The ip addressing scheme, Computer Networking

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 32-bit IP address of the sender (source) as well as the receiver (destination).

THE IP ADDRESS HIERARCHY:

Each 32-bit Internet address is divided into two parts:

  • PREFIX:

 It shows the physical network to which the computers are attached.

  • SUFFIX:

 It shows an individual computer on the network.

The physical network in an Internet is given a unique value called as a network number. No two networks can be given the same network number and no two computers on the same network can be given the similar suffix. A suffix number can be used on more than one network.

The IP address architecture guarantees two important rules:

1. Each computer is given a unique address.

2. Although IP address assignment must be coordinated globally, suffixes may be given locally.

Posted Date: 7/31/2012 8:33:10 AM | Location : United States







Related Discussions:- The ip addressing scheme, Assignment Help, Ask Question on The ip addressing scheme, Get Answer, Expert's Help, The ip addressing scheme Discussions

Write discussion on The ip addressing scheme
Your posts are moderated
Related Questions
Introduction: This is a specialized protocol designed for CS5244. It provides a distributed means to access a BasicEnrollmentManager implementation through client-server communica

When using access lists, it is important where those access lists are placed. Which Statement best defines access list placement Ans) Put standard access lists as near the desti

Higher bandwidth Fibre  optic  cable an  support  dramatically higher bandwidths than  either   twisted pair or  coaxial  cable currently data rates  and bandwidth utilizatio

Q. Explain about line coding? Line Coding  Procedure of converting binary data to a digital signal DC Components  Residual dc (direct-current) components or

Priority and Reservation Higher priority stations may possibly access the token sooner Each station has a priority code Since token passes by station waiting to t

There are many types of servers:- a) File servers b) Database servers c) Transaction servers d)  Groupware servers e) Object servers Web servers.


features

The most difficult representatives of shared memory programming models are thread libraries present in mainly of the modern operating systems. Some examples for thread libraries ar

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c