{"appState":{"pageLoadApiCallsStatus":true},"articleState":{"article":{"headers":{"creationTime":"2016-03-26T15:28:03+00:00","modifiedTime":"2016-07-18T15:18:12+00:00","timestamp":"2022-09-14T18:15:10+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Private IP Address Ranges for Networks","strippedTitle":"private ip address ranges for networks","slug":"private-ip-address-ranges-for-networks","canonicalUrl":"","seo":{"metaDescription":"Private IP (Internet protocol) address blocks are the IP addresses most often used for private networks. Most networks use addresses in one of these ranges: 10.","noIndex":0,"noFollow":0},"content":"Private IP (Internet protocol) address blocks are the IP addresses most often used for private networks. Most networks use addresses in one of these ranges:\r\n<ul class=\"level-one\">\r\n\t<li>\r\n<p class=\"first-para\"><span class=\"code\">10.0.0.0</span> to <span class=\"code\">10.255.255.255</span></p>\r\n</li>\r\n\t<li>\r\n<p class=\"first-para\"><span class=\"code\">172.16.0.0</span> to <span class=\"code\">172.31.255.255</span></p>\r\n</li>\r\n\t<li>\r\n<p class=\"first-para\"><span class=\"code\">192.168.0.0</span> to <span class=\"code\">192.168.255.255</span></p>\r\n</li>\r\n</ul>","description":"Private IP (Internet protocol) address blocks are the IP addresses most often used for private networks. Most networks use addresses in one of these ranges:\r\n<ul class=\"level-one\">\r\n\t<li>\r\n<p class=\"first-para\"><span class=\"code\">10.0.0.0</span> to <span class=\"code\">10.255.255.255</span></p>\r\n</li>\r\n\t<li>\r\n<p class=\"first-para\"><span class=\"code\">172.16.0.0</span> to <span class=\"code\">172.31.255.255</span></p>\r\n</li>\r\n\t<li>\r\n<p class=\"first-para\"><span class=\"code\">192.168.0.0</span> to <span class=\"code\">192.168.255.255</span></p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe</b> is the bestselling author of more than 40 <i>For Dummies</i> books. He's covered everything from Microsoft Office to creating web pages to technologies such as Java and ASP.NET, and has written several editions of both <i>PowerPoint For Dummies</i> and <i>Networking For Dummies.</i></p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":true,"relatedBook":{"bookId":292922,"slug":"dns-for-dummies","isbn":"9780764516832","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0764516833/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0764516833/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0764516833-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0764516833/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0764516833/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/covers/9780764516832.jpg","width":250,"height":350},"title":"DNS For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"10654\">Blair Rampling</b> is a senior systems administrator and system architect. <p>David Dalan is a technical trainer and training manager for a leading international technical support services call-center firm.</p> Blair Rampling is a senior systems administrator and system architect. <p><b data-author-id=\"10655\">David Dalan</b> is a technical trainer and training manager for a leading international technical support services call-center firm.</p></p>","authors":[{"authorId":10654,"name":"Blair Rampling","slug":"blair-rampling","description":" Blair Rampling is a senior systems administrator and system architect. <p>David Dalan is a technical trainer and training manager for a leading international technical support services call-center firm.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10654"}},{"authorId":10655,"name":"David Dalan","slug":"david-dalan","description":" Blair Rampling is a senior systems administrator and system architect. <p>David Dalan is a technical trainer and training manager for a leading international technical support services call-center firm.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10655"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/292922"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{"key":"cat","values":["technology","information-technology","networking","general-networking"]},{"key":"isbn","values":[null]}]\" id=\"du-slot-63221a2e921e6\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{"key":"cat","values":["technology","information-technology","networking","general-networking"]},{"key":"isbn","values":[null]}]\" id=\"du-slot-63221a2e92702\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":null,"lifeExpectancySetFrom":null,"dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":168546},"articleLoadedStatus":"success"},"listState":{"list":{},"objectTitle":"","status":"initial","pageType":null,"objectId":null,"page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{},"filterDataLoadedStatus":"initial","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2024-05-02T15:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"https://cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"https://sb\" : \"http://b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"https://sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"https://zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for http://www.dummies.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'https://static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"https://www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":301547,"title":"For the Game Day Prepper","hasSubCategories":false,"url":"/collection/big-game-day-prep-made-easy-301547"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":{"term":"168546","count":5,"total":375,"topCategory":0,"items":[{"objectType":"article","id":168546,"data":{"title":"Private IP Address Ranges for Networks","slug":"private-ip-address-ranges-for-networks","update_time":"2016-07-18T15:18:12+00:00","object_type":"article","image":null,"breadcrumbs":[{"name":"Technology","slug":"technology","categoryId":33512},{"name":"Information Technology","slug":"information-technology","categoryId":33572},{"name":"Networking","slug":"networking","categoryId":33581},{"name":"General Networking","slug":"general-networking","categoryId":33585}],"description":"Private IP (Internet protocol) address blocks are the IP addresses most often used for private networks. Most networks use addresses in one of these ranges:\r\n\r\n\t\r\n10.0.0.0 to 10.255.255.255\r\n\r\n\t\r\n172.16.0.0 to 172.31.255.255\r\n\r\n\t\r\n192.168.0.0 to 192.168.255.255\r\n\r\n","item_vector":null},"titleHighlight":null,"descriptionHighlights":null,"headers":null},{"objectType":"article","id":184514,"data":{"title":"Network Administration: IP Address Blocks","slug":"network-administration-ip-address-blocks","update_time":"2016-03-26T19:46:35+00:00","object_type":"article","image":null,"breadcrumbs":[{"name":"Technology","slug":"technology","categoryId":33512},{"name":"Information Technology","slug":"information-technology","categoryId":33572},{"name":"Networking","slug":"networking","categoryId":33581},{"name":"General Networking","slug":"general-networking","categoryId":33585}],"description":"A subnet can be thought of as a range or block of IP addresses that have a common network ID. For example, the CIDR 192.168.1.0/28 represents the following block of 14 IP addresses:\n192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.4\n192.168.1.5 192.168.1.6 192.168.1.7 192.168.1.8\n192.168.1.9 192.168.1.10 192.168.1.11 192.168.1.12\n192.168.1.13 192.168.1.14\nGiven an IP address in CIDR notation, it’s useful to be able to determine the range of actual IP addresses that the CIDR represents. This matter is straightforward when the octet within which the network ID mask ends happens to be 0, as in the preceding example. You just determine how many host IDs are allowed based on the size of the network ID and count them off.\nHowever, what if the octet where the network ID mask ends is not 0? For example, what are the valid IP addresses for 192.168.1.100 when the subnet mask is 255.255.255.240? In that case, the calculation is a little harder. The first step is to determine the actual network ID.\nYou can do that by converting both the IP address and the subnet mask to binary and then extracting the network ID as in this example:\n 192 . 168 . 1 . 100\nIP address: 11000000 10101000 00000001 01100100\nSubnet mask: 11111111 11111111 11111111 11110000\nNetwork ID: 11000000 10101000 00000001 01100000\n 192 . 168 . 1 . 96\nAs a result, the network ID is 192.168.1.96.\nNext, determine the number of allowable hosts in the subnet based on the network prefix. You can calculate this by subtracting the last octet of the subnet mask from 254. In this case, the number of allowable hosts is 14.\nTo determine the first IP address in the block, add 1 to the network ID. Thus, the first IP address in my example is 192.168.1.97. To determine the last IP address in the block, add the number of hosts to the network ID. In my example, the last IP address is 192.168.1.110. As a result, the 192.168.1.100 with subnet mask 255.255.255.240 designates the following block of IP addresses:\n192.168.1.97 192.168.1.98 192.168.1.99 192.168.1.100\n192.168.1.101 192.168.1.102 192.168.1.103 192.168.1.104\n192.168.1.105 192.168.1.106 192.168.1.107 192.168.1.108\n192.168.1.109 192.168.1.110","item_vector":null},"titleHighlight":null,"descriptionHighlights":null,"headers":null},{"objectType":"article","id":184687,"data":{"title":"Network Administration: Classifying IP Addresses","slug":"network-administration-classifying-ip-addresses","update_time":"2016-03-26T19:48:56+00:00","object_type":"article","image":null,"breadcrumbs":[{"name":"Technology","slug":"technology","categoryId":33512},{"name":"Information Technology","slug":"information-technology","categoryId":33572},{"name":"Networking","slug":"networking","categoryId":33581},{"name":"General Networking","slug":"general-networking","categoryId":33585}],"description":"When the original designers of the IP protocol created the IP addressing scheme, they could have assigned an arbitrary number of IP address bits for the network ID. The remaining bits would then be used for the host ID.\nFor example, suppose that the designers decided that half of the address (16 bits) would be used for the network, and the remaining 16 bits would be used for the host ID. The result of that scheme would be that the Internet could have a total of 65,536 networks, and each of those networks could have 65,536 hosts.\nIn the early days of the Internet, this scheme probably seemed like several orders of magnitude more than would ever be needed. However, the IP designers realized from the start that few networks would actually have tens of thousands of hosts.\nSuppose that a network of 1,000 computers joins the Internet and is assigned one of these hypothetical network IDs. Because that network will use only 1,000 of its 65,536 host addresses, more than 64,000 IP addresses would be wasted.\nAs a solution to this problem, the idea of IP address classes was introduced. The IP protocol defines five different address classes: A, B, C, D, and E. Each of the first three classes, A–C, uses a different size for the network ID and host ID portion of the address. Class D is for a special type of address called a multicast address. Class E is an experimental address class that isn’t used.\nThe first four bits of the IP address are used to determine into which class a particular address fits, as follows:\n\n If the first bit is zero, the address is a Class A address.\n \n If the first bit is one and if the second bit is zero, the address is a Class B address.\n \n If the first two bits are both one and if the third bit is zero, the address is a Class C address.\n \n If the first three bits are all one and if the fourth bit is zero, the address is a Class D address.\n \n If the first four bits are all one, the address is a Class E address.\n \n\nThe following table summarizes the details of each address class.\n\n\nIP Address Classes\n\n\nClass\nAddress Number Range\nStarting Bits\nLength of Network ID\nNumber of Networks\nHosts\n\n\nA\n1–126.x.y.z\n0\n8\n126\n16,777,214\n\n\nB\n128–191.x.y.z\n10\n16\n16,384\n65,534\n\n\nC\n192–223.x.y.z\n110\n24\n2,097,152\n254\n\n","item_vector":null},"titleHighlight":null,"descriptionHighlights":null,"headers":null},{"objectType":"article","id":196388,"data":{"title":"TCP/IP Definitions","slug":"tcpip-definitions","update_time":"2016-03-26T22:08:00+00:00","object_type":"article","image":null,"breadcrumbs":[{"name":"Technology","slug":"technology","categoryId":33512},{"name":"Information Technology","slug":"information-technology","categoryId":33572},{"name":"Networking","slug":"networking","categoryId":33581},{"name":"General Networking","slug":"general-networking","categoryId":33585}],"description":"Knowing your way around TCP/IP is key if you want to manage a network successfully. The definitions in the following list explain the basics, such as what an IP address is, and they also clarify the various nets you deal with — extranets, intranet, and subnetting — as well other key terms. \n\n CIDR (Classless InterDomain Routing): A way to conserve on IP addresses. An IP addressing design that replaces the traditional Class A, B, C structure, CIDR allows one IP address to represent many IP addresses. A CIDR address looks like a regular IP address with a “suffix” on the end, such as 192.200.0.0/12. The suffix is an IP prefix.\n \n extranet: A private/public hybrid network that uses TCP/IP to share part of an intranet with an outside organization. An extranet is the part of an intranet that outsiders can access over the Internet. Be sure to have good security practices if you have an extranet.\n \n intranet: An organization’s private network. If your intranet is built on TCP/IP protocols, applications, and services, it’s also an Internet.\n \n IP address: The 32-bit (IPv4) or 128-bit (IPv6) numeric address for a computer. You must have an IP address to be connected to the Internet. An IP address consists of two parts: the network piece and the host piece. An IPv4 example: 127.0.0.1; an IPv6 example: 0:0:0:0:0:0:0:1 (::1 for short).\n \n loopback address: IP shorthand for you — actually, your computer. The loopback is a special IP address (127.0.0.1) that isn’t physically connected to any network hardware. You use it to test TCP/IP services and applications without worrying about hardware problems.\n \n Network Address Translation (NAT): Helps the Internet not run out of IP addresses by translating an IP address (perhaps not unique) on one network to another IP address on a different network — usually, the Internet. IPv6 does away with the need for NAT address help, but NAT, unintentionally, also provides firewall security.\n \n subnetting: Dividing one large Internet into smaller networks (subnets) in which they all share the same network portion of an IP address.\n \n TCP/IP (Transmission Control Protocol/Internet Protocol): The guts and the rules of the Internet and World Wide Web. A set of protocols, services, and applications for linking computers of all kinds.\n \n Virtual private network (VPN): A private network that runs over the public Internet. You can build a VPN at low cost by using the Internet (rather than your own system of private — and expensive — lines) with special security checks and a tunneling protocol. Companies are beginning to use a private virtual network for both extranets and wide-area intranets.\n \n Voice over Internet Protocol (VoIP): Are you spending too much on phone calls? Get rid of your phone service. You can make phone calls from anywhere to anywhere that has a computer, free VoIP software, and a fast Internet connection. Even better, it’s free. You can call from Buenos Aires to Nairobi for free with VoIP. It doesn’t have to be computer to computer, either. You can also use VoIP to call a regular telephone number.\n \n\nAre you acronym challenged? If you don’t know what a particular acronym means, visit WhatIs? where you can find thousands of definitions for Internet and security acronyms.","item_vector":null},"titleHighlight":null,"descriptionHighlights":null,"headers":null},{"objectType":"article","id":184474,"data":{"title":"Network Administration: Understanding IP Address Scopes","slug":"network-administration-understanding-ip-address-scopes","update_time":"2016-03-26T19:46:05+00:00","object_type":"article","image":null,"breadcrumbs":[{"name":"Technology","slug":"technology","categoryId":33512},{"name":"Information Technology","slug":"information-technology","categoryId":33572},{"name":"Networking","slug":"networking","categoryId":33581},{"name":"General Networking","slug":"general-networking","categoryId":33585}],"description":"A scope is simply a range of IP addresses that a Dynamic Host Configuration Protocol (DHCP) server is configured to distribute. In the simplest case, where a single DHCP server oversees IP configuration for an entire subnet, the scope corresponds to the subnet.\nHowever, if you set up two DHCP servers for a subnet, you can configure each with a scope that allocates only one part of the complete subnet range. In addition, a single DHCP server can serve more than one scope.\nYou must create a scope before you can enable a DHCP server. When you create a scope, you can provide it with the following properties:\n\n A scope name, which helps you to identify the scope and its purpose\n \n A scope description, which lets you provide additional details about the scope and its purpose\n \n A starting IP address for the scope\n \n An ending IP address for the scope\n \n A subnet mask for the scope\nYou can specify the subnet mask with dotted-decimal notation or with network prefix notation.\n \n One or more ranges of excluded addresses\nThese addresses won’t be assigned to clients. For more information, see the section “Feeling excluded?” later in this chapter.\n \n One or more reserved addresses\nThese are addresses that will always be assigned to particular host devices. For more information, see the section “Reservations suggested” later in this chapter.\n \n The lease duration, which indicates how long the host will be allowed to use the IP address\nThe client will attempt to renew the lease when half of the lease duration has elapsed. For example, if you specify a lease duration of eight days, the client will attempt to renew the lease after four days pass. This allows the host plenty of time to renew the lease before the address is reassigned to some other host.\nThe router address for the subnet\nThis value is also known as the Default Gateway address.\n \n The domain name and the IP address of the network’s DNS servers and WINS servers\n \n","item_vector":null},"titleHighlight":null,"descriptionHighlights":null,"headers":null}]},"relatedArticlesStatus":"success"},"routeState":{"name":"Article4","path":"/article/technology/information-technology/networking/general-networking/private-ip-address-ranges-for-networks-168546/","hash":"","query":{},"params":{"category1":"technology","category2":"information-technology","category3":"networking","category4":"general-networking","article":"private-ip-address-ranges-for-networks-168546"},"fullPath":"/article/technology/information-technology/networking/general-networking/private-ip-address-ranges-for-networks-168546/","meta":{"routeType":"article","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"dropsState":{"submitEmailResponse":false,"status":"initial"},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
Private IP (Internet protocol) address blocks are the IP addresses most often used for private networks. Most networks use addresses in one of these ranges: