...IP ADDRESSING: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of the Internet Protocol defined an IP address as a 32-bit number[ and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995, standardized as RFC 2460 in 1998, and its deployment has been ongoing since the mid-2000s. In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e-mail address you're sending a note to. At the other...
Words: 1361 - Pages: 6
...Unit 1 Exercise 1 IP Addressing Scenario When designing the data closet should be located in a non-centralized location but still have easy access for services and upgrades or repairs. I would consider using a class b network set up which would easily allow 145 users, computers or equipment to connect but still provide additional addresses and networks as the company expands within the next two years. As for IP address I would consider static IP address for all local computers and equipment within the company such as printers, routers user computers etc. This will be easier to use and less expensive. With over 16,000 networks and 65,000 host address available there will be plenty of room for the company to grow. I would also consider having a wireless network using dynamic ip addresses leasing addresses to the user’s devices to allow users to connect there wireless devices to the network. All the systems we use today can work well with DHCP so it shouldn’t be a problem. Also you should consider having multiple domain and DHCP servers to provide load balancing, efficiency and safety in case of server failure. DHCP should be used whenever possible DHCP is easier because there is usually not a need to manually assign and track IP addresses across a number of devices where a specific IP is not necessary, and use reservations for the static devices like Printers and A/P's. And use static addresses for Servers. For example when recovering from a full power outage DHCP WILL...
Words: 308 - Pages: 2
...IP Addressing: Who’s Got Class and Who’s Special Chelley Cline NT2640 We live in a time of marvel and discovery. We have phones and computers in our pockets and in our cars. Our workplaces expect us to use equipment that literally can talk to the world. These things are so much a part of our lives that we forget they are the result of years of development and standardizing. The wonders of that result are far overshadowed by the systems that enable them to work. At the most basic level the internet is like a huge mail delivery system. While that is a vast simplification, it gives a framework to understand why and how some of the fundamental rules came into play. Originally there were just 32-bit numbers as IP addresses – no classes or obvious distinction between network and host bits. It was assumed that the first eight bits were the network. This only offered 254 networks. Many organizations didn’t need 16,777,214 host addresses, and over time it was obvious that we needed not only different sizes of networks, but more of them. In 1981 a new way to partition the bits of an IP address was put into use. In order to be able to easily see which bits were network and which were host, a class system was defined. (Sharma, 2011) The IANA has set rules that are followed worldwide to allow international use of the internet and intranets. Using the knowledge that an octet can only show numbers between zero and 255, classes were developed for the numbers that designate...
Words: 954 - Pages: 4
...IP Addressing Scenario The first thing that we must take in consideration is the number of hosts (145). For my design, I could use the 192.168.0.0 address space using /21 (192.168.0.1 - 192.168.7.254). My subnet mask on the devices will be 255.255.255.0. I will reserve the first and last 20 or so addresses in each DHCP for statically assigned addresses and network devices / gateway addresses. * 192.168.0.0 /24 for servers-all static * 192.168.1.0 /24 for pc's printers- operational for DHCP 192.681.1.21 - 192.168.1.230 * 192.168.2.0 /24 for wireless - functional for DHCP 192.168.2.21-192.168.2.230 * 192.168.3.0 /24 for VoIP - working for DHCP 192.168.3.21 - 192.168.3.230 * 192.168.4.0 - 192.168.7.254 for future usage . We should have multiple domain servers and DHCP servers. Firewall always needs to be used even though most computers with windows 7 come with it. Firewall is very important because it block any outside intrusion. That way it can be monitored. All type of security can be implanted to assure that the servers can’t be infiltrate by intruders, like finger print recognition, password expiration…. It will be my responsibility to ensure that all policy regarding the security of each computer and server will meet the criteria. Each IP addresses should be addressed dynamically because it will be easier and it won’t take a lot of time and that way we won’t have to go to each computer and assign them statically. The only that we will have to assign...
Words: 510 - Pages: 3
...IP addressing Scenario When you design an IP addressing scheme for a medium to large scale company you need to take into account several questions about the company environment. What type of security is needed? Is the company going to grow past 145 clients? Do all the computers need to talk to one another? Can they be separated out into different departments? What types of content will be shared between users? How many content share servers are there? When setting up an IP scheme you need to take into account the growth of the company. If the company is only going to have 254 devices attached to the network. If the answer is yes then you can proceed with a statically assigned IP scheme. If you answer is no then you need to implement a scheme designed around a DHCP server. Normally when you design a scheme you want to take into account the departments in the company and if they need to be interconnected to the rest of the clients. If there are several departments that need to talk to one another, and a couple of departments that are restricted access clients. These types of question and answers would make an IT professional’s job either simple or more complex. Normally in a IP Scheme you want to choose the IP address that make sense to your network most internal networks sit in the class B or C range. If you choose a network IP of 172.16.0.1 your subnet masks would be at 255.255.0.0 for your choice. If you are going to design a IP scheme around a DHCP Server it might be...
Words: 508 - Pages: 3
...Unit 1 Exercise 1: IP Addressing Scenario To start with, I would use the IP Class C. The subnet range in Class C is 255.255.255.0-255.255.255.255. This would be the best one for this company because there is room to grow. I believe that the IP addresses should be statically assigned. That way, there is not a chance of it getting into any trouble by anyone. One network/subnet would do fine. You have a giant subnet range, plus you have a good size network. If DHCP is used, then yes a router, firewall, and Windows Server should be utilized. You need a firewall, so you don’t have any problems with your employees looking at non-work related websites or websites that haven’t been approved. A router, so that you can have your internet connection protected. You wouldn’t want anyone just hacking into your connection and getting their hands onto any private information that they could get their hands on and ruin your company. A Windows Server would be good as well. You could use the Windows Server so the employees could get their work done, instead of searching the web for non-work related things as well. When you consider this design as a possible outcome, just remember that this plan also involves the growth of the company. The growth of the company is the main concern here. We do not want to stunt the growth of the company. We want the company to grow as much as possible. I believe this design will prove to do that. It will be a great design and will help out very much. We do not...
Words: 317 - Pages: 2
...1010101000110010 010101001011000 110101100011010 11010100001011 001010100110 1001010010 11010011 10011000 IP Addressing and Subnetting Workbook Version 2.0 Instructor’s Edition 11111110 10010101 00011011 10000110 IP Address Classes Class A Class B Class C Class D Class E 1 – 127 128 – 191 192 – 223 224 – 239 240 – 255 (Network 127 is reserved for loopback and internal testing) 00000000.00000000.00000000.00000000 Leading bit pattern 0 Network . Host . Host . Host Leading bit pattern Leading bit pattern 10 110 10000000.00000000.00000000.00000000 Network . Network . Host . Host 11000000.00000000.00000000.00000000 Network . Network . Network . Host (Reserved for multicast) (Reserved for experimental, used for research) Private Address Space Class A Class B Class C 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 Default Subnet Masks Class A Class B Class C 255.0.0.0 255.255.0.0 255.255.255.0 Produced by: Robb Jones jonesr@careertech.net and/or Robert.Jones@fcps.org Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors, and to everyone who has sent in suggestions to improve the series. Workbooks included in the series: IP Addressing and Subnetting Workbooks ACLs - Access Lists Workbooks VLSM Variable-Length Subnet Mask Workbooks Instructors...
Words: 18750 - Pages: 75
...Understanding IP Addressing: Everything You Ever Wanted To Know Introduction In the mid-1990's, the Internet is a dramatically different network than when it was first established in the early 1980's. Today, the Internet has entered the public consciousness as the world's largest public data network, doubling in size every nine months. This is reflected in the tremendous popularity of the World Wide Web (WWW), the opportunities that businesses see in reaching customers from virtual storefronts, and the emergence of new types and methods of doing business. It is clear that expanding business and social awareness will continue to increase public demand for access to resources on the Internet. There is a direct relationship between the value of the Internet and the number of sites connected to the Internet. As the Internet grows, the value of each site's connection to the Internet increases because it provides the organization with access to an ever expanding user/customer population. Internet Scaling Problems Over the past few years, the Internet has experienced two major scaling issues as it has struggled to provide continuous and uninterrupted growth: - The eventual exhaustion of the IPv4 address space - The ability to route traffic between the ever increasing number of networks that comprise the Internet The first problem is concerned with the...
Words: 7368 - Pages: 30
...IP version 6 As you study this section, answer the following questions: * What is the primary reason for developing IPv6? * How many hexadecimal numbers are in an IPv6 address? How does this compare to a MAC address? * What do you add to an IPv6 address when you remove one or more quartets with all 0's? * What information is included within the IPv6 address prefix? * How many numbers are used for the interface ID? How can the interface ID be related to the MAC address? * What is the difference between ISATAP and 6-to-4 tunneling? * What is the difference between tunneling and NAT-PT? This section covers the following exam objectives: * 1.3 Identify the following address formats * IPv6 IPv6 Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. The IPv6 address is a 128-bit binary number. A sample IPv6 IP address looks like: 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973. The following list describes the features of an IPv6 address: * The address is made up of 32 hexadecimal numbers, organized into 8 quartets. * The quartets are separated by colons. * Each quartet is represented as a hexadecimal number between 0 and FFFF. Each quartet represents 16-bits of data (FFFF = 1111 1111 1111 1111). * Leading zeros can be omitted in each section. For example, the quartet 0284 could also be represented by 284. ...
Words: 979 - Pages: 4
...UNIT 1: IP ADDRESSING SCENARIO First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class B. In the case of the how the IP addresses would be assigned I would consider choosing statically. A static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that they’re easy to use and less expensive. When it comes to maintaining and obtaining they’re easier to have as well. In answering the question about having one or more network/subnets to be used, I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space, host...
Words: 289 - Pages: 2
...ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 | | Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you...
Words: 541 - Pages: 3
...(part 2) Memory Access to access memory we can use these four registers: BX, SI, DI, BP. combining these registers inside [ ] symbols, we can get different memory locations. these combinations are supported (addressing modes): [BX + SI] [BX + DI] [BP + SI] [BP + DI] | [SI] [DI] d16 (variable offset only) [BX] | [BX + SI + d8] [BX + DI + d8] [BP + SI + d8] [BP + DI + d8] | [SI + d8] [DI + d8] [BP + d8] [BX + d8] | [BX + SI + d16] [BX + DI + d16] [BP + SI + d16] [BP + DI + d16] | [SI + d16] [DI + d16] [BP + d16] [BX + d16] | d8 - stays for 8 bit signed immediate displacement (for example: 22, 55h, -1, etc...) d16 - stays for 16 bit signed immediate displacement (for example: 300, 5517h, -259, etc...). displacement can be a immediate value or offset of a variable, or even both. if there are several values, assembler evaluates all values and calculates a single immediate value.. displacement can be inside or outside of the [ ] symbols, assembler generates the same machine code for both ways. displacement is a signed value, so it can be both positive or negative. generally the compiler takes care about difference between d8 and d16, and generates the required machine code. for example, let's assume that DS = 100, BX = 30, SI = 70. The following addressing mode: [BX + SI] + 25 is calculated by processor to this physical address: 100 * 16 + 30 + 70 + 25 = 1725. by default DS segment register is used for all modes except those with BP register, for these SS segment...
Words: 2749 - Pages: 11
...General Objective: To know and understand the addressing mode and programming. Specific Objectives: At the end of the unit you should be able to: 4.1 classify and describe the addressing modes 4.2 explain the concept of programming 4.3 discuss the implementation structure of programming 0. INTRODUCTION Programming is a process of composing several instructions to perform certain tasks. The product of the programming is called a program which contains several instructions. The skill of programming is to know the best or optimum composition of selective instructions to performs the required tasks. In other words, we may classify these skills into uniform concepts as structure of programming implementation. These structure shall bear the emphasis to: • what instructions (selectable from a complete list of instructions as a tools list) essential and best to perform a certain task; • how these instructions are organized into a sub program which can be reused or recalled as many times as possible to perform the identical task with different set of data; • to preserve the minimum lines of instruction but performs the maximum tasks. The less instruction lines require less operating times, thus expetite the implementation speed. The main proccess of program (instructions) implementation is nothing else just the manipulation of data. We need to know how to identify the source of data, procedure to fetch these...
Words: 9907 - Pages: 40
...Assembly Language Tutorial (x86) For more detailed information about the architecture and about processor instructions, you will need access to a 486 (or 386+) microprocessor manual. The one I like is entitled The 80386 book, by Ross P. Nelson. (This book is copyright 1988 by Microsoft Press, ISBN 1-55615-138-1.) Intel processor manuals may also be found at http://www.x86.org/intel.doc/586manuals.htm. The GNU Assembler, gas, uses a different syntax from what you will likely find in any x86 reference manual, and the two-operand instructions have the source and destinations in the opposite order. Here are the types of the gas instructions: opcode (e.g., pushal) opcode operand (e.g., pushl %edx) opcode source,dest (e.g., movl %edx,%eax) (e.g., addl %edx,%eax) Where there are two operands, the rightmost one is the destination. The leftmost one is the source. For example, movl %edx, %eax means Move the contents of the edx register into the eax register. For another example, addl %edx,%eax means Add the contents of the edx and eax registers, and place the sum in the eax register. Included in the syntactic differences between gas and Intel assemblers is that all register names used as operands must be preceeded by a percent (%) sign, and instruction names usually end in either "l", "w", or "b", indicating the size of the operands: long (32 bits), word (16 bits), or byte (8 bits), respectively. For our purposes...
Words: 1264 - Pages: 6
...Addressing Modes The way the operands are chosen during program execution is dependent on the addressing mode of the instructions. The addressing mode specifies a rule for interpreting or modifying the address field of the instruction before the operand is actually referenced. Computers use addressing mode techniques for the purpose of accommodating one or both of the following provisions: 1 Addressing Modes Computers use addressing mode techniques for the purpose of accommodating one or both of the following provisions: 1. 2. to give programming versatility to the user by providing such facilities as pointers to memory, counters for loop control, indexing of data and program relocation. To reduce the number of bits in the addressing field of the instruction. 2 Addressing Modes Immediate Direct Indirect Register Register Indirect Displacement (Indexed) Stack 3 Immediate Addressing Operand is part of instruction Operand = address field e.g. ADD 5 Add 5 to contents of accumulator 5 is operand No memory reference to fetch data Fast Limited range 4 Immediate Addressing Diagram Instruction Opcode Operand 5 Direct Addressing Address field contains address of operand Effective address (EA) = address field (A) e.g. ADD A Add contents of cell A to accumulator Look in memory at address A for operand Single memory reference to access data No additional calculations to work out effective address Limited address space 6 Direct Addressing...
Words: 595 - Pages: 3