Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Types, Features and Classes of IP Address Objectives:: Decimal Notation. Each Bit in An Octet Has A Binary Weight (128

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Configuring Computer Systems and Networks

Types, Features and Classes of IP Address

Objectives:

At the end of this lesson, the learners can identify and


familiarize the types, features and classes of IP Address.

The IP address is a familiar term for most computer users. An IP


address is the unique numerical address of a device in a computer
network that uses Internet Protocol for communication. The IP
address allows you to pinpoint a particular device from the
billions of devices on the Internet. To send you a letter,
someone needs your mailing address. In the same sense, one
computer needs the IP address of another computer to communicate
with it.

There are two versions of IP that currently coexist in the global


Internet: IP version 4 (IPv4) and IP version 6 (IPv6). IP
addresses are made up of binary values and drive the routing of
all data over the Internet. IPv4 addresses are 32 bits long, and
IPv6 addresses 128 bits long.

The 32-bit IP address is grouped 8 bits at a time, each group of


8 bits is an octet. Each of the four octets are separated by a
dot, and represented in decimal format, this is known as dotted
decimal notation. Each bit in an octet has a binary weight (128,
64, 32, 16, 8, 4, 2, 1). The minimum value for an octet is 0 (all
bits set to 0), and the maximum value for an octet is 255 (all
bits set to 1).

The following figure shows the basic format of a typical IP


address:

36
Configuring Computer Systems and Networks

Parts of IP Address:

An IP address consists of two parts, one identifying the network


and one identifying the node, or host. The Class of
the address determines which part belongs to the
network address and which part belongs to the node address. All
nodes on a given network share the same network prefix but must
have a unique host number.

An IPv4 address is typically shown as split into 4 chunks as


shown above. Different ranges of IP addresses are categorised
differently, with the first part of the IP specifying who or
where the IP address is (the network identifier), and the second
part defining which host/machine it is (the host identifier).

IP Address Classes:

IP addressing supports three different commercial address


classes; Class A, Class B, and Class C.

In a class A address, the first octet is the network portion, so


the class A address of, 10.1.25.1, has a major network address of
10. Octets 2, 3, and 4 (the next 24 bits) are for the hosts.
Class A addresses are used for networks that have more than
65,536 hosts (actually, up to 16,581,375 hosts!).

In a class B address, the first two octets are the network


portion, so the class B address of, 172.16.122.204, has a major
network address of 172.16. Octets 3 and 4 (the next 16 bits) are
for the hosts. Class B addresses are used for networks that have
between 256 and 65,536 hosts.

In a class C address, the first three octets are the network


portion. The class C address of, 193.18.9.45, has a major network
address of 193.18.9. Octet 4 (the last 8 bits) is for hosts.
Class C addresses are used for networks with less than 254 hosts.

37
Configuring Computer Systems and Networks

First-Octet Rule:

The class of address can be easily determined by examining the


first octet of the address, and mapping that value to a class
range in the table below:

The left-most (high-order) bits in the first octet indicate the


network class.

Address First High- Number of Host per Default


Classes Octet in Order Networks Network Subnet Mask
Decimal Bits (usable
Addresses)
Class A 1 – 126 0 126 16,777,214 255.0.0
Class B 128 – 191 10 126,382 65,534 255.255
Class C 192 – 223 110 2,097,150 254 255.255.255.0
Class D 224 – 239 1110 Reserved for Multicasting
Class E 240 – 255 1111 Experimental; used for research

For example, given an IP address of 172.31.1.2, the first octet


is 172. 172 falls between 128 and 191, so 172.31.1.2 is a Class B
address.

Classfull Network Masks:

Each of the commercial address classes has a set classfull


network mask. The network mask defines which bits out of the 32
bit of the address are defined as the network portion and which
are the host portion.

As stated above, a Class A address has the first octet as the


network portion and the remaining 3 octets as the host portion.
Therefore, a Class A network mask is defined as 255.0.0.0.

A Class B address has the first and second octets as the network
portion and the third and fourth octets as the host portion. A
Class B network mask is shown as 255.255.0.0.

A Class C address has the first, second, and third octet as the
network portion and the last octet as the host portion. A Class C
network mask is shown as 255.255.255.0.

The network mask is calculated by setting all bits to a value of


1 in the octets designated for the network portion and all bits
to a value of 0 in the octets designated for the host portion.

38
Configuring Computer Systems and Networks

The following figure summarizes the network and host portion of


each address class:

Inspect Networking Devices, Media and Connectors

Objectives:

At the end of this lesson, you should learn how inspect


networking devices, media and connectors.

Conducting an inspection or assessment after the installation and


configuration of computer systems and networks must always be
done to ensure that all will work and function according to the
job specifications and requirements.

In order to conduct a proper inspection, a technician must always


know the things to check. Commonly included in the checklist are
networking devices, media and connectors. Listed below are the
description of each and the procedures in inspecting them.

1) Networking Devices – these devices include those that are


designed to act as a common connection point for all the
computer systems and other devices. Examples of networking
devices are hubs, switches and routers.

 Always read the labels of all these devices to ensure that


they have correct specifications.

39
Configuring Computer Systems and Networks

 Physically scan the devices for any dents, or external


damages. These damages may lead to malfunctions.
 Check the power cables for any breaks. Damaged power cables
may lead to short circuiting and electrocution.
 Ensure that all ports are free from any clogs and foreign
objects to allow a connector to properly be inserted to it.
 Test the connectivity by sending a “ping” to the networking
device using a connected computer system.

2) Media – this is technically called transmission media. This


refers to the means of transmission in any computer network. A
common transmission media is the twisted-pair cable. Another
transmission media uses wireless technology or most commonly
known as WiFi.

 Always check if the cable installed are correct. Twisted-


pair cables have categories that determine its transfer rate
or transmission speed, so make sure that the right one is
laid down.
 Check the twisted-pair cables for any breaks.
 Ensure that no other devices can cause interference or
noise. Common interference are cross-talk; this happens when
a cable intersects with another.
 For wireless media, make sure that the wireless access point
can broadcast a signal that the computer systems can scan or
detect. Enable all the channels and frequencies available to
ensure that all types of devices can access it.

3) Connectors – these are small materials that are attached to


both ends of a cable. It serves as a means of connection
between the cables and the ports.

 Ensure that the correct connectors are used for a particular


cable.
 Always check if the connectors are firmly attached to the
end of the cable. Usually, an RJ45 connector that is
properly attached to a twisted-pair cable will not fall out
even if a strong force is applied.
 Ensure that the contact points of a connector are free from
any dirt or lint to guarantee that proper connection with
the contact points of the port.
 In inserting a connector to a port, ensure that it is
locked. A clicking sound can be heard when proper insertion
is accomplished.

Doing the procedures above will not absolutely ensures that the
computer network will run perfectly. Other factors may also

40
Configuring Computer Systems and Networks

affect the performance of the networking devices, media and


connectors. Regular inspections and testing must be made in order
to ensure that the above mentioned will continue to work and
perform their functions effectively.

Preparing Computer Systems, Tools, Devices, Equipment and


Materials

Objectives:

You should be able to prepare computer systems, tools, devices,


equipment and materials at the end of the lesson.

In configuring computer systems and networks, it is important


that the technician would know the specific tools, devices,
equipment and materials needed before starting any activity.
Being able to prepare all the needed things before commencing
will not only make the configuration faster, but more efficiently
as well.

In order to ensure that all that are needed in configuration of


computer systems and networks are properly prepared, having a
checklist is recommended. Listed below are some of these
checklists:

1) Computer System

 All integrated and external peripherals must be installed.


These peripherals are essential to the entire operation of
the computer system.
 Ensure that an operating system is properly running. The OS
will manage the overall processes of the computer system.
 Application software needed for the different activities
should be installed. It must be run and tested to ensure
smooth compatibility.
 The system drivers for all the peripherals must also be
installed. System drivers will enable the full use of a
peripheral’s functionalities.

2) Tools and Equipment

 Tools must already be requested from the property custodian


ahead of the scheduled configuration.

41
Configuring Computer Systems and Networks

 Tools must be well inspected to ensure that they are in good


operating condition.
 Tools that requires repair or maintenance must be brought
back to the property custodian.

3) (Networking) Devices

 Servers must be installed if central data processing is


needed. A special operating system is needed to be installed
in order for this to function.
 Network switches must be checked so that the appropriate LAN
speed can be met. The number of ports must also be confirmed
to make sure that it will be enough to connect all the
computer systems into a network.
 If wireless routers will be used, the range and frequency of
the signal must be checked against the specifications of the
computer systems that will connect to it.

4) Materials

 A list of needed materials must be specified. Materials are


commonly those which are consumed.
 The specifications of materials must be specified to ensure
that they are compatible with the components.
 Correct quantity must be determined to avoid running out in
the duration of the configuration. In case the exact
quantity cannot be determined, analogous estimation can be
used which derives the number from a previously completed
task with the same requirement.

Completing the checklist indicated above may help a technician in


determining if all the components needed in the configuration are
already prepared. Having all of these prepared will result in a
hassle free completion of the job requirement at hand. This may
also increase the efficiency rating of all the personnel involved
in the said activity.

42

You might also like