SlideShare a Scribd company logo
IP ADDRESSING Developed by Peter Smith
The 32-bit IP address is broken up into 4 octets, which are arranged into a dotted-decimal notation scheme. An octet is a set of 8 bits & not a musical instrument. Example of an IP version 4: 172.64.126.52 Peter Smith 2 Octets
IP addresses are divided into 5 classes, each of which is designated with the alphabetic letters A to E. Class D addresses are used for multicasting. Class E addresses are reserved for testing & some mysterious future use. Peter Smith 3 IP Address Classes
The 5 IP classes are split up based on the value in the 1st octet: Peter Smith 4 IP Address Classes
Using the ranges, you can determine the class of an address from its 1st octet value. An address beginning with 120 is a Class A address, 155 is a Class B address & 220 is a Class C address. Peter Smith 5 IP Address Classes
Peter Smith 6 Network & Host Representation By IP Address Class  Class Octet1 Octet2 Octet3 Octet4 Class A Network Host Host Host Class B Network Network Host Host Class C Network Network Network Host Are You the Host or the Network? The 32 bits of the IP address are divided into Network & Host portions, with the octets assigned as a part of one or the other.
Each Network is assigned a network address & every device or interface (such as a router port) on the network is assigned a host address. There are only 2 specific rules that govern the value of the address.  Peter Smith 7 Are You the Host or the Network? (Cont.)
A host address cannot be designated by all zeros or all ones. These are special addresses that are reserved for special purposes. Peter Smith 8 Are You the Host or the Network? (Cont.)
Class A IP addresses use the 1st 8 bits (1st Octet) to designate the Network address. The 1st bit which is always a 0, is used to indicate the address as a Class A address & the remaining 7 bits are used to designate the Network. The other 3 octets contain the Host address.  Peter Smith 9 Class A Addresses
There are 128 Class A Network Addresses, but because addresses with all zeros aren’t used & address 127 is a special purpose address, 126 Class A Networks are available. Peter Smith 10 Class A Addresses
There are 16,777,214 Host addresses available in a Class A address. Rather than remembering this number exactly, you can use the following formula to compute the number of hosts available in any of the class addresses, where “n” represents the number of bits in the host portion:  (2n – 2) = Number of available hosts Peter Smith 11 Class A Addresses
For a Class A network, there are: 224 – 2 or 16,777,214 hosts.  Half of all IP addresses are Class A addresses. You can use the same formula to determine the number of Networks in an address class. Eg., a Class A address uses 7 bits to designate the network, so (27 – 2) = 126 or there can be 126 Class A Networks.  Peter Smith 12 Class A Addresses
Class B addresses use the 1st 16 bits (two octets) for the Network address. The last 2 octets are used for the Host address. The 1st 2 bit, which are always 10, designate the address as a Class B address & 14 bits are used to designate the Network.  This leaves 16 bits (two octets)  to designate the Hosts.  Peter Smith 13 Class B IP Addresses
So how many Class B Networks can there be? Using our formula, (214 – 2), there can be 16,382 Class B Networks & each Network can have (216 – 2) Hosts, or 65,534 Hosts. Peter Smith 14 Class B IP Addresses
Class C addresses use the 1st 24 bits (three octets) for the Network address & only the last octet for Host addresses.the 1st 3 bits of all class C addresses are set to 110, leaving 21 bits for the Network address, which means there can be 2,097,150(221 – 2) Class C Networks, but only 254 (28 – 2) Hosts per Network. Peter Smith 15 Class C IP Addresses
Peter Smith 16 IP Address Chart
A few addresses are set aside for specific purposes. Network addresses that are all binary zeros, all binary ones & Network addresses beginning with 127 are special Network addresses. Peter Smith 17 Special Addresses
Peter Smith 18 Special Addresses
Within each address class is a set of addresses that are set aside for use in local networks sitting behind a firewall or NAT (Network Address Translation) device or Networks not connected to the Internet. Peter Smith 19 Special Addresses
A list of these addresses for each IP address class: Peter Smith 20 Private IP Addresses

More Related Content

What's hot

Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
vssnsarma
 
Mesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet Tracer
Maksudujjaman
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
AYESHA JAVED
 
Ip address
Ip addressIp address
Ip address
Ip address Ip address
Ip address
Yash Bansal
 
Ipv4 header
Ipv4 headerIpv4 header
Ipv4 header
Pouyan Zamani
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMSkoolkampus
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
Shashank Asthana
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
kristinatemen
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
Upendra Sengar
 
Sub Netting
Sub NettingSub Netting
Sub Netting
Lilesh Pathe
 
Data model and entity relationship
Data model and entity relationshipData model and entity relationship
Data model and entity relationship
Knowledge Center Computer
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
Ip address
Ip addressIp address
Ip address
MdAnikKhan
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
junnubabu
 
All processors
All processorsAll processors
All processors
ALI RAZA
 
File system
File systemFile system
File system
Harleen Johal
 
Database - Entity Relationship Diagram (ERD)
Database - Entity Relationship Diagram (ERD)Database - Entity Relationship Diagram (ERD)
Database - Entity Relationship Diagram (ERD)
Mudasir Qazi
 

What's hot (20)

Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Mesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet Tracer
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Ip address
Ip addressIp address
Ip address
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Ip address
Ip addressIp address
Ip address
 
Ip address
Ip address Ip address
Ip address
 
Ipv4 header
Ipv4 headerIpv4 header
Ipv4 header
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Data model and entity relationship
Data model and entity relationshipData model and entity relationship
Data model and entity relationship
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Ip address
Ip addressIp address
Ip address
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
All processors
All processorsAll processors
All processors
 
File system
File systemFile system
File system
 
Database - Entity Relationship Diagram (ERD)
Database - Entity Relationship Diagram (ERD)Database - Entity Relationship Diagram (ERD)
Database - Entity Relationship Diagram (ERD)
 

Similar to Ip Addressing

Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
Kashif Sohail
 
Pjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easyPjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easy
Naresh Gotad
 
IP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.pptIP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.ppt
gadisaAdamu
 
ip addressing_&_subnetting_made_easy
 ip addressing_&_subnetting_made_easy ip addressing_&_subnetting_made_easy
ip addressing_&_subnetting_made_easy
Manjit Singh
 
Ip address
Ip address Ip address
Ip address
tanvirahmed638
 
-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdf-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdf
AreshZabi
 
IP and MAC Address
IP and MAC AddressIP and MAC Address
IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
nandiaditi2010
 
Classful ip address (ip address picture book 4 from visual land animations)
Classful ip address (ip address picture book 4 from visual land animations)Classful ip address (ip address picture book 4 from visual land animations)
Classful ip address (ip address picture book 4 from visual land animations)
vl11111
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4
Hossam El-Deen Osama
 
chapter 6.pptx
chapter 6.pptxchapter 6.pptx
chapter 6.pptx
MelkamtseganewTigabi1
 
chapter 5 (1).ppt
chapter 5 (1).pptchapter 5 (1).ppt
chapter 5 (1).ppt
shucaybcabdi
 
IP and MAC addressing
IP and MAC addressingIP and MAC addressing
IP and MAC addressing
ShohanaakterKakon
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Jayesh Chauhan
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
SintayehuBeyene2
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
Rathodpradip1
 
AN-Unit-1-1-Classful-Internet-Addresses.pdf
AN-Unit-1-1-Classful-Internet-Addresses.pdfAN-Unit-1-1-Classful-Internet-Addresses.pdf
AN-Unit-1-1-Classful-Internet-Addresses.pdf
kaxeca4096
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptx
KISHOYIANKISH
 
Ip and mac addressing
Ip and mac addressingIp and mac addressing
Ip and mac addressing
nafisarayhana1
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
Ronoh Kennedy
 

Similar to Ip Addressing (20)

Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
Pjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easyPjsmith ip addressing_&_subnetting_made_easy
Pjsmith ip addressing_&_subnetting_made_easy
 
IP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.pptIP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.ppt
 
ip addressing_&_subnetting_made_easy
 ip addressing_&_subnetting_made_easy ip addressing_&_subnetting_made_easy
ip addressing_&_subnetting_made_easy
 
Ip address
Ip address Ip address
Ip address
 
-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdf-LAB 3-IP Addressing and Subnettinncgbg.pdf
-LAB 3-IP Addressing and Subnettinncgbg.pdf
 
IP and MAC Address
IP and MAC AddressIP and MAC Address
IP and MAC Address
 
IP Address & Its Classes .pdf
IP    Address   &   Its    Classes  .pdfIP    Address   &   Its    Classes  .pdf
IP Address & Its Classes .pdf
 
Classful ip address (ip address picture book 4 from visual land animations)
Classful ip address (ip address picture book 4 from visual land animations)Classful ip address (ip address picture book 4 from visual land animations)
Classful ip address (ip address picture book 4 from visual land animations)
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4
 
chapter 6.pptx
chapter 6.pptxchapter 6.pptx
chapter 6.pptx
 
chapter 5 (1).ppt
chapter 5 (1).pptchapter 5 (1).ppt
chapter 5 (1).ppt
 
IP and MAC addressing
IP and MAC addressingIP and MAC addressing
IP and MAC addressing
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Ch7 IP addressing.pptx
Ch7 IP addressing.pptxCh7 IP addressing.pptx
Ch7 IP addressing.pptx
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
 
AN-Unit-1-1-Classful-Internet-Addresses.pdf
AN-Unit-1-1-Classful-Internet-Addresses.pdfAN-Unit-1-1-Classful-Internet-Addresses.pdf
AN-Unit-1-1-Classful-Internet-Addresses.pdf
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptx
 
Ip and mac addressing
Ip and mac addressingIp and mac addressing
Ip and mac addressing
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 

More from swascher

Resume interview tips
Resume interview tipsResume interview tips
Resume interview tipsswascher
 
RVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant PresentationRVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant Presentation
swascher
 
Elevator speeches
Elevator speechesElevator speeches
Elevator speechesswascher
 
Cis142fall2011
Cis142fall2011Cis142fall2011
Cis142fall2011
swascher
 
Strategic plan 2.9.11
Strategic plan 2.9.11Strategic plan 2.9.11
Strategic plan 2.9.11swascher
 
Newspaper January 2010
Newspaper January 2010Newspaper January 2010
Newspaper January 2010swascher
 
Rti Booklet
Rti BookletRti Booklet
Rti Bookletswascher
 
Binary Review
Binary ReviewBinary Review
Binary Reviewswascher
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introductionswascher
 
Ip Addressing Worksheets
Ip Addressing WorksheetsIp Addressing Worksheets
Ip Addressing Worksheetsswascher
 
Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheetswascher
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Subnetting A Network
Subnetting A NetworkSubnetting A Network
Subnetting A Networkswascher
 
IP Addressing Principles
IP Addressing PrinciplesIP Addressing Principles
IP Addressing Principlesswascher
 

More from swascher (15)

Resume interview tips
Resume interview tipsResume interview tips
Resume interview tips
 
RVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant PresentationRVC DOL TAACCCT Grant Presentation
RVC DOL TAACCCT Grant Presentation
 
Elevator speeches
Elevator speechesElevator speeches
Elevator speeches
 
Feb23
Feb23Feb23
Feb23
 
Cis142fall2011
Cis142fall2011Cis142fall2011
Cis142fall2011
 
Strategic plan 2.9.11
Strategic plan 2.9.11Strategic plan 2.9.11
Strategic plan 2.9.11
 
Newspaper January 2010
Newspaper January 2010Newspaper January 2010
Newspaper January 2010
 
Rti Booklet
Rti BookletRti Booklet
Rti Booklet
 
Binary Review
Binary ReviewBinary Review
Binary Review
 
Subnetting Introduction
Subnetting IntroductionSubnetting Introduction
Subnetting Introduction
 
Ip Addressing Worksheets
Ip Addressing WorksheetsIp Addressing Worksheets
Ip Addressing Worksheets
 
Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheet
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Subnetting A Network
Subnetting A NetworkSubnetting A Network
Subnetting A Network
 
IP Addressing Principles
IP Addressing PrinciplesIP Addressing Principles
IP Addressing Principles
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Ip Addressing

  • 1. IP ADDRESSING Developed by Peter Smith
  • 2. The 32-bit IP address is broken up into 4 octets, which are arranged into a dotted-decimal notation scheme. An octet is a set of 8 bits & not a musical instrument. Example of an IP version 4: 172.64.126.52 Peter Smith 2 Octets
  • 3. IP addresses are divided into 5 classes, each of which is designated with the alphabetic letters A to E. Class D addresses are used for multicasting. Class E addresses are reserved for testing & some mysterious future use. Peter Smith 3 IP Address Classes
  • 4. The 5 IP classes are split up based on the value in the 1st octet: Peter Smith 4 IP Address Classes
  • 5. Using the ranges, you can determine the class of an address from its 1st octet value. An address beginning with 120 is a Class A address, 155 is a Class B address & 220 is a Class C address. Peter Smith 5 IP Address Classes
  • 6. Peter Smith 6 Network & Host Representation By IP Address Class Class Octet1 Octet2 Octet3 Octet4 Class A Network Host Host Host Class B Network Network Host Host Class C Network Network Network Host Are You the Host or the Network? The 32 bits of the IP address are divided into Network & Host portions, with the octets assigned as a part of one or the other.
  • 7. Each Network is assigned a network address & every device or interface (such as a router port) on the network is assigned a host address. There are only 2 specific rules that govern the value of the address. Peter Smith 7 Are You the Host or the Network? (Cont.)
  • 8. A host address cannot be designated by all zeros or all ones. These are special addresses that are reserved for special purposes. Peter Smith 8 Are You the Host or the Network? (Cont.)
  • 9. Class A IP addresses use the 1st 8 bits (1st Octet) to designate the Network address. The 1st bit which is always a 0, is used to indicate the address as a Class A address & the remaining 7 bits are used to designate the Network. The other 3 octets contain the Host address. Peter Smith 9 Class A Addresses
  • 10. There are 128 Class A Network Addresses, but because addresses with all zeros aren’t used & address 127 is a special purpose address, 126 Class A Networks are available. Peter Smith 10 Class A Addresses
  • 11. There are 16,777,214 Host addresses available in a Class A address. Rather than remembering this number exactly, you can use the following formula to compute the number of hosts available in any of the class addresses, where “n” represents the number of bits in the host portion: (2n – 2) = Number of available hosts Peter Smith 11 Class A Addresses
  • 12. For a Class A network, there are: 224 – 2 or 16,777,214 hosts. Half of all IP addresses are Class A addresses. You can use the same formula to determine the number of Networks in an address class. Eg., a Class A address uses 7 bits to designate the network, so (27 – 2) = 126 or there can be 126 Class A Networks. Peter Smith 12 Class A Addresses
  • 13. Class B addresses use the 1st 16 bits (two octets) for the Network address. The last 2 octets are used for the Host address. The 1st 2 bit, which are always 10, designate the address as a Class B address & 14 bits are used to designate the Network. This leaves 16 bits (two octets) to designate the Hosts. Peter Smith 13 Class B IP Addresses
  • 14. So how many Class B Networks can there be? Using our formula, (214 – 2), there can be 16,382 Class B Networks & each Network can have (216 – 2) Hosts, or 65,534 Hosts. Peter Smith 14 Class B IP Addresses
  • 15. Class C addresses use the 1st 24 bits (three octets) for the Network address & only the last octet for Host addresses.the 1st 3 bits of all class C addresses are set to 110, leaving 21 bits for the Network address, which means there can be 2,097,150(221 – 2) Class C Networks, but only 254 (28 – 2) Hosts per Network. Peter Smith 15 Class C IP Addresses
  • 16. Peter Smith 16 IP Address Chart
  • 17. A few addresses are set aside for specific purposes. Network addresses that are all binary zeros, all binary ones & Network addresses beginning with 127 are special Network addresses. Peter Smith 17 Special Addresses
  • 18. Peter Smith 18 Special Addresses
  • 19. Within each address class is a set of addresses that are set aside for use in local networks sitting behind a firewall or NAT (Network Address Translation) device or Networks not connected to the Internet. Peter Smith 19 Special Addresses
  • 20. A list of these addresses for each IP address class: Peter Smith 20 Private IP Addresses