{"id":2636,"date":"2020-05-21T09:38:56","date_gmt":"2020-05-21T04:08:56","guid":{"rendered":"https:\/\/www.hostnamaste.com\/blog\/?p=2636"},"modified":"2025-11-29T20:10:48","modified_gmt":"2025-11-29T14:40:48","slug":"understanding-of-ip-addressing","status":"publish","type":"post","link":"https:\/\/www.hostnamaste.com\/blog\/understanding-of-ip-addressing\/","title":{"rendered":"Understanding of IP Addressing IPv4 IPv6 Netmasks Subnets and CIDR Notation Charts for Networking"},"content":{"rendered":"<figure id=\"attachment_2642\" aria-describedby=\"caption-attachment-2642\" style=\"width: 756px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2642\" src=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/Understanding-of-IP-Addressing-IPv4-IPv6-Netmasks-Subnets-and-CIDR-Notation-Charts-for-Networking-HostNamaste.jpg\" alt=\"Understanding of IP Addressing, IPv4, IPv6, Netmasks, Subnets and CIDR Notation Charts for Networking - HostNamaste\" width=\"756\" height=\"567\" srcset=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/Understanding-of-IP-Addressing-IPv4-IPv6-Netmasks-Subnets-and-CIDR-Notation-Charts-for-Networking-HostNamaste.jpg 512w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/Understanding-of-IP-Addressing-IPv4-IPv6-Netmasks-Subnets-and-CIDR-Notation-Charts-for-Networking-HostNamaste-300x225.jpg 300w\" sizes=\"auto, (max-width: 756px) 100vw, 756px\" \/><figcaption id=\"caption-attachment-2642\" class=\"wp-caption-text\"><span style=\"color: #333333; font-size: 12pt; font-family: Verdana, Geneva;\"><strong>Understanding of IP Addressing, IPv4, IPv6, Netmasks, Subnets and CIDR Notation Charts for Networking &#8211; HostNamaste<\/strong><\/span><\/figcaption><\/figure>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Internet is a group of computer networks, where each connected device has got an identifier that helps in its unique identification. This identifier is called an \u201cInternet Protocol address\u201d. It is expressed in the form of a number. In other words, every device linked to the net has a unique IP address. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">The two commonest types of IP address that are used are, Internet Protocol version 4 or IPV4, and Internet Protocol version 6 or IPv6. Both IPv4, as well as IPv6 addresses, are obtained from a finite pool of numbers. To understand IP addresses, you need to have a general idea about the binary numeral system. It is the fundamental unit for the storage of digital information.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Not all IP addresses contained in the pool of IPv4 or IPv6 can be used to assign it to the systems connected to the Internet. They are reserved for use in private networks. This shows that the total number of IP addresses available is less, than the total number of addresses available in the pool.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">If you want to understand the configuration of the complex environment on the internet, then it is important to get a clear understanding of networking. This knowledge is very much important when you are trying to make efficient communication between servers, build safe network policies, and keep the nodes organized.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">In this article, we are going to talk about specific concepts involved in interacting and designing with networked computers. We will also cover subnets, network classes, and CIDR Notation Charts to group IP addresses.<\/span><\/p>\n\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 24pt; font-family: Verdana, Geneva; color: #333333;\"><strong>What is IP Address?<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Every device or location present on the network has to have an address. Internet IP address is a unique identifier that lets you connect to the Internet. In other words, it is a unique number ID allocated to a particular interface (network connection), or host in a network. It is a numerical address, used for the identification of specific hardware linked to the Internet. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">IP addresses enable users to reach network resources through an interface. If a computer wishes to communicate with another computer, then it can address this information to the IP address of the remote computer. Each IP address has to be uniquely present on its network. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Networks can either be inaccessible from one another, or can be translated, or bridged to offer access between different networks. This system is referred to as Network Address Translation. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">These addresses can be written on the packets, as they traverse network borders till they reach their destination. IP Address translation enables the same IP address for use on several different isolated networks that enables configuration of devices to communicate effectively.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">The commonest versions of IP address used in present scenario are Internet Protocol version 4, and Internet Protocol version 6. IPv4 pool is 32-bits in size. It contains 4,294,967,296 IPv4 addresses. On the other hand, the IPv6 address space has a size of 128-bits. It contains:<\/span><\/p>\n<blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\"> 340,282,366,920,938,463,463,374,607,431,768,211,456 IPv6 addresses.<\/span><\/p>\n<\/blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">To use an IP address, Cisco advises you to get a basic understanding of decimals and binary numbers. A subnet is a part of a digital network and has its own subnet address. A subnet mask is a 32-bit combination that helps to describe the part of an address that denotes to the subnet. It also refers to the host.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">The 32 binary bits are divided into four octets, where one octet is equivalent to eight bits. Each of these octets gets converted into decimal. They are separated from each other by a period. Due to this reason, an IP address is expressed in the format of dotted decimals. The value in each of these octets ranges between 0 and 255 decimals, or 00000000 &#8211; 11111111 binary.<\/span><\/p>\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 24pt; font-family: Verdana, Geneva; color: #333333;\"><strong>Network Prefixes<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">IP addresses are obtained from the IPv4 pool or the IPv6 pool. They are divided into a host section or a network section. Where the host section recognizes the particular node, the latter section recognizes the particular network on the Local Area Network.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">IP addresses are allocated to digital networks in varying sizes of \u2018block&#8217;. These sizes are written after an oblique (\/). It shows the number of IP addresses that are present inside that specific block.<\/span><\/p>\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 24pt; font-family: Verdana, Geneva; color: #333333;\"><strong>What is IPv4 Address?<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">There are two amendments to the IP protocol that are presently implemented on systems. <span style=\"color: #99cc00;\"><strong><a style=\"color: #99cc00;\" href=\"https:\/\/en.wikipedia.org\/wiki\/IPv4\" target=\"_blank\" rel=\"noopener\">IPv4<\/a><\/strong><\/span> is the fourth version of the IP protocol that is supported by a majority of systems. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">IPV6 is the sixth revision that was introduced to make improvements in the IP protocol, and also to address the drawbacks of IPv4 address space. The number of addresses available via IPv4 was less than the number of internet-connected devices, and that led to the need for IPV6 addresses. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Here, each byte (a collection of eight bits) of the address, is bifurcated by a period. It is denoted as a number that ranges between 0 and 255. A typical IPv4 address will resemble like 192.168.0.5. When this address is expressed in binary form, then it will look like 1100 0000 &#8211; 1010 1000 &#8211; 0000 0000 &#8211; 0000 0101.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">As there are 32 bits present in IPv4 address space, if a network comprises of the address \u201c192.0.2.0\/24\u201d, it reveals that there are 24 number of bits present in the network. With this information, one can easily find the remaining number of bits for address space. IPv4 networks have got thirty-two bits. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Each of these sections is characterized by the decimal points that comprise eight bits, \u201c192.0.2.0\/24\u201d that contains IP addresses of users. This space is sufficient to accommodate 256 host addresses that are essential to connect the machine to the Internet.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">A network that is numbered as \u201c10.0.0.0\/8\u201d is a network that has eight bits of the network prefix. It is characterized by \u201c\/8\u201d after the oblique. It denotes that there are twenty-four bits left on the digital network to contain IPv4 host IP addresses: 16,777,216 addresses.<\/span><\/p>\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 22pt; font-family: Verdana, Geneva; color: #333333;\"><strong>Classless Inter-Domain Routing (CIDR) Notation Chart<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">The concept of Classless Inter-Domain Routing was introduced to enhance the utilization of address space and routing scalability on the Internet. It is required for the quick development of the Internet and the IP routing tables that are contained in the Internet routers.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">CIDR is different from the traditional IP classes as Class A, Class B, Class C, etc. In this method, an IP network is expressed with the help of a prefix. This prefix is an IP address that denotes the length of the subnet mask. In other words, a network \u201c172.16.0.0 255.255.0.0\u201d can also be represented in the form of 172.16.0.0\/16.<\/span><\/p>\n<h2 lang=\"en-US\"><span style=\"font-family: Verdana, Geneva; color: #333333;\"><span style=\"font-size: 24pt;\"><strong>IPv4 CIDR Chart<\/strong><\/span><\/span><\/h2>\n<figure id=\"attachment_2648\" aria-describedby=\"caption-attachment-2648\" style=\"width: 713px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2648 size-full\" title=\"IPv4 CIDR Chart - HostNamaste\" src=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/IPv4-CIDR-Chart-HostNamaste.jpg\" alt=\"IPv4 CIDR Chart - HostNamaste\" width=\"713\" height=\"986\" srcset=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/IPv4-CIDR-Chart-HostNamaste.jpg 713w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/IPv4-CIDR-Chart-HostNamaste-217x300.jpg 217w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><figcaption id=\"caption-attachment-2648\" class=\"wp-caption-text\"><span style=\"font-family: Verdana, Geneva; color: #333333;\"><strong><span style=\"font-size: 12pt;\">IPv4 CIDR Chart &#8211; HostNamaste &#8211; Image Source:\u00a0ripe.net<\/span><\/strong><\/span><\/figcaption><\/figure>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">CIDR denotes represents a hierarchical form of Internet architecture, where every domain obtained its IP addresses and the summarization of the domains is carried out at a higher level. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">The Classless Inter-Domain Routing, or the CIDR Chart is used by running networks and aids in the management of IP addresses. The chart allows you to figure out how many IP addresses are contained within every single \u201cslash notation\u201d along with the size of \u201cslash notation\u201d in the form of bits.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Classless Inter-Domain Routing is a substitute conventional form of subnetting. Using this chart helps you add a specification in the IP address to the significant bits that form the <span style=\"color: #99cc00;\"><strong><a style=\"color: #99cc00;\" href=\"https:\/\/www.hostnamaste.com\/blog\/what-is-rir-in-networking\/\">Networking<\/a><\/strong><\/span> Portion.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">For example, the IP address 192.168.0.15 is linked with netmask 255.255.255.0. It is expressed as the CIDR \u201c192.168.0.15\/24\u201d. The initial 24 bits of this address are considered important for the network routing.<\/span><\/p>\n<h2 lang=\"en-US\"><span style=\"font-family: Verdana, Geneva; color: #333333;\"><span style=\"font-size: 24pt;\"><strong>IPv6 CIDR Chart<\/strong><\/span><\/span><\/h2>\n<figure id=\"attachment_2649\" aria-describedby=\"caption-attachment-2649\" style=\"width: 711px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2649 size-full\" title=\"IPv6 CIDR Chart - HostNamaste\" src=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/IPv6-CIDR-Chart-HostNamaste.png\" alt=\"IPv6 CIDR Chart - HostNamaste\" width=\"711\" height=\"982\" srcset=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/IPv6-CIDR-Chart-HostNamaste.png 711w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2020\/05\/IPv6-CIDR-Chart-HostNamaste-217x300.png 217w\" sizes=\"auto, (max-width: 711px) 100vw, 711px\" \/><figcaption id=\"caption-attachment-2649\" class=\"wp-caption-text\"><span style=\"font-family: Verdana, Geneva; color: #333333;\"><strong><span style=\"font-size: 12pt;\">IPv6 CIDR Chart &#8211; HostNamaste &#8211; Image Source:\u00a0ripe.net<\/span><\/strong><\/span><\/figcaption><\/figure>\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 24pt; font-family: Verdana, Geneva; color: #333333;\"><strong>Network Masks and Subnets<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">A network mask tells about what part of the address denotes the network and what part of it denotes the node. Class A, Class B, and Class C networks will have specific subnet masks as default. They are also called as natural masks and are shown as:<\/span><\/p>\n<blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 Class A is represented as 255.0.0.0<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 Class B is represented as 255.255.0.0<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 Class C is represented as 255.255.255.0<\/span><\/p>\n<\/blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">An IP address present on a Class A network that is not subnetted will have an IP address or pair of subnet mask that is similar to: 8.20.15.1 255.0.0.0. If you wish to see in what ways the mask identifies the node parts of the address, and the network, you need to convert the address followed by masking to its binary equivalent numbers.<\/span><\/p>\n<blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 8.20.15.1 is equivalent to 00001000.00010100.00001111.00000001<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 255.0.0.0 is equivalent to 11111111.00000000.00000000.00000000<\/span><\/p>\n<\/blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">When the mask and the address are presented in binary, then it eases the identification of the host ID and network. Address bits that have corresponding subnet mask bit set to one show the network ID. If the address bits that have mask bits set to zero, then it shows the node ID.<\/span><\/p>\n<blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 8.20.15.1 is equivalent to 00001000.00010100.00001111.00000001<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 255.0.0.0 is equivalent to 11111111.00000000.00000000.00000000<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 Network ID is 00001000 = 8 bits<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 Host ID is 00010100.00001111.00000001 = 20.15.1<\/span><\/p>\n<\/blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Using subnetting, you can form various logical networks in a single Class A, Class B, or Class C network. In the absence of a subnet, you can only use one network from the Class A, Class B, or Class C network.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Each data link present on the network comprised of a unique network identification number, with every node present on that link denotes a member of that same network. On breaking a major network as Class A, Class B, or Class C into smaller subnetworks, you can easily form a network of interconnecting subnetworks. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Each data link present on the network will have a distinctive network or subnetwork ID. Any gateway or device that connects to the networks or subnetworks has got a distinctive address, that comprise of one address for each network or subnetwork to which it connects.<\/span><\/p>\n<blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.0 255.255.255.224 host address ranges between 1 and 30<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.32 255.255.255.224 host address range between 33 and 62<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.64 255.255.255.224 host address ranges between 65 and 94<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.96 255.255.255.224 host address ranges between 97 and 126<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.128 255.255.255.224 host address ranges between 129 and 158<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.160 255.255.255.224 host address ranges between 161 and 190<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.192 255.255.255.224 host address ranges between 193 and 222<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 204.17.5.224 255.255.255.224 host address ranges between 225 and 254<\/span><\/p>\n<\/blockquote>\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 24pt; font-family: Verdana, Geneva; color: #333333;\"><strong>What is IPv6 Address?<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\"><span style=\"color: #99cc00;\"><strong><a style=\"color: #99cc00;\" href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6\" target=\"_blank\" rel=\"noopener\">IPv6<\/a><\/strong><\/span> is quite similar to IPv4 and was developed to fulfill the growing needs of IP addresses. It is organized so that all Local Area Networks have 64 bits of network prefix in contrast to the variable length of network prefix1 that is held by IPv4 networks. All IPv6 networks provide space to accommodate 18,446,744,073,709,551,616 IPv6 addresses.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Presently, most ISPs allocate \/48 network prefixes to the sites of subscribers (the End Users&#8217; networks). As all IPv6 networks comprise of \/64 prefixes, network prefix with \u201c\/48\u201d enables 65,536 Local area networks in the site of the end-user.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">The present minimum IPv6 allocation formed by the RIPE NCC is a \u201c\/32\u201d network prefix. If the LIR made \/48 assignments using s \/32 network prefix, then they can make 65,536 \/48 assignments. If they only allocated \/56 network prefixes, then they have 24 bits free to make 16,777,216 \/56 assignments.<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">If a \/24 IPv6 assignment is made to the LIR, then it would make 4,294,967,296 \/56, assignments, and 16,777,216 \/48 assignments. There are around 4,294,967,296 IPv4 addresses that are significantly lesser in number as compared to the total number of IPv6 addresses.<\/span><\/p>\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 24pt; font-family: Verdana, Geneva; color: #333333;\"><strong>IPv6 Relative Network Sizes<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Below are the sizes of relative IPV6 network:<\/span><\/p>\n<blockquote>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 \/128 1 IPv6 address: A network interface<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 \/64 1 IPv6 subnet: 18,446,744,073,709,551,616 <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 \/56 256 LAN segments: Popular size of prefix for each subscriber site<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 \/48 65,536 LAN segments: Popular prefix size for each subscriber site<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 \/32 65,536 \/48 subscriber sites: Minimum IPv6 allocation<\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">\u2022 \/24 16,777,216 subscriber sites: 256 times greater than the minimum number of IPv6 allocation<\/span><\/p>\n<\/blockquote>\n<h2><span style=\"font-size: 24pt;\"><strong><span style=\"color: #333333; font-family: Verdana, Geneva;\">What is the Difference Between IPv4 and IPv6 Addresses<\/span><\/strong><\/span><\/h2>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">Both IPv4 and IPv6 are using binary numbers: IPv4 is 32 bit binary number and IPv6 is a 128 bit binary number address. IPv4 address is separated by a dot (.) and IPv6 address is separated by a colon (:).\u00a0<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva;\"><strong><span style=\"font-size: 14pt;\"><strong>Example:<\/strong><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\"><strong>IPv4:<\/strong> 127.255.255.255<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\"><strong>IPv6:<\/strong>\u00a02001:0db8:85a3:0000:0000:8a2e:0370:7334<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva;\"><div class=\"supsystic-table-loader la-ball-beat la-2x\" style=\"color:#ff6a00\"><div><\/div><div><\/div><div><\/div><\/div><div id=\"supsystic-table-2_90571\" class=\"supsystic-tables-wrap \" style=\" visibility: hidden; \" ><table id=\"supsystic-table-2\" class=\"supsystic-table compact border stripe hover order-column lightboxImg cell-border\" data-id=\"2\" data-view-id=\"2_90571\" data-title=\"IPv4 Vs IPv6\" data-currency-format=\"$1,000.00\" data-percent-format=\"10.00%\" data-date-format=\"DD.MM.YYYY\" data-time-format=\"HH:mm\" data-features=\"[&quot;searching&quot;,&quot;after_table_loaded_script&quot;,&quot;auto_width&quot;]\" data-search-value=\"\" data-lightbox-img=\"\" data-head-rows-count=\"1\" data-foot=\"on\" data-foot-custom-rows-count=\"1\" data-fixed-foot=\"on\" data-fixed-height = \"400\" data-fixed-cols=\"on\" data-fixed-left=\"1\" data-fixed-right=\"0\" data-pagination-length=\"50,100,All\" data-auto-index=\"off\" data-searching-settings=\"{&quot;columnSearchPosition&quot;:&quot;bottom&quot;,&quot;minChars&quot;:&quot;0&quot;}\" data-lang=\"default\" data-override=\"{&quot;emptyTable&quot;:&quot;&quot;,&quot;info&quot;:&quot;&quot;,&quot;infoEmpty&quot;:&quot;&quot;,&quot;infoFiltered&quot;:&quot;&quot;,&quot;lengthMenu&quot;:&quot;&quot;,&quot;search&quot;:&quot;&quot;,&quot;zeroRecords&quot;:&quot;&quot;,&quot;exportLabel&quot;:&quot;&quot;,&quot;file&quot;:&quot;default&quot;}\" data-merged=\"[]\" data-responsive-mode=\"0\" data-from-history=\"0\" ><thead><tr><th class=\"\" style=\"width:; padding: 0 !important;\"><\/th><th class=\"\" style=\"width:; padding: 0 !important;\"><\/th><th class=\"\" style=\"width:; padding: 0 !important;\"><\/th><\/tr><\/thead><tbody><tr style=\"height:px\" ><td data-cell-id=\"A1\" data-x=\"0\" data-y=\"1\" data-db-index=\"1\" class=\"color-ff6a00 bold htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"Points of Difference\" data-order=\"Points of Difference\" >Points of Difference <\/td><td data-cell-id=\"B1\" data-x=\"1\" data-y=\"1\" data-db-index=\"1\" class=\"color-ff6a00 bold htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"IPv4 Address\" data-order=\"IPv4 Address\" >IPv4 Address <\/td><td data-cell-id=\"C1\" data-x=\"2\" data-y=\"1\" data-db-index=\"1\" class=\"color-ff6a00 bold htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"IPv6 Address\" data-order=\"IPv6 Address\" >IPv6 Address <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A2\" data-x=\"0\" data-y=\"2\" data-db-index=\"2\" class=\"color-ff6a00 bold htCenter\" data-cell-type=\"text\" data-original-value=\"Addressing Method\" data-order=\"Addressing Method\" >Addressing Method <\/td><td data-cell-id=\"B2\" data-x=\"1\" data-y=\"2\" data-db-index=\"2\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv4 is a numeric address, and its binary bits are separated by a dot (.)\" data-order=\"IPv4 is a numeric address, and its binary bits are separated by a dot (.)\" >IPv4 is a numeric address, and its binary bits are separated by a dot (.) <\/td><td data-cell-id=\"C2\" data-x=\"2\" data-y=\"2\" data-db-index=\"2\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv6 is an alphanumeric address whose binary bits are separated by a colon (:). It also contains hexadecimal.\" data-order=\"IPv6 is an alphanumeric address whose binary bits are separated by a colon (:). It also contains hexadecimal.\" >IPv6 is an alphanumeric address whose binary bits are separated by a colon (:). It also contains hexadecimal. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A3\" data-x=\"0\" data-y=\"3\" data-db-index=\"3\" class=\"bold color-ff6a00 htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"Example\" data-order=\"Example\" >Example <\/td><td data-cell-id=\"B3\" data-x=\"1\" data-y=\"3\" data-db-index=\"3\" class=\"htCenter bold color-333333\" data-cell-type=\"text\" data-original-value=\"127.255.255.255\" data-order=\"127.255.255.255\" >127.255.255.255 <\/td><td data-cell-id=\"C3\" data-x=\"2\" data-y=\"3\" data-db-index=\"3\" class=\"htCenter bold color-333333\" data-cell-type=\"text\" data-original-value=\"2001:0db8:85a3:0000:0000:8a2e:0370:7334\" data-order=\"2001:0db8:85a3:0000:0000:8a2e:0370:7334\" >2001:0db8:85a3:0000:0000:8a2e:0370:7334 <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A4\" data-x=\"0\" data-y=\"4\" data-db-index=\"4\" class=\"color-ff6a00 bold htCenter\" data-cell-type=\"text\" data-original-value=\"Size of IP Address\" data-order=\"Size of IP Address\" >Size of IP Address <\/td><td data-cell-id=\"B4\" data-x=\"1\" data-y=\"4\" data-db-index=\"4\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv4 is a 32-Bit IP Address\" data-order=\"IPv4 is a 32-Bit IP Address\" >IPv4 is a 32-Bit IP Address <\/td><td data-cell-id=\"C4\" data-x=\"2\" data-y=\"4\" data-db-index=\"4\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv6 is 128 Bit IP Address\" data-order=\"IPv6 is 128 Bit IP Address\" >IPv6 is 128 Bit IP Address <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A5\" data-x=\"0\" data-y=\"5\" data-db-index=\"5\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Number of Header Fields\" data-order=\"Number of Header Fields\" >Number of Header Fields <\/td><td data-cell-id=\"B5\" data-x=\"1\" data-y=\"5\" data-db-index=\"5\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-cell-format-type=\"number\" data-original-value=\"12\" data-order=\"12\" >12 <\/td><td data-cell-id=\"C5\" data-x=\"2\" data-y=\"5\" data-db-index=\"5\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-cell-format-type=\"number\" data-original-value=\"8\" data-order=\"8\" >8 <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A6\" data-x=\"0\" data-y=\"6\" data-db-index=\"6\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Length of Header Diled\" data-order=\"Length of Header Diled\" >Length of Header Diled <\/td><td data-cell-id=\"B6\" data-x=\"1\" data-y=\"6\" data-db-index=\"6\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-cell-format-type=\"number\" data-original-value=\"20\" data-order=\"20\" >20 <\/td><td data-cell-id=\"C6\" data-x=\"2\" data-y=\"6\" data-db-index=\"6\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-cell-format-type=\"number\" data-original-value=\"40\" data-order=\"40\" >40 <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A7\" data-x=\"0\" data-y=\"7\" data-db-index=\"7\" class=\"bold color-ff6a00 htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"Checksum\" data-order=\"Checksum\" >Checksum <\/td><td data-cell-id=\"B7\" data-x=\"1\" data-y=\"7\" data-db-index=\"7\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Has checksum fields\" data-order=\"Has checksum fields\" >Has checksum fields <\/td><td data-cell-id=\"C7\" data-x=\"2\" data-y=\"7\" data-db-index=\"7\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Does not have checksum fields\" data-order=\"Does not have checksum fields\" >Does not have checksum fields <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A8\" data-x=\"0\" data-y=\"8\" data-db-index=\"8\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Type of Addresses\" data-order=\"Type of Addresses\" >Type of Addresses <\/td><td data-cell-id=\"B8\" data-x=\"1\" data-y=\"8\" data-db-index=\"8\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Unicast, broadcast, and multicast.\" data-order=\"Unicast, broadcast, and multicast.\" >Unicast, broadcast, and multicast. <\/td><td data-cell-id=\"C8\" data-x=\"2\" data-y=\"8\" data-db-index=\"8\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Unicast, multicast and anycast.\" data-order=\"Unicast, multicast and anycast.\" >Unicast, multicast and anycast. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A9\" data-x=\"0\" data-y=\"9\" data-db-index=\"9\" class=\"bold color-ff6a00 htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"Configuration\" data-order=\"Configuration\" >Configuration <\/td><td data-cell-id=\"B9\" data-x=\"1\" data-y=\"9\" data-db-index=\"9\" class=\"htCenter bold color-333333\" data-cell-type=\"text\" data-original-value=\"It requires to configure on the system before it can be used to communicate with other sytems.\" data-order=\"It requires to configure on the system before it can be used to communicate with other sytems.\" >It requires to configure on the system before it can be used to communicate with other sytems. <\/td><td data-cell-id=\"C9\" data-x=\"2\" data-y=\"9\" data-db-index=\"9\" class=\"htCenter bold color-333333\" data-cell-type=\"text\" data-original-value=\"It is optional, and configuration depends upon the requirements.\" data-order=\"It is optional, and configuration depends upon the requirements.\" >It is optional, and configuration depends upon the requirements. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A10\" data-x=\"0\" data-y=\"10\" data-db-index=\"10\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"VLSM (Virtual Length Subnet Mask) Support\" data-order=\"VLSM (Virtual Length Subnet Mask) Support\" >VLSM (Virtual Length Subnet Mask) Support <\/td><td data-cell-id=\"B10\" data-x=\"1\" data-y=\"10\" data-db-index=\"10\" class=\"htCenter bold color-333333\" data-cell-type=\"text\" data-original-value=\"IPv4 Supports VLSM.\" data-order=\"IPv4 Supports VLSM.\" >IPv4 Supports VLSM. <\/td><td data-cell-id=\"C10\" data-x=\"2\" data-y=\"10\" data-db-index=\"10\" class=\"htCenter bold color-333333\" data-cell-type=\"text\" data-original-value=\"IPv6 Does Not Support VLSM.\" data-order=\"IPv6 Does Not Support VLSM.\" >IPv6 Does Not Support VLSM. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A11\" data-x=\"0\" data-y=\"11\" data-db-index=\"11\" class=\"bold color-ff6a00 htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"Fragmentation\" data-order=\"Fragmentation\" >Fragmentation <\/td><td data-cell-id=\"B11\" data-x=\"1\" data-y=\"11\" data-db-index=\"11\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Fragmentation is done by sending and forwarding routes.\" data-order=\"Fragmentation is done by sending and forwarding routes.\" >Fragmentation is done by sending and forwarding routes. <\/td><td data-cell-id=\"C11\" data-x=\"2\" data-y=\"11\" data-db-index=\"11\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Fragmentation is done by the sender.\" data-order=\"Fragmentation is done by the sender.\" >Fragmentation is done by the sender. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A12\" data-x=\"0\" data-y=\"12\" data-db-index=\"12\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Routing Information Protocol (RIP)\" data-order=\"Routing Information Protocol (RIP)\" >Routing Information Protocol (RIP) <\/td><td data-cell-id=\"B12\" data-x=\"1\" data-y=\"12\" data-db-index=\"12\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"RIP is a routing protocol supported by the routed daemon.\" data-order=\"RIP is a routing protocol supported by the routed daemon.\" >RIP is a routing protocol supported by the routed daemon. <\/td><td data-cell-id=\"C12\" data-x=\"2\" data-y=\"12\" data-db-index=\"12\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"RIP does not support IPv6. It uses static routes.\" data-order=\"RIP does not support IPv6. It uses static routes.\" >RIP does not support IPv6. It uses static routes. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A13\" data-x=\"0\" data-y=\"13\" data-db-index=\"13\" class=\"bold color-ff6a00 htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"Network Configuration\" data-order=\"Network Configuration\" >Network Configuration <\/td><td data-cell-id=\"B13\" data-x=\"1\" data-y=\"13\" data-db-index=\"13\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Networks need to be configured either manually or with DHCP. IPv4 had several overlays to handle Internet growth, which require more maintenance efforts.\" data-order=\"Networks need to be configured either manually or with DHCP. IPv4 had several overlays to handle Internet growth, which require more maintenance efforts.\" >Networks need to be configured either manually or with DHCP. IPv4 had several overlays to handle Internet growth, which require more maintenance efforts. <\/td><td data-cell-id=\"C13\" data-x=\"2\" data-y=\"13\" data-db-index=\"13\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv6 support autoconfiguration capabilities.\" data-order=\"IPv6 support autoconfiguration capabilities.\" >IPv6 support autoconfiguration capabilities. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A14\" data-x=\"0\" data-y=\"14\" data-db-index=\"14\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Best Feature\" data-order=\"Best Feature\" >Best Feature <\/td><td data-cell-id=\"B14\" data-x=\"1\" data-y=\"14\" data-db-index=\"14\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Widespread use of NAT (Network address translation) devices which allows single NAT address can mask thousands of non-routable addresses, making end-to-end integrity achievable.\" data-order=\"Widespread use of NAT (Network address translation) devices which allows single NAT address can mask thousands of non-routable addresses, making end-to-end integrity achievable.\" >Widespread use of NAT (Network address translation) devices which allows single NAT address can mask thousands of non-routable addresses, making end-to-end integrity achievable. <\/td><td data-cell-id=\"C14\" data-x=\"2\" data-y=\"14\" data-db-index=\"14\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"It allows direct addressing because of vast address Space.\" data-order=\"It allows direct addressing because of vast address Space.\" >It allows direct addressing because of vast address Space. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A15\" data-x=\"0\" data-y=\"15\" data-db-index=\"15\" class=\"bold color-ff6a00 htCenter bg-fafafa\" data-cell-type=\"text\" data-original-value=\"Address Mask\" data-order=\"Address Mask\" >Address Mask <\/td><td data-cell-id=\"B15\" data-x=\"1\" data-y=\"15\" data-db-index=\"15\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Use for the designated network from host portion.\" data-order=\"Use for the designated network from host portion.\" >Use for the designated network from host portion. <\/td><td data-cell-id=\"C15\" data-x=\"2\" data-y=\"15\" data-db-index=\"15\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Not used.\" data-order=\"Not used.\" >Not used. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A16\" data-x=\"0\" data-y=\"16\" data-db-index=\"16\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"SNMP\" data-order=\"SNMP\" >SNMP <\/td><td data-cell-id=\"B16\" data-x=\"1\" data-y=\"16\" data-db-index=\"16\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"SNMP is a protocol used for system management.\" data-order=\"SNMP is a protocol used for system management.\" >SNMP is a protocol used for system management. <\/td><td data-cell-id=\"C16\" data-x=\"2\" data-y=\"16\" data-db-index=\"16\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"SNMP does not support IPv6.\" data-order=\"SNMP does not support IPv6.\" >SNMP does not support IPv6. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A17\" data-x=\"0\" data-y=\"17\" data-db-index=\"17\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Mobility &amp; Interoperability\" data-order=\"Mobility &amp; Interoperability\" >Mobility & Interoperability <\/td><td data-cell-id=\"B17\" data-x=\"1\" data-y=\"17\" data-db-index=\"17\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Relatively constrained network topologies to which move restrict mobility and interoperability capabilities.\" data-order=\"Relatively constrained network topologies to which move restrict mobility and interoperability capabilities.\" >Relatively constrained network topologies to which move restrict mobility and interoperability capabilities. <\/td><td data-cell-id=\"C17\" data-x=\"2\" data-y=\"17\" data-db-index=\"17\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv6 provides interoperability and mobility capabilities which are embedded in network devices.\" data-order=\"IPv6 provides interoperability and mobility capabilities which are embedded in network devices.\" >IPv6 provides interoperability and mobility capabilities which are embedded in network devices. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A18\" data-x=\"0\" data-y=\"18\" data-db-index=\"18\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Security\" data-order=\"Security\" >Security <\/td><td data-cell-id=\"B18\" data-x=\"1\" data-y=\"18\" data-db-index=\"18\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Security is dependent on applications - IPv4 was not designed with security in mind.\" data-order=\"Security is dependent on applications - IPv4 was not designed with security in mind.\" >Security is dependent on applications - IPv4 was not designed with security in mind. <\/td><td data-cell-id=\"C18\" data-x=\"2\" data-y=\"18\" data-db-index=\"18\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPSec (Internet Protocol Security) is built into the IPv6 protocol, usable with a proper key infrastructure.\" data-order=\"IPSec (Internet Protocol Security) is built into the IPv6 protocol, usable with a proper key infrastructure.\" >IPSec (Internet Protocol Security) is built into the IPv6 protocol, usable with a proper key infrastructure. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A19\" data-x=\"0\" data-y=\"19\" data-db-index=\"19\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Packet Size\" data-order=\"Packet Size\" >Packet Size <\/td><td data-cell-id=\"B19\" data-x=\"1\" data-y=\"19\" data-db-index=\"19\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Packet size 576 bytes required, fragmentation optional\" data-order=\"Packet size 576 bytes required, fragmentation optional\" >Packet size 576 bytes required, fragmentation optional <\/td><td data-cell-id=\"C19\" data-x=\"2\" data-y=\"19\" data-db-index=\"19\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"1208 bytes required without fragmentation\" data-order=\"1208 bytes required without fragmentation\" >1208 bytes required without fragmentation <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A20\" data-x=\"0\" data-y=\"20\" data-db-index=\"20\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Packet Fragmentation\" data-order=\"Packet Fragmentation\" >Packet Fragmentation <\/td><td data-cell-id=\"B20\" data-x=\"1\" data-y=\"20\" data-db-index=\"20\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Allows from routers and sending host\" data-order=\"Allows from routers and sending host\" >Allows from routers and sending host <\/td><td data-cell-id=\"C20\" data-x=\"2\" data-y=\"20\" data-db-index=\"20\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Sending hosts only\" data-order=\"Sending hosts only\" >Sending hosts only <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A21\" data-x=\"0\" data-y=\"21\" data-db-index=\"21\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Packet Header\" data-order=\"Packet Header\" >Packet Header <\/td><td data-cell-id=\"B21\" data-x=\"1\" data-y=\"21\" data-db-index=\"21\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Does not identify packet flow for QoS handling which includes checksum options.\" data-order=\"Does not identify packet flow for QoS handling which includes checksum options.\" >Does not identify packet flow for QoS handling which includes checksum options. <\/td><td data-cell-id=\"C21\" data-x=\"2\" data-y=\"21\" data-db-index=\"21\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Packet head contains Flow Label field that specifies packet flow for QoS handling\" data-order=\"Packet head contains Flow Label field that specifies packet flow for QoS handling\" >Packet head contains Flow Label field that specifies packet flow for QoS handling <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A22\" data-x=\"0\" data-y=\"22\" data-db-index=\"22\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"DNS Records\" data-order=\"DNS Records\" >DNS Records <\/td><td data-cell-id=\"B22\" data-x=\"1\" data-y=\"22\" data-db-index=\"22\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Address (A) records, maps hostnames\" data-order=\"Address (A) records, maps hostnames\" >Address (A) records, maps hostnames <\/td><td data-cell-id=\"C22\" data-x=\"2\" data-y=\"22\" data-db-index=\"22\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Address (AAAA) records, maps hostnames\" data-order=\"Address (AAAA) records, maps hostnames\" >Address (AAAA) records, maps hostnames <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A23\" data-x=\"0\" data-y=\"23\" data-db-index=\"23\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Address Configuration\" data-order=\"Address Configuration\" >Address Configuration <\/td><td data-cell-id=\"B23\" data-x=\"1\" data-y=\"23\" data-db-index=\"23\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Manual or via DHCP\" data-order=\"Manual or via DHCP\" >Manual or via DHCP <\/td><td data-cell-id=\"C23\" data-x=\"2\" data-y=\"23\" data-db-index=\"23\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Stateless address autoconfiguration using Internet Control Message Protocol version 6 (ICMPv6) or DHCPv6\" data-order=\"Stateless address autoconfiguration using Internet Control Message Protocol version 6 (ICMPv6) or DHCPv6\" >Stateless address autoconfiguration using Internet Control Message Protocol version 6 (ICMPv6) or DHCPv6 <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A24\" data-x=\"0\" data-y=\"24\" data-db-index=\"24\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"IP to MAC resolution\" data-order=\"IP to MAC resolution\" >IP to MAC resolution <\/td><td data-cell-id=\"B24\" data-x=\"1\" data-y=\"24\" data-db-index=\"24\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Broadcast ARP\" data-order=\"Broadcast ARP\" >Broadcast ARP <\/td><td data-cell-id=\"C24\" data-x=\"2\" data-y=\"24\" data-db-index=\"24\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Multicast Neighbour Solicitation\" data-order=\"Multicast Neighbour Solicitation\" >Multicast Neighbour Solicitation <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A25\" data-x=\"0\" data-y=\"25\" data-db-index=\"25\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Local Subnet Group Management\" data-order=\"Local Subnet Group Management\" >Local Subnet Group Management <\/td><td data-cell-id=\"B25\" data-x=\"1\" data-y=\"25\" data-db-index=\"25\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Internet Group Management Protocol GMP)\" data-order=\"Internet Group Management Protocol GMP)\" >Internet Group Management Protocol GMP) <\/td><td data-cell-id=\"C25\" data-x=\"2\" data-y=\"25\" data-db-index=\"25\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Multicast Listener Discovery (MLD)\" data-order=\"Multicast Listener Discovery (MLD)\" >Multicast Listener Discovery (MLD) <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A26\" data-x=\"0\" data-y=\"26\" data-db-index=\"26\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Optional Fields\" data-order=\"Optional Fields\" >Optional Fields <\/td><td data-cell-id=\"B26\" data-x=\"1\" data-y=\"26\" data-db-index=\"26\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Has Optional Fields\" data-order=\"Has Optional Fields\" >Has Optional Fields <\/td><td data-cell-id=\"C26\" data-x=\"2\" data-y=\"26\" data-db-index=\"26\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Does not have optional fields. But Extension headers are available.\" data-order=\"Does not have optional fields. But Extension headers are available.\" >Does not have optional fields. But Extension headers are available. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A27\" data-x=\"0\" data-y=\"27\" data-db-index=\"27\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"IPSec\" data-order=\"IPSec\" >IPSec <\/td><td data-cell-id=\"B27\" data-x=\"1\" data-y=\"27\" data-db-index=\"27\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Internet Protocol Security (IPSec) concerning network security is optional\" data-order=\"Internet Protocol Security (IPSec) concerning network security is optional\" >Internet Protocol Security (IPSec) concerning network security is optional <\/td><td data-cell-id=\"C27\" data-x=\"2\" data-y=\"27\" data-db-index=\"27\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Internet Protocol Security (IPSec) Concerning network security is mandatory\" data-order=\"Internet Protocol Security (IPSec) Concerning network security is mandatory\" >Internet Protocol Security (IPSec) Concerning network security is mandatory <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A28\" data-x=\"0\" data-y=\"28\" data-db-index=\"28\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Dynamic Host Configuration Server\" data-order=\"Dynamic Host Configuration Server\" >Dynamic Host Configuration Server <\/td><td data-cell-id=\"B28\" data-x=\"1\" data-y=\"28\" data-db-index=\"28\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Clients have approach DHCS (Dynamic Host Configuration server) whenever they want to connect to a network.\" data-order=\"Clients have approach DHCS (Dynamic Host Configuration server) whenever they want to connect to a network.\" >Clients have approach DHCS (Dynamic Host Configuration server) whenever they want to connect to a network. <\/td><td data-cell-id=\"C28\" data-x=\"2\" data-y=\"28\" data-db-index=\"28\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"A Client does not have to approach any such server as they are given permanent addresses.\" data-order=\"A Client does not have to approach any such server as they are given permanent addresses.\" >A Client does not have to approach any such server as they are given permanent addresses. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A29\" data-x=\"0\" data-y=\"29\" data-db-index=\"29\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Combability with Mobile Devices\" data-order=\"Combability with Mobile Devices\" >Combability with Mobile Devices <\/td><td data-cell-id=\"B29\" data-x=\"1\" data-y=\"29\" data-db-index=\"29\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv4 address uses the dot-decimal notation. That&#039;s why it is not suitable for mobile networks.\" data-order=\"IPv4 address uses the dot-decimal notation. That&#039;s why it is not suitable for mobile networks.\" >IPv4 address uses the dot-decimal notation. That's why it is not suitable for mobile networks. <\/td><td data-cell-id=\"C29\" data-x=\"2\" data-y=\"29\" data-db-index=\"29\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"IPv6 address is represented in hexadecimal, colon- separated notation. IPv6 is better suited to mobile networks.\" data-order=\"IPv6 address is represented in hexadecimal, colon- separated notation. IPv6 is better suited to mobile networks.\" >IPv6 address is represented in hexadecimal, colon- separated notation. IPv6 is better suited to mobile networks. <\/td><\/tr><tr style=\"height:px\" ><td data-cell-id=\"A30\" data-x=\"0\" data-y=\"30\" data-db-index=\"30\" class=\"bold color-ff6a00 htCenter\" data-cell-type=\"text\" data-original-value=\"Mapping\" data-order=\"Mapping\" >Mapping <\/td><td data-cell-id=\"B30\" data-x=\"1\" data-y=\"30\" data-db-index=\"30\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Uses ARP(Address Resolution Protocol) to map to MAC address\" data-order=\"Uses ARP(Address Resolution Protocol) to map to MAC address\" >Uses ARP(Address Resolution Protocol) to map to MAC address <\/td><td data-cell-id=\"C30\" data-x=\"2\" data-y=\"30\" data-db-index=\"30\" class=\"bold htCenter color-333333\" data-cell-type=\"text\" data-original-value=\"Uses NDP (Neighbour Discovery Protocol) to map to MAC address\" data-order=\"Uses NDP (Neighbour Discovery Protocol) to map to MAC address\" >Uses NDP (Neighbour Discovery Protocol) to map to MAC address <\/td><\/tr><\/tbody><tfoot><tr><th data-cell-id=\"A31\" data-x=\"0\" data-y=\"31\" data-db-index=\"31\" class=\"\" data-cell-type=\"text\" data-original-value=\"\" data-order=\"\" ><\/th><th data-cell-id=\"B31\" data-x=\"1\" data-y=\"31\" data-db-index=\"31\" class=\"\" data-cell-type=\"text\" data-original-value=\"\" data-order=\"\" ><\/th><th data-cell-id=\"C31\" data-x=\"2\" data-y=\"31\" data-db-index=\"31\" class=\"\" data-cell-type=\"text\" data-original-value=\"\" data-order=\"\" ><\/th><\/tr><\/tfoot><\/table><!-- \/#supsystic-table-2.supsystic-table --><\/div><!-- \/.supsystic-tables-wrap --><!-- Tables Generator by Supsystic --><!-- Version:1.11.1 --><!-- http:\/\/supsystic.com\/ --><a title=\"WordPress Responsive Table\" style=\"display:none;\" href=\"https:\/\/supsystic.com\/plugins\/wordpress-data-table-plugin\/?utm_medium=love_link\" target=\"_blank\" rel=\"noopener\">WordPress Responsive Table<\/a><\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; color: #000000; font-size: 14pt;\">IPv4 and IPv6 addresses are not able to communicate with each other, but they can coexist on the same network, which is known as a Dual Stack.<\/span><\/p>\n<h2 class=\"western\" lang=\"en-US\"><span style=\"font-size: 24pt; font-family: Verdana, Geneva; color: #333333;\"><strong>Conclusion<\/strong><\/span><\/h2>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">Dealing with networking isn\u2019t always self-explanatory, and can be tough to work sometimes. The above information would have given you an understanding of the networking consequences of the IP protocol. <\/span><\/p>\n<p class=\"western\" lang=\"en-US\"><span style=\"font-size: 14pt; font-family: Verdana, Geneva; color: #333333;\">You will get several types of online tools, and calculators such as a subnet calculator, an IP address to binary octet converter, and a CIDR range finder that will help in understanding these concepts and obtain the required ranges and addresses by typing specific information. These tools will assist you in forming precise networking decisions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet is a group of computer networks, where each connected device has got an identifier that helps in its unique identification. This identifier is called&hellip;<\/p>\n","protected":false},"author":2,"featured_media":2642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2360,2421,2422,2423,2426,2424,2419,2371,2418,2420,2425,2427],"tags":[2373,2431,2366,2432,2367,2433,2436,2368,2434,2429,2369,2365,2372,2428,2430,2435,2437],"class_list":["post-2636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-understanding-of-ip-addressing","category-classless-inter-domain-routing-cidr-notation-chart","category-ipv4-cidr-chart","category-ipv6-cidr-chart","category-ipv6-relative-network-sizes","category-network-masks-and-subnets","category-network-prefixes","category-understanding-of-ip-addressing-ipv4-ipv6-netmasks-subnets-and-cidr-notation-charts-for-networking","category-what-is-ip-address","category-what-is-ipv4-address","category-what-is-ipv6-address","category-what-is-the-difference-between-ipv4-and-ipv6","tag-cidr-charts","tag-classless-inter-domain-routing-cidr-notation-chart","tag-ipv4","tag-ipv4-cidr-chart","tag-ipv6","tag-ipv6-cidr-chart","tag-ipv6-relative-network-sizes","tag-netmasks","tag-network-masks-and-subnets","tag-network-prefixes","tag-subnets-and-cidr-notation-charts-for-networking","tag-understanding-of-ip-addressing","tag-understanding-of-ip-addressing-ipv4-ipv6-netmasks-subnets-and-cidr-notation-charts-for-networking","tag-what-is-ip-address","tag-what-is-ipv4-address","tag-what-is-ipv6-address","tag-what-is-the-difference-between-ipv4-and-ipv6"],"acf":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/posts\/2636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/comments?post=2636"}],"version-history":[{"count":42,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/posts\/2636\/revisions"}],"predecessor-version":[{"id":5761,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/posts\/2636\/revisions\/5761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media\/2642"}],"wp:attachment":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media?parent=2636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/categories?post=2636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/tags?post=2636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}