Tcp/Ip Subnetting Essay

1044 words - 4 pages

TCP/IP Subnetting

The core components of TCP/IP are the IP address and the Subnet mask.
The entire purpose of the Subnet Mask is to show the computer where to separate the IP Address into the Network ID and the Host ID. When read in Binary, a Subnet Mask will always be a string of 1's followed by a string of 0's. The 1's cover the Network ID while the 0's cover the Host ID. The IP Address is separated between the last 1 and the first 0.
Network ID Host ID
10101010.01010101 11001100.11100011 = IP Address
11111111.11111111 00000000.00000000 = Subnet Mask

TCP/IP addresses are made up of 4 sets of numbers called "Octets." Each octet is an 8 bit binary string. The largest possible value that can be created with 8 characters in binary is 255.
There are three classes of IP Address by default. They are determined by the value of their first octet. Each Class address has a particular default Subnet Mask.
Class "A" = 1-127 Default Subnet Mask = 255.0.0.0
Class "B" = 128-191 Default Subnet Mask = 255.255.0.0
Class "C" = 192-223 Default Subnet Mask = 255.255.255.0
When viewed in Binary, you'll notice a pattern.
Class "A" always begins with a 0 00000001-01111111
Class "B" always begins with a 10 10000000-10111111
Class "C" always begins with a 110 11000000-11011111

The remaining classes (any with a value of 224 or higher in the first octet) are not used for public use, and are not considered valid.

Also, though technically a Class "A" address, 127.0.0.1 is reserved for testing purposes. It is referred to as the "Loop-Back Address." It, along with any other address beginning with 127 in the first octet, is not considered valid.

When determining Host ID's or Network ID's it is very important to remember that we cannot have an ID containing all 1's or all 0's. All 0's would be an address of 0 (nothing) and all 1's is used to broadcast to everyone within the same group.

The easiest and fastest way to determine the number of valid Hosts, Networks, or Subnets, is to count the number of bits (single space digits in Binary) in that ID, figure out the largest possible number (remembering not to use all 1's) and translate that back to decimal. For example: an address with 5 bits dedicated to the Host ID (11110) would have 30 different possible Hosts. This method works to calculate the number of Networks or Subnets as well.

The reverse of this can also be used to calculate how many bits are required for a particular number of Hosts or Subnets. For example: if we had a network that required 50 Hosts, you would determine the number of bits necessary to accommodate the required Hosts. The Binary number of 50 is 110010. 6 bits are required, which means that in reality we would have 62 Hosts (111110 = 62), however if we had tried to use only 5 bits instead of 6 we would end up with 30 Hosts per Subnet. (11110 = 30)

Subnetting is used to break a class network into a number of smaller groups of Hosts called a Subnet. For...

Find Another Essay On TCP/IP Subnetting

Denial of Service Attacks Essay

2628 words - 11 pages features in common network protocols. These attacks do not directly exploit weaknesses in TCP/IP stacks or network applications, but use the expected behavior of protocols such as TCP, UDP, and ICMP to the attacker's advantage (Clark 19). An example of this is a SYN flood in which the attacker floods the victim with TCP SYN packets. The attacker generates several SYN segments with invalid source IP addresses and sends them to a target server

Design of communication systems Essay

5286 words - 21 pages to use more than one subnet mask within the same network address space. Implementing VLSM is often referred to as subnetting a subnet and it can be used to maximize addressing efficiency. VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. Of the IP routing protocols supported by Cisco, OSPF, Dual IS-IS, RIP v2, BGP-4, and EIGRP support "classless" or VLSM

IT Security

3493 words - 14 pages Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable

When the Bubble Burst

1539 words - 6 pages By the time I arrived state side from my second tour in the Middle East the housing bubble had already burst. I noticed a drastic change in the way that many of my friends and family were living. Several of my friends that worked in real estate had sold their boats and seconds houses. My own stock portfolio had lost a third of its value. My sister and her husband had defaulted on their home mortgage leaving them scrambling for a place to live. I

phase diagram

4456 words - 18 pages Introduction: Chemical equilibrium is a crucial topic in Chemistry. To represent and model equilibrium, the thermodynamic concept of Free energy is usually used. For a multi-component system the Gibbs free energy is a function of Pressure, Temperature and quantity (mass, moles) of each component. If one of these parameters is changed, a state change to a more energetically favorable state will occur. This state has the lowest free energy

Revolutionary Work of Art

1890 words - 8 pages Walter Benjamin emphasizes in his essay, “The Work of Art in the Age of its Technological Reproducibility” that technology used to make an artwork has changed the way it was received, and its “aura”. Aura represents the originality and authenticity of a work of art that has not been reproduced. The Sistine Chapel in the Vatican is an example of a work that has been and truly a beacon of art. It has brought a benefit and enlightenment to the art

Enlightenment Thought in New Zealand Schools

1594 words - 6 pages In this essay I will be looking at how the political and intellectual ideas of the enlightenment have shaped New Zealand Education. I will also be discussing the perennial tension of local control versus central control of education, and how this has been affected by the political and intellectual ideas of the enlightenment. The enlightenment was an intellectual movement, which beginnings of were marked by the Glorious Revolution in Britain

Psychological Egoism Theory

2240 words - 9 pages The theory of psychological egoism is indeed plausible. The meaning of plausible in the context of this paper refers to the validity or the conceivability of the theory in question, to explain the nature and motivation of human behavior (Hinman, 2007). Human actions are motivated by the satisfaction obtained after completing a task that they are involved in. For example, Mother Teresa was satisfied by her benevolent actions and

How Celtic Folkore has Influenced My Family

1587 words - 6 pages Every family has a unique background that influences the way they live and interact with other people. My parents, who emigrated from Ireland to the States with my three brothers in 1989, brought over their own Celtic folklore and traditions that have helped shaped the way our family operates and lives. One aspect of folklore that has helped shape my family dynamic is the Celtic cross—both its background and what role it has played in our lives

Julia Margaret Cameron

1406 words - 6 pages At a time when women were looked upon as being homemakers, wives, mothers and such the late 1850's presented a change in pace for one woman in specific. Photography was discovered in 1826 and soon after the phenomenon of photography was being experimented with and in turn brought new and different ways of photo taking not only as documenting real time, but also conceptualizing a scene in which an image would be taken. Julia Margaret Cameron will

Evaluation of School Improvement

1403 words - 6 pages The evaluation process should be progressive to incorporate overall planning, implement changes, which contribute to success. In order to focus on school climate and norms, the evaluation design must include the students, instructions, and outcomes to improve communication and building-level concerns to be address in this response. School Climate and Social Norms The school principal, other staff leaders, and personnel set the tone and the

Similar Essays

Tcp/Ip Overview Essay

1573 words - 6 pages the machine of the application you are talking to as well as the ability to break large data sets into small packages. This protocol pair is the work horse of the modern internet. According to Microsoft this is “largely because of its ability to connect together networks of different sizes and systems of different types.” ("Understanding TCP/IP addressing and subnetting basics" September 23, 2011) Before TCP/IP came along machines had to be

Open Shortest Path First Essay

707 words - 3 pages Open Shortest Path First is one of the link-state routing protocol used in the Internet Protocol networks developed explicitly for TCP/IP Internet Environment. It is an Interior Gateway Routing Protocol defined in RFCs 1245, 1247, 1253 and 1583. The features of the OSPF protocol are as follows • Provides authentication of routing messages. • Enables load balancing by allowing traffic to be split evenly across routes with equal cost. • Type-of

E. Miller Floor Washington School Tcs

2415 words - 10 pages computer in the network and 100 Mbps to any server host in the network. Only two OSI layer 3&4 protocols will be allowed to be implemented in this network, they are TCP/IP and Novell IPX.TABLE OF CONTENTSSECTION 1 - Wide Area Network SECTION 2 - Local Area Network & Wiring Scheme SECTION 3 - District Supplied Servers and Functions SECTION 4 - Address and Network Management SECTION 5 - Security SECTION 6 - Internet Connectivity SECTION 7 - User

Cisco Tcs Wan Design Essay

6016 words - 24 pages Logical Plan 19 Appendix G - Acacia School IDF 1 Logical Plan 20 Appendix H - Acacia School IDF 2 Logical Plan 21 Appendix I - Acacia School Cable Run Overview 22 Appendix J - Acacia School Cable Runs: MDF 23 Appendix K - Acacia School Cable Runs: IDF 1 24 Appendix L - Washington School District Addressing 25 Subnetting 25 Acacia IP addressing 25 Appendix M - Washington School District Access Lists 26 District Office Access 26 Acacia LAN Access
Mia and Me – Abenteuer in Centopia | Lieqi (25) | The Guardian APK Modded