Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
ipv6 and ipv4 essay
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: ipv6 and ipv4 essay
TOPIC:IP ADDRESS
Cyber Law & Information Security
The address of a computer on the Internet is commonly referred to as the IP Address (Internet Protocol). It's a 32 bit (4 bytes) number normally written as follows:
xxx.xxx.xxx.xxx
Since a byte can represent any number from zero to 255, the least and the maximum IP address possible are:
0.0.0.0 to 255.255.255.255
Understanding IP Addresses
Understanding IP Addressing is necessary, since all applications on the Internet
generate logs, wherein IP Addresses of all interacting computers are recorded. The logs from a basis for investigation by investigating officers. The IP address has two parts - Network number and the Host number. Whereas the Network Number is assigned by an International Body interNIC, the host Number or Host ID is assigned by the Network System's administrator. For convenience we shall address the four bytes as follows
Class A network
These are among the biggest networks in the world. If the numeric value of the first byte is between 1 and 127, it indicates that the IP Address belongs to a A Class network. For such addresses the 1st byte represents the network number 2nd, 3rd and the 4th byte represent the host number. Thus for the IP Address 98.124.103.45 the network number is 98; and the host number is 124.103.45. As is evident there can only be 127 Class A networks, and each of them can support (256x256x256) about 1,67,77,000 terminals.
Class B network
If the numeric value of the first byte is between 128 and 191, it indicates that the IP Address belongs to a B Class network. For such addresses 1st and 2nd byte represents the network number, and the 3rd and the 4th byte represent the host number. Thus for the IP Address 156.124.103...
... middle of paper ...
...d acknowledgement numbers. The data contained in these fields ensures packet delivery by determining whether or not a packet needs to be resent. The sequence number is the number of the first byte in the current packet, which is relevant to the data stream. The acknowledgement number, in turn, contains the value of the next expected sequence number in the stream. This relationship confirms, on both ends, that the proper packets were received. It's quite different than IP, since transaction state is closely monitored.
ACKNOWLEDGEMENT
The advice ,guidance and material provided by Mr.Shariq Rizvi ,Dr K.N.Agarwal, Ashok Dohare,Dr.T.N.Srivastava is duly acknowledged.
REFERENCES
http://www.linuxjournal.com/
http://en.wikipedia.org/wiki/IP_address
http://en.wikipedia.org/wiki/Internet_Protocol
http://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority
5. The value of the Transaction ID is 0xe6746a7d. The second ID is 0xe4eff25f. A Transaction ID is used so that the DHCP server can differentiate client requests whilst in the the request process.
IP – The Internet Protocol (IP) - is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.
IPv6-the next version of IP, already implemented in some of the newest Internet ready devices. IPSEC and congestion control (ECN) functionality are already put into service. Increased address space will decrease the effectiveness of attacks scanning for vulnerable machines.
TCP/IP addresses are made up of 4 sets of numbers called "Octets." Each octet is an 8 bit binary string. The largest possible value that can be created with 8 characters in binary is 255.
Starting Delimiter - consists of a special bit pattern denoting the beginning of the frame. The bits from most significant to least significant are J,K,0,J,K,0,0,0. J and K are code violations.
Each packet of information that is sent is identified by the IP address which reveals the source of the information.
now, IP uses one part of this address to specify which Net it is on. Most of the time, this is a physical Net like an ethernet LAN that is linked to the internet. Nets that link to the internet get dedicated IPs for each of their hosts from the IANA.org. /24 means that the first 24 bits are the Net address and the remaining 8 bits are the Host address. This looks like this: Net: 000000010000001000000011 Host: 00000100 Meaning, we are on the net 1.2.3.0 (0 used as a wildcard here) and on the host 4 of 256.
In a logical network layout, IP addresses are shown to be associated with each part of the network. "In most cases, the logical network is in a Class C network such as 192.168.0.0 with the default subnet mask of 255.255.255.0. Therefore, this type of network allows up to 254 hosts to be connected directly to it without the need of any routing." http://www.
Explain how the two important transport protocols deliver messages on behalf of the application and discuss the differences between them
When all the internet system is working and then refer a particular IP (Internal Protocol) address to every machine and the address should be defined four “Octets” in dotted decimal number and 32-bit normally like “192.200.199.1”.
MaltHouse engineering has a network of approximately 60 systems including servers, workstations, IP phones and printers. The size of the company’s network infrastructure can be classified as a small to medium-sized network. The network devices are segmented into three physical local area networks (LAN) within the same company, these LANs where created as part of application and services requirements, the LAN can be classified as general data network, accounting network, the IP telephoning (VOIP) ...
IP address is you Internet identity when you are connected to the web. It is synonymous to a postal address.
IP telephony, unlike other Internet applications, is still dominated by concerns about interworking with older technology, here, the PSTN. Thus, we can define three classes [21] of IP telephony operation as shown in Fig. 1.1, depending on the number of IP and traditional telephone end systems.
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
The domain name space is organized hierarchically according to a root and tree structure. When read from left to right, the name follows a path from the branches of the tree to the root. A domain name, such as , essentially consists of two main elements: the top-level domain (TLD), second-level domain (2LD) and sometimes it may contain a third or higher level domain. The machine-readable addresses are called IP (Internet Protocol) addresses, because the location of data on the Internet is identified using the Internet Protocol Address System. Every resource on the Internet (web site, web page or e-mail address) must have a unique Internet Protocol address. Without this unique identifying address, resources on the Internet will not be able to find other specific resources. There will, for example, be no way of making sure that the important e-mail one sends will reach the intended addressee. Domain names are converted into a thirty-two-bit dotted decimal notation, or a number consisting of four octets (sets of eight binary digits...