Question

In: Computer Science

a. Explain with an example a scenario where both the class full and classless IP addressing...

a. Explain with an example a scenario where both the class full and classless IP addressing scheme can be used to configure the IP address for the network. [5Marks

Solutions

Expert Solution

1]Class Full IP addresses:-

Class full IP address are into divided 5 classes:-

Class A to C =unicast addresses

Class D = Multicast addresses

Class E = reserved for future use

Explanation above Five classes

Class A:-

In a class A address, the first bit of the first octet is always ‘0’. Thus, class A addresses range from 0.0.0.0 to 127.255.255.255(as 01111111 in binary converts to 127 in decimal). The first 8 bits or the first octet denote the network portion and the rest 24 bits or the 3 octets belong to the host portion.

Ex :- 10.1.1.1

Class B:-

In a class B address, the first octet would always start with ’10’. Thus, class B addresses range from 128.0.0.0 to 191.255.255.255. The first 16 bits or the first two octets denote the network portion and the remaining 16 bits or two octets belong to the host portion.

Ex :- 172.16.1.1

Class C:-

In a class C address, the first octet would always start with ‘110’. Thus, class C addresses range from 192.0.0.0 to 223.255.255.255. The first 24 bits or the first three octets denote the network portion and the rest 8 bits or the remaining one octet belong to the host portion.

Ex :- 192.168.1.1

Class D:-

Class D is used for multicast addressing and in a class D address the first octet would always start with ‘1110’. Thus, class D addresses range from 224.0.0.0 to 239.255.255.255.

Ex :- 239.2.2.2

Class E:-

Class E addresses are reserved for research purposes and future use. The first octet in a class E address starts with ‘1111’. Thus, class E addresses range from 240.0.0.0 to 255.255.255.255.

2]Classless IP adresses:-

Classless to replace classfull addressing.

It allows the user to use VLSM or Variable Length Subnet Masks.

In classless(CIDR) subnet masks are denoted by /X.

For Ex :-

a subnet of 255.255.255.0 would be denoted by /24. To work a subnet mask in CIDR, we have to first convert each octet into its respective binary value. For example, if the subnet is of 255.255.255.0.

First Octet : - 255 has 8 binary 1's when converted to binary

Second Octet :- 255 has 8 binary 1's when converted to binary

Third Octet :- 255 has 8 binary 1's when converted to binary

Fourth Octet :- 0 has 0 binary 1's when converted to binary


Related Solutions

a. Explain with an example a scenario where both the class full and classless IP addressing...
a. Explain with an example a scenario where both the class full and classless IP addressing scheme can be used to configure the IP address for the network. b. Suppose that a network has the IP network 192.168.10.0/27. Answer the following questions based on the IP arrangement. 1. Find the IP address of the second subnet. 2. Compute the number of valid hosts. 3. Find the usable IP address 4. Find the broadcast address.
Explain with an example a scenario where both the class full and classless IP addressing scheme...
Explain with an example a scenario where both the class full and classless IP addressing scheme can be used to configure the IP address for the network.
Compare classfull IP addressing with classless IP addressing. Why was classless IP addressing designed?
Compare classfull IP addressing with classless IP addressing. Why was classless IP addressing designed?
How does a router work? Please explain the IP addressing system.
How does a router work? Please explain the IP addressing system.
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure....
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure. Why is it important to know Subnetting and VLSM? 2.) Explain Functions at the OSI and TCP/IP Model Layers.
Explain an example of a scenario where a firm might use the Pareto diagram to focus...
Explain an example of a scenario where a firm might use the Pareto diagram to focus on the largest causes of quality failures in their organization (IN YOUR OWN WORDS). Provide an example(s).
Explain the significance of different fields of an instruction with an example. Discuss the different addressing...
Explain the significance of different fields of an instruction with an example. Discuss the different addressing modes of an instruction. (20marks)   
case example where both common law and statue law were applied
case example where both common law and statue law were applied
Explain a social convoy and socioemotional selectivity. Give an example of both and explain why they...
Explain a social convoy and socioemotional selectivity. Give an example of both and explain why they are important.
Assignment #1: Descriptive Statistics Data Analysis Plan Identifying Information Student (Full Name): Class: Instructor: Date: Scenario:...
Assignment #1: Descriptive Statistics Data Analysis Plan Identifying Information Student (Full Name): Class: Instructor: Date: Scenario: Please write a few lines describing your scenario and the four variables (in addition to income) you have selected. Use Table 1 to report the variables selected for this assignment. Note: The information for the required variable, “Income,” has already been completed and can be used as a guide for completing information on the remaining variables. Table 1. Variables Selected for the Analysis Variable...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT