0% found this document useful (0 votes)
76 views29 pages

CNE #Micro Project

The document discusses Internet Protocol version 4 (IPv4) which is the protocol that powers the internet. It describes how IPv4 allows clients to locate servers and resources. It also mentions IPv4 addressing schemes and transition mechanisms to IPv6 as IPv4 addresses are running out. The project report submitted by students evaluates IPv4 and discusses its limitations to secure the current IPv4 infrastructure until IPv6 is realized.

Uploaded by

shreyashbhunje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views29 pages

CNE #Micro Project

The document discusses Internet Protocol version 4 (IPv4) which is the protocol that powers the internet. It describes how IPv4 allows clients to locate servers and resources. It also mentions IPv4 addressing schemes and transition mechanisms to IPv6 as IPv4 addresses are running out. The project report submitted by students evaluates IPv4 and discusses its limitations to secure the current IPv4 infrastructure until IPv6 is realized.

Uploaded by

shreyashbhunje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Certificate

S.V.P.M’S,

INSTITUTE OF TECHNOLOGY AND ENGG.MALEGAON BK. BARAMATI, DIST.PUNE.

(Affiliated to MSBTE MUMBAI)


2022-2023

This is to certify that the following group of students submitted Micro

Project Report Entitled “Internet Protocol (IP)” Of Fourth Semester of

Diploma in INFORMATION TECHNOLOGY has Completed the Micro-Project

satisfactorily in course Computer Networks (Course code: 22417) for the

Academic Year 2022 to 2023 as prescribed in the curriculum . Submitted by

Name of Member1: Dinesh Anil Jagtap Enroll No:2100380100

Name of Member2: Viraj Suresh Khandekar Enroll No:2100380097

Name of Member3: Santosh Gorakh Jadhav Enroll No:2100380087

Prof. KADAM H.S. Prof. KADAM H.S. Prof. WABALE R.M.

Micro-Project Guide ( H.O.D.) Principal


Shivnagar Vidya Prasarak Mandal’s
Institute of Technology and Engineering, Malegaon (Bk.)
Tal-Baramati; Dist-Pune PIN-413115. Telephone No. (02112)254214
________________________________________________________________________
__

A
Report
On

MICROPROJECT
ACADEMIC YEAR 2022-23

TITLE OF PROJECT
Internet Protocol ( IP )
Guided By: Mr. Kadam H.S.

Program: SYIF Program Code : IF4I

Course: Computer Networks Course Code: 22417


Presented By:

Sr.No. Name of Student Sr.No./Roll No.

1. Dinesh Anil Jagtap 18

2. Viraj Suresh khandekar 15

3. Santosh Gorakh Jadhav 05

ANNEXURE II
EVALUATION SHEET FOR MICRO PROJECT
Academic Year: 2022-2023 Name of Faculty: Prof.H.S.Kadam
Course: Computer Networks Course Code:22417 Semester: IV
Title of the Project: .Internet Protocol (IP)………………………………………..……….
CO’s addressed by the Micro Project.

a) …………………………………………………………………………………………………….…….…………

b) …………………………………………………………………………………………………….………………..

c) …………………………………………………………………………………………………….…….…………..

Major learning outcomes achieved by students by doing the project


a) Unit Outcomes (Cognitive Domain)
……………………………………………………………………………………………………...
……………………………………………………………………………………………………...
b) Practical Outcomes (in Psychomotor Domain)
…………………………………………………………………………………………………….
…………………………………………………………………………………………………….
c) Affective Domain Outcomes
……………………………………………………………………………………………………..
……………………………………………………………………………………………………..
Comments/Suggestions about team work/leadership/inter-personal communication (if any)

……………………………………………………………………………………………………..
Marks out of 6 for Marks out of 4 for
Roll No./ performance in performance in Total out
Student Name
Sr.No group activity oral / presentation of 10
(D5 Col. 8) (D5 Col. 9)

18 Dinesh Anil Jagtap

15 Santosh Gorakh Jadhav

05 Viraj Suresh Khandekar

……………………………………………………………………………………………………..

Name & Signature of faculty


Prof. Kadam H.S.
Abstract

The current version of Internet Protocol (IPv4) has not been substantially changed in the past
25 years. IPv4 has proven to be robust and easily implemented. In the early stage, the
deployment of IPv6 is prepared and begun on the IPv4-based network. In the intermediate
stage, IPv4 and IPv6 coexist. In the later stage, IPv6 plays a leading role on the network and
the IPv4 network is gradually withdrawing from the market.

Meanwhile, researchers put forward many transition mechanisms for different network
infrastructures and different evolution stages. In this paper, a detailed study is made on IPv4
along with its different smart saving techniques. Which help in delay of IPv4 to IPv6 shifting
delays. Also different addressing schemes are discussed which remains unchanged in future.
Along with that limitations of IPv4 is also focused so present IPv4 network infrastructure can
be more secured till IPv6 realization.

NTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
NTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION
World wide web, www
connects all
e-resources together where clients and
server can
use and give such services. Whenever
any service
or resource is demanded the client
should first
able to locate the server carrying the
resources.
After resource has been found out the
particular
directory or server disk has to be
checked to get the
location of the file. Once location is
identified then
there is a need for different protocols
which deliver
such resources on the internet in
electrical forms
while keeping it intact. To get the
resource we have
different addressing schemes while
protocols stand
INTRODUCTION

World wide web, www connects all e-resources together where clients and server can use
and give such services. Whenever any service or resource is demanded the client should
first able to locate the server carrying the resources. After resource has been found out the
particular directory or server disk has to be checked to get the location of the file. Once
location is identified then there is a need for different protocols which deliver such resources
on the internet in electrical forms while keeping it intact. To get the resource we have
different addressing schemes while protocols stand to deliver the content.
In this paper Internet Protocol version 4 is studied in order to understand its pros and cons.
The different addressing levels such as logical, physical, port and specific addressing is
mentioned in their own aspects of need and certainty. Further the relation of such
addressing schemes with OSI and TCP/IP models are shown. IPv4 is talked about with its
size and different classes, where each class differs by its network and host ID part.

IPv4 addresses are already scarce and IPv6 addressing is under deployment progress. Till all
the IPv4 devices are improved to IPv6 devices the only option is to use IPv4. In such
scenarios how to use IPv4 addressing scheme with more efficiency is discussed and it covers
the different techniques like classful and classless IP addressing. Subnetting is other way
by which one can expand the network while keeping the public network id unchanged.
Advance to that the private and public IP addresses are mentioned along with their ranges, so
one can make use of them in their private and public networks accordingly. The other
possible way to have more users in less range of available IP is DHCP which is focused too,
followed by the Network Address Translation technique which makes communication
possible for private networks over public domains.

 IP addresses structure :

An IP address consists of 32 bits. These bits are divided into four sections. Sections are
separated by a dot (.). Each section contains 8 bits. 8 bits are equal to 1 byte or 1 octet. The
following image shows how bits are organized in an IP address.

By using 32 bits with two possible values for each position, the binary system can create
4,294,967,296 (232) unique combinations or IP addresses. These addresses can be used without
any addressing scheme or with an addressing scheme that arranges them in such a way that it
becomes easier to access them.

If addresses are used without any addressing scheme, all routers on the network will need to
store the address of each and every interface on the network. Depending on the size of the
network, this may affect routing. If the network size is small, it can make routing slow. If the
network size is moderate, it can make routing very slow. If the network size is large, it can
make routing completely impossible.
For efficient routing, addresses are organized into the hierarchical addressing scheme. In this
scheme, all addresses are divided into five classes and each address is divided into two
addresses: the network address and the host address.

 Types of IP Address :
IP Address is of two types:

1. IPv4 :

Internet Protocol version 4. It consists of 4 numbers separated by the dots. Each number can
be from 0-255 in decimal numbers. But computers do not understand decimal numbers, they
instead change them to binary numbers which are only 0 and 1. Therefore, in binary, this (0-
255) range can be written as (00000000 – 11111111). Since each number N can be
represented by a group of 8-digit binary digits. So, a whole IPv4 binary address can be
represented by 32-bits of binary digits. In IPv4, a unique sequence of bits is assigned to a
computer, so a total of (2^32) devices approximately = 4,294,967,296 can be assigned with
IPv4.

IPv4 can be written as:

Ex. 189.123.123.90

2. IPv6:

But, there is a problem with the IPv4 address. With IPv4, we can connect only the above
number of 4 billion devices uniquely, and apparently, there are much more devices in the
world to be connected to the internet. So, gradually we are making our way to IPv6
Address which is a 128-bit IP address. In human-friendly form, IPv6 is written as a group of
8 hexadecimal numbers separated with colons(:). But in the computer-friendly form, it can be
written as 128 bits of 0s and 1s. Since, a unique sequence of binary digits is given to
computers, smartphones, and other devices to be connected to the internet. So, via IPv6 a
total of (2^128) devices can be assigned with unique addresses which are actually more than
enough for upcoming future generations.

IPv6 can be written as:

Ex. 2011:0bd9:75c5:0000:0000:6b3e:0170:8394

 IP address classes :
Based on the following rules, IP addresses are categorized into five classes; A, B, C, D, and
E.

 In class A, the first bit of the first byte always remains OFF (0).
 In class B, the first bit of the first byte always remains ON and the second bit of the
first byte always remains OFF.

 In class C, the first two bits of the first byte always remain ON and the third bit of the
first byte always remains OFF.

 In class D, the first three bits of the first byte always remain ON and the fourth bit of
the first byte always remains OFF.

 In class E, the first four bits of the first byte always remain ON.

By turning all remaining bits of the first byte ON and OFF, we can make the first and last
address of that class.

IP Class Address Range Maximum number of Subnet Mask


networks
Class A 0-127 126 (27-1) 255.0..0.0
Class B 178-191 16384 255.255.0.0
Class C 192-223 2097152 255.255.255.0
Class D 224-239 Reserve for multitasking -
Class E 240-255 Reserved for Research and -
development

The following table lists the value of the first byte or octet in both notations.

 Classification of IP Address :
An IP address is classified into the following types:

1. Public IP Address:
This address is available publicly and it is assigned by your network provider to your router,
which further divides it to your devices. Public IP Addresses are of two types,

 Dynamic IP Address :

When you connect a smartphone or computer to the internet, your Internet Service Provider
provides you an IP Address from the range of available IP Addresses. Now, your device has
an IP Address and you can simply connect your device to the Internet and send and receive
data to and from your device. The very next time when you try to connect to the internet with
the same device, your provider provides you with different IP Addresses to the same device
and also from the same available range. Since IP Address keeps on changing every time when
you connect to the internet, it is called a Dynamic IP Address.

 Static IP Address :

Static address never changes. They serve as a permanent internet address. These are used by
DNS servers. What are DNS servers? Actually, these are computers that help you to open a
website on your computer. Static IP Address provides information such as device is located
on which continent, which country, which city, and which Internet Service Provider provides
internet connection to that particular device. Once, we know who is the ISP, we can trace the
location of the device connected to the internet. Static IP Addresses provide less security than
Dynamic IP Addresses because they are easier to track.

2. Private IP Address :

This is an internal address of your device which are not routed to the internet and no
exchange of data can take place between a private address and the internet.

3. Shared IP addresses :

Many websites use shared IP addresses where the traffic is not huge and very much
controllable, they decide to rent it to other similar websites so to make it cost-friendly.
Several companies and email sending servers use the same IP address (within a single mail
server) to cut down the cost so that they could save for the time the server is idle.

4. Dedicated IP addresses :

A dedicated IP Address is an address used by a single company or an individual which gives


them certain benefits using a private Secure Sockets Layer (SSL) certificate which is not in
the case of a shared IP address. It allows to access the website or log in via File Transfer
Protocol (FTP) by IP address instead of its domain name. It increases the performance of the
website when the traffic is high. It also protects from a shared IP address that is black-listed
due to spam.
 Network and host addressing :
In the second level of the hierarchical addressing scheme, each address is further divided into
two addresses: the network address and host address.

Network addresses are used to combine multiple IP addresses in a group while host addresses
are used to provide a unique identity to each IP address in the group. A network address is the
group address. All group members use the same network address. A host address is a unique
address in the group.

The length of network addresses and host addresses in IP addresses are different in all IP
classes. In class A, the first bits are reserved for the network address. The remaining 24 bits
are available for the host address. In class B, the first 16 bits are reserved for the network
address while the last 16 bits are available for the host address. In class C, the first 24 bits are
reserved for the network address while the last 8 bits available for the host address.

The following image shows how bits are defined for network addresses and host addresses in
each IP class.

In
IP

addresses, host bits are flexible. Administrators can adjust the


length of host bits to meet the requirements of their networks. They can use host bits as
network bits to utilize maximum addresses from all available addresses. If hosts bits are used
as the network bits, this is known as the subnetting.

Class D and E are not used for the host addressing. Class D addresses are used for multicast
addresses. Class E addresses are reserved for research and development purposes.

 The subnet mask :


IP addresses use an additional component to distinguish between network addresses and host
addresses. This component is known as the subnet mask. In simple words, the subnet mask
tells, how many bits in the IP address are used as the network address and how many bits are
left for the host address.

IP addresses are always written with the subnet mask. The following table lists the default
subnet mask for all IP classes.
Class Decimal Notation Binary Notation

A 255.0.0.0 11111111.00000000.00000000.00000000

B 255.255.0.0 11111111.11111111.00000000.00000000

C 255.255.255.0 11111111.11111111.11111111.00000000

 Identifying the class of an IP address (decimal notation) :


If an IP address is written in the decimal notation, check the value of the first section or
octet and use the following rules to identify the class of the IP address.

 If the value is in the range 1 to 127, the address belongs to class A.

 If the value is in the range 128 to 191, the address belongs to class B.

 If the value is in the range 192 to 223, the address belongs to class C.

 If the value is in the range 224 to 239, the address belongs to class D.

 If the value is in the range 240 to 255, the address belongs to class E.

 Identifying the class of an IP address (binary notation) :


If an IP address is written in the binary notation, you can use the following rules to identify
the class of the IP address.

 If the first bit is OFF, the address belongs to class A.

 If the first bit is ON and the second bit is OFF, the address belongs to class B.

 If the first two bits are ON and the third bit is OFF, the address belongs to class C.

 If the first three bits are ON and the fourth bit is OFF, the address belongs to class D.

 If the first four bits are ON, the address belongs to class E.

 Examples of IP addresses :
Examples of class A IP addresses are the following.
Decimal Notation Binary Notation

1.2.3.4
255.0.0.0 00000001.00000010.00000011.00000100
11111111.00000000.00000000.00000000

10.10.10.10 00001010.00001010.00001010.00001010
255.0.0.0 11111111.00000000.00000000.00000000

25.147.191.14 00011001.10010011.10111111.00001110
255.0.0.0 11111111.00000000.00000000.00000000

95.86.75.4 01011111.01010110.01001011.00000100
255.0.0.0 11111111.00000000.00000000.00000000

127.0.0.1 01111111.00000000.00000000.00000001
255.0.0.0 11111111.00000000.00000000.00000000

Examples of class B IP addresses are the following.

Decimal Notation Binary Notation

129.12.36.42 10000001.00001100.00100100.00101010
255.255.0.0 11111111.11111111.00000000.00000000

168.172.1.1 10101000.10101100.00000001.00000001
255.255.0.0 11111111.11111111.00000000.00000000

175.66.43.12 10101111.01000010.00101011.00001100
255.255.0.0 11111111.11111111.00000000.00000000

145.186.175.234 10010001.10111010.10101111.11101010
255.255.0.0 11111111.11111111.00000000.00000000

190.60.152.25 10111110.00111100.10011000.00011001
255.255.0.0 11111111.11111111.00000000.00000000

Examples of class C IP addresses are the following.

Decimal Notation Binary Notation


192.168.1.1 11000000.10101000.00000001.00000001
255.255.255.0 11111111.11111111.11111111.00000000

210.20.30.40 11010010.00010100.00011110.00101000
255.255.255.0 11111111.11111111.11111111.00000000

216.123.145.16 11011000.01111011.10010001.00010000
255.255.255.0 11111111.11111111.11111111.00000000

220.86.76.43 11011100.01010110.01001100.00101011
255.255.255.0 11111111.11111111.11111111.00000000

220.60.80.100 11011100.00111100.01010000.01100100
255.255.255.0 11111111.11111111.11111111.00000000

 Lookup IP addresses :
To know your public IP, you can simply search “What is my IP?” on google. Other websites
will show you equivalent information: they will see your public IP address because, by
visiting the location, your router has made an invitation/request and thus revealed the
information. the location IP location goes further by showing the name of your Internet
Service Provider and your current city.

Finding your device’s private IP Address depends on the OS or platform you are using.

 On Windows: Click Start and type “cmd” in the search box and run the command
prompt. In the black command prompt dialog box type “ipconfig” and press enter.
You will be able to see your IP Address there.

 On Mac: Go to system preferences and select Network, you will be able to see the
information regarding your network which includes your IP Address.

 IP address security threats :


Each IP address is associated with virtual ports in a computer that acts as a doorway that
allows web applications or websites to send and receive data or information on your device.
If after the connection is terminated the ports remain open somehow, might allow hackers to
get into your device. Once, a hacker gets access to your device remotely through various
tools and viruses, they would be able to access all your stored files and data and your
computer hardware as well, which includes your webcam, mic, speaker, and all your
browsing history, your emails and saved passwords. These are some serious threats from
which we need to be extra careful.

Various online activities can reveal your IP address from playing games or accepting bad
cookies from a trap website or commenting on a website or forum. Once, they have your IP,
there are websites that help them get a decent idea of your location. They can further use
social media websites to track your online presence and cross verify everything that they got
from these sites and use your information for their benefits or can sell these data collected on
the dark web which can further exploit you.

The worst which I have seen in my friend’s pc got infected while he was installing an
application that he downloaded from a pirated website. The moment he hit install, a number
of command prompt boxes started appearing, tens of commands started running and after a
while, it was back to normal. Some malware was installed in the process. After a few days,
someone was trying to log in to his social media account and other accounts using his
computer as a host pc (his own IP address) but his computer was idle. The hacker was using
his pc and his network, i.e., his IP address to do some serious stuff. He formatted his
computer then and there, secured all his emails and other accounts, and changed all the
passwords and all the security measures that had to be taken.

Cybercriminals use different techniques to get hands-on with your IP address and know your
location, get into your network and hack into your computers. For instance, they will find you
through Skype which uses IP addresses to speak. If you are using these apps, it’s important to
notice that your IP address might be vulnerable. Attackers can use the various tools, where
they will find your IP address. Some of the threats are: Online stalking, downloading illegal
content using your IP address, tracking your location, directly attacking your network, and
hacking into your device.

 Protect and hide IP address :


To secure and hide your IP address from unwanted people always remember the following
points:

 Use a proxy server.

 Use a virtual private network (VPN) when using public Wi-Fi, you are traveling,
working remotely, or just want some privacy.

 Change privacy settings on instant messaging applications.

 Create unique passwords.

 Beware of phishing emails and malicious content.

 Use a good and paid antivirus application and keep it up to date.


 When you are using public wifi in a cafe or station or anywhere, you must hide your
IP address by using VPN. Getting your IP from public wifi is just a cakewalk for
these hackers and they are very good at stealing all your information while using your
computer’s address. There are different phishing techniques in which they email you,
call you, and SMS you about giving vital information about you. They give links to
vicious websites which are pre-rigged. The moment you open these websites, they
steal all your device’s information revealing all the information about you and your
device which are to be kept private. These leaks help the hackers to exploit your
device and install or download some spyware and malware on your device. But using
a good anti-virus gives you web security as well, which will prevent those websites to
launch and warn you about the information being passed to these websites.

 It is also not recommended to use torrent or pirated websites which are a threat to
your online identity and can compromise your device or emails or any other
information about you.

 Conclusion
Hopefully by now, you should have a working understanding of some of the networking
implications of the IP protocol. While dealing with this type of networking is not always
intuitive, and may be difficult to work with at times, it is important to understand what is
going on in order to configure your software and components correctly.

There are various calculators and tools online that will help you understand some of these
concepts and get the correct addresses and ranges that you need by typing in certain
information. CIDR.xyz provides a translation from decimal-based IP addresses to octets,
and lets you visualize different CIDR netmasks.

 References
1. www.google.com
2. www.unacademy.com
3. www.byjus.com

You might also like