Class | IP Range | Start bits | Number of Networks | Number of Hosts | Total Address space |
---|---|---|---|---|---|
A | 0.0.0.0 - 127.255.255.255 | 0 | 128(two reserved) | 16777216 ( |
2147483648 ( |
B | 128.0.0.0 - 191.255.255.255 | 10 | 16384 ( |
65356 ( |
1073741824 ( |
C | 192.0.0.0 - 223.255.255.255 | 110 | 2097152 ( |
256 ( |
536870912 ( |
D | 234.0.0.0 - 239.255.255.255 | 1110 | |||
E | 240.0.0.0 - 247.255.255.255 | 1111 |
Class | IP address Range | Formatting |
---|---|---|
A | 0.0.0.0 127.255.255.255 | 0NNNNNNN. HHHHHHHH.HHHHHHHH.HHHHHHHH |
B | 128.0.0.0 191.255.255.255 | 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH |
C | 192.0.0.0 223.255.255.255 | 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH |
D | 234.0.0.0 239.255.255.255 | MULTICASTING |
E | 240.0.0.0 247.255.255.255 | EXPERIMENTAL |
Class D - A multicast (one-to-many) is different from a broadcast (one-to-al). Every device on a logical network must process a broadcast, whereas only devices configured to listen for a Class D address receive a multicast.
Class E - Class E addresses are reserved for experimental purposes and should not be used to address hosts or multicast groups.
IP address range 127.0.0.0 to 127.255.255.255 is reserved.
This is for the loopback address network and local host.
Allows for a device to send and receive its own data packet
Allows for analysis like testing and debugging, or allowing routers to communicate in specific ways
$ cat /etc/hosts
127.0.0.1 localhost
::1 localhost
127.0.0.2 vakare
::1 vakare
What is this class is this address and its dotted decimal notation:
237.210.79.35
Class B
165.56.21.134
35.189.47.148
192.168.1.136
Netmasks defines how large a network can be, this help limit the number of devices that can connect to your network. i.e., the number of the available address
Can help distinguish between network and host within the IP address.
Classless Inter-Domain Routing (CIDR)/Netmask was designed by the Internet Engineering Task Force (IETF) to slow down the exhaustion of addresses and chaotic routing tables.
CIDR (e.g., /32)is the number of the bit from the left
Size of Subnet Mask it's 32 bits
IP Address | Netmask | Description | Netmask Length or CIDR |
---|---|---|---|
192.168.55.161 | 255.255.255.255 | Only applies to 192.168.55.161 | /32 (4 octets) |
192.168.55.0 | 255.255.255.0 | Applies to the range 192.168.55.0-255 | /24 |
192.168.55.240 | 255.255.255.240 | Applies to the range 192.168.55.240-255 | /28 |
192.168.0.0 | 255.255.0.0 | Applies to the range 192.168.0-255.0-255 | /16 |
So lets look at the binary subnet mask, we can see that /## denotes the number of ones masked off which means only the addresses not masked are available to that network.
IP/CIDR | Binary Mask | Number of Hosts |
---|---|---|
192.168.55.161/32 | 11111111.11111111.11111111.11111111 | 1 |
192.168.55.0/24 | 11111111.11111111.11111111.00000000 | 256 |
192.168.55.240/28 | 11111111.11111111.11111111.11110000 | 16 |
192.168.55.161/24 | 11111111.11111111.11111111.00000000 | 256 |
192.168.0.0/16 | 11111111.11111111.00000000.00000000 | 65536 |
192.168.2.1/29 | 11111111.11111111.11111111.11111000 | 8 |
The IP addresses range is from 21.19.35.64 and 21.19.35.127. Find the CIDR block?
CIDR block is 21.19.35.64/26
So lets look at the binary subnet mask, we can see that /## denotes the number of ones masked off which means only the addresses not masked are available to that network.
237.210.79.35/32
192.168.1.136/24
192.101.5.0/19
It is the address used to identify a specific network. It represents the beginning of a range of IP addresses assigned to devices (hosts) within that network.
The network address is obtained by performing a logical AND
operation between an IP address and its corresponding subnet mask.
This operation effectively "masks out"
the host portion of the IP address, leaving only the network portion intact
All host bits are 0
IP Address: 192.168.1.100
Subnet Mask: 255.255.255.0
Convert IP Address to Binary: IP=11000000.10101000.00000001.01100100
Convert Subnet Mask to Binary: SNM= 11111111.11111111.11111111.00000000
Perform Logical AND Operation:
Network Address: 192.168.1.0
The broadcast address is used to send data packets to all devices within a specific network. It represents the end of the range of IP addresses assigned to devices within that network
Invert Subnet Mask to get Wildcard Mask: 00000000.00000000.00000000.11111111
Perform Logical OR Operation:
OR
=
Broadcast Address: 192.168.1.255
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP and OSI are the most widely used communication networking protocols.
![bg right:40% 100%](../../figures/physical.png)
## Specialised Devices 1 **Switches** Switches connect and help to internally secure computers, printers, servers, and other devices to networks in homes or organisations ![width:1OO% height:90 center](../../figures/switch.png) **Access Points** Access points are switches that connect devices to networks without the use of cables ![width:1OO% height:100 center](../../figures/accesspoint.png.jpeg) --- ## Specialised Devices 1 Switches/Access Points identify a connected computer by its Media Access Control (MAC) address. ![width:1OO% height:200px center](../../figures/MAC-Address.png) - MAC 12-digit hexadecimal numbers (48 bits in length) – MM:MM:MM:SS:SS:SS - M is the manufactor's id and S is the unique id per device - 00:0a:95:9d:68:16 this is the Network Interface Card (NIC) ---
Manages the mapping between logical addresses and physical addresses, for IP addresses, this is accomplished through Address Resolution Protocol or ARP
## Specialised Devices 2 ![bg right:40% 100%](../../figures/router.png) **Routers** - Connect networks to other networks and act as dispatchers. - They analyse data to be sent across a network, choose the best routes for it, and send it on its way. - Routers connect your home and business to the world and help protect information from outside security threats - Routers connect your home and business to the world and help protect information from outside security threats <!--Routers identify a connected computer by is network assigned Internet Protocol (IP) address. IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255 xxx.xxx.xxx.xxx -> 192.168.1.0
For example, say you are ordering something from an online store. These transactions are typically handled in a secure transmission which means that the data passing between the “store” or the Website Application will transmit encrypted data to the Presentation layer that will need to be decrypted and processed
All of those interactive applications provide a set of services that allow the application layer to supply data to and receive data from the Presentation layer
Encapsulation and Decapsulation. These terms refer to how data is moved through the layers from top to bottom when sending and from bottom to top when receiving. As the data is handed from layer to layer, each layer adds the information it requires to accomplish its goal before the complete datagram is converted to 1s and 0s and sent across the wire. For example: Layer 4 will add a TCP header which would include a Source and Destination port Layer 3 will add an IP header which would include a Source and Destination IP address Layer 2 would add an Ethernet header which would include a Source and Destination MAC address
<p align=center> 192.168.0.1 </p> <p align=center> 11000000.10101000.00000000.00000001 </p>