The ip addressing scheme, Computer Networking

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 32-bit IP address of the sender (source) as well as the receiver (destination).

THE IP ADDRESS HIERARCHY:

Each 32-bit Internet address is divided into two parts:

  • PREFIX:

 It shows the physical network to which the computers are attached.

  • SUFFIX:

 It shows an individual computer on the network.

The physical network in an Internet is given a unique value called as a network number. No two networks can be given the same network number and no two computers on the same network can be given the similar suffix. A suffix number can be used on more than one network.

The IP address architecture guarantees two important rules:

1. Each computer is given a unique address.

2. Although IP address assignment must be coordinated globally, suffixes may be given locally.

Posted Date: 7/31/2012 8:33:10 AM | Location : United States







Related Discussions:- The ip addressing scheme, Assignment Help, Ask Question on The ip addressing scheme, Get Answer, Expert's Help, The ip addressing scheme Discussions

Write discussion on The ip addressing scheme
Your posts are moderated
Related Questions
Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

what role would you assign for Pentium iii, 500 MHz processor, 256 MB memory, 1o GB hard drive

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

What is a Web server? This new model of Client/Server having of thin, portable, "universal" clients that talk to super fat servers. In the easiest form, a web server returns do

Subscriber Database Core network  also hosts  the subscribers  database ( for e, g HLR in GSM systems). Subscriber  database  is accessed by core  network  nodes fro  funct

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

What is the equivalent layer or layers of the TCP/IP Application layer in terms of OSI reference model? The TCP/IP Application layer really has three counterparts on the OSI mo

Categorization according to pipeline configuration According to the configuration of a pipeline, the below categories are recognized under this classification: Unifunct

Q. Why we use numbering frames? Why numbering frames? Stop--and-wait ARQ, 1. Numbering Frames prevents the retaining of duplicate frames.. 2. Numbered acknowled