• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer.

Extracts from this document...


Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer. This public address is unique to that device and makes it possible to interact with and address that particular device. 32 bit IP addresses consist of two parts 1. the network ID identifies the network on which the host computer is found 2. the host ID specifies the specific device on the network IP's are displayed in Dotted Decimal Notation (DDN). This means that each group of 8 digits in a binary IP address (which is known as an octet) is separated by a decimal in its dotted decimal equivalent. IPv4 When IP was first created it was never envisioned that it would grow the way it did and so assigning a set number of digits for the network address and the rest of host addresses was perfectly reasonable for all networks. But soon, as IP grew in popularity, it was realised that many networks were being assigned too many hosts for their needs. This is how IP classes came about; they allow much more customisation in the number of hosts and networks available. There are five main classes: A, B and C being the most common and D and E being reserved for special purposes. Class A addresses are designed for the biggest networks. Only 8 bits at the start (and one of these is reserved to show that it's a class A address) ...read more.


This means that there is a much greater range of host device IPs instead of every network having 254, 65,000 or 16 million hosts. The problem with class allocation is that when a network needs move over the available host IDs, even if only by one device, a higher class is assigned. An example would be a Class C address which has 254 devices but wishes to add 10 more. This means a Class B address is required. This means that 65,000 host IPs are available but only 264 are being used. This means that well over 64,000 IP host addresses are being wasted! The second reason for subnetting is the large organisations that don't want to have all of their hosts on one physical network. With the use of broadcast addresses; it's possible to split the network down into much smaller physical networks with fewer hosts and still have the network work as a big network. Most of these networks are classed as supernets; which means they are subnetted outside of the usual classes- this is explained further in the next section. An excellent example of this is Google, and this is better explained in the example explained at the end of this document. For Google to have a single physical network would cause it to be slow and clumsy, instead Google relies on many servers scattered across the world. Google searches are sent to a broadcast address which is passed forward to the relevant addresses. ...read more.


Everything outside of the brackets is knocked down to the default 0 to find the network IP. When converted back to DDN we get This is Google's network address. To find out the host addresses, the same thing is done again except with the mask inverted. converted to binary is: 11011000.11101111.001(11001.01100011) The inverted mask is 13 bits: 00000000.00000000.000(11111.11111111) This leaves us: 00000000.00000000.000(11001.01100011) Translated back to DDN, this is: This is the number of hosts that Google has. So now it is possible to see that Google's server IP addresses start at and that this particular server has a (theoretical) host IP of This can be tested by adding and together, and sure enough this equals the original IP of The broadcast address for this subnet is This is the top of this range of addresses and is reserved for this purpose. To find the broadcast address of this network, we take the network IP we found earlier ( and apply the inverted subnet mask ( and carry out an XOR2 calculation. This is easily tested by carrying out a search for google.com online. The results are displayed below and show that the smallest possible address was the one first calculated and the biggest address is the broadcast address listed. 1 This is an and explanation, 2 XOR - compare two binary values. If just 1 of the values is 1 then the result is 1. If both are 1 or both are 0 then the result is 0. ?? ?? ?? ?? Page 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    It is quite hard to setup the network. Skilled technicians are needed to maintain the network. Yet the biggest disadvantage is that if the file server goes down than all the other computers on the network are affected as well. WAN This type of network covers a wider area.

  2. Flexible Architectures in Communication Security Application

    8W Lisa Wu Page 44 4/22/01 nearly 30% faster than the 4-wide design. Instruction combining appears to be a beneficial feature, configurations with this capability are more than 10% faster with even smaller increases in area. Section 6.3 System Analysis of CryptoManiac There are many potential applications of the CryptoManiac processor.

  1. Unit 10 Server-side scripting of web pages part 2

    Heat sinks are generally made of an aluminium alloy. This picture shows various heat sinks used for devices like the CPU, graphics card, bridges on a motherboard and much more. Depending on how hot a device gets an extra fan may be required, the CPU, graphics card and motherboard all tend to use active heat sinks.

  2. ICT Sample Work India Red

    Capacity of room should be known by employees. Input Method: Typed using keyboard. Type/Format of Data: Price & added VAT will be currency. VAT will be % and Capacity field will be numeric. PROCESSING REQUIREMENTS Processes Details 5 Digit Quotation No. Calculation (Unique) Quotation No. (Last quotation number +1)

  1. importance of data security and data safety

    What is the difference between the Internet, Intranet and Extranet? (P8) Internet: Are public networks that allow the user to use any of its facilities. Intranet and Extranet: is like a private internet. It is like a website that is only accessible to the members of a business or company.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    This is what I will be doing. Methods of testing, > Dry Run - test every part of the program by working through it manually > Unit Test - individual testing of units > Integration Test - put every part together test the system The first test my program has to go through is the debugger in

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    have read*/ wait(NULL); /*wait until a child process end*/ } } Function of the program The program will create a pipe and fork a child, then the child redirect a string to the pipe, the father read that string through the pipe.

  2. "Wireless videophones and high-speed Internet access are a reality with the world's first "Third ...

    * Imaging phones - Sending of photos and video clips to our friends on the other side of the world within seconds. * Entertainment phones - How about playing a game with friend at the other side of the globe.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work