Class A : 10.x.y.z
Class B : 172.16.x.y 至 172.31.x.y
Class C :192.168.x.y
这些私有的内联网地址不能直接访问公共 Internet ,需要通过 NAT 网络转换技术才能实现与外部公网之间的通讯
2、子网掩码 (Subnet Mask)
子网掩码是用来区分本地网络的部分和其他远程网络的一部分的一种工具 。它的作用是对给定的一个完整 IP 地址划分出哪些位属于 “网络” 部分而哪些则代表具体的 主机组 (即终端节点)。通俗来说就是用来判断两个 IP 是否在同一子网上,默认情况下相同前缀长度下的所有机器都处于同一个逻辑上的局部区域,并且可以直接相互通信无需经过路由转发机制;反之如果不在同一区域内,则必须借助于专门负责跨区传输任务的核心组件———路由器来进行信息传递工作.
A-class networks use an eight-bit prefix (/8), which means the first octet identifies the network and remaining three identify hosts within that particular segment.
B-class uses sixteen bits(/16)、Here two initial bytes determine what constitutes as valid address space while rest specifies individual devices connected through it respectively .
C-type employs twenty-four bit prefixes(/24); thus only last byte varies across different instances belonging same group whereas others remain constant throughout entire range defined above mentioned limits accordingly.
In addition to these predefined values there exist custom tailored solutions known collectively under term Variable Length Prefixes(VLPS).
VLPIs allow administrators flexibility when designing complex topologies involving multiple interconnected subnets spread over large geographical distances without having constraints imposed by rigid hierarchical structure enforced earlier versions of protocols like RFC791 etcetera..
For instance consider following scenario where we want create smaller divisions inside existing infrastructure but still retain ability reach beyond those borders easily whenever necessary...
Suppose our organization has been assigned block starting from say X.Y.Z.W up till Y.XZ.VW inclusive according standard conventions outlined previously then using appropriate combination techniques such as CIDR(Classless Inter-Domain Routing)
we could further split this resource pool into several distinct zones each possessing unique characteristics suited specific requirements demanded thereof yet maintaining overall integrity required proper functioning systemwide basis simultaneously too!
Let us take look at few examples illustrating how exactly这一切 works out practically speaking shall proceed stepwise manner ensuring clarity along way ahead !
Example 1 :Suppose We Have Been Given Range Starting From 192.168.、And Ending At .、Then Using Appropriate Combination Techniques Such As cidr(classles inter domain routing)
We Could Further Split This Resource Pool Into Several Distinct Zones Each Possessing Unique Characteristics Suited Specific Requirements Demanded Thereof Yet Maintaining Overall Integrity Required Proper Function System Wide Basis Simultaneously Too !
Now Let Us Consider Following Scenario Wherein Our Organization Has Be Assigned Block Starti