• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer.

Extracts from this document...


Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer. This public address is unique to that device and makes it possible to interact with and address that particular device. 32 bit IP addresses consist of two parts 1. the network ID identifies the network on which the host computer is found 2. the host ID specifies the specific device on the network IP's are displayed in Dotted Decimal Notation (DDN). This means that each group of 8 digits in a binary IP address (which is known as an octet) is separated by a decimal in its dotted decimal equivalent. IPv4 When IP was first created it was never envisioned that it would grow the way it did and so assigning a set number of digits for the network address and the rest of host addresses was perfectly reasonable for all networks. But soon, as IP grew in popularity, it was realised that many networks were being assigned too many hosts for their needs. This is how IP classes came about; they allow much more customisation in the number of hosts and networks available. There are five main classes: A, B and C being the most common and D and E being reserved for special purposes. Class A addresses are designed for the biggest networks. Only 8 bits at the start (and one of these is reserved to show that it's a class A address) ...read more.


This means that there is a much greater range of host device IPs instead of every network having 254, 65,000 or 16 million hosts. The problem with class allocation is that when a network needs move over the available host IDs, even if only by one device, a higher class is assigned. An example would be a Class C address which has 254 devices but wishes to add 10 more. This means a Class B address is required. This means that 65,000 host IPs are available but only 264 are being used. This means that well over 64,000 IP host addresses are being wasted! The second reason for subnetting is the large organisations that don't want to have all of their hosts on one physical network. With the use of broadcast addresses; it's possible to split the network down into much smaller physical networks with fewer hosts and still have the network work as a big network. Most of these networks are classed as supernets; which means they are subnetted outside of the usual classes- this is explained further in the next section. An excellent example of this is Google, and this is better explained in the example explained at the end of this document. For Google to have a single physical network would cause it to be slow and clumsy, instead Google relies on many servers scattered across the world. Google searches are sent to a broadcast address which is passed forward to the relevant addresses. ...read more.


Everything outside of the brackets is knocked down to the default 0 to find the network IP. When converted back to DDN we get This is Google's network address. To find out the host addresses, the same thing is done again except with the mask inverted. converted to binary is: 11011000.11101111.001(11001.01100011) The inverted mask is 13 bits: 00000000.00000000.000(11111.11111111) This leaves us: 00000000.00000000.000(11001.01100011) Translated back to DDN, this is: This is the number of hosts that Google has. So now it is possible to see that Google's server IP addresses start at and that this particular server has a (theoretical) host IP of This can be tested by adding and together, and sure enough this equals the original IP of The broadcast address for this subnet is This is the top of this range of addresses and is reserved for this purpose. To find the broadcast address of this network, we take the network IP we found earlier ( and apply the inverted subnet mask ( and carry out an XOR2 calculation. This is easily tested by carrying out a search for google.com online. The results are displayed below and show that the smallest possible address was the one first calculated and the biggest address is the broadcast address listed. 1 This is an and explanation, 2 XOR - compare two binary values. If just 1 of the values is 1 then the result is 1. If both are 1 or both are 0 then the result is 0. ?? ?? ?? ?? Page 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    It is quite hard to setup the network. Skilled technicians are needed to maintain the network. Yet the biggest disadvantage is that if the file server goes down than all the other computers on the network are affected as well. WAN This type of network covers a wider area.

  2. Unit 10 Server-side scripting of web pages part 2

    Very much, I think this feature alone makes Windows 7 stand above the rest. #2 Taskbar A remake of the old taskbar that introduced some new features such as pinning, this allows you to pin a application to the taskbar (similar to Mac dock)

  1. ICT Sample Work India Red

    Telephone/ Telephone No. Between 0 and 15 characters long. 02476735929 024767359291233 (15 chars) 0247673512333 (16 chars) Company Name/Company Name between 0 and 30 characters Intime Consultants BLANK Intime Consultantssssssssssssss(31 chars) Address Line 1/ Field Presence Check 11 Prince's Avenue 1 (1 char)

  2. importance of data security and data safety

    The spreading of viruses (use to destroy or damage the important files of company) 3. Internet fraud (taking credit card details from customers) 4. Spay ware (is biggest threat in the computer system which allows someone to log into your computer and use it for their own purpose) 5.

  1. Flexible Architectures in Communication Security Application

    Breakdown of Cipher Operations. Lisa Wu Page 25 4/22/01 Chapter 4 Architectural Extensions Figure 8 lists the additions we made to the instruction set to support fast execution of symmetric secret-key ciphers. A number of important considerations drove the design of these instructions.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    THEN // If logon file dosnt exist then create it BEGIN REWRITE (logonfile); // Creates external file which will store logon data firstrun.username:='admin'; // Assign username to temp variable firstrun.password:='change'; // Assign password to temp variable firstrun.fullname:='administrator'; // Assign full name to temp variable WRITE (logonfile, firstrun); // Write the

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    Structure of the program 1. The child process (!fork()) redirect a string "token" to the pipe then the parent process read a string "token" from the pipe. 2. The wait(NULL) - will tell the father process to wait for the child process stop.

  2. "Wireless videophones and high-speed Internet access are a reality with the world's first "Third ...

    * Imaging phones - Sending of photos and video clips to our friends on the other side of the world within seconds. * Entertainment phones - How about playing a game with friend at the other side of the globe.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work