IP addressing consists of four bytes divided into a network address and host address. There are three classes - Class A uses the first byte for network addressing and supports over 16 million hosts, Class B divides the first two bytes evenly between network and host, and Class C uses the first three bytes for network addressing and supports up to 254 hosts. IPv6 expanded the address space to 16 bytes or 128 bits to accommodate more devices.
IP addressing consists of four bytes divided into a network address and host address. There are three classes - Class A uses the first byte for network addressing and supports over 16 million hosts, Class B divides the first two bytes evenly between network and host, and Class C uses the first three bytes for network addressing and supports up to 254 hosts. IPv6 expanded the address space to 16 bytes or 128 bits to accommodate more devices.
Divided into two components Network address Host address Classes Class A Class B Class C Hands-On Ethical Hacking and Network Defense, Second Edition 1 Hands-On Ethical Hacking and Network Defense, Second Edition 2 Table 2-3 TCP/IP address classes IP Addressing (contd.) Class A First byte is reserved for network address Last three bytes are available for host computers Supports more than 16 million host computers Limited number of Class A networks Reserved for large corporations and governments Format: network.node.node.node Hands-On Ethical Hacking and Network Defense, Second Edition 3 IP Addressing (contd.) Class B Divided evenly Two-octet network address Two-octet host address Supports more than 65,000 hosts Assigned to large corporations and Internet Service Providers (ISPs) Format: network.network.node.node Hands-On Ethical Hacking and Network Defense, Second Edition 4 IP Addressing (contd.) Class C Three-octet network address and one-octet host address More than two million Class C addresses Supports up to 254 host computers Usually available for small business and home use Format: network.network.network.node Hands-On Ethical Hacking and Network Defense, Second Edition 5 IP Addressing (contd.) Subnet mask Each network must be assigned a subnet mask Helps distinguish network from host address bits Subnetting concepts are important Utilities return information based on IP address and subnet information May be useful when penetration testing Hands-On Ethical Hacking and Network Defense, Second Edition 6 Planning IP Address Assignments Each network segment must have a unique network address Address cannot contain all 0s or all 1s Accessing entities and services on other networks Each computer needs IP address of gateway TCP/IP Internet layer uses subnet mask to determine destination computers network address If addresses are different, relays packet to gateway Gateway forwards packet to its next destination Packet eventually reaches destination Hands-On Ethical Hacking and Network Defense, Second Edition 7 IPv6 Addressing Internet Protocol version 6 (IPv6) Wasnt designed with security in mind Many current network vulnerabilities Developed to increase IP address space and provide additional security Uses 16 bytes, or a 128-bit address 2 128 available addresses Many OSs are configured to enable IPv6 Many router filtering devices, firewalls, and intrusion detection systems are not Hackers bypass security systems Hands-On Ethical Hacking and Network Defense, Second Edition 8 Summary IP addressing Four bytes and three classes (A, B, and C) IPv6 addresses 16 bytes Written in hexadecimal notation Hands-On Ethical Hacking and Network Defense, Second Edition 9
Practical Obstetrics and Gynaecology Handbook for O G Clinicians and General Practitioners 2nd Edition Thiam Chye Tan - Read the ebook online or download it to own the full content
Practical Obstetrics and Gynaecology Handbook for O G Clinicians and General Practitioners 2nd Edition Thiam Chye Tan - Read the ebook online or download it to own the full content