• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer.

Extracts from this document...


Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer. This public address is unique to that device and makes it possible to interact with and address that particular device. 32 bit IP addresses consist of two parts 1. the network ID identifies the network on which the host computer is found 2. the host ID specifies the specific device on the network IP's are displayed in Dotted Decimal Notation (DDN). This means that each group of 8 digits in a binary IP address (which is known as an octet) is separated by a decimal in its dotted decimal equivalent. IPv4 When IP was first created it was never envisioned that it would grow the way it did and so assigning a set number of digits for the network address and the rest of host addresses was perfectly reasonable for all networks. But soon, as IP grew in popularity, it was realised that many networks were being assigned too many hosts for their needs. This is how IP classes came about; they allow much more customisation in the number of hosts and networks available. There are five main classes: A, B and C being the most common and D and E being reserved for special purposes. Class A addresses are designed for the biggest networks. Only 8 bits at the start (and one of these is reserved to show that it's a class A address) ...read more.


This means that there is a much greater range of host device IPs instead of every network having 254, 65,000 or 16 million hosts. The problem with class allocation is that when a network needs move over the available host IDs, even if only by one device, a higher class is assigned. An example would be a Class C address which has 254 devices but wishes to add 10 more. This means a Class B address is required. This means that 65,000 host IPs are available but only 264 are being used. This means that well over 64,000 IP host addresses are being wasted! The second reason for subnetting is the large organisations that don't want to have all of their hosts on one physical network. With the use of broadcast addresses; it's possible to split the network down into much smaller physical networks with fewer hosts and still have the network work as a big network. Most of these networks are classed as supernets; which means they are subnetted outside of the usual classes- this is explained further in the next section. An excellent example of this is Google, and this is better explained in the example explained at the end of this document. For Google to have a single physical network would cause it to be slow and clumsy, instead Google relies on many servers scattered across the world. Google searches are sent to a broadcast address which is passed forward to the relevant addresses. ...read more.


Everything outside of the brackets is knocked down to the default 0 to find the network IP. When converted back to DDN we get This is Google's network address. To find out the host addresses, the same thing is done again except with the mask inverted. converted to binary is: 11011000.11101111.001(11001.01100011) The inverted mask is 13 bits: 00000000.00000000.000(11111.11111111) This leaves us: 00000000.00000000.000(11001.01100011) Translated back to DDN, this is: This is the number of hosts that Google has. So now it is possible to see that Google's server IP addresses start at and that this particular server has a (theoretical) host IP of This can be tested by adding and together, and sure enough this equals the original IP of The broadcast address for this subnet is This is the top of this range of addresses and is reserved for this purpose. To find the broadcast address of this network, we take the network IP we found earlier ( and apply the inverted subnet mask ( and carry out an XOR2 calculation. This is easily tested by carrying out a search for google.com online. The results are displayed below and show that the smallest possible address was the one first calculated and the biggest address is the broadcast address listed. 1 This is an and explanation, 2 XOR - compare two binary values. If just 1 of the values is 1 then the result is 1. If both are 1 or both are 0 then the result is 0. ?? ?? ?? ?? Page 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    It is quite hard to setup the network. Skilled technicians are needed to maintain the network. Yet the biggest disadvantage is that if the file server goes down than all the other computers on the network are affected as well. WAN This type of network covers a wider area.

  2. Unit 10 Server-side scripting of web pages part 2

    All modern CPUs need a heat sink and most heat sinks require a fan. A heat sink without a fan is called a passive heat sink; a heat sink with a fan is called an active heat sink. Heat sinks are generally made of an aluminium alloy.

  1. ICT Sample Work India Red

    The automatically produced quotation should have similar formatting to the current quotation produced and this quotation should be printable for hard copy usage. HOW THE SOLUTION IS TO WORK Based on the requirements the best software for this would be Visual Basic.

  2. importance of data security and data safety

    * What is a browser? Is programme that can read web pages, by downloading HTML code and that allows the browser to interpret the code to the web page. A browser displays web pages, keeps track of where you've been, and remembers the places you want to return to, the most used browsers are Internet Explorer and Netscape Navigator.

  1. Flexible Architectures in Communication Security Application

    The last experiment (DF) shows the scalability of cipher kernel performance. In these experiments, the original code is executed on a dataflow machine. We found these results quite surprising, Blowfish, IDEA, and RC6 are running within 20% of dataflow machine performance.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    length which will allow me to declare all of these strings as just one string. Doing this will enable me to use the string to find a persons information when required, like a link between the two record files. Section 3.6 - Processing stages * Describe the algorithms for the program(s)

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    { int p[2]; char bu[30]; pipe(p); /*create a pipe for ipc*/ if (!fork()) { /*create a child*/ printf(" C: writing\n"); write(p[1], "token", 5); /*Redirect to pipe p[1]*/ printf(" C: bye\n"); exit(0); } else { printf("P: reading\n"); read(p[0], bu, 5); /*read from the pipe p[0]*/ printf("P: [%s]\n", bu); /*print out what

  2. "Wireless videophones and high-speed Internet access are a reality with the world's first "Third ...

    * Imaging phones - Sending of photos and video clips to our friends on the other side of the world within seconds. * Entertainment phones - How about playing a game with friend at the other side of the globe.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work