The ip addressing scheme, Computer Networking

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 32-bit IP address of the sender (source) as well as the receiver (destination).

THE IP ADDRESS HIERARCHY:

Each 32-bit Internet address is divided into two parts:

  • PREFIX:

 It shows the physical network to which the computers are attached.

  • SUFFIX:

 It shows an individual computer on the network.

The physical network in an Internet is given a unique value called as a network number. No two networks can be given the same network number and no two computers on the same network can be given the similar suffix. A suffix number can be used on more than one network.

The IP address architecture guarantees two important rules:

1. Each computer is given a unique address.

2. Although IP address assignment must be coordinated globally, suffixes may be given locally.

Posted Date: 7/31/2012 8:33:10 AM | Location : United States







Related Discussions:- The ip addressing scheme, Assignment Help, Ask Question on The ip addressing scheme, Get Answer, Expert's Help, The ip addressing scheme Discussions

Write discussion on The ip addressing scheme
Your posts are moderated
Related Questions
The following information was obtained from a host: IP address...............205.133.127.8/24 Default Gateway...... 205.133.127.1 DNS Server.............139.100.110.10

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Write the layer on which layer does L2F, PPTP and L2TP operate?

What is Uniform Resource Locator Address of location for accessing Web pages. Clicking on an icon or "hot text" is the most common means of accessing and using a URL. Typing

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

The bitonic sorting network needed log n number of stages for performing the task of sorting the list. The first n-1 stages of the circuit are able to sort two n/2 numbers and the

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

Q. Illustrate about RSA Encryption? RSA Encryption - Public key encryption technique - Encryption steps: - Encode data to be encrypted as a number to create the pla

Verify Network Connectivity Step 1: Use the ping command to determine network connectivity. You can determine network connectivity using the ping command.  Note: If pings