Skip to main content

IP Addressing


I try to discuss in brief some key terms in IP Addressing in networking.
1.       Class full IP Addressing
2.       Class less IP addressing
In network computer needs to identify their destination and host computer  among others, to communicate each other. So it used 32 bit binary number for that, and split it into equal 4 parts and convert it to decimal for easy use.
E.g   11000000.10100000.00000001.00000001
         192.168.1.1
 To identify one computer from large network is not easy by concerning one by one digit. So that there are two things within on IP. Network address and Host(computer or any device) address.

This process like this, when we post a letter it address look like this,(No 35,Reid Avenue,Colombo 07).If we post that letter from galle the post office(galle) just looks the colombo and sends it to the colombo.Rest of the parts of address (road and number) looks by colombo post office.The IP address also looks like that.Router look the network address and try to send it to that network.In that network it looks which host that it should go.


So that we split this IP into main two parts.(splitting parts are only logicaly not in physically.)
for e.g. if we take 192.168.1.1 class C address the network address is 192.168.1.0.

Network address is taken from all the host site bits concern as Zero.In above eg 192.168.1 part belongs to network and other 8 bits belongs to hosts site.When all hosts site bits takes as zero network address is given.When we give all hosts site bits as 1 (ones) that give broadcast address. 192.168.1.255 is the broadcast address.






According to dividing position there were 4 main classes.
Class A =  8 bits for network 24 for host.  Within this class there are nearly 2 to power 8 difference network addresses and 2 to power 24 difference hosts can keep in each network. Likewise in class B there are 16 bits for network and hosts class C 24 bits for network and 8 bits for hosts.
But in this system IP addresses are limited to nearly 4 billon and it is now not enough. Even if we need to 10 computer lab to give IP’s we had to take class C IP address. And  in class C there are 256 hosts can give IP’s in one network. Thing getting worst when we concern Class A and B.
So this is now not in use. Subnet mask address is replaced that. In subnetting the pointer of network and host dividing can keep any bit position within 32 bit number. That help to reduce wastage of IP address.
Next article will discuss about classless IP. (Subnetting)

Comments

Post a Comment

Popular posts from this blog

IP based vertual hosting in apache2

I think most of the people used ubuntu as their linux OS. There will be a little bit conflict when you are trying to use virtual hosting in apache2 according to centOS. In this article I will try to explain how it should done in ubuntu apache2. Anyway there is a few more things to know before you start. 1. httpd.conf  file is equal to apache2.conf in /etc/apache2/ 2. In apache2.conf includes some other conf file so that necessary settings should be done those files. e.g. changing port numbers should be done in ports.conf I will explain step by step vertual hosting using apacge2. I take /etc/var/www as a DocumentRoot any way if you want to change it, Change the default file which locate in /etc/apache2/sites-available/default file. To easy access create a folder called www.bict.lk (any choice)  and create htdocs and logs two folders inside www.bict.lk. Don't forget to create index.html file in htdocs folder. (html file which shows www.bict.lk ). These folders should b...

SSL Certificate

SSL stands as secure socket layer, of the main protocol which is used to secure the data transmission.  In this article I am trying to discuss how this SSL certificate is used in client server architecture. First of all you should know the difference of "Authentication" and "Authorization".  Authentication means validate the correct user, for instance most of times when you tried to log to the system, it will ask user name and password to log it. That is called as authentication. Only user who is given correct user name and password allow to log to the system. When you log to a particular site what are the things you are allowed to do and not to do, in other words the privileges that you have in that site called as Authorization. These two concepts are used when client (your browser) requests from server through SSL protocol.  You may wonder what is the reason of having such a system. This all about trust. Once you type your favorite site, www.facebook...

Creating a custom logs in apache2

In this article I try to explain how to create our own log file in apache2. Log files are there to keep records about the details of users ,time , host's IP  etc.. These details are used to analyzed about the users who visits web sites. First of all you had to create a web site and should host in apache server.Following guidelines will help to you.According to your document root create a directories to keep your index file. In my case I keep it /var/www/www.mypage.lk/htdocs. If you are not define custom log file to your site it will go to default place in /var/log/apache2 .And I create a log directory in side the www.mypage.lk to keep records of www.mypage.lk. Normally log files are keep in /var/log/apache2. This is the default directory where apache log files are keep.  In this scenario I create log directory inside the www.mypage.lk directory. So my log file path will be /var/www/www.mypage.lk/logs. go to /etc/apache2 and edit ports.conf file ( you can use an editor l...