Bytes (32 Bits) - These Bytes Are Also Known As Octets.: Classes of IP Addresses, IP Broadcast and IP Multicast
Bytes (32 Bits) - These Bytes Are Also Known As Octets.: Classes of IP Addresses, IP Broadcast and IP Multicast
Bytes (32 Bits) - These Bytes Are Also Known As Octets.: Classes of IP Addresses, IP Broadcast and IP Multicast
Internet Protocol (IP) technology was developed in the 1970s to support some of the first research
computer networks. Today, IP has become a worldwide standard for home and business networking
as well. Two versions of IP technology exist today. Essentially all home computer networks use IP
version 4 (IPv4), but an increasing number of educational and research institutions have adopted the
next generation IP version 6 (IPv6).
All Class C addresses, for example, have the leftmost three bits set to '110', but each of the
remaining 29 bits may be set to either '0' or '1' independently (as represented by an x in these bit
positions):
110xxxxx xxxxxxxx xxxxxxxx xxxxxxxx
Converting the above to dotted decimal notation, it follows that all Class C addresses fall in the
range from 192.0.0.0 through 223.255.255.255.
IP Address Class E and Limited Broadcast
The IPv4 networking standard defines Class E addresses as reserved, meaning that they should not
be used on IP networks. Some research organizations use Class E addresses for experimental
purposes. However, nodes that try to use these addresses on the Internet will be unable to
communicate properly.
A special type of IP address is the limited broadcast address 255.255.255.255. A broadcast
involves delivering a message from one sender to many recipients. Senders direct an IP broadcast to
255.255.255.255 to indicate all other nodes on the local network (LAN) should pick up that
message. This broadcast is 'limited' in that it does not reach every node on the Internet, only nodes
on the LAN.
Technically, IP reserves the entire range of addresses from 255.0.0.0 through 255.255.255.255 for
broadcast, and this range should not be considered part of the normal Class E range.
255.255.255.255 is reserved as a broadcast IP, intended as a way to send a message to all devices on
the network. 0.0.0.0 refers to the default network.127.0.0.1 is another reserved address that refers to
the same computer the program is running on.
IP Address Class D and Multicast
The IPv4 networking standard defines Class D addresses as reserved for multicast. Multicast is a
mechanism for defining groups of nodes and sending IP messages to that group rather than to every
node on the LAN (broadcast) or just one other node (unicast). Multicast is mainly used on research
networks. As with Class E, Class D addresses should not be used by ordinary nodes on the Internet.
IP Address Class A, Class B, and Class C
Class A, Class B, and Class C are the three classes of addresses used on IP networks in common practice,
with three exceptions as explained next.
... . DNS allows nodes on the public Internet to be assigned both an IP address and a corresponding
name, called a domain name. For DNS to work as designed, these names must be unique
worldwide. Hence an entire "cottage industry" has emerged around the purchasing of domain names
in the Internet name space.
DNS Name Space
DNS is a hierarchical system. DNS organizes all registered names in a tree structure.
At the base or root of the tree are a group of top-level domains including familiar names like com,
org, and edu and numerous country-level domains like fi (Finland), ca (Canada), and my
(Malaysia). One generally cannot purchase names at this level. However, in a well-publicized and
controversial event in 2000, the island nation of Tuvalu agreed to receive a large payment in return
for rights to the root domain tv.
Below this level are the second-level registered domains such as about.com. These are domains
that organizations can purchase from any of numerous accredited registrars. For nodes in the com,
org, and edu domains, the Internet Corporation for Assigned Names and Numbers (ICANN)
oversees registrations.
Below that, local domains like compnetworking.about.com are defined and administered by the
overall domain owner. DNS supports additional tree levels as well. The period ('.') always separates
each level of the hierarchy in DNS.
DNS Root Level and Other Servers
DNS is also a distributed system. The DNS database contains a list of registered domain names. It
further contains a mapping or conversion between each name and one or more IP addresses.
However, DNS requires a coordinated effort among many computers (servers); no one computer
holds the entire DNS database. Each DNS server maintain just one piece of the overall hierarchy -
one level of the tree and then only a subset or zone within that level.
The top level of the DNS hierarchy, also called the root level, is maintained by a set of 13 servers
called root name servers. These servers have gained some notoriety for their unique role on the
Internet. Maintained by various independent agencies, the servers are uniquely named A, B, C and
so on up to M. Ten of these servers reside in the United States, one in Japan, one in London, and
one in Stockholm, Sweden.
DNS Resolvers
DNS works in a client/server fashion. DNS servers respond to requests from DNS clients called
resolvers. ISPs and other organizations set up local DNS resolvers as well as servers. Most DNS
servers also act as resolvers, routing requests up the tree to higher-level DNS servers, and also
delegating requests to other servers. DNS servers eventually return the requested mapping (either
address-to-name or name-to-address) to the resolver.
DNS and DHCP
DNS was not designed to work with dynamic addressing such as that supported by DHCP. DNS
requires that fixed (static) addresses be maintained in the database. Web servers in particular
require fixed IP addresses for this reason.
IP Network Numbering
IP Network Partioning
Computer networks consist of individual segments of network cable. The electrical properties of
cabling limit the useful size of any given segment such that even a modestly-sized local-area
network (LAN) will require several of them. Gateway devices like routers and bridges connect
these segments together although not in a perfectly seamless way... (see below)
... . Besides partitioning through the use of cable, subdividing of the network can also be done at a
higher level. Subnets support virtual network segments that partition traffic flowing through the
cable rather than the cables themselves. The subnet configuration often matches the segment layout
one-to-one, but subnets can also subdivide a given network segment.
A segment is a specially-configured subset of a larger network. The boundaries of a network
segment are established by devices capable of regulating the flow of packets into and out of the
segment, including routers, switches, hubs, bridges, or multi-homed gateways (but not simple
repeaters).
Network designers create segments to physically separate related computers into groups. This
grouping can improve network performance and security. In Ethernet networks, for example,
computers send many broadcast packets onto the network, but only other computers on the same
segment receive them. Network segments and subnets serve similar purposes; both create a
grouping of computers. The difference between a segment and a subnet is as follows: a segment is a
physical network construction, whereas a subnet is simply a higher-level software configuration. In
particular, one cannot define a single IP subnet that functions correctly across multiple segments.
A subnet is a logical grouping of connected network devices. Nodes on a subnet tend to be located
in close physical proximity to each other on a LAN. Network designers employ subnets as a way to
partition networks into logical segments for greater ease of administration. When subnets are
properly implemented, both the performance and security of networks can be improved.
In Internet Protocol (IP) networking, devices on a subnet share contiguous ranges of IP address
numbers. A mask (known as the subnet mask or network mask) defines the boundaries of an IP
subnet. The correspondence between subnet masks and IP address ranges follows defined
mathematical formulas. IT professionals use subnet calculators to map between masks and
addresses.
IP Network Numbering
Even without subnetting (explained later), hosts on the Internet or any other IP network are assigned
a network number. Network numbering allows a group of hosts (peers) to communicate efficiently
with each other. Hosts on the same network may be computers located in the same facility or all
computers used by a workgroup, for example. Multi-homed hosts, that contain multiple network
adapters, can belong to multiple networks, but each adapter is assigned exactly one network
number.
Network numbers look very much like IP addresses, but the two should not be confused. Consider
for example the host IP address 10.0.0.1, an address commonly used on private networks. Because
it is a Class A address, with no subnetting employed, its leftmost byte (eight bits) by default refer to
the network address and all other bits remain set at zero. Thus, 10.0.0.0 is the network number
corresponding to IP address 10.0.0.1.
The portion of the IP address that does not refer to the network refers instead to the host address -
literally, the unique identifier of the host on that network. In the above example, the host address
becomes '0.0.0.1' or simply '1'. Also note that a network address becomes a reserved address that
should not be assigned to any actual host. Configuring a live host at 10.0.0.0 in the example above
could impact communications for all hosts on that network.
The table below illustrates the default numbering scheme for Class A, B, and C networks.
Class Host address range Network address Default mask
A 0.0.0.0 - 127.255.255.255 x.0.0.0 255.0.0.0
B 128.0.0.0 - 191.255.255.255 x.x.0.0 255.255.0.0
C 192.0.0.0 - 223.255.255.255 x.x.x.0 255.255.255.0
In general, a network address uses the leftmost byte of its hosts' addressing if the hosts fall within
the Class A range, the leftmost two bytes for hosts in Class B, and the leftmost three bytes for hosts
in Class C. This algorithm is applied in practice through the use of a network mask. The above
table shows the decimal representation of the default network masks that is commonly used by
network operating systems. Note that the decimal value '255' corresponds to one byte that has all
bits set to one (11111111).
Benefit of Network Addressing
Network addressing fundamentally organizes hosts into groups. This can improve security (by
isolating critical nodes) and can reduce network traffic (by preventing transmissions between nodes
that do not need to communicate with each other). Overall, network addressing becomes even more
powerful when introducing subnetting and/or supernetting.
CIDR stands for Classless Inter-Domain Routing. CIDR was developed in the 1990s as a standard
scheme for routing network traffic across the Internet.
Why Use CIDR?
Before CIDR technology was developed, Internet routers managed network traffic based on the
class of IP addresses. In this system, the value of an IP address determines its subnetwork for the
purposes of routing.
CIDR is an alternative to traditional IP subnetting that organizes IP addresses into subnetworks
independent of the value of the addresses themselves. CIDR is also known as supernetting as it
effectively allows multiple subnets to be grouped together for network routing.
CIDR Notation
CIDR specifies an IP address range using a combination of an IP address and its associated network
mask. CIDR notation uses the following format -
xxx.xxx.xxx.xxx/n
where n is the number of (leftmost) '1' bits in the mask. For example,
192.168.12.0/23
applies the network mask 255.255.254.0 to the 192.168 network, starting at 192.168.12.0. This
notation represents the address range 192.168.12.0 - 192.168.13.255. Compared to traditional class-
based networking, 192.168.12.0/23 represents an aggregation of the two Class C subnets
192.168.12.0 and 192.168.13.0 each having a subnet mask of 255.255.255.0. In other words,
192.168.12.0/23 = 192.168.12.0/24 + 192.168.13.0/24
Additionally, CIDR supports Internet address allocation and message routing independent of the
traditional class of a given IP address range. For example,
10.4.12.0/22
represents the address range 10.4.12.0 - 10.4.15.255 (network mask 255.255.252.0). This allocates
the equivalent of four Class C networks within the much larger Class A space.
You will sometimes see CIDR notation used even for non-CIDR networks. In non-CIDR IP
subnetting, however, the value of n is restricted to either 8 (Class A), 16 (Class B) or 24 (Class C).
Examples:
10.0.0.0/8
172.16.0.0/16
192.168.3.0/24
Default Gateway
In computer networking, a gateway is a node (a router) on a TCP/IP network that serves as an
access point to another network. A default gateway is the node on the computer network that the
network software uses when an IP address does not match any other routes in the routing table.
In home computing configurations, an ISP often provides a physical device which both connects
local hardware to the Internet and serves as a gateway. Such devices include DSL modems and
cable modems.
In organizational systems a gateway is a node that routes the traffic from a workstation to another
network segment. The default gateway commonly connects the internal networks and the outside
network (Internet). In such a situation, the gateway node could also act as a proxy server and a
firewall. The gateway is also associated with both a router, which uses headers and forwarding
tables to determine where packets are sent, and a switch, which provides the actual path for the
packet in and out of the gateway.
In other words, a default gateway provides an entry point and an exit point in a network.
Example1
An office network consists of six hosts and a router is given as:
Hosts addresses:
192.168.4.3
192.168.4.4
192.168.4.5
192.168.4.6
192.168.4.7
192.168.4.8
Router (this side) address:
192.168.4.1
The network has a subnet mask of:
255.255.255.0 (/24 in CIDR notation)
Thus the usable network ranges from addresses 192.168.4.1 to 192.168.4.254. (TCP/IP defines the
addresses 192.168.4.0 and 192.168.4.255 for special functions.)
The office's hosts will send packets addressed to IPs within this range directly, by resolving the
destination IP address into a MAC address through an ARP sequence (if not already known through
the host's ARP cache) and then enveloping the IP packet into a layer 2 (MAC) packet addressed to
the destination host.
Packets addressed outside of this range (for this example, a packet addressed to 192.168.12.3)
cannot travel directly to the destination. Instead they must be sent to the default gateway for further
routing to their ultimate destination. In this example, the default gateway uses the IP address
192.168.4.1, which is resolved into a MAC address with ARP in the usual way. Note that the
destination IP address remains 192.168.12.3, but the next-hop physical address is that of the
gateway, rather than of the ultimate destination.