• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer.

Extracts from this document...


Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer. This public address is unique to that device and makes it possible to interact with and address that particular device. 32 bit IP addresses consist of two parts 1. the network ID identifies the network on which the host computer is found 2. the host ID specifies the specific device on the network IP's are displayed in Dotted Decimal Notation (DDN). This means that each group of 8 digits in a binary IP address (which is known as an octet) is separated by a decimal in its dotted decimal equivalent. IPv4 When IP was first created it was never envisioned that it would grow the way it did and so assigning a set number of digits for the network address and the rest of host addresses was perfectly reasonable for all networks. But soon, as IP grew in popularity, it was realised that many networks were being assigned too many hosts for their needs. This is how IP classes came about; they allow much more customisation in the number of hosts and networks available. There are five main classes: A, B and C being the most common and D and E being reserved for special purposes. Class A addresses are designed for the biggest networks. Only 8 bits at the start (and one of these is reserved to show that it's a class A address) ...read more.


This means that there is a much greater range of host device IPs instead of every network having 254, 65,000 or 16 million hosts. The problem with class allocation is that when a network needs move over the available host IDs, even if only by one device, a higher class is assigned. An example would be a Class C address which has 254 devices but wishes to add 10 more. This means a Class B address is required. This means that 65,000 host IPs are available but only 264 are being used. This means that well over 64,000 IP host addresses are being wasted! The second reason for subnetting is the large organisations that don't want to have all of their hosts on one physical network. With the use of broadcast addresses; it's possible to split the network down into much smaller physical networks with fewer hosts and still have the network work as a big network. Most of these networks are classed as supernets; which means they are subnetted outside of the usual classes- this is explained further in the next section. An excellent example of this is Google, and this is better explained in the example explained at the end of this document. For Google to have a single physical network would cause it to be slow and clumsy, instead Google relies on many servers scattered across the world. Google searches are sent to a broadcast address which is passed forward to the relevant addresses. ...read more.


Everything outside of the brackets is knocked down to the default 0 to find the network IP. When converted back to DDN we get This is Google's network address. To find out the host addresses, the same thing is done again except with the mask inverted. converted to binary is: 11011000.11101111.001(11001.01100011) The inverted mask is 13 bits: 00000000.00000000.000(11111.11111111) This leaves us: 00000000.00000000.000(11001.01100011) Translated back to DDN, this is: This is the number of hosts that Google has. So now it is possible to see that Google's server IP addresses start at and that this particular server has a (theoretical) host IP of This can be tested by adding and together, and sure enough this equals the original IP of The broadcast address for this subnet is This is the top of this range of addresses and is reserved for this purpose. To find the broadcast address of this network, we take the network IP we found earlier ( and apply the inverted subnet mask ( and carry out an XOR2 calculation. This is easily tested by carrying out a search for google.com online. The results are displayed below and show that the smallest possible address was the one first calculated and the biggest address is the broadcast address listed. 1 This is an and explanation, 2 XOR - compare two binary values. If just 1 of the values is 1 then the result is 1. If both are 1 or both are 0 then the result is 0. ?? ?? ?? ?? Page 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    It is quite hard to setup the network. Skilled technicians are needed to maintain the network. Yet the biggest disadvantage is that if the file server goes down than all the other computers on the network are affected as well. WAN This type of network covers a wider area.

  2. Unit 10 Server-side scripting of web pages part 2

    A typical modern desktop machine will have a hard disk with a capacity of between 250GB and 1TB. Data is stored onto the disk in the form of files. The master (typically C:) is the primary drive, which the computer uses to boot up, the slave (D:)

  1. ICT Sample Work India Red

    Automatic calculation of prices. Lookup food prices from the food menu. Capacity of each part of restaurant Simply look up the rooms table and show the room capacity. Calculate & display the Total cost of food. Lookup food prices from the food menu and add all the prices together, If more than one serving

  2. importance of data security and data safety

    Also you can send files such as pictures, word document and sound as attachments to your message. (a) List major threats to an organisation that could happen while using the Internet. (P9) 1. Hacking (use to steal the personal details and private files of company)

  1. Flexible Architectures in Communication Security Application

    Consequently, ciphers with performance headroom will benefit most from additional resources and issue bandwidth. For the benchmarks running at near dataflow speeds, we will have to rely on latency reduction of individual operations to improve their performance. Section 3.4 Cipher Relative Run Time Cost When attacking a bottleneck, it is

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Screens and user interface need to be in place. The module(s) implemented for the prototype system should be fully functional, but will lack some of the sophistication that you would expect to see in the fully developed coursework, such as, error trapping routines and full validation of inputs, which should be included in CP6.)

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    have read*/ wait(NULL); /*wait until a child process end*/ } } Function of the program The program will create a pipe and fork a child, then the child redirect a string to the pipe, the father read that string through the pipe.

  2. "Wireless videophones and high-speed Internet access are a reality with the world's first "Third ...

    * Imaging phones - Sending of photos and video clips to our friends on the other side of the world within seconds. * Entertainment phones - How about playing a game with friend at the other side of the globe.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work