The ip addressing scheme, Computer Networking

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 32-bit IP address of the sender (source) as well as the receiver (destination).

THE IP ADDRESS HIERARCHY:

Each 32-bit Internet address is divided into two parts:

  • PREFIX:

 It shows the physical network to which the computers are attached.

  • SUFFIX:

 It shows an individual computer on the network.

The physical network in an Internet is given a unique value called as a network number. No two networks can be given the same network number and no two computers on the same network can be given the similar suffix. A suffix number can be used on more than one network.

The IP address architecture guarantees two important rules:

1. Each computer is given a unique address.

2. Although IP address assignment must be coordinated globally, suffixes may be given locally.

Posted Date: 7/31/2012 8:33:10 AM | Location : United States







Related Discussions:- The ip addressing scheme, Assignment Help, Ask Question on The ip addressing scheme, Get Answer, Expert's Help, The ip addressing scheme Discussions

Write discussion on The ip addressing scheme
Your posts are moderated
Related Questions
What is the difference among TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) permits a local host to get files from a remote host but does n

Describe in detail with example how data fragmentation works?

What is the difference between TFTP and FTP application layer protocols? Ans) TFTP - Trivial File Transfer Protocol A stripped down version of FTP, easy to use and fast. TFTP

Question 1 Write about                       Circuit Switched Networks                       Packet Switched Networks Question 2 Write about                       Protocol Indep


Can you define what is interior and exterior routing protocols?

Q. Define Metropolitan Area Network? Metropolitan Area Network (MAN) Cable Network Architecture: Overview Protocols and Standards - Set of regulations that go

Role of Software in Intranet For an Intranet to be successful, it must have strong software support. In this section, a brief description of the operating system, groupware an

What is CRC and Checksum CRC (Cyclic redudancy check) CRC, is the most powerful of the redundancy checking methods, is based on binary division. Checksum Checksum

Memory Memory Layout   BOOTROM This device stores the information of  the startup diagnostic  code in permanently. It performs diagnostics of  hardware  wh