our online library for related final exam nt1210 that you needed. You can download PDF Document such final exam nt1210 for free ... Download Filetype: PDF | Last Update: 2014-12-11 Final Exam Nt1210 Itt Tech http://ebookinstitute.net/..../final-exam-nt1210-itt-tech.pdf Read or Download final exam nt1210 itt tech Online. Also you...

Words: 1156 - Pages: 5

Nt1210

...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the......

Words: 252 - Pages: 2

Nt1210 U6

...NT1210 Unit 6 Assignment 1 1. C 2. C 3. B, D 4. B,D 5. A 6. C 7. A, B 8. B 9. A, B 10. C 11. C 12. A 13. C 14. A, D 15. B, D 16. A, B, D 17. B 18. B 19. C, D 20. B, C Key Terms Coverage area – the space in which the wireless radio signals in one wireless LAN can effectively reach and be used to send and receive data between the WLAN’s AP’s and its clients. Shared bandwith – a term referring to how some networks must share the right to send data by taking turns, which limits the total number of bits sent by all devices (the networks total capacity). Wi-Fi – a term created by the Wi-FiAlliance as part of its overall wireless LAN branding and marketing strategy; this term has become somewhat synonymous with wireless LAN over time. LAN edge – a reference to the part of the campus LAN with the end-user devices and the switches to which they connect, through an Ethernet switch or a wireless LAN access point, that contains the largest number of physical links. WLAN hotspot – a location, typically in a business like a retailer or restaurant, where customers can come and go and where the company offers a wireless LAN plus internet access to its customers, often for free. Basic Service Set – (BSS) in wireless LANs, a single wireless access point (AP) and the client devices that send data to/from that AP. Extended Service Set – (ESS) a wireless LAN in which all devices...

Words: 470 - Pages: 2

Nt1210

...NT1210 Lab 3 3.1.1 If wireless devices where not governed by the Wi-Fi alliance it would make it hard to communicate hardware and software between different machines. That would mean cable providers, cellphone providers, and internet providers would all have to use their own Wi-Fi frequencies. Without the WI-FI alliance it would be to hard to manage day to day life with all devices not being able to share hardware and software. Also there would be no real security so it would be easy for someone to hack all of your information. 3.1.2 A model that is used to visualize something that I would use is power points. It is easier to explain something to someone when you break down the information into slides and show key points. Power points make information easier to understand. 3.1.3 Data Link Physical Application Network Transport 3.1.4 If the model is to general then you wouldn’t understand it. If the model is to granular then the data would begin to overlap itself. Review.3.1 1. The data wouldn’t be filtered correctly so there would be connection errors. 2. (OSI) started in the 1970s, with a lot of progress on individual standards in the 1980s, and with vendor products appearing by the early 1990s. It was created to compete with TCP/IP. It broke everything into layers and each layer provided facilities to the layer above it and below it. 3. (TCP)/IP resulted from research and......

Words: 334 - Pages: 2

Nt1210 Unit 8

...NT1210 Unit 8 Assignment 1 Practice #1 Give an IP address and number of bits borrowed (from the host for the subnet mask), Find the following information. Host Address 200.17.15.10 Network Class C SN Mask 255255255224 Network Address 200.17.15.0 Bits Bono wed 3 SNs Created 524288 Usable SNs | 8 | | Hosts perSN | 32 | Usable Host^N 30 | Subnet No. | Network ID | First Host IP | Last Host IP | Broadcast Address | 0 | 200.17.15.0 | 200.17.15.1 | 200.17.15.30 | 200.17.15.31 | 1 | 200.17.15.32 | 200.17.15.33 | 200.17.15.62 | 200.17.15.63 | 2 | 200.17.15.64 | 200.17.15.65 | 200.17.15.92 | 200.17.15.93 | 3 | 200.17.15.94 | 200.17.15.95 | 200.17.15.124 | 200.17.15.125 | 4 | 200.17.15.126 | 200.17.15.127 | 200.17.15.156 | 200.17.15.157 | 5 | 200.17.15.158 | 200.17.15.159 | 200.17.15.188 | 200.17.15.189 | 6 | 200.17.15.190 | 200.17.15.191 | 200.17.15.220 | 200.17.15221 | 7 | 200.17.15.222 | 200.17.15.223 | 200.17.15.252 | 200.17.15253 | Practice #2 Given an address and subnet mask, find the Following information. Host Add ness | 152.12.14.18 | Network Class | B | SN Mask | 255.255.255.240 | Net wotk Address | 152.12.14.16 | Bits Borrowed | 4 | SNsCieated | 1048576 | UsableSNs | 16 | | | Hosts perSN | 16 | Usable HosWSN | 14 | Subnet No. | Network ID | Rrst Host IP | Last Host IP | Broadcast Address | 0 | 152.12.14.16 | 152.12.14.17 | 152.12.14.30 | 152.12.14.31 | 1 | 152.12.14.32 | 152.12.14.33 | 152.12.14.46 | 152.12.14.47 | ......

Words: 473 - Pages: 2

Nt1210 Week 10 Presentation

...NT1210 Week 10 – Presentation From Week 9 Research – The Difference Between Broadband and DSL. The word “broadband” is used for any internet service that provides a continuous (always on) high-speed internet connection. DSL, which stands for digital subscriber line, is also a “broadband” connection. There are, however, different types of broadband connections that use different wiring and transmission systems to connect users to the internet. These different types are DSL, cable, fiber optic, wireless, and satellite. DSL internet uses telephone wiring to connect users to the internet. It sends data from the computer’s telephony modem to the internet service provider’s modem over the telephone lines in digital form. Cable broadband internet uses coaxial cables to transmit data from the computer’s modem to the internet service provider’s modem. Speed and quality are similar to that of DSL, though throughout history DSL speeds have been slower. Fiber-optic broadband internet uses wires made of plastic or glass to transmit data from the internet service provider to the computer. The data travels through these wires as light granting greater download and upload speeds than any of the other broadband internet types. While DSL and cable broadband internet uses wires that are already installed in the home or business, the fiber-optic broadband internet service require the installation of this type of wiring. Wireless broadband internet does not......

Words: 322 - Pages: 2