IP and its properties address space subnetting with real time example

Computer Network | 28 comments

What is IP and its properties

“IP” stands for Internet Protocol where data is sent by which the method or protocol from one computer to another.  Actually, each computer on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. An IP address is a unique global address for a network interface.

IP is an real life example of the postal system. It allows you to address a package and drop it in the system, but there’s no direct link between you and the recipient. TCP/IP, in contrast, creates a connection between two hosts, so that they can send messages back and forth for a period of time.

TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.

Two (2) IP addressing standards are in use today. The IPv4 standard is most familiar to people and supported everywhere on the Internet, but the newer IPv6 standard is gradually replacing it.

  • IPv4 addresses consist of four (4) bytes (32 bits)
  • IPv6 addresses are sixteen (16) bytes (128 bits) long.

IP Address space

An IPv4 address is a 32-bit or  4 byte address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.

An IPv4 address consists of four numbers, with a single dot (.) separating each number or set of digits.

Each of the four numbers can range from 0 to 255.

An address space is the total number of addresses used by the protocol. If a protocol uses N bits to define an address, the address space is  2N  because each bit can have two different values (0 or 1) and N bits can have 2N  values.

IPv4 uses 32-bit addresses, which means that the address space is 232  or 4,294,967,296 (more than 4 billion).

  • There are two prevalent notations to show an IPv4 address:

(1) Binary notation and

(2) Dotted decimal notation.

Binary Notation:

01110101   10010101   00011101   00000010

Dotted-Decimal Notation:   117.  149.  29.  2

Classful Addressing

IPv4 addressing, at its inception, used the concept of classes. This architecture is called classful addressing. In classful addressing, the address space is divided into five classes: A, B, C, D, and E.

Class Binary Decimal
A 0 0-127
B 1o 128-191
C 110 192-223
D 1110 224-239
E 1111 240-255

 

 

Class Start address End Address
A  0.0.0.0 127.255.255.255
B 128.0.0.0 191.255.255.255
C 192.0.0.0 223.255.255.255
D 224.0.0.0 239.255.255.255
E 240.0.0.0 255.255.255.255

 

Exercise

  1. 193.14.56.22

The first byte is 193 (between 192 and 223); the class is C.

  1. 14.23.120.8

The first byte is 14 (between 0 and 127); the class is A.

In classful addressing, an IP address of class A, B and C is divided into two parts : Netid and Hostid.

The netid and hostid are of varying lengths that is varies on depending on the class of the address.

Netid(n): The part of an IP address that identifies the network.

Hostid(32-n): The part of an IP address that identifies a host in a network.

Class Net Id Host Id Start address End Address
A 8 24 0.0.0.0 127.255.255.255
B 16 16 128.0.0.0 191. 255.255.255
C 24 8 192.0.0.0 223. 255.255.255
D Not define 224.0.0.0 239. 255.255.255
E Not define 240.0.0.0 255. 255.255.255

Class A address

  • If the first decimal number in IP address is 0 to 127, then it is a class A address.
  • Class A IP addresses use the 1st 8 bits (1st Octet) to designate the Network address.
  • The 1st bit which is always a 0, is used to indicate the address as a Class A address & the remaining 7 bits are used to designate the Network.
  • The other 3 octets contain the Host address.
  • There are 128 (27) Class A Network Addresses, but because addresses with all zeros aren’t used & address 127 is a special purpose address, 126 Class A Networks are available.
  • formula to compute the number of hosts available in any of the class addresses, where “n” represents the number of bits in the host portion:
  • (2n – 2) = Number of available hosts
  • For a Class A network, there are:
  • 224 – 2 or 16,777,214 hosts.
  • Half of all IP addresses are Class A addresses.
  • You can use the same formula to determine the number of Networks in an address class.
  • , a Class A address uses 7 bits to designate the network, so (27 – 2) = 126 or there can be 126 Class A Networks.

Class B IP Addresses

 

  • If the first decimal number in IP address is 128 to 191, then it is a class B address.
  • Class B addresses use the 1st 16 bits (two octets) for the Network address.
  • The last 2 octets are used for the Host address.
  • The 1st 2 bit, which are always 10, designate the address as a Class B address & 14 bits are used to designate the Network. This leaves 16 bits (two octets) to designate the Hosts.
  • So how many Class B Networks can there be?

Using our formula, (214 – 2), there can be 16,382 Class B Networks & each Network can have (216 – 2) Hosts, or 65,534 Hosts

 

 

Class C IP address

  • If the first three bits of the address are 1 1 0, it is a class C network address.
  • The first three (3) bits are class identifiers.
  • The next 21 bits are for the network address.
  • The last eight (8) bits  identify the host.
  • There are millions of class C network numbers.
  • However, each class C network can have 254 hosts.
Class Number of Blocks/ Networks Block size/ Address per block Start address End Address Application
A 128(27) 16,777,216(224) 0.0.0.0 127.255.255.255 Unicast
B 16384(214) 65536(216) 128.0.0.0 191. 255.255.255 Unicast
C 2097152(221) 256(28) 192.0.0.0 223. 255.255.255 Unicast
D 224.0.0.0 239. 255.255.255 Multicast
E 240.0.0.0 255. 255.255.255 Multicast

 

Mask

the form /n where n can be 8, 16, or 24 in classful addressing. This notation is also called slash notation or Classless Interdomain Routing (CIDR) notation.

  • the length of the netid and hostid (in bits) is predetermined in classful addressing, we can also use a mask.
  • Default Mask:
Class  Dotted-Decimal Mask
A 255.0.0.0 /8

Example: 10.25.11.27/8

B 255.255.0.0 /16

Example: 192.25.11.27/16

C 255.255.255.0 /24

Example: 224.25.11.27/24

 

The next article give example of subnetting, Now do practice with blog Subnetting with real time example

Chapter 6: Software Testing with example Process

What is Testing? Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. In simple words, testing is executing a system in order to identify any gaps, errors, or missing...

Chapter – 4: Project management with Example Procedures.

Project management Software project management is an essential part of software engineering. Projects need to be managed because professional software engineering is always subject to organizational budget and schedule constraints. The project manager‘s job is to...

You may find interest following article

Chapter 6: Software Testing with example Process

What is Testing? Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. In simple words, testing is executing a system in order to identify any gaps, errors, or missing requirements in contrary to the actual requirements. According to ANSI/IEEE 1059 standard, Testing can be...

Chapter-5: Cost Estimation Tutorial in Software Engineering

Cost Estimation Tutorial Cost is s strategic concept in software development for the following reasons: Project management: Estimating cost is extremely crucial in carrying out project management activities such as scheduling, planning and control.Feasibility Study: Making investment decisions regarding software projects requires full cost breakdown and analysis...

Chapter – 4: Project management with Example Procedures.

Project management Software project management is an essential part of software engineering. Projects need to be managed because professional software engineering is always subject to organizational budget and schedule constraints. The project manager‘s job is to ensure that the software project meets and overcomes these constraints as well as delivering...

Chapter -3: Agile Software Development Method Process

Agile Software Development Although there are many approaches to rapid software development, they share some fundamental characteristics: The processes of specification, design, and implementation are interleaved. There is no detailed system specification, and design documentation is minimized or generated automatically by the programming environment used to...

Chapter 2: Software processes with various model

Objectives: understand the concepts of software processes and software process models;have been introduced to three generic software process models and when they might be used;know about the fundamental process activities of software requirements engineering, software development, testing, and evolution;understand why processes should be organized to cope with...

Frequency Word for IELTS Listening

Frequency Word for IELTS Listening School a. Library  WordSentence1. Shelf 2. Librarian 3. The stacks 4. Return 5. Fine 6. Magazine 7. Copier  8. Overdue  9. Reading room  10. Reference room  11. Periodical room  12. Study lounge  13. Catalogue  14....

Chapter 8: Gantt chart Project Development in SDLC

Gantt chart Project DevelopmentSchedule (project management) The project scheduleis the tool that communicates what work needs to be performed, which resources of the organization will perform the work and the timeframes in which that work needs to be performed. The project scheduleshould reflect all of the work associated with delivering the project on time....

Chapter 7: Feasibility Analysis in Software Develoment Life Cycle.

Feasibility AnalysisWhat is Feasibility Analysis?? An analysisand evaluation of a proposed project to determine if it (1) is technically feasible, (2) is feasible within the estimated cost, and (3) will be profitable for Organization. Feasibility analysis guides the organization in determining whether to proceed with the project. Feasibility analysis also identifies...

Chapter 6: Data Flow Diagram in Software Development Life Cycle.

Data Flow Diagram What is DFD? A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system, modelling its process aspects.A DFD is often used as a preliminary step to create an overview of the system, which can later be elaborated.Show users how data moves between different processes in a system. Figure 1: DFD Symbols...

Chapter 5: System request on SDLC

System Request In most organizations, project initiation begins by preparing a  system request. A  system request is a document that describes the business reasons for building a system and the value that the system is expected to provide.The project sponsor usually completes this form as part of a formal system project selection process within the...

Chapter 4: SDLC design Phase

SDLC design Phase DFD (Design Analysis)Architectural DesignUI DesignDatabase DesignProgram DesignArchitectural design (logical)Network designClient –server designClient designServer designCloud ComputingDatabase designER diagramRelational diagramDDL (not now..!!)Program design (physical)Investigating the hardware/software platformPhysical DFDData storageData...

Chapter 3: SDLC and its Life cycle Phases.

What is SDLC? The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system. Career Paths for System Developers Systems Development Life Cycle Building...

Chapter 2: SDLC Key Features For SYSTEMS ANALYST.

Once upon a time, software development consisted of a programmer writing code to solve a problem or automate a procedure. Nowadays, systems are so big and complex that teams of architects, analysts, programmers, testers and users must work together to create the millions of lines of custom-written code that drive our enterprises.To manage this, a number of system...

Chapter 1: System analysis and Design Overview.

System analysis, a method of studying a system by examining its component parts and their interactions. •It provides a framework in which judgments of the experts in different fields can be combined to determine what must be done, and what is the best way to accomplish it in light of current and future needs.  •The system analyst (usually a software engineer or...

Chapter 4: Concept Of Sampling, Quantization And Resolutions

Concept Of Sampling, Quantization And Resolutions Conversion of analog signal to digital signal: The output of most of the image sensors is an analog signal, and we can not apply digital processing on it because we can not store it. We can not store it because it requires infinite memory to store a signal that can have infinite values. So we have to convert an...

Chapter 3: Images and Conversions in Digital Image Process

Images And Conversions There are many type of images, and we will look in detail about different types of images, and the color distribution in them. The binary image The binary image as it name states, contain only two pixel values. 0 and 1. In our previous tutorial of bits per pixel, we have explained this in detail about the representation of pixel values to...

Chapter 2: Concept of Pixel in Digital Image Process

Concept of Pixel Pixel Pixel is the smallest element of an image. Each pixel correspond to any one value. In an 8-bit gray scale image, the value of the pixel between 0 and 255. The value of a pixel at any point correspond to the intensity of the light photons striking at that point. Each pixel store a value proportional to the light intensity at that particular...

Part 6: IELTS Academic Writing Task 1 For Diagram/Graph Vocabulary

Vocabulary to show the sequence: You must write a summary of at least 150 words in response to a specific graph (bar, line, or pie graph), table, chart, or procedure in Writing Task 1 of the IELTS Academic test (how something works, how something is done). This job assesses your ability to choose and report the most important aspects, describe and compare data,...

Part 5: IELTS Academic Writing Task 1 Formal and Informal expressions.

Formal and Informal expressions and words: You must write a summary of at least 150 words in response to a specific graph (bar, line, or pie graph), table, chart, or procedure on the IELTS Academic test (how something works, how something is done). Few more informal expressions with their formal versions are given below. Since IELTS is a formal test, your writing...