Preview

Nt2460 Unit 1 Research Paper

Satisfactory Essays
Open Document
Open Document
413 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt2460 Unit 1 Research Paper
Jack Frison
NT2460 – Mr. Rose
6/27/14
Unit 1: IP Addresses Classes and Special - Use IP Address Space
In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of
…show more content…

There were only 254 distinct networks with each network having a max of 16,777,214 IP addresses, because the first 8 bits for network part are standard reserved. Network Classes were developed in 1981. 16,777,214 IP addresses can be placed in 24 bits for host address, with this on the horizon developers found that they had to partition IP addresses. This partition had to be done in a way so we can have different sizes of a network. Different sizes of network bits eventually created different classes of networks, known today as Class A, Class B, and Class C. This solved the issue with the classes, but with little information given we still needed to identify what is the network class. In octets Class A (network bit 8 host bit 24) always between 0-127, Class B (network bit 16 host bit 16) between 128-191, Class C (network bit 24 host bit 8) between 192-224, Class D (network and host bit not defined) between 225-239, and Class E (network and host bit not defined) between

You May Also Find These Documents Helpful

  • Good Essays

    The Arduino Mega 2560 is a microcontroller board based on the ATmega256 .It has 54 digital input/output pins, 16 analog inputs, 4 UARTs , 16 MHz crystal oscillator, USB connection, power jack, ICSP header, and a reset button. It has everything needed to support the microcontroller.…

    • 558 Words
    • 3 Pages
    Good Essays
  • Good Essays

    64. Yes p, because the elements are the same and they have the same number of…

    • 373 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 2 Review Paper

    • 1508 Words
    • 7 Pages

    9- Which of the following stress or strength parameters is used in the computation of the force in an extrusion operation (one best answer): (a) average flow stress, (b) compression strength, (c) final flow stress, (d) tensile strength, (e) yield strength?…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    In the figure below, CD bisects AB at D. For each of the following, find the value of ‘x’ and the measure of the segment indicated.…

    • 693 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1430 Unit 2 Discuss

    • 401 Words
    • 2 Pages

    EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unix processes are instances of an executed program. UNIX, being a multi task operating system handles thousands of processes at a time. We are able to check on what processes are currently running by typing ps at the UNIX prompt. Depending on the options used with the ps command, we can see different outcomes such as $ps -ef | more. This will list all the processes in the system. Some items you might see using the ps command are PID which is the process ID number, TT or TTY shows the controlling terminal for the process. If there is no controlling terminal then a question mark is used.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISO 17025 Certification, the general requirements for the competence to carry out tests and calibrations, including sampling. It handles testing and calibration carried out using standard methods, non-standard methods and laboratory-developed methods. It applies to all organizations that tests and calibrations. These include, first, second and third - party laboratories, and laboratories where testing and calibration forms part of inspection and product certification.…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. An Ipv4 uses 32 bit IP addresses. The max number of of IPv4 addresses is about 4 billion.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    · S/W Environment: Minimum one Web Browser should be installed before PC installation, Use IE 5.5 or higher, Go to Tools > Internet Options > Security tab and click on Custom Level button and make sure that under the Scripting section the Active Scripting is set to “Enable”.…

    • 1858 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    NT2670 Week2 Research 3

    • 752 Words
    • 3 Pages

    The common gateway interface (CGI) is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user. It is part of the Web's Hypertext Transfer Protocol (HTTP). A disadvantage of a CGI application (or "executable file," as it is sometimes called) is that each time it is run, it runs as a separate process with its own address space, resulting in extra instructions that have to be performed, especially if many instances of it are running on behalf of users The improper use of CGI scripts affords users a number of vulnerabilities in system security. Failure to validate user input, poorly…

    • 752 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Research Paper

    • 4285 Words
    • 18 Pages

    Each character requires one byte as it is usually stored as an ASCII character. Notice that a digit such as 8 could be held as either a character, an integer or even a real. If any calculations are going to take place on the value then it should be held as either an integer or a real. If the calculation will never result in it being extremely large or gaining decimal places then an integer should be used.…

    • 4285 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Cloud being single point of data access it even suffers from single point data failure /…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Ipv6

    • 7669 Words
    • 31 Pages

    The Internet Protocol (IP) is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP.…

    • 7669 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    FreeVLSM EBook

    • 5063 Words
    • 48 Pages

    My aim of writing this eBook is to teach you how to subnet using VLSM the easy way. I…

    • 5063 Words
    • 48 Pages
    Powerful Essays

Related Topics