Preview

Nt2460 Unit 1 Assignment

Good Essays
Open Document
Open Document
762 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt2460 Unit 1 Assignment
Jason Simpson
NT2460 Friday 6pm
Unit 1 Assignment 1
IP Addresses Classes and Special-Use IP Address Space
Class A Addresses
Feature
Value
First octet range
1 to 127
Default subnet mask
255.0.0.0
IP address breakdown
n.h.h.h*
Number of class A networks
126
Number of hosts per network
16,777,214 (224 – 2)
*n = network, h = host

Class B Addresses
Feature
Value
First octet range
128 to 191
Default subnet mask
255.255.0.0
IP address breakdown
n.n.h.h*
Number of class A networks
16,384
Number of hosts per network
65,534 (216 – 2)
*n = network, h = host

Class C Addresses
Feature
Value
First octet range
192 to 223
Default subnet mask
255.255.255.0
IP address breakdown
n.n.n.h*
Number of class A networks
2,097,152
Number of hosts per network
254
…show more content…
These addresses are commonly used for home, office, and enterprise local area networks (LANs), when globally routable addresses are not mandatory, or are not available for the intended network applications. Under IPv4, the private IP address spaces were originally defined in an effort to delay IPv4 address exhaustion, but they are also a feature of IPv6, the next generation Internet Protocol.
The most common use of private addresses is in residential networks, since most Internet service providers (ISPs) only allocate a single publicly routable IP address to each residential customer, but many homes have more than one computer or other Internet connected device, such as smartphones. In this situation, a network address translator (NAT/PAT) gateway is usually used to provide Internet connectivity to multiple hosts.
Private addresses are also commonly used in corporate networks, which for security reasons, are not connected directly to the Internet. Often a proxy, SOCKS gateway, or similar devices are used to provide restricted Internet access to network-internal
…show more content…
If seen on the public internet, these packets cannot actually originate as claimed, or be delivered. However, certain reserved addresses can be routed using multicast, or on private networks, local links, or loopback interfaces, depending on which special-use range they fall within.
Martian packets commonly arise from IP address spoofing in denial-of-service attacks, but can also arise from network equipment malfunction or misconfiguration of a host.
The name is derived from packet from Mars, a place where packets clearly cannot originate.
Bogon filtering is the practice of filtering bogons, which are bogus IP addresses. Bogon is also an informal name for an IP packet on the public Internet that claims to be from an area of the IP address space reserved, but not yet allocated or delegated by the Internet Assigned Numbers Authority (IANA) or a delegated Regional Internet Registry (RIR). The areas of unallocated address space are called the bogon space.
References
Clarke, Glen E. (2011) CCENT Certification All-In-One For Dummies. Indianapolis, IN:

You May Also Find These Documents Helpful

  • Better Essays

    Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter.…

    • 1103 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    It uses IP addresses because it allows to config your setting easier and it would allow you to customize your setting.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The RIRs divide their allocated address pools into smaller blocks and delegate them in their respective operating regions to Internet service providers and other organizations. Since the introduction of the CIDR system, IANA typically allocates address space in the size of /8 prefix blocks for IPv4 and /23 to /12 prefix blocks from the 2000::/3 IPv6 block to requesting regional registries as needed.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    So that you can find the correct proper device when troubleshooting a particular issue. Also using a static IP can dial into the computer that is having any direct issues.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    DHCP eliminates the need to assign static IP addresses by allowing a server to assign addresses to devices as they connect to the network.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    IPv4 addresses are commonly represented using what is called dotted-decimal notation, in which the decimal value of each byte is shown, using periods to separate the bytes.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    Network software uses this when my IP does not match any routes on routing chart.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP address: A 32-bit binary number, often written in the DDN format, that hosts use as their unique identifier in a TCP/IP network, much like a postal mailing address in the postal system.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    lab 6

    • 252 Words
    • 2 Pages

    4. Through command window determine the cause of the network connection loss using the IP configuration. Next renew the connection lost.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    4. Why do you think the world is running out of IPv4 addresses? The depletion of the pool of unallocated Internet Protocol Version 4 (IPv4) addresses. The world is running out of IPv4 addresses since people are increasing and the addresses are limited.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Sec572 Research Paper

    • 587 Words
    • 3 Pages

    These packets are sent through the network by routers. There are lots of protocols-Ethernet, TCP, or whatever, but they all work basically the same way. Routers look at the address on the packets, and then send them toward their destination. They may not know where the destination is, but they know something about where it should go.…

    • 587 Words
    • 3 Pages
    Good Essays

Related Topics